Tuesday, January 28, 2020
You Are an Investment Analyst Essay Example for Free
You Are an Investment Analyst Essay History ââ¬Å"Bradââ¬â¢s drinkâ⬠was created in the summer of 1893 by pharmacist Caleb Bradham of New Bern, North Carolina. The drink was renamed Pepsi Cola in 1898, after pepsin and cola nuts were used in the recipe. Also in 1898, Caleb Bradham wisely bought the trade name Pep Cola for $100 from a competitor from Newark, New Jersey that had gone broke. The new name was trademarked on June 16th, 1903. Bradhams neighbor, an artist designed the first Pepsi logo and ninety-seven shares of stock for Bradhams new company were issued (Bellis, 2012). After seventeen years of success, Caleb Bradham lost Pepsi Cola. He had gambled on the fluctuations of sugar prices during W.W.I, believing that sugar prices would continue to rise but they fell instead leaving Caleb Bradham with an overpriced sugar inventory. Pepsi Cola went bankrupt in 1923. In 1931, Pepsi Cola was bought by the Loft Candy Company Loft president, Charles G. Guth who reformulated the popular soft drink. Guth struggled to make a success of Pepsi and even offered to sell Pepsi to the Coca-Cola company, who refused to offer a bid (Bellis, 2012). In May, 1886, Coca Cola was invented by Doctor John Pemberton a pharmacist from Atlanta, Georgia. The soft drink was first sold to the public at the soda fountain in Jacobââ¬â¢s Pharmacy in Atlanta on May 8, 1886. About nine servings of the soft drink were sold each day. Sales for that first year added up to a total of about $50. The funny thing was that it cost John Pemberton over $70 in expanses, so the first year of sales were a loss (Bellis, 2012). In 1887, another Atlanta pharmacist and businessman, Asa Candler bought the formula for Coca Cola from inventor John Pemberton for $2,300. By the late 1890s, Coca Cola was one of Americaââ¬â¢s most popular fountain drinks, largely due to Candlerââ¬â¢s aggressive marketing of the product. With Asa Candler, now at the helm, the Coca Cola Company increased syrup sales by over 4000% between 1890 and 1900. Until the 1960s, both small town and big city dwellers enjoyed carbonated beverages at the local soda fountain or ice cream saloon. Often housed in the drug store, the soda fountain counter served as a meeting place for people of all ages. Often combined with lunch counters, the soda fountain declined in popularity as commercial ice cream, bottled soft drinks, and fast food restaurants became popular (Bellis, 2012). Products and Services PepsiCo is a global food and beverage leader with a diverse product portfolio that includes 22 brands that each generate more than $1 billion each in annual retail sales. Pepsi-Cola North America is the refreshment beverage unit of PepsiCo, Inc., in the United States and Canada. Its U.S. brands include Pepsi, Mountain Dew, Sierra Mist, SoBe, AMP Energy, IZZE, Naked Juice, Propel, Mug, and Aquafina, among others. The company also makes and markets North Americaââ¬â¢s best-selling ready-to-drink iced teas and coffees, respectively, via joint ventures with Lipton and Starbucks (PepsiCo, 2012). Frito-Lay North America is the $13 billion convenient foods business unit of PepsiCo. For more than 75 years, Frito Lay has enjoyed growing the best snacks on earth starting with simple, farm-grown ingredients. To continue growing the best snacks on earth, they are working to reduce their impact on the environment by improving how they make their snacks. Frito-Lay is also dedicated to giving consumers a wider range of healthier choices. They offer great-tasting chips with less fat through their Baked! Line and snacks made only from natural ingredients, which contain no artificial colors, flavors or preservatives with their Natural line. All of their snack chips contain 0 grams of trans fat (PepsiCo, 2012). Tropicana Products, Inc., a division of PepsiCo, Inc., is the leading producer and marketer of branded fruit juices. Tropicana markets its products in the U.S. under a variety of brand names, including the Tropicana not-from-concentrate line of juices: Doleà ® juices and juice blends; Tropicanaà ® Juices, Trop50 and Tropicana Twisterà ® juice beverages. The Dole brand name is licensed from Dole Food Company, Inc. (PepsiCo, 2012). Quaker brands have been around for over a century. They are symbols of quality, great taste, and nutrition. Holding No.1 positions in their respective categories are favorites such as Quaker Oats, Quake r Rice Cakes, Chewy Granola Bars and Rice-A-Ronià ®. With its Aunt Jemimaà ® brand, Quaker is also a leading manufacturer of pancake syrups and mixes. It is among the four largest manufacturers of cold cereals with popular brands like Capââ¬â¢n Crunchà ® and Lifeà ® (PepsiCo, 2012). Available in more than 80 countries, Gatoradeââ¬â¢s line of performance drinks adds over 45 years of rehydration and sports nutrition research to the PepsiCo portfolio. In early summer of 1965, a University of Florida assistant football coach sat down with a team of university physicians and asked them to determine why so many of his players were being affected by heat and heat-related illnesses. The researchers Dr. Robert Cade, Dr. Dana Shires, Dr. H. James Free and Dr. Alejandro de Quesada soon discovered two key factors that were causing the Gator players to ââ¬Å"wiltâ⬠: the fluids and electrolytes the players lost through sweat were not being replaced, and the large amounts of carbohydrates the playersââ¬â¢ bodies used for energy were not being replenished (PepsiCo, 2012). The researchers then took their findings into the lab, and scientifically formulated a new, precisely balanced carbohydrate-electrolyte beverage that would adequately replace the key components lost by Gator players through sweating and exercise. They called their concoction ââ¬Å"Gatorade.â⬠After years of careful research by the staff at GSSI into the needs of athletes engaged in high-demand training and competition, Gatorade launched the Gatorade Performance Series, an elite line of sports nutrition products, in 2001. These products include Gatorade Energy Drink, Gatorade Energy Bar, and the Gatorade Nutrition Shake (PepsiCo, 2012). Four years later, after studying endurance athletes, GSSI developed the Gatorade Endurance Formula. Featuring a higher concentration of sodium the key electrolyte found in Original Thirst Quencher and four other electrolytes lost in sweat, Gatorade Endurance Formula became a mainstay on racetracks the world over (PepsiCo, 2012). The Coca-Cola Company is the worldââ¬â¢s largest beverage company, refreshing consumers with more than 500 sparkling and still brands. Led by Coca-Cola, the worldââ¬â¢s most valuable brand, our Companyââ¬â¢s portfolio features 15 billion dollar brands including Diet Coke, Fanta, Sprite, Coca-Cola Zero, vitaminwater, Powerade, Minute Maid, Simply, Georgia and Del Valle. Globally, we are the No. 1 provider of sparkling beverages, ready-to-drink coffees, and juices and juice drinks. Through the worldââ¬â¢s largest beverage distribution system, consumers in more than 200 countries enjoy our beverages at a rate of 1.8 billion servings a day. With an enduring commitment to building sustainable communities, our Company is focused on initiatives that reduce our environmental footprint, support active, healthy living, create a safe, inclusive work environment for our associates, and enhance the economic development of the communities where we operate. Together with our bottling partners, we rank among the worldââ¬â¢s top 10 private employers with more than 700,000 system employees (Coca-Cola Journey, 2012 ). Major Customers PepsiCo is proud to offer consumers a wide range of products that deliver great taste, nutritional value, convenience and affordability. Theyââ¬â¢re committed to playing a responsible role in health and wellness by encouraging consumers to adopt healthy lifestyles, beginning with offering consumers a choice of a wide variety of products. PepsiCo is always finding innovative ways to reduce the use of energy, water and packaging, and to better serve consumer wants and needs through new products and packaging. Through continuously expand their distribution network to make their enjoyable products more widely available. PepsiCo works relentlessly to improve productivity so they can offer affordable products to a broad range of consumers (PepsiCo, 2012). Coca-Cola system is a global business that operates on a local scale, in every community where we do business. Coca-Cola is able to create global reach with local focus because of the strength of the Coca-Cola system, which comprises our Company and our nearly 300 bottling partners worldwide (Coca-Cola Journey, 2012 ). While many view our Company as simply ââ¬Å"Coca-Cola,â⬠our system operates through multiple local channels. Our Company manufactures and sells concentrates, beverage bases and syrups to bottling operations, owns the brands and is responsible for consumer brand marketing initiatives. Our bottling partners manufacture, package, merchandise and distribute the final branded beverages to our customers and vending partners, who then sell our products to consumers (Coca-Cola Journey, 2012 ). Major Suppliers Since 2007, PepsiCo has employed a Supplier Code of Conduct (ScoC) globally. The PepsiCo Supplier Code of Conduct communicates our global expectations in the areas of labor practices, associate health and safety, environmental management and business integrity (PepsiCo, 2012). Our Supplier Code is based on the International Labor Organization, United Nations Global Compact and other internationally recognized standards. The ScoC includes 13 standards that require suppliers to adhere to the following: basic compliance with local law, respect for human rights and prohibiting all forms of forced or compulsory labor, ensuring no child labor is used, and cooperating with reasonable assessment processes requested by PepsiCo. The ScoC is communicated in 19 languages, and is mandatory in procurement contracts globally (PepsiCo, 2012). Our suppliers and business partners are vital to our continued success. They help us refresh the world, more than 1.7 billion times every day, by delivering necessary products and services for our business (Coca-Cola Journey, 2012 ). Having a sound, stable and ethical supply base is important for our growth and the footprint we leave in local communities around the world. Our suppliers provide our system with materials, including ingredients, packaging and machinery, as well as goods and services. As a company, we have a responsibility to hold our direct suppliers and bottling partners to standards no less than those required by applicable law. We also have an opportunity to support community development by purchasing goods and services from minority- and women-owned business enterprises (MWBEs) (Coca-Cola Journey, 2012 ). Our suppliers are expected, at a minimum, to conduct business in an ethical manner and comply with all applicable laws and regulations. Our Supplier Guiding Principles (SGPs) communicate our values and expectations for our bottling partners and business partners. The SGPs are a part of all supplier agreements, and a pre-certification practice is in place for trademark marketing suppliers. Suppliers also are provided training and assistance programs on an as-needed basis for areas where they need to improve their operations (Coca-Cola Journey, 2012 ). Leadership In 2010, PepsiCo created the Global Sustainability team, whose role is to develop, implement and enforce standards to ensure consistency and quality in our sustainability reporting and ultimately accelerate our Performance with Purpose mission (PepsiCo, 2012). More specifically, an overall governance structure has been defined and implemented. This includes the creation of the Sustainability Steering Committee (SSC), made up of the most senior members of the organization (the majority report directly to our CEO), as well as the establishment of Sustainability Leadership Teams across all four planks, based on defined roles and selection criteria, and guided by PepsiCoââ¬â¢s Public Policy Coordinating Group (PepsiCo, 2012). The Performance Sustainability Leadership Team (PSLT), Human Sustainability Leadership Team (HSLT), Environmental Sustainability Leadership Team (ESLT) and Talent Sustainability Leadership Team (TSLT) are responsible for creating our overall strategy, driving implementation and identifying issues/risks, which are then communicated to the Sustainability Steering Committee (PepsiCo, 2012). Since our first soda fountain sales in 1886, we have been a driver of marketplace innovation and an investor in local economies. Today we lead the beverage industry with more than 500 beverage brands ââ¬â including four of the worldââ¬â¢s top-five sparkling brands. But while our business opportunities are enormous, our commitment to our consumers and the communities in which we operate is even greater (Coca-Cola Journey, 2012 ). Muhtar Kent, our Chairman of the Board and Chief Executive Officer, leads us into the new century with a firm commitment to the values and spirit of the worldââ¬â¢s greatest brand. In our journey to become a sustainable, profitable growth company, our management structure has evolved to sharpen external focus on the marketplace with greater speed, productivity and effectiveness (Coca-Cola Journey, 2012 ). Initial Public Offering An initial public offering yesterday by Pepsi Bottling Group Inc. provided a stark contrast to the pyrotechnics of recent Internet offerings. In a spinoff from its parent company, PepsiCo Inc., Pepsi Bottling sold 100 million shares at $23 each, for a total of $2.3 billion, which will be used to pay off debt. The initial offering price was settled at the low end of the estimated range of $23 to $26, an indication that prepricing demand was less than the company had anticipated. The stock closed at $21.6875 on the New York Stock Exchange. Analysts were quick to distinguish Pepsi Bottling Groupââ¬â¢s offering from the string of highly successful recent Internet deals, whose phenomenal openings have conditioned investors into expecting huge first-day gains (Pepsi Spinoff in Lackluster Stock Offering, 1999). Initial public offering involves the first or initial sale of the corporationââ¬â¢s common shares to the public in the hope of raising additional revenues for the corporation. If you will apply in on the case of Coca Cola, the worldwide manufacturing and distribution of their carbonated drink products is the result of their IPO, which happened in 1919. A single share of Coca Cola is worth $40 dollars, yet the market value of their shares suddenly crashed to $19 per common share in 1920 (when they have undergone a secondary market offering). Despite of such crash in the market value of their common shares, Coca Cola managed to survive and extend operations to different regions around the world, particularly within the Asian and European regions. Different corporate entities later on affiliated with Coca Cola to further boost their revenue generation capabilities (Interesting Initial Public Offering of the Coca Cola Company and Its Worldwide Affiliate Units, 2010).
Monday, January 20, 2020
Is Google Evil? Essay -- Legal Case Monopoly
Google has proposed an agreement with representatives of authors and publishers to host a massive digital library. This library will consist of mostly books published in the United States. Google will make digitally available new and old books. This catalog will include books that are no longer in print and ââ¬Å"orphanâ⬠texts (books where the copyright owner is unknown or contact information is unavailable).5 The texts will be available through search engines, for individual sale as electronic-books, and with database subscriptions. If the Google agreement is approved by the Justice Department, ethical issues would come into question. The issues addressed in this paper include whether the agreement creates a ââ¬Å"legally sanctioned cartel for digital book rightsâ⬠4 and if the public benefits outweigh the monopoly consequences. Google has the network, storage, man power and funding to make this digital library a possibility, yet is this justification enough to give one company so much concentrated power over information access? Using the utilitarian approach, arguments both for and against the Google library agreement can be supported. First the audience should be established. Authors and publishers could be financially affected by this agreement. They are represented as a whole by the Authors Guild and the Association of American Publishers. Both groups are working together to ensure that writers are not under compensated by Google and that publishing prices do not become too high. The Google company and its competitors are directly affected by the outcome of the agreement. Google will take on a huge expense in hopes to gain a reasonable profit. Competitors with equivalent capabilities, such as Microsoft and Amazon, have not expressed ... ...t there is no immediate need to settle for the current agreement. The Authors Guild and the Association of American Publishers should take time to incorporate preventative measures in the agreement. Given the substantial impact the digital library would make time should be taken to re-discuss terms of usage, include amendments and restrictions. References 1. E. HARRIS and R. JAMES, ENGR 482 Class Notes, Texas A&M University (Fall 2009). 2. HARRIS,PRITCHARD, RABINS, ââ¬Å"Engineering Ethicsâ⬠, Wadsworth, Cengage Learning, Belmont (2009) 3. J. E. VASCELLARO and J. A. TRACHTENBERG, ââ¬Å"Digital-Rights Signatories Revisit Googleââ¬â¢s dealâ⬠, Wall Street Journal; wsj.com (October 29,2009) 4. S. SHANKLAND, ââ¬Å"Googleââ¬â¢s Digital-book Future Hangs in the Balanceâ⬠, News.cnet.com (October 2009) 5. P. SCHRANK, ââ¬Å"Googleââ¬â¢s Big Book Caseâ⬠, The Economist print edition (September 3rd 2009)
Sunday, January 12, 2020
Vinegar as Alternative Battery
Vinegar as Alternative Battery An Investigatory Project Presented to The Faculty of the High School Department Surigao Education Center Km. 2, Surigao City _______________________________________________ In Partial Fulfillment of the Requirements in Physics IV _______________________________________________ By: Edradan, Dhaniel Jefferson Yaun, Mary Allyssa Concon, Leonel Galos, Jancirfil Jimena, Rimar Villarojo, Kerr March 2013 APPROVAL SHEET Vinegar as Alternative BatteryPrepared & Submitted by MARY ALLYSSA YAUN, DHANIEL JEFFERSON EDRADAN, LEONEL CONCON, JANCIRFIL GALOS, RIMAR JIMENA, KERR VILLAROJO has been examined and is recommended for approval and acceptance for ORAL EXAMINATION. GIOVANNI P. DOSANO Adviser ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- PANEL OF EXAMINERS APPROVED by the committee on ORAL EXAMINATION with the grade of__ on February 2013. ZALDY P. BELOY, Ph. D _______________ _____ _________ Member Member ___________________Member ACCEPTANCE in partial fulfillment of the requirements for SCIENCE IV Acknowledgement There are a lot of people the researchers would wish to thank for their generous and unselfish help in realization of this study. First and foremost, Almighty God for giving the researchers the patience and perseverance to tackle the study; To their parents who gave them their full support, financially and morally. To Sir Giovanni Dosano, who became the researchers great and dearly research paper adviser who patiently helped and encourage them finish the study.The researchers salute for the continuous help and guidance. And most especially, Sir Zaldy P. Beloy, Ph. D. for helping the researchers to understand revise and emphasize the importance of the study. TABLE OF CONTENTS Title Pagei Approval Sheetii Acknowledgementiii Abstractiv Table of Contentsvi CHAPTER I: THE PROBLEM AND REVIEW OF RELATED LITERATURE Introduction4 Review and Related literatur e5 Statement of the Problem5 Significance of the Study5 Scope of Limitations5 Definition of Terms7-8 CHAPTER II: METHODOLOGY Research Design9 Materials9 General Procedure9-10 Observation10Flow Chart of Methodology11 CHAPTER III: RESULTS AND ANALYSIS CHAPTER IV: SUMMARY, CONCLUSION, AND RECOMMENDATION Summary13 Findings13 Conclusion13 Recommendation13 References14 APPENDICES15 CHAPTER I THE PROBLEM AND REVIEW OF RELATED LITERATURE Introduction We all know that the world is now facing an energy crisis and everyone is trying to do something about that. Now you can show everyone that electrical energy or electricity can be made from air and vinegar. After all, vinegar are freely available everywhere. Battery is a device that converts chemical energy directly to electrical energy.It consists of a number of voltaic cells; each voltaic cell consists of twoà half-cellsconnected in series by a conductive electrolyte containing anions and cations. One half-cell includes electrolyte and the electrode to whichà anionsà (negatively charged ions) migrate, i. e. , theà anodeà or negative electrode; the other half-cell includes electrolyte and the electrode to whichà cationsà (positively charged ions) migrate, i. e. , the cathodeà or po sitive electrode. In theà redoxà reaction that powers the battery, cations are reduced (electrons are added) at the cathode, while anions are oxidized (electrons are removed) at the anode.The electrodes do not touch each other but are electrically connected by theà electrolyte. Some cells use two half-cells with different electrolytes. A separator between half-cells allows ions to flow, but prevents mixing of the electrolytes. Vinegar is a solution of acetic acid and water. Acids donate H+ ions into a solution. The concentration of these ions is what determines whether a solution is a strong electrolyte (conductor) or a weak one. Since vinegar has a low concentration of acetic acid(about 5%) it only has a pH of only ~2. 4 and so is a weak acid.Review of Related Literature According to Doctor Sergey stated that vinegar have lots of electronic magnet cells that can because electricity will small megabytes. During the experimentation, the researchers found out that 4 pieces of calamodins are enough to light a certain bulb. It is also found out that a coin which is hot copper and copper wires are not the appropriate materials in making the experiment. Instead of the materials mentioned used the copper coin and alligator wire. The galvanized nail also matter in lightning the bulb. Use the 1. inches galvanized nail to balanced the flow of the current. Statement of the Problem The researchers aimed to answer the following: 1. How much amount of vinegar that can make the light emitting diode bulb light? 2. Can vinegar bean alternative battery? Significance of the Study This activity is done by the researcher with an important purpose. This activity is launched solely for the Fourth Year High school students of Surigao Education Center. Scope and Limitations This study focused only on commercial vinegar as an alternative source of energy. Definition of Terms Battery ââ¬â a device consisting of one or moreà electrochemical cellsà that convert stored chemicalà energyà into electrical energy. * Vinegar ââ¬â a liquid substance consisting mainly ofà acetic acidà (CH3CO2H) andà water, the acetic acid being produced through theà fermentationà ofà ethanol byà acetic acid bacteria. * Electricity ââ¬â is the set of physical phenomena associated with the presence and flow ofà electric charge. * Acids ââ¬â is a substance which reacts with aà base * Electric Source ââ¬â aà physical propertyà ofà matterà that causes it to experience aà forceà when near other electrically charged matter. Cat ion ââ¬â the ion in an electrolyzed solution that migrates to the cathode;à broadlyà :à a positively charged ion * Anion ââ¬â the ion in an electrolyzed solution that migrates to the anode;à broadlyà :à a negatively charged ion | | * Anode ââ¬â the electrode of an electrochemical cell at which oxidation occurs: as * Cathode ââ¬â à the electrode of an electrochemical cell at which reduction occurs: * Current ââ¬â a flow of electricity * Voltage ââ¬â electric potential or potential difference expressed inà volts * Galvanized Nail ââ¬â Galvanizedà nails are a special type ofà nailà used in construction.They have undergone a special galvanizationà process, which involves covering them with aà zincà coating in order to form a protective barrier. This barrier also works as aà sacrificial anode, which means the coating will dissolve before the metal inside does, if the barrier itself becomes damaged. * Copper Wire ââ¬â Copperà has been used inà electric wiringà since the invention of theà electromagnetà and theà telegraphà in the 1820s. The invention of theà telep honeà in 1876 created further demand for copper wire as an electrical conductor. CHAPTER II METHODOLOGY Research DesignThe descriptive and experimental design was used in this study. Materials/Equipment * Vinegar (Commercial) * 1 meter Alligator Wires * 1. 5 inch Galvanized Nails * 1. 5 inch Copper wires * Tape * 2 Cups * Led bulb General Procedure A. Preparation on Materials 1. Prepare and check all the materials needed B. Set up the prepared materials 1. Share first the vinegar in packs 2. Fill the cups with vinegar 3. Then place a type at the top of the cups then put two different holes C. Connecting the wires 1. Attach the galvanized nail and copper wires both side. Do not allow the copper wire and galvanized nail touch each other. . Attach the alligator wire to the copper wires and galvanized nails 3. Attach the alligator clip to the bulb and it will light up. C1. Observation C2. Collection of Data C3. Tabulation C4. Evaluation C5. Conclusion Flow Chart of Methodology Conclus ion Tabulation Collection of Data Evaluation Observation Experimentation Setting up the Prepare Materials Preparation CHAPTER III RESULTS AND DISCUSSION Table. 1 TRIAL| AMOUNT OF VINEGAR| OBSERVATION| 1| 200 ml| The led bulb havenââ¬â¢t produced light| 2| 400 ml| The led bulb still havenââ¬â¢t produced light| 3| 800 ml| The led bulb produced little light| | 1000 ml| The led bulb produced great light| Based on the table above, the researchers first prepared in trial with the amount of vinegar 200ml but it does not make the led bulb light. On the second trial, they prepared 400ml but again it does not work. By the third trial, with the amount of 800ml of vinegar, it only produced a little amount of light on the led bulb. On their last trial, they tried to use more vinegar with the amount of 1000ml, and then it already made the led bulb produced great light. CHAPTER IV SUMMARY, FINDINGS, CONCLUSION AND RECOMENDATIONSIn this chapter the researchers will be giving the summary of th e findings of their study. The conclusions on the different problems that arose and to the recommendations on the kinds of improvement their readers can do in the near future. Summary With the use of vinegar it is proven effective when the copper wire and galvanized nail is inserted in it. Based on the observation of the researchers through experimentation it was proven that Vinegar can be an alternative battery and can be a good source of electricity and further justified based on the result of the study.Findings Based on the experiment conducted, the following were the findings of the study: 1. With the amount of 1000ml of vinegar, it can make the led bulb light with the use also of galvanized nail and copper wire 2. Vinegar contains small amounts of acetic acid that can make the led bulb light Conclusions Based on the findings the researchers have conducted, the researchers therefore conclude that vinegar can be an alternative battery and a good example of producing light.With th e galvanized nail and copper wire as the negative and positive the two components shouldnââ¬â¢t be attach with other with the flow of electricity there should only be one direction Recommendations The experiment is easy, you can spend lesser. This is recommended to all the people. By this study, a lot of people can get and get idea how to save money, and energy at home. Someday, vinegar will be a source of electricity. The researchers also recommend this to the following: * Students ââ¬â this can help them to be their guide anf for them to try something new and develop their skills in investigatory. Teachers ââ¬â to take this as an example to the students for them to encourage themselves to discover other kinds of alternative battery. The researchers recommend two title of further studies: 1. ââ¬Å"Animal Urine as Alternative batteryâ⬠2. ââ¬Å"Vinegar as a battery for Calculatorâ⬠REFERENCES http://tag. wonderhowto. com/vinegar-battery/ http://hilaroad. com/c amp/projects/lemon/vinegar_battery. html http://www. youtube. com/watch? v=pq9NuvdLZaU&feature=gv http://www. termpaperwarehouse. com/search_results. php? query=vinegar+alternative+battery+ APPENDICES Vinegar as Alternative Battery Vinegar as Alternative Battery An Investigatory Project Presented to The Faculty of the High School Department Surigao Education Center Km. 2, Surigao City _______________________________________________ In Partial Fulfillment of the Requirements in Physics IV _______________________________________________ By: Edradan, Dhaniel Jefferson Yaun, Mary Allyssa Concon, Leonel Galos, Jancirfil Jimena, Rimar Villarojo, Kerr March 2013 APPROVAL SHEET Vinegar as Alternative BatteryPrepared & Submitted by MARY ALLYSSA YAUN, DHANIEL JEFFERSON EDRADAN, LEONEL CONCON, JANCIRFIL GALOS, RIMAR JIMENA, KERR VILLAROJO has been examined and is recommended for approval and acceptance for ORAL EXAMINATION. GIOVANNI P. DOSANO Adviser ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- PANEL OF EXAMINERS APPROVED by the committee on ORAL EXAMINATION with the grade of__ on February 2013. ZALDY P. BELOY, Ph. D _______________ _____ _________ Member Member ___________________Member ACCEPTANCE in partial fulfillment of the requirements for SCIENCE IV Acknowledgement There are a lot of people the researchers would wish to thank for their generous and unselfish help in realization of this study. First and foremost, Almighty God for giving the researchers the patience and perseverance to tackle the study; To their parents who gave them their full support, financially and morally. To Sir Giovanni Dosano, who became the researchers great and dearly research paper adviser who patiently helped and encourage them finish the study.The researchers salute for the continuous help and guidance. And most especially, Sir Zaldy P. Beloy, Ph. D. for helping the researchers to understand revise and emphasize the importance of the study. TABLE OF CONTENTS Title Pagei Approval Sheetii Acknowledgementiii Abstractiv Table of Contentsvi CHAPTER I: THE PROBLEM AND REVIEW OF RELATED LITERATURE Introduction4 Review and Related literatur e5 Statement of the Problem5 Significance of the Study5 Scope of Limitations5 Definition of Terms7-8 CHAPTER II: METHODOLOGY Research Design9 Materials9 General Procedure9-10 Observation10Flow Chart of Methodology11 CHAPTER III: RESULTS AND ANALYSIS CHAPTER IV: SUMMARY, CONCLUSION, AND RECOMMENDATION Summary13 Findings13 Conclusion13 Recommendation13 References14 APPENDICES15 CHAPTER I THE PROBLEM AND REVIEW OF RELATED LITERATURE Introduction We all know that the world is now facing an energy crisis and everyone is trying to do something about that. Now you can show everyone that electrical energy or electricity can be made from air and vinegar. After all, vinegar are freely available everywhere. Battery is a device that converts chemical energy directly to electrical energy.It consists of a number of voltaic cells; each voltaic cell consists of twoà half-cellsconnected in series by a conductive electrolyte containing anions and cations. One half-cell includes electrolyte and the electrode to whichà anionsà (negatively charged ions) migrate, i. e. , theà anodeà or negative electrode; the other half-cell includes electrolyte and the electrode to whichà cationsà (positively charged ions) migrate, i. e. , the cathodeà or po sitive electrode. In theà redoxà reaction that powers the battery, cations are reduced (electrons are added) at the cathode, while anions are oxidized (electrons are removed) at the anode.The electrodes do not touch each other but are electrically connected by theà electrolyte. Some cells use two half-cells with different electrolytes. A separator between half-cells allows ions to flow, but prevents mixing of the electrolytes. Vinegar is a solution of acetic acid and water. Acids donate H+ ions into a solution. The concentration of these ions is what determines whether a solution is a strong electrolyte (conductor) or a weak one. Since vinegar has a low concentration of acetic acid(about 5%) it only has a pH of only ~2. 4 and so is a weak acid.Review of Related Literature According to Doctor Sergey stated that vinegar have lots of electronic magnet cells that can because electricity will small megabytes. During the experimentation, the researchers found out that 4 pieces of calamodins are enough to light a certain bulb. It is also found out that a coin which is hot copper and copper wires are not the appropriate materials in making the experiment. Instead of the materials mentioned used the copper coin and alligator wire. The galvanized nail also matter in lightning the bulb. Use the 1. inches galvanized nail to balanced the flow of the current. Statement of the Problem The researchers aimed to answer the following: 1. How much amount of vinegar that can make the light emitting diode bulb light? 2. Can vinegar bean alternative battery? Significance of the Study This activity is done by the researcher with an important purpose. This activity is launched solely for the Fourth Year High school students of Surigao Education Center. Scope and Limitations This study focused only on commercial vinegar as an alternative source of energy. Definition of Terms Battery ââ¬â a device consisting of one or moreà electrochemical cellsà that convert stored chemicalà energyà into electrical energy. * Vinegar ââ¬â a liquid substance consisting mainly ofà acetic acidà (CH3CO2H) andà water, the acetic acid being produced through theà fermentationà ofà ethanol byà acetic acid bacteria. * Electricity ââ¬â is the set of physical phenomena associated with the presence and flow ofà electric charge. * Acids ââ¬â is a substance which reacts with aà base * Electric Source ââ¬â aà physical propertyà ofà matterà that causes it to experience aà forceà when near other electrically charged matter. Cat ion ââ¬â the ion in an electrolyzed solution that migrates to the cathode;à broadlyà :à a positively charged ion * Anion ââ¬â the ion in an electrolyzed solution that migrates to the anode;à broadlyà :à a negatively charged ion | | * Anode ââ¬â the electrode of an electrochemical cell at which oxidation occurs: as * Cathode ââ¬â à the electrode of an electrochemical cell at which reduction occurs: * Current ââ¬â a flow of electricity * Voltage ââ¬â electric potential or potential difference expressed inà volts * Galvanized Nail ââ¬â Galvanizedà nails are a special type ofà nailà used in construction.They have undergone a special galvanizationà process, which involves covering them with aà zincà coating in order to form a protective barrier. This barrier also works as aà sacrificial anode, which means the coating will dissolve before the metal inside does, if the barrier itself becomes damaged. * Copper Wire ââ¬â Copperà has been used inà electric wiringà since the invention of theà electromagnetà and theà telegraphà in the 1820s. The invention of theà telep honeà in 1876 created further demand for copper wire as an electrical conductor. CHAPTER II METHODOLOGY Research DesignThe descriptive and experimental design was used in this study. Materials/Equipment * Vinegar (Commercial) * 1 meter Alligator Wires * 1. 5 inch Galvanized Nails * 1. 5 inch Copper wires * Tape * 2 Cups * Led bulb General Procedure A. Preparation on Materials 1. Prepare and check all the materials needed B. Set up the prepared materials 1. Share first the vinegar in packs 2. Fill the cups with vinegar 3. Then place a type at the top of the cups then put two different holes C. Connecting the wires 1. Attach the galvanized nail and copper wires both side. Do not allow the copper wire and galvanized nail touch each other. . Attach the alligator wire to the copper wires and galvanized nails 3. Attach the alligator clip to the bulb and it will light up. C1. Observation C2. Collection of Data C3. Tabulation C4. Evaluation C5. Conclusion Flow Chart of Methodology Conclus ion Tabulation Collection of Data Evaluation Observation Experimentation Setting up the Prepare Materials Preparation CHAPTER III RESULTS AND DISCUSSION Table. 1 TRIAL| AMOUNT OF VINEGAR| OBSERVATION| 1| 200 ml| The led bulb havenââ¬â¢t produced light| 2| 400 ml| The led bulb still havenââ¬â¢t produced light| 3| 800 ml| The led bulb produced little light| | 1000 ml| The led bulb produced great light| Based on the table above, the researchers first prepared in trial with the amount of vinegar 200ml but it does not make the led bulb light. On the second trial, they prepared 400ml but again it does not work. By the third trial, with the amount of 800ml of vinegar, it only produced a little amount of light on the led bulb. On their last trial, they tried to use more vinegar with the amount of 1000ml, and then it already made the led bulb produced great light. CHAPTER IV SUMMARY, FINDINGS, CONCLUSION AND RECOMENDATIONSIn this chapter the researchers will be giving the summary of th e findings of their study. The conclusions on the different problems that arose and to the recommendations on the kinds of improvement their readers can do in the near future. Summary With the use of vinegar it is proven effective when the copper wire and galvanized nail is inserted in it. Based on the observation of the researchers through experimentation it was proven that Vinegar can be an alternative battery and can be a good source of electricity and further justified based on the result of the study.Findings Based on the experiment conducted, the following were the findings of the study: 1. With the amount of 1000ml of vinegar, it can make the led bulb light with the use also of galvanized nail and copper wire 2. Vinegar contains small amounts of acetic acid that can make the led bulb light Conclusions Based on the findings the researchers have conducted, the researchers therefore conclude that vinegar can be an alternative battery and a good example of producing light.With th e galvanized nail and copper wire as the negative and positive the two components shouldnââ¬â¢t be attach with other with the flow of electricity there should only be one direction Recommendations The experiment is easy, you can spend lesser. This is recommended to all the people. By this study, a lot of people can get and get idea how to save money, and energy at home. Someday, vinegar will be a source of electricity. The researchers also recommend this to the following: * Students ââ¬â this can help them to be their guide anf for them to try something new and develop their skills in investigatory. Teachers ââ¬â to take this as an example to the students for them to encourage themselves to discover other kinds of alternative battery. The researchers recommend two title of further studies: 1. ââ¬Å"Animal Urine as Alternative batteryâ⬠2. ââ¬Å"Vinegar as a battery for Calculatorâ⬠REFERENCES http://tag. wonderhowto. com/vinegar-battery/ http://hilaroad. com/c amp/projects/lemon/vinegar_battery. html http://www. youtube. com/watch? v=pq9NuvdLZaU&feature=gv http://www. termpaperwarehouse. com/search_results. php? query=vinegar+alternative+battery+ APPENDICES
Saturday, January 4, 2020
Terrorism A Modern Terrorist Organization - 850 Words
Terrorism is a tactic that has been used for centuries, it is one of the most important and dangerous problems facing mankind today. Terrorism is the calculated use of violence, or the threat of violence, to intimidate, frighten, or coerce. In addition, the history of terrorism is as old as humans willingness to use violence exist. The earliest known organization that exhibited aspects of a modern terrorist organization was the Zealots of Judea. Zealots of Judea were known to the Romans as sicarii, or dagger-men. They carried on an underground campaign of assassination of Roman occupation forces, as well as any Jews they felt had collaborated with the Romans. Their motive was an uncompromising belief that they could not remain faithful to the dictates of Judaism while living as Roman subjects. Eventually, the Zealot revolt became open, and they committed mass suicides. From the time of the Assassins (late 13th century) to the 1700s, terror and barbarism were widely used in w arfare and conflict. In addition to the acts of violence described above, there are also numerous other types of violence that can exist under the framework of terrorism. Terrorism can be executed or presented in a variety of forms. For example, bioterrorism, cyberterrorism, nuclear terrorism, domestic terrorism, etc. It is important to highlight that terrorism can strike not just large cities, but in any community of any size. Domestic terrorism in the United States is not a newShow MoreRelatedTerrorism Is Not Only A Weapon Used By Non State Actors, Regimes, And Governments?1213 Words à |à 5 PagesWhen discussing terrorism from a realism point a view, many do not believe realists have much to say on the topic since realists concerns focuses on state interaction and terrorists as some believe are transnational actors. While it may be easier to pick any other international theory, there are some aspects of realism that can explain terrorism and will be explained throughout this section. One, terrorism is not only a weapon used by non-state actors, regimes and governments use it against theirRead More Terrorism Essay526 Words à |à 3 Pageshi-jacking? How do individuals and organizations justify these acts of terror? These acts can easily be labeled as terrorist actions. Terrorism is a growing international problem. In the recent years, new terrorist groups and organizations have been forming at an alarming rate. Governments have had little success in their attempts to resolve issues involving terrorism. One of the major problems in discussing terrorism is ââ¬Å"establishing a generally accepted definition.â⬠Terrorism can be described as, ââ¬Å"the unlawfulRead More Motivations Of Terrorists Essays710 Words à |à 3 Pages Discussing terrorism and motivations leading to terrorism brings up thoughts of random acts of violence. These acts are mostly considered to be methods of insane men. Most of these modern terrorists follow their own polit ical agenda with each group trying to achieve a particular goal. There are three types of terrorists in todayââ¬â¢s society: the single individual, a certain group, and government funded organization. These terrorists all resemble criminals with one major difference; they are dedicatedRead MoreTerrorists and Terrorism: The 9/11 Terror Attacks922 Words à |à 4 PagesTerrorists and Terrorism: The 9/11 terror attacks is one of the historical and fatal events that changed the United States of America forever, especially in relation to terrorists and terrorism. While these concepts were on the minds of very few people in Americas population before the attacks, the 9/11 incident made terrorism to become one of the major concerns for the whole nation. This is despite of the fact that they were carried out in New York City, Washington, and parts of PennsylvaniaRead MoreTerrorism Influences1537 Words à |à 7 PagesTerrorism Influences The history of terrorism has affected governments, communities, businesses and individuals. Terrorism has been around for thousands of years but the term was not developed until the French Revolution. Underlying conditions such as corruption, poverty, and religious conflict create opportunities for terrorists to exploit and take advantage of. Some of these conditions are real and some are made-up. Through the last 200 years, the concept of terrorism has been used toRead MoreThe Attack On The United States976 Words à |à 4 Pagesthe September 11, and the consequent War on Terror changed how the American government and its public perceive terrorism and how to formulate a policy to counter the phenomenon. A couple of large wars were waged on the name of War on Terror and many other small wars and conflicts took place in numbers of countries and continents to eradicate the threat of a terrorist attack. Yet the terrorist groups survived and the United States were left with a large d ebt acquired by expensive counterterrorism effortRead MoreGtd Flaws And Issues. Gtd Is Considered As One Of The Most1382 Words à |à 6 PagesGTD Flaws and Issues GTD is considered as one of the most comprehensive database of terrorist events in the world. But is it ideal? Since we deal with big data from open sources around the world, itââ¬â¢s not always show the true picture. All entries in one way or another were created upon unclassified information, mostly from media articles. That creates bias because articles is always a subjective view, moreover only English articles were used, thus we can see only one side of the coin. Data collectionRead MoreAnimal Farm, By George Orwell1172 Words à |à 5 Pagesseek pleasure from these activities. Climate change, political agendas, and intolerance across the globe are all examples of human created problems that could be avoided if human werenââ¬â¢t fundamentally horrible. According to literary, historical and modern research, humans are generally violent and awful. According to George Orwellââ¬â¢s Animal Farm, people are the enemy of any other species. Humans are the creators of pollution, war, murder and many more horrible actions. Orwell used animals to portrayRead MoreTerrorists Attacks And Warfare.Recently, The Number Of1239 Words à |à 5 PagesTerrorists Attacks and Warfare Recently, the number of terroristsââ¬â¢ attacks increase dramatically, so do reginal warfare. Both terroristsââ¬â¢ attacks and warfare are resulted from political complex, there is a correlation relationship between these two. The origins of terroristsââ¬â¢ attack is different political opinion and the purpose of minor groups did not be accepted, so they create terrorists attacks for attacking views on them. Warfare does stimulate Terroristsââ¬â¢ attacks by increase theRead MoreEssay about The Ever Increasing International Terrorism Threat635 Words à |à 3 PagesCenter and the Pentagon on 11 September 2001 was the most destructive terrorist attack recorded in the world history which resulted in untold misery and suffering. This very atrocious act was committed at a time when experts had been defining a new form of international terrorism which states that not even a superpower like America is immune from these attacks as the main objective behind this the m ass destruction. Terrorism can be defined as the specific and deliberate use of violence against civilians
Friday, December 27, 2019
Critique Defining Art And Artworlds By Stephen Davies
Critique ââ¬Å"Defining Art and Artworldsâ⬠In the article ââ¬Å"Defining Art and Artworldsâ⬠by Stephen Davies from The Journal of Aesthetics and Art Criticism, published in fall 2015, informs the readers that ââ¬Å"[m]any of the late twentieth-century definitions of art were prompted by the challenge of controversial avant-garde works.â⬠There are many contributions to consider before identifying any specific piece as a piece of art. Establishing what exactly qualifies an art-piece will develop further contributions to the artworld, whether it is because of the pieceââ¬â¢s aesthetic, skill, genre, intention, or tradition. A definitions suggests that something is art if it displays advanced skill-work to achieve significant beauty to the extent that it makes a vital contribution to its primary function, falls under a genre or form of identified art and within an art tradition, or was intended by its certified maker to be art. There are flaws, these definitions a llow the possibility of: something being art even if it falls outside all artworlds, a pieceââ¬â¢s location can become sufficient for the piece to become art, or art being self-conscious. Artworlds are ââ¬Å"different art traditions latched onto different prehistoric art cohortsâ⬠¦what makes them all artworlds is their origins in first art.â⬠Artworlds become autonomous and can be take many directions. (1) The main idea of this article is that an adequate definition for ââ¬Å"artâ⬠must be developed to accommodate the artworldââ¬â¢s efforts, since
Thursday, December 19, 2019
Analysis of A Poison Tree Essay - 1370 Words
In his work, Songs of Innocence and Experience: Shewing the Two Contrary States of the Human Soul, William Blake uses the aforementioned contrasting states of being to illustrate his unique view of the world around him. Through this work, Blake lays bare his soulful views of religion and ethics, daring the reader to continue on in their narcissistic attitudes and self-serving politics. While Blakes work had countless themes, some of the most prevalent were religious reform, social change, and morality. Philosophically, one would think that William Blake was a Deist; however Blake rejected the Deist view of life. He was a devout Christian, yet he also wanted nothing to do with the church or their teachings. These views give Blake aâ⬠¦show more contentâ⬠¦Apple is full of poison, enemy is dead. The end. Nevertheless, Blake is famous for are his multi-layered works. Poems that are simple at first glance, yet they take you deeper and deeper the more you delve. Similarly, A Poison Tree, demonstrates the emotional as well as spiritual toll that the repression of feelings, in this case anger, can take on an individual. The poem, originally titled Christian Forbearance, was aptly named because it dealt with the Christian G-d and the virtues that He tried to instill in man, one of those virtues being forbearance (Gleckner, 255). Forbearance, or a lack thereof, is clearly illustrated in this work. This style of narrative takes the reader on a journey from innocence into experience, which parallels the fall of man. In the same way that the Bible tells of how Adam and Eve were expelled from the Garden of Eden and their subsequent separation from G-d, so too does this poem tell of how man and his suppression of feeling leads to a separation from the mind and soul. Symbolic on a religious level, the tree represents the Tree of Knowledge, while the apple signifies the forbidden fruit. The speaker represents human life (Adam and Eve). While the foe repre sents the snake or temptation. The death at the end of the poem results from the loss of innocence and full blown hatred, which is sometimes akin to love. Throughout the poem, the tone and the language that the speaker uses makes it obvious that theShow MoreRelatedA Poison Tree Analysis918 Words à |à 4 PagesAnalysis of the poem ââ¬Å"A poison treeâ⬠by William Blake I am going to write about and analyse the poem ââ¬Å"A poison treeâ⬠by William Blake. The poem â⬠A poison treeâ⬠was written by William Blake in 1794 as a collection of poems as Songs of Experience. ââ¬Å"A poison treeâ⬠is about humanityà ´s hatred upon other people, and finally getting vengeance. Although it is a short poem, Blake clearly gives every sentence a whole meaning. Containing only 4 stanzas and 16 lines. The rhyme scheme used is: a aRead MoreA Poison Tree Analysis858 Words à |à 4 Pagesthing in overcoming these situations and challenges in life. This idea can be seen in many pieces of text including the following poems. ââ¬Å"A Poison Treeâ⬠by William Blake and ââ¬Å"A total stranger one black dayâ⬠by e.e. cummings both convey the message that people need to learn to forgive in order to move on which also means learning from mistakes. Through ââ¬Å"A Poison Tree,â⬠William Blake conveys that people need to learn to forgive in order to move on and this means learning from mistakes. The use of endRead MoreA Poison Tree Analysis Essay977 Words à |à 4 PagesRunning head: Analysis of William Blakeââ¬â¢s A Poison Tree (1794) Analysis of William Blakeââ¬â¢s A Poison Tree (1794) Jayne Courtney Kendall Brandman University Abstract This analysis is going to explore each segment to better understand the meaning the author was trying to express and the lessons that we in these words that transcends through all ages. The exploration and analysis will look further in to what we can take away from this writing and lesson we can learn in order for our soulââ¬â¢sRead MoreStylistic Analysis of Poison Tree869 Words à |à 4 PagesA Poison Tree a poem by William Blake I was angry with my friend; I told my wrath, my wrath did end. I was angry with my foe: I told it not, my wrath did grow. And I watered it in fears, Night and morning with my tears: And I sunned it with smiles, And with soft deceitful wiles. And it grew both day and night, Till it bore an apple bright. And my foe beheld it shine, And he knew that it was mine. And into my garden stole. When the night had veiled the pole; In the morningRead More Analysis of William Blakes A Poison Tree Essay530 Words à |à 3 PagesIn ââ¬Å"A Poison Tree,â⬠by William Blake is a central metaphor explains a truth of human nature. The opening stanza sets up everything for the entire poem, from the ending of anger with the ââ¬Å"friend,â⬠to the continuing anger with the ââ¬Å"foe.â⬠Blake startles the reader with the clarity of the poem, and with metaphors that can apply to many instances of life. Blake also uses several forms of figurative language. He works with a simple AABB rhyme scheme to keep his poem flowing. These ideals allow himRead MoreCritical Analysis Of William Blakes A Poison Tree926 Words à |à 4 Pagesillustrated in William Blakeââ¬â¢s poem ââ¬Å"A Poison Tree.â⬠This poem directs the readers to the importance of communication and willingness to forgive. The moment the speaker refuses to communicate his or her anger is the point in which the cultivation of the wrath begins. By looking at the concealment of the wrath and the opposition between communication and concealment in addition to the structure developed by tension we see the metaphorical growth of the wrath as if it were a tree. This leads us to understandRead MoreAnalysis Of Edgar Allen Poe And A Poison Tree By William Blake860 Words à |à 4 Pagessafe? Have you done anything? Think again, even the little things. Sometimes you may never know. Hopefully you dont end up like these two ill-fa ted men that were suddenly murdered. In the texts ââ¬Å"The Cask Of Amantiatioâ⬠by Edgar Allen Poe and ââ¬Å"A Poison Treeâ⬠by William Blake, They plotted their murders carefully and made sure nobody would find out it was them. Edgar Allen Poe and William Blake show that revenge can come as a shock because sometimes appearance hides reality. There are two literary devicesRead MoreEssay on The Message Behind A Poison Tree1077 Words à |à 5 Pages(Eaves). The poem that I have analyzed is A Poison Tree. Blake strategically placed imagery and personification to hide his underlying truth; do not store up anger because horrible situations will arise. At first glance the poem seems hate filled and that he just wrote it out of revenge or angst, but in reality he is teaching a moral lesson that should be taken very seriously. Blakeââ¬â¢s structure in the poem is interesting in its symbolism. He wrote A Poison Tree in four stanzas. Upon first glance it seemsRead MoreThe Unknown Citizen By. Auden1527 Words à |à 7 PagesThe Unknown Citizen Analysis The Unknown Citizen, written by W.H. Auden, is a satirical poem declaring the petty accomplishments achieved by an unnamed citizen in a presumably American or industrialized society. Through several readings of the poem, many would not even consider the Unknown Citizen as a poem, but rather, a letter of recommendation or a speech for a political election. The only obvious characteristic of this piece resembling a poem is the rhyming scheme. Other than rhyming, thereRead MoreThe Use of Symbolism in Rappaccinis Daughter1295 Words à |à 6 PagesThe use of Symbolism in Rappaccinis Daughter Nathaniel Hawthornes work is unique. His writings are full of subtle imagination, analysis, and poetic wording. His short stories are known for their originality and for their ability to provoke the readers thoughts. Although a large portion of his stories are allegories, Hawthornes preference is to draw more heavily on symbolism (Pennell 13). His use of symbols adds depth to his stories and helps to reveal different aspects of his characters
Wednesday, December 11, 2019
Human Centred Security and Privacy Research â⬠MyAssignmenthelp.com
Question: Discuss about the Human Centred Security and Privacy Research. Answer: Introduction Every user, business unit and Government is associated with a lot of data and information in the present scenario of digitalization. There are numerous web-based and cloud computing applications that are being used by all of these entities for a variety of different purposes. As a result, there are many security risks and concerns that have emerged which are required to be managed, controlled and dealt with. Victorian Protective Data Security Framework abbreviated as VPDSF is a Victorian Government security initiative that has been brought forward to keep the public sector unit of Victoria safe from all the security occurrences. Public sector units carry out a lot many operations and activities which are open to many security risks. VPDSF has three major elements in terms of the security definition and protocols, assurance model in association with security and many supporting guides and references to move ahead in the direction of security. The report also covers many of the areas f or protection against the security events and threats. There are certain security risks and concerns that have a low likelihood or a low impact. In case of the VIC Government, the data security risks that may take place will have the potential to cause damage to the public and private information sects associated with the public sector unit of Victoria. There are two such security attacks that have a high exposure in association with the VIC Government. Insider threats may be carried out by the internal employees of the various organizations belonging to the public sector unit in Victoria. These internal entities will be aware of the data security policies and mechanisms being applied and may take advantage of the same to cause damage to the properties of the information sets. In addition to the same, there may also be attacks on the information availability with the execution of the flooding attacks (Cpdp, 2016). Risks with Medium Exposure The next category of the attacks is the risks with medium risk exposure. There may be cases of information and data breaches that may take place along with the occurrences which may lead to the leakage of the information in front of the unauthorized entities. The integrity of the information is one of the properties that may get violated with the integrity attacks such as message alteration, media alteration or changes in the properties of the data packets. The access points in the network may be utilized for this purpose which may impact the information present in the databases or the one under transmission as well. Some security risks may lead to the damage to the information properties of personal and sensitive information sets. There are tighter legal policies that are associated with these information sets and the security attack in turn may lead to the emergence of further risks in form of legal risks and regulatory obligations. There are initiatives that VIC Government has taken to provide additional protection to these sensitive data sets and therefore, the likelihood of the occurrence is not very high. Public sector units in VIC Government have many people deployed at various levels in the technical, operational and managerial departments. Due to the presence of so many activities and the need to execute so many different processes, there may be technical or operational errors that may be executed. These may lead to some permanent damage which may not be roll-backed. Such risks are therefore placed in this category (Dang-Pham, 2017). Data and information security attacks that are given shape by the attackers involve a lot many threat agents. There are also different motives and benefits that are involved with each of such occurrence. The case is same with VIC Government that may become victim to many of the information security attacks. These occurrences have been put in two categories on the basis of the motive of the attacker that is involved. These risks may be deliberately caused or may be caused by an accidental step. Deliberate Threats Accidental Threats In these forms of attacks on data and information security, the primary motive of the attack is to cause intentional damage to the contents and properties of the data sets. In these forms of attacks on data and information security, the primary motive of the attack is to not to cause intentional damage to the contents and properties of the data sets. These are cause by an accident. The damage and the outcomes of these attacks can be extremely severe in a negative manner. These attacks may have no or low impact or may also have a permanent damage with a severe impact The time of execution of these attacks is determined in advance and these are planned to be triggered at specific duration. The time of execution of these attacks is not known or planned as they are caused by accident. Flooding attacks such as denial of service and distributed denial of service and other availability attacks (Kaynar, 2016) Malware attacks such as the ones caused by triggering and launch of a virus or worm. Network based security attacks such as man in the middle attacks, eavesdropping attack etc. Information loss or leakage due to an operation error or a deviation from the regular path. Information breaching by an external entity due to exposure of private information. Attacks that are caused by the internal employees of the agencies and organizations can fall in any of these two threat categories. It is because of the reason that there may be certain insiders that may cause deliberate damage by giving shape to the information and data security risks. Insider attacks may also come in the category of the accidental risks and attacks. There may be certain insiders that may cause unintentional damage by giving shape to the information and data security risks due to an accident. Irrespective of the type of the security risk or an attack, it is necessary to control and prevent the same. The VIC Government has also carried out an analysis on the possible deliberate and accidental threats and has therefore, developed measures to prevent and detect these risks. There are also various other organizations and departments that have carried out successful steps and strategies to control these attacks. One such entity is the Department of Homeland security that has successfully controlled the various deliberate and accidental threats and attacks. There is a step by step procedure that was followed in this case. In the initial step, there was an analysis that was carried out to identify and classify the attacks in each of the two categories. In the next step, there were mitigation guidelines and strategies that were developed and identified to put a check on the security occurrences that were identified. It was concluded that the deliberate attacks were intentional and planned in advanced and therefore, they had the potential to cause damage that was severe in most cases as compared to the accidental attacks. There were many security gaps that were highlighted by the Department of Homeland Security in its analysis phase. The department as a result, implemented many automated solutions to resolve the gaps that were discovered. Training sessions were also conducted to improve the knowledge of the insiders. It is recommended for the VIC Government to follow a similar policy such that the security gaps are listed and identified and there are measures developed and implemented in accordance with the same (Korzhik, 2003). Security/Risk Management Execution Possible Challenges and Issues Management of the security risks can be done by adopting different methods and techniques. Some of these methods may include the resources that may be internal in nature while there are certain measures that be taken which may involve the use of external resources and entities. The aim in both the cases will be to put a stop on the security risks and occurrences. In case of the internal methodology, it will be decided to make use of the in-house development processes to give rise to the required security controls and protocols. The security infrastructure in the VIC Government will thereafter make use of all these controls developed. The resources in terms of tools, equipment, processes and human resources that will be used in this methodology will be entirely internal in nature. There are specific set of challenges that are associated with these methods. There may be insufficient skills and inadequate knowledge that may be witnessed which may lead to the compromise of security. The human resources that will be working on the development process will have additional information on the security framework which may be misused by them. There may be technical failures that may lead to breakdown. There may be operational errors that may cause permanent damage. The second methodology that has been recommended in association with the VIC Government is the use and application of the external methods and resources. In this case, the best possible method will be the use of outsourcing process. In this process, the third-parties will be contacted to develop and implement the necessary security protocols. The external method will cost more than the internal method and there may be a number of additional costs involved (Bertino, 2015). There may be deviations that may be observed in terms of the functional and non-functional requirements. The production data and information may be played with. The changes that will be introduced with the adaptation of any of these two processes will be common. These will give rise to a lot many migration challenges in terms of change planning and management of these changes. Comparison of Risks and Uncertainties Risk and uncertainty are the two terms that are often used inter-changeably. However, there is a vast difference between the two terms, their meaning and their results. Risk is a term that refers to the event or an occurrence that is predictable and can therefore be controlled as well. The impacts that a risk may have may be positive but are usually negative in nature. There are many of the data and information security risks that may be executed by the attackers in association with the VIC Government. These risks may have a varying degree of impact as the impact may be low or exactly opposite of it. There are two security attacks that have a high exposure in association with the VIC Government. Insider threats may be carried out by the internal employees of the various organizations belonging to the public sector unit in Victoria. In addition to the same, there may also be attacks on the information availability with the execution of the flooding attacks. There may be cases of information and data breaches that may take place along with the occurrences which may lead to the leakage of the information in front of the unauthorized entities. The integrity of the information is one of the properties that may get violated with the integrity attacks such as message alteration, media alteration or changes in the properties of the data packets. Some of the security events may lead to the emergence of legal and regulatory risks with medium-low impact. Due to the presence of so many activit ies and the need to execute so many different processes, there may be technical or operational errors that may be executed. These may lead to some permanent damage which may not be roll-backed. Such risks are therefore placed in this category of low-impact risks (Pernebekova, 2015). Uncertainties are referred to the occurrences and events that are not predictable and because of the same reason; it is difficult to put any control on these occurrences. One such event may be the changes in the rules defined by the Government in terms of the regulatory processes of legal policies that are set up. With changes in the terms and conditions of these policies, there will be direct impact on the agencies and organizations connected with the same. VIC Government is made up of hundreds of agencies and organizations that adapt these policies in their framework and have developed their security profile accordingly. With such uncertain events, there will be modifications that will become mandatory to be executed which may lead to the violation of security. Risk Control and Mitigation The first approach that has been suggested for VIC Government is the administrative approach that involves the use of advanced measures in the security administration. The overall security status and scenario is based upon the policies and plans that have been implemented in association with the data and information security. It is therefore necessary to have advanced administrative policies and measures in place. This approach suggests the use and implementation of the automated tools for security administration such as security audits, security reviews and inspections. These tools will provide the administrators with an automated process to carry out these activities. The VIC Government shall also make sure that the security administrators have a correct mix of skills and knowledge. The second approach that has been recommended to the VIC Government is the use of technical approach and methods (Joshi, 2017). There are a lot many technical tools that are automated in nature and are built using the latest technology. These tools shall be installed and implemented in the agencies and organizations that are governed by the VIC Government to detect, prevent and control the attacks on the information confidentiality, integrity and availability. These tools will also minimize the occurrence of the network based attacks as the network activities will be captured at a non-stop basis. Physical Security Approach for Risk Mitigation Data and information that is associated with the VIC Government is placed at the data centres, workstations of the employees, cloud databases, server rooms and various other physical and virtual environments (Shamala, 2013). The third approach that has been recommended for the security and risk mitigation is the physical security approach. It will make use of the physical entities at all the access and entry points to manage the access and identity. Out of the three approaches that have been suggested, the one that is recommended is the technical approach. This approach has been recommended as it will provide the VIC Government with the latest technology and tools to deal with the security risks and attacks. Also, there shall be an update on the administrative and physical security that shall also be done to strengthen the security framework (Renaud, 2017). Conclusion The data security risks that may take place in the VIC Government may impact three primary properties of information as confidentiality, availability and integrity. It is required to develop mechanisms to control all of these risks and the use of technical approach towards security will serve the purpose. It will include the latest set of security tools and equipment that will not only identify the security risks but will also lead to the control and prevention of the risks (Elci, 2015). References Bertino, E. (2015). Security and privacy of electronic health information systems. International Journal Of Information Security, 14(6), 485-486. https://dx.doi.org/10.1007/s10207-015-0303-z Cpdp. (2016). Victorian Protective Data Security Framework. Retrieved 28 August 2017, from https://www.cpdp.vic.gov.au/images/content/pdf/data_security/20160628%20VPDSF%20Framework%20June%202016%20v1.0.pdf Dang-Pham, D. (2017). Exploring behavioral information security networks in an organizational context: An empirical case study. Journal Of Information Security And Applications, 34, 46-62. https://dx.doi.org/10.1016/j.jisa.2016.06.002 Elci, A. (2015). Editorial: Special issue on security of information and networks. Journal Of Information Security And Applications, 22, 1-2. https://dx.doi.org/10.1016/j.jisa.2015.06.002 Joshi, C. (2017). Information security risks management framework A step towards mitigating security risks in university network. Journal Of Information Security And Applications, 35, 128-137. https://dx.doi.org/10.1016/j.jisa.2017.06.006 Kaynar, K. (2016). A taxonomy for attack graph generation and usage in network security. Journal Of Information Security And Applications, 29, 27-56. https://dx.doi.org/10.1016/j.jisa.2016.02.001 Korzhik, V. (2003). Hybrid authentication based on noisy channels. International Journal Of Information Security, 1(4), 203-210. https://dx.doi.org/10.1007/s10207-002-0017-x Pernebekova, A. (2015). Information Security and the Theory of Unfaithful Information. Journal Of Information Security, 06(04), 265-272. https://dx.doi.org/10.4236/jis.2015.64026 Renaud, K. (2017). Contemplating human-centred security privacy research: Suggesting future directions. Journal Of Information Security And Applications, 34, 76-81. https://dx.doi.org/10.1016/j.jisa.2017.05.006 Shamala, P. (2013). A conceptual framework of info structure for information security risk assessment (ISRA). Journal Of Information Security And Applications, 18(1), 45-52. https://dx.doi.org/10.1016/j.jisa.2013.07.002
Subscribe to:
Posts (Atom)