Friday, September 6, 2019

Prescription Drug Abuse in Teenagers Essay Example for Free

Prescription Drug Abuse in Teenagers Essay Although prescription drugs are not harmful if used correctly, prescription drug abuse is high in teenagers. Most parents would never think their teenagers are helping themselves to prescription medicine sitting on ones counter. The truth is, prescription drug abuse in teenagers has become very common nowadays. The drugs are easily accessible at home, or cheap to buy at school. They are highly addictive and can even cause death. Putting one’s prescriptions in a safe place may save a childs life. Prescription drug addiction usually starts with experimentation. Teenagers may be trying prescription drugs because their friends are doing it or it may just be out of curiosity. Some teenagers will turn to prescription drugs to forget their problems. As the addiction progresses, it becomes harder and harder to stop using the prescription drugs (Smith, 2010). Experimentation rarely leads to a good outcome. If one’s child starts with a simple experiment of prescription drug use, odds are it will ultimately end with addiction. Smith (2010), states â€Å"Addiction is a complex disorder characterized by compulsive drug use. People who are addicted feel an overwhelming, uncontrollable need for drugs† (Drug abuse and addiction, para. 1). When one has repeated drug use it will permanently alter the brain. The long-lasting effect on the brain changes ones ability to think, use good judgment, control ones behavior, or feel normal without the drug. It is the drug cravings and compulsions to use that make the addiction so powerful. These cravings and compulsions to use are partly cause by the changes the drugs make to one’s brain (Smith, 2010). The average prescription drug abuser will start between the ages of 12 and 17. Every day about 2,500 teenagers in this age group abuse a prescription drug for the first time (Havens, 2009). â€Å"The number of high school students who are abusing prescription pain relievers such as oxycodone (OxyCotin), a potent and highly addictive opiate, or sedative is on the rise† (Freedman, (2006), para. 3). Stimulants are the most common used, next is opiates, followed by tranquilizers, and then sedatives (Parenting Teens, 2005). The pain relievers such as Vicoden or OxyCotin are used to achieve a high, whereas the sedatives such as Xanax and Valium are used to relax or calm. These drugs can lead to dependence and addiction. Stimulants such as Adderall, Ritalin, Dexedrine, or Provigil decrease ones appetite but increases ones alertness and attention. These are dangerous because they can cause addiction, seizures, or heart attacks. Stimulants are often used to lose weight of for studying. Steroids are used to built ones bodies or promote athletic performance. The dangers involved in consuming steroids are mental and physical health effects as well as serious sexual effects (Havens, 2009). Findings from a 2005 survey conducted by the National Survey on Drug Use and Health â€Å"indicates that approximately 21% of the U. S. population age 12 and older report using any type of prescription drug nonmedically in their lifetime, 16% report us of opiate-type pain killers, 8% report tranquilizer use, 8% report stimulant use, and 2% report sedative use† (Ford, 2008, para. 10). The study also found that substance abuse can cause users to offend the law as well as impair good judgment. However, it has been found that the violations of the law are followed by the abuse of prescription drugs, or other illegal substances. Therefore if one’s teenager is addicted to prescription drugs, legal difficulties will probably follow. The researchers believe substance abuse is a definite road to a delinquent lifestyle (Ford, 2008). Reported prescription drug abuse by high school seniors in 2005 Parenting Teens (2005). According to Freedman (2006), an 18-year-old who lives in San Francisco believes as long as the prescription medication is taken properly, it is much safer than any street drug. According to the findings of the Partnership for a Drug-Free America study, forty percent said prescription were much safer than illegal drugs; while 31 percent said that there was nothing wrong with using prescription drugs once in a while† (â€Å"Prescription-Drug Use by Teens,† (2006), para. 1). Teenagers think that because a medication has a prescription for an individual, it makes it safe for everyone. Several factors are involved in prescribing certain medications such as medical conditions, age, other prescriptions on may be taking and the diagnosis of the individual. Most teenagers do not consider these factors when helping themselves to medications prescribed to someone else. Prescription drugs are easy for a teenager to acquire either from their doctors or from their own medicine cabinets. Most parents are not aware of the risks involved in leaving a bottle of prescription medication lying on the counter for everyone to have access. It will start with taking one or two at a time and then the teenager ultimately proceeds to steeling the entire bottle, buying the prescription medications at school from classmates or even lying to their doctors to obtain their own prescriptions. The increasing popularity of nonmedical prescription drug use is based on the putative advantages of prescription drugs over â€Å"street† drugs: the drugs are easier to obtain, there is less likelihood of arrest, use is more socially accepted, and there is a perception the prescription drugs are safer† (Ford, (2008), para. 10). Prevention is the best tool concerning teenagers and prescription drug abuse. Havens, (2009), â€Å"Most teenagers say parents are not discussing the dangers of prescription drugs with them† (6 Steps to Prevent Prescription Drug Abuse in Teens, para. ). It is the parent’s responsibility to monitor closely the prescription medication in the home and purchase a lock box if necessary to keep one’s teenager safe. One needs to educate one’s teenagers in the dangers of prescription medication and the factors that go into prescribing those medications to each individual. Take it as far as asking the family physician to speak with one’s teenager if necessary. Sometimes they listen to strangers better than their own parents. Take the time to ensure there are no or out-of-date medications in the home. If these medications are no longer needed, dispose of them properly by flushing those (Havens, 2009). Parents are not always aware of how dangerous their own medication can be to their teenagers. MSNBC (2010). Parents also need to educate themselves in the signs associated with prescription drug abuse. Some of the thing one needs to watch for with their teenager behavior is neglecting responsibilities, getting into legal trouble, and even problems with the relationships with one’s friends. If ones teenager is starting to fall on school grades, not do chores at home, or even skipping school a pattern of neglecting responsibilities in beginning to develop. Behavior to watch for in relationships with friends would be losing longtime friends, and sometimes fist fighting with them. One may also be fighting more than usual with one’s siblings or ones boss at the job. The signs of legal trouble can be anywhere from simple disorderly conduct to any type of major crime. If ones teenager suddenly becomes involved with the law, something is wrong (Smith, 2010). The most noticeable physical signs of a prescription drug addiction is if ones pupils are bigger or smaller than normal, ones eyes are bloodshot, grooming habit deteriorate, unusual odor on breath or clothing, slurred speech, bad coordination, and tremors (Smith, 2010). Psychological warnings one can detect are (Smith, 2010), â€Å"Unexplained change in personality or attitude, sudden mood swings, irritability, or anger outbursts, periods of unusual hyperactivity, agitation, or giddiness, lack of motivation; appears lethargic or â€Å"spaced out†, appears fearful, anxious, or paranoid, with no reason† (Drug abuse and addiction, para. 9). Warning signs that tend to show more in teenagers are when one starts being secretive about their friends, one has a new interest in one’s clothing styles, and ones teenager is suddenly in need or more privacy then usual. If one has money, valuables, or prescription medication missing, one may need to consider the possibility of one’s teenager developing a prescription drug addiction. Other common signs are depression, withdrawing from the family, using incense to hide the smell, or eye drops to cover the dilated or bloodshot (Smith, 2010). Drug rehabilitation can be a costly, but necessary, adventure. According to ChooseHelp, (2010), â€Å"the professional staff involvement at any comprehensive and quality rehab facility disallows bargain treatment, and you need to be prepared to spend a significant amount of money to get a quality and effective treatment program (The Cost of Drug Rehab, para. 3). † Considering all cost involved in housing, feeding, drug therapies, and professional involvement, prices can range from a few thousand dollars a month all the way up to $30,000 per month (ChooseHelp, 2010). Several insurance companies will absorb most of the financial burden. One needs to contact one’s private insurance company and receive all details pertaining to this type of treatment. If one contacts one’s local State Drug and Alcohol Rehabilitation Council, there are programs available to those that cannot pay nor have any insurance. One needs to take into consideration the seriousness of this addiction. When it involves a prescription drug addiction, one cannot let the cost be a factor in the determination of the treatment. According to ChooseHelp (2010), â€Å"family programs can help to heal a family harmed by the destruction and heartache of abuse; and bring back a healthier dynamic to the family as a whole (Families Need to be a Part of the Process, para. 3). † One needs to decide how much family involvement will be in the rehab process. Family involvement is extremely important not only for the family but for the addict as well. When family member are learning about the addiction from trained professionals as well as other families facing the same situation, families are taught what is most beneficial for the teen and it assures the family that they are not esponsible for the addiction (ChooseHelp, 2010). When seeking a prescription drug treatment center for teenager one needs to consider a program involving patient education as well as family education. The program should offer counseling sessions with a therapist or psychologist as well as peer group session involving several families. One needs to choose a facility close to home to achieve adequate family involvement (ChooseHelp, 2010). When the rehabilitation program is successfully completed it is also important to continue care in an outside group such as Alcohol Anonymous or Narcotics Anonymous. Information for these meetings can be obtained in one’s local phone book. If the teenager in the home has been acting differently and medication is running out sooner than usual, take the steps necessary to help him or her. Admitting he or she may be addicted to prescription drugs is not easy but the help one can receive for him or her may save his or her life. Pay attention to the warning signs, ask questions at the doctor appointments and try not to have addictive medication prescribed to one’s child, especially if the child has had a problem in the past with any type of addiction. Be careful where prescription medications are located and consider investing in a lock box. It may be a decision that saves ones teenagers’ life. If one discovers one’s teenager has a prescription drug addiction, or any other addiction, do not be afraid to seek help. Money does not need to be an issue in saving ones life. References http://www.choosehelp.com/drug-rehab/families-need-to-be-a-part-of-the-process http://www.choosehelp.com/drug-rehab/the-costs-of-drug-rehab http://today.msnbc.msn.com/id/12803776/ns/health-addictions/

Thursday, September 5, 2019

An Introduction To Cryptology Computer Science Essay

An Introduction To Cryptology Computer Science Essay Cryptography was used only for military and diplomatic communication until the development of public key cryptography. Secrecy is one of most important requirement for any communication and it becomes more important when the content of communication is for military and diplomatic purpose. Hieroglyphs used by Egyptians are earliest known example of cryptography in 1900 BC. These hieroglyphics were used to write the stories of the life of kings and describe the great acts of his life. Around 500 BC Hebrew scholars used mono alphabetic substitution cipher such as Atbash cipher. Around 400 BC the Spartans also developed a Scytale cipher that used ribbons of parchment for writing any secret message after wrapping it around a cylindrical rod named as Scytale. In second century BC Greek historian Polybius invented Polybius Square a type of substitution ciphers. Around 1st century BC the Roman emperor Julius Ceaser used the substitution cipher named after him as Ceaser Cipher. The Caesar Cipher is a Monoalphabetic type Cipher. Around 9th century AD the Arab Mathematician AbÃ…Â « YÃ…Â «suf YaÊ »qÃ…Â «b ibn Isà ¡Ã‚ ¸Ã‚ ¥Ãƒâ€žÃ‚ q al-KindÄ « popularly known as Al-Kindi published the first text book on cryptnalysis of ciphers named Risalah fi Istikhraj al-Muamma (On Deciphering Cryptographic Messages). This book can be stated as the pioneer of the medieval cryptography. In this book Al-Kindi described the frequency analysis technique for deciphering substitution ciphers and some polyalphabetic substitution ciphers. The relative frequency of symbols is used in Frequency analysis to decode the message. Al-Kindi used this technique on Quran to understand the meaning for religious purpose. The field of cryptography had not made any significant development until 15th century when the Italian mathematician Leon Battista Alberti known as The Father of Western Cryptology, developed the concept of polyalphabetic substitution. Although he had not made any practical cipher but by using this concept a practical Poly-Alphabetic substitution cryptographic system was developed by French cryptographer BLAISE DE VIGENERE, which was named after him and called as VIGENERE SQUARE. For a long time this cipher was believed to be secure but around 1854, CHARLES BABBAGE, an English mathematician and engineer, better known as father of Computer Science for his development work of difference engine that become the first mechanical computer, successfully cracked the Vigenere Square Cipher by using the method of statistical analysis. Cryptography was widely used in World War I and II. The most famous incident of World War I is of German foreign Minister Zimmerman Telegram that changed the whole World War I and involved the America in world war which was neutral till that date and Germany was finally defeated. Unlike the past cryptographic algorithms in which the main concentration was on hiding the algorithm or technique the modern ciphers needed the technique or algorithm which can be widely used and whose security should not be compromised if the algorithm is known. To encrypt and decrypt the information, a key is used in modern cryptographic algorithms which convert the message and data in such format which are senseless to the receiver through encryption and then return them to the original form through decryption process. Claude E. Shannon, father of modern cryptography has contributed his work to cryptography in the form of A mathematical theory of cryptography and A Communications Theory of Secrecy Systems which are considered as the foundation of modern cryptography. In seventies the field of cryptography has witnessed two major developments. First was the development of Data Encryption Standard (DES) by IBM, which was accepted as standard after some modification by the NSA in 1977 and it was later replaced by the Advanced Encryption Standard (AES) in 2001. The second development which is more important and that changed the whole working process and use of cryptography is the development of Public Key Cryptography. It was started with the publication of the paper titled New Directions in Cryptography, by Whitfield Diffie and Martin Hellman and similar development made by Ron Rivest, Adi Shamir and Leonard Adleman, who were the first to publicly describe the algorithm in 1977 and it was named after them as RSA algorithm. An Introduction to Cryptology: The word cryptology is a combination of two greek words, kryptos, which means hidden and logos means study. Cryptology is as old as writing itself and it has been primarily for thousands of years it had been used for securing military and diplomatic communications. The field of Cryptology can be further classified into two main fields, namely: Cryptography and Cryptanalysis. On the one hand the cryptographers try to develop a system or algorithm that will be safe and secure for communication while on the other hand the cryptanalysts seek weaknesses in the developed system and try to breach the security of the system. The two works can be considered against each other but the work of cryptanalysts cannot be always negative and they can work for the betterment of the developed system by trying to find out the weaknesses in the cryptographic algorithm and fix it. Cryptography: Cryptography is the technique for writing secretly so that the unintended recipients cannot comprehend the original message. It transforms the information into such an unintelligible form so that illegitimate or unintended users cannot devise the original meaning of the message and it looks like a garbage value for them. But the main consideration during the transformation is that the process must be reversible so that the intended user can get the original information after applying the original key and process. This is the traditional use of cryptography but in modern times the scope of cryptography has widened. Cryptanalysis: Cryptanalysis is the field of study that deals with the techniques that verify and assert the security of the protocol or system. The objective of the cryptanalysis techniques is to assess the security claims of the cryptographic algorithm or system. Cryptanalysts try to develop an attack to show that claimed security level is not achieved due to weaknesses in the cryptographic system. It is difficult to define when a cryptosystem is broken. Generally, efficiency of an attack is compared with the efficiency of exhaustive key search attack and if the efficiency of attack is less than it then it is considered an attack on the cryptographic system. Classification of attacks can be made on the basis of the amount of information available to attacker: à ¢Ã¢â€š ¬Ã‚ ¢ Ciphertext-only attack: The attacker has access to the ciphertext only. à ¢Ã¢â€š ¬Ã‚ ¢ Known-plaintext attack: In this case the attacker has access to both the plaintext and the corresponding ciphertext. This attack can be employed when the attacker has limited access to the encrypting device. à ¢Ã¢â€š ¬Ã‚ ¢ Chosen-Plaintext attack: The attacker selects a plaintext and generates corresponding ciphertext using the correct key. This can only be applied if the attacker has access to encryption device and is able to encrypt a message of choice using this device. The goal of such type of attack is to discover the secret key or algorithm for any given encrypted text. à ¢Ã¢â€š ¬Ã‚ ¢ Chosen-Ciphertext attack: The attacker selects a ciphertext and generates corresponding plaintext using the correct key. This can only be possible if the attacker has access to decryption device and is able to decrypt a message of choice using this device. The goal of such type of attack is also to discover the secret key or algorithm for any given encrypted text. The goals of such attacks in general can be classified as secret key recovery, plaintext recovery without recovering the key or the discovery of the encryption/decryption algorithm. Classification of Cryptographic primitives: Unkeyed Cryptography: Unkeyed cryptosystem is that cryptosystem which does not use any key or parameter for application. Examples of such system are one-way functions, cryptographic hash functions, and random bit generators. Public Key or Asymmetric Cryptography: Public Key or Asymmetric Key cryptography is the latest addition to the cryptographic techniques that has changed the basic uses of cryptography. Two different keys are used for encryption and decryption in Public or asymmetric key cryptography. Public key is being used for encryption and it is known to everyone and is freely distributable but the encrypted message can only be decrypted by using the private key corresponding to public key which is known only to the authorized person. Public key cryptography evolved to solve the problems of Secret key cryptography but it is very slow in comparison to secret key cryptography. Public key cryptography cannot be used for high volume encryption. Therefore we use combination of Public and Private Key cryptography for practical applications. Secret Key or Private Key or Symmetric Key Cryptography: In Symmetric Key or Secret Key cryptography, only a single key is used to encrypt and decrypt. It is also called Private Key cryptography. The main problem of the secret key cryptography is the sharing of same key by sender and receiver. In the case of unsecure channels, there is no mean to exchange key securely. The secret key must be shared using any secure channel before communication take place and for such purpose Public Key cryptography is generally used. An overview of Symmetric Algorithms: Symmetric key cryptography is still highly used due to its efficiency and is generally used where high volume of data is encrypted. Symmetric key primitives can be classified into two basic designs; namely Block Cipher and Stream Cipher. Block Ciphers: Block cipher is a symmetric key encryption which divides the input stream of plaintext into fixed size of blocks, generally 64, 128 or 256 bits long and using a fixed transformation (substitutions and permutations) on every block on by one. These transformations are repeated many times to obtain highly nonlinear output bits. The two most popular block ciphers are DES and AES. Modes of operation: A block cipher performs fixed transformations on any block of data and results in same ciphertext for same plaintext, hence can only be considered secure for a single block of data. A mode of operation is actually a way of encryption using a block cipher securely for data more than one block. The Block ciphers are used in one of the five modes to operate for breaking the linearity. A cryptographic mode usually consists of basic cipher, some sort of feedback, and some simple operations. Electronic Code Book (ECB) Mode Cipher block Chaining (CBC) Mode Cipher Feedback (CFB) Mode Output Feedback (OFB) Mode The counter (CTR) Mode Stream Ciphers: Symmetric Cryptographic systems encrypt plaintext messages unit by unit, and unlike block ciphers, which encrypt block of plaintext using fixed transformation, Stream Ciphers encrypt individual units or character of plaintext using a time-varying transformation. It takes the secret key and initialization vector (IV) as input and generates a pseudo random sequence of digits called keystream using pseudo random generator, usually part of Stream Ciphers. ciphertext digits are generated by XORing the keystream digits with the plaintext digits. The stream ciphers are classified into two parts as synchronous and asynchronous stream ciphers on the basis of application of internal state in further encryption of digits. Stream ciphers have played an important role in cryptography and still being used due to its efficiency and especially, in hardware implementations where hardware resources are restricted. Stream ciphers are the main topic of research in this thesis and it will be discussed more comprehensively in later chapters. For a general description of stream ciphers, see chapter 2. Scope of Cryptology: Today the cryptology is not just limited to data encryption and decryption as mentioned above, it has a wide range of usages. The field of cryptology is an emerging field in which continuous expansions and modifications are taking place. The field of cryptography was evolved for military usage but it has now expanded and is highly used in civilian applications also. Cryptography is the study of mathematical techniques, algorithms and protocols that can provide four basic services for information security, namely privacy, authentication, data integrity and non-repudiation. Privacy or confidentiality: The basic goal of cryptography is to keep the information secret from unauthorized persons. Cryptography is the most common mean to provide confidentiality or privacy to the information. Data Integrity: Data integrity means that system must be able to detect the unauthorized manipulation of the data. Data manipulation refers to insertion, deletion or substitution of data. Authentication: Authentication service provides the ability to correctly identify the parties in the communication and origin of the data. Non-Repudiation: Non-repudiation service prevents an entity from denying any activity done by itself or existence of a communication at any later stage in case of any dispute. Stream Cipher Standardization: Major effort towards standardization of cryptographic primitives was started by European Commission research project funded from 2000-2003 in form of NESSIE (New European Schemes for Signatures, Integrity and Encryption). In March 2000 NESSIE urged the public for submissions of cryptographic primitives, and against this call 42 primitives were submitted in February 2003. The submissions were selected in different categories for standardization. Various cryptographic primitives were standardized except Stream Ciphers and none of the six submitted stream ciphers were considered as upto standard. During this period another organization, the International Standards Organizations ISO/IEC 18033 also initiated a similar project for standardization and selected two stream ciphers: SNOW 2.0 and MUGI. Other than these two efforts a Cryptography Research and Evaluation Committee was set up by the Japanese Government which started a project CRYPTREC in 2001 to evaluate and recommend the cryptogr aphic primitives in different category for use. In the stream cipher category, three ciphers were recommended that are MUGI, MULTI-S01 and RC4 (128-bit keys only). But, Later on these ciphers were also found to be susceptible to the cryptanalytic attacks This failure on the side of cryptographic primitives in stream cipher category prompted Adi Shamir in 2004 RSA Data Security Conference to question, whether there is a need for Stream Ciphers or not. He also defined two areas were Stream Ciphers can still be useful where exceptionally high throughput is required in software and exceptionally low resource consumption is required in hardware. To explore the Stream Cipher condition and to develop a state of art stream cipher which can secure and fulfill the above mentioned requirements, ECRYPT launched the eSTREAM project in 2004. eSTREAM made a call for submission in two categories; hardware based and software based stream ciphers. In response to this call 34 ciphers were submitted in both the categories. In different phases of this project, cipher profiles were declared. The final profile issued in January 2012, seven ciphers were selected. The selected ciphers are HC-128, Rabbit, Salsa20/12 and SOSEMANUK in profile 1 (Software based Ciphers) and Grain v1, MICKEY 2.0 and Trivium in profile 2 (Harware based cipher). Even after these standardization efforts, many weaknesses were found in these ciphers. This state of Stream Ciphers has led me to involve in the research of the Stream Cipher and work towards a secure and efficient Stream Cipher.

Wednesday, September 4, 2019

Concept of liberalization:

Concept of liberalization: Introduction: The early 1990s was an era of intense changes in the Indian economic system. The torrent of international companies that we see today in India was born as a result of the economic transitions the country went through in 1991. It was the age of relaxation of a number of rules popularly known as â€Å"Liberalization†. With liberalization, there was an increase in competition and certain categories were facing competition for the first time. There could be no lackadaisical attitude on the part of the companies existing pre-liberalization as the whole economic system was overthrown to willingly accommodate more players. Liberalization had far reaching impacts. One are which it impacted significantly was the arena of advertising. Organizations couldnt take their customers for granted as there were other organizations waiting to eat into their market share. Advertisements hence became a more incisive tool for organizations to make their presence felt and appeal to their target audie nce. It is this change in the pattern of advertising that this thesis wishes to track. Literature Review Exploring the Concept of Liberalization: â€Å"in July 1991 with the announcement of sweeping liberalization by the minority government of P.V. Narasimha Rao opened the economy dismantled import controls, lowered customs duties, and devalued the currency virtually abolished licensing controls on private investment, dropped tax rates, and broke public sector monopolies. We felt as though our second independence had arrived: we were going to be free from a rapacious and domineering state† Das (2000), on the reforms that originated with the July 1991 package announced by Manmohan Singh (Panagariya, 2004). To ‘Liberalize means remove or loosen restrictions on (something typically an economic or political system).   Generally, Liberalization (Liberalisation) refers to removal or relaxation of restrictions imposed by the previous government usually in areas of economic or social policy.   In the area of social policy, liberalization refers to the relaxation of laws for example, laws on homosexuality, drugs, abortion, divorce etc.   In the area of economic policy, liberalization can either be privatized or be liberalized.   Like, India has liberalized various markets, instituting a system of competition, but still some of the departments like Gas and Energy remain partially or completely in government ownership. The economic liberalization in India refers to the current reforms in India.   The Indian economy was liberalized in 1991.   That marked the end of â€Å"License Raj†.   License Raj, also known as Permit Raj, was the brainchild of Jawaharlal Nehru, Indias first Prime Minister.   It was the result of Nehrus decision to have a planned economy in India where all the aspects of economy are controlled by the government (state).   License Raj refers to the elaborate licenses and regulations and the accompanying ‘red tape, which was required to set up and run businesses in India between 1947 and 1990.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the late 80s, the government led by Rajiv Gandhi eased restrictions; removed price controls and reduced corporate taxes. This did increase the rate of growth, but it in turn led to high fiscal deficits and a worsening current account. Soviet Union, Indias major trading partner collapsed at the same time and the first Gulf War, which caused a spike in oil prices, caused a major balance-of-payments crisis for India. The Gulf war also led to a reduction in repatriation from expatriate workers (an important source of foreign exchange at that time).   India asked for a $1.8 billion bailout loan from IMF, which in return demanded reforms.   In response to this, Prime Minister Narasimha Rao and the finance minister Manmohan Singh initiated the economic liberalization of 1991. The reforms did away with the License Raj and ended many public monopolies, allowing automatic approval of foreign direct investment in many sectors. On licensing, the new policy explicitly stated, â€Å"industrial licensing will henceforth be abolished for all industries, except those specified, irrespective of levels of investment.† (Sivadasan, 2007) Liberalization is about Encouraging growth of private sector Simplification of policy, regulation, tax structure Facilitating Foreign Direct Investment Restructuring public sector for efficiencies Providing incentives for exports and allowing more imports Put emphasis on modernization of plants and equipment through liberalized imports of capital goods and technology (Sivadasan, 2007) Expose the Indian industry to competition by gradually reducing the import restrictions and tariffs Moving away from protection of small scale industries Realization that economies of scale is necessary for economic growth (Singh Shankar, 2008) Life before 1991 Various rules were imposed on foreign companies operating in India, under the Foreign Exchange Regulation Act (1973).   Foreign ownership rates were restricted to below 40% in most industries. In addition, restrictions were placed on the use of foreign brand names, on remittances of dividends abroad and on the proportion of local content in output (under the Phased Manufacturing Program).  Ã‚   (Sivadasan, 2007) Very limited brands available on the supermarket shelves Upto 97% taxes on private players High-level corruption.   Frustrated Entrepreneurs State monopoly in many key sectors including TV broadcast.   Hence, the monopoly of Doordarshan. [Television and public policy: change and continuity in an era of global liberalization, David Ward, 2009] Legendary battle between the two textile magnates Dhirubhai Ambani and Nusli Wadia in the latter part of 1986.   The battle between these 2 corporate rivals Dhirubhai Ambani, Chairman Reliance Industries Ltd., is not the first in the history but the weapons such as the Press employed by them on the large scale is certainly without a parallel. This shattered the concept of objective journalism in a business controlled press (Aggarwal, 1989) Movies of that era young man rebelling against the ‘system a reflection of common mans angst against a state-run, corrupt, bureaucratic machinery which slowed down the progress of India rather than facilitating it. Life after 1991 Foreign direct investors were now allowed up to 51% equity stakes in certain industries, under the â€Å"automatic approval route. Further, restrictions relating to use of foreign brands, remittances of dividend and local content were relaxed. Following these reforms, there was a significant increase in amount of foreign direct investment into India(Sivadasan, 2007) Media Explosion Introduction of Cable TVs.   Since most of the Doordarshans programming was seen to be unimaginative and dull, large audiences switched to satellite television channels made available through cable. Influx of western ideas and lifestyle Conspicuous consumption Entry of foreign players and hence multiple players in each category.   Great increase in competition and hence, customer at the advantage Increase in challenges of Media Planning and Brand Building due to the widespread channels Emergence of TVR, GRPs, TAM ratings etc  · Much more buoyant and optimistic state of mind was reflected in Bollywood.   Hence, all soft, mushy, romantic blockbusters like ‘Hum Aapke Hai Kaun,Dilwale Dulhaniya Le Jaayenge,Kuch Kuch Hota Hai (Joshi, 2001) Defining Advertising: Advertising is so familiar to modern readers that it may seem odd to ask what an advertisement is.   Although advertising is all around us perhaps because it is all around us we dont often pause to think about its nature as a form of discourse, as a system of language use. There are multiple definitions of advertising like ‘Advertising is simply one of many available channels of communication and ‘Advertisements are the messages that advertising carries, in an attempt to achieve those ends. Advertising is a form of communication used to influence individuals to purchase products or services or ideas Advertising is a non-personal form of promotion that is delivered through selected media outlets that, under most circumstances, require the marketer to pay for message placement Any paid-for communication, intended to inform and/or influence one or more people is Advertising Of few of the above mentioned definitions, I could best relate advertising being ‘any paid-for communication, intended to inform and/or influence one or more people Paid-for Any advertisement that is not paid for is not an advertisement Communication Every advertisement is attempting to bridge a gap between a sender and one or more potential receivers.   That bridge is a form of communication. Intended Not all advertisements ‘work, in the sense of achieving their desired objectives, but they are nonetheless part of advertising. Inform and/or influence The purely informative advertisement may be rare and the distinction between information and persuasion may be difficult to draw, but an advertisement does not have to set out to influence either attitude or behavior in order to qualify (Bullmore, 2003) History of Advertising Worlds first ever advertisements appeared some 3000 years B.C. as ‘stencilled inscriptions on bricks made by the Babylonians. History tells us that out-of-home advertising and Billboards are the oldest form of advertising.   Printed advertising began to make itsappearance for ‘Royal announcements in early Europe: China, Turkey, England (1100 -1711). Moving on to American advertising in 1729 1850; several changes occurred interms of medium, message, manner of presentation. These changes are nothing but areflection of the social, economical and technological changes over time. Changing times and society called up for changes in the way advertising was planned. There has been one or the other peculiar aspect of advertising strategy, which kept it growing in volumes of success and importance. In 1870 the first ‘Brand advertisement for St. Jacobs Oil appeared and this phenomenon continued till early 80s. Further ‘slogans and trade characters took over the job. Then there came a time to appeal; variety of creative appeals (humor, sex, fear, love, affection etc.) made the further way up for advertising (Pincas Loiseau, 2008) Medium of Advertising Medium is nothing but a channel that carries the Advertisers message.   There are six major categories of advertising media 1. Print Media refers to any published, printed medium such as Newspapers and magazines. a. Newspapers are one of the traditional mediums used by all types of businesses to promote their product or service or idea. Advantages Huge reach in a given geographic area Flexibility in deciding the size and the placement of the ad Exposure to the ad is not limited.   People can go back to see the ad Quick turn around.   The ad if decided to run today can be in the hands of the customers in a day or two Disadvantages: Expensive ad space Lot of competition Poor photo production Highly visible medium, and hence the competitors can quickly react to your prices Newspapers facing stiff competitions from internet b. Magazines more focused, expensive compared to newspapers Advantages: Better targeting of audience Higher reader involvement and hence more attention paid to the advertisement Better color reproduction Disadvantages: Long lead time Limited flexibility in terms of ad placement and format Higher costs compared to newspapers 2. Electronic Media consists of radio and television a. Radio is a universal medium enjoyed at one time or another during the day. Advantages: Negotiable rates Less inflation in radio media compared to other media Disadvantages: Listener cannot go back to the ads for the important points Ads, an interruption in the entertainment Radio is a background medium.   Most listeners are doing something else while listening b. Television permits you to reach large number of people Advantages: Television permits you to reach large numbers of people on a national or regional level in a short period of time New opportunities to pinpoint local audiences Television being an image-building and visual medium, it offers the ability to convey your message with sight, sound and motion Disadvantages: Lot of competition.   Requires multiple exposure for the ad to get noticed Preferred ad times are often sold out far in advance Relatively expensive in terms of creative, production and airtime costs Limited length of exposure, as most ads are only thirty seconds long or less, which limits the amount of information you can communicate 3. Out-of-home media is focused on marketing to consumers when they are on the go in public places, in transit, waiting (such as in a medical office), and/or in specific commercial locations. a. Out door advertising: is essentially used for any type of advertising that reaches the consumer while he or she is outside the home. Advantages: Specific Target Audience Good for branding and positioning Creates greater consumer awareness Disadvantages: Less effective in tactical and short term campaigns b. Transit Advertising: Transit advertising is typically advertising placed on anything, which moves, such as buses, subway advertising, truckside, and taxis, but also includes fixed static and electronic advertising at train and bus stations and platforms. Airport advertising, which helps businesses address an audience while traveling, is also included in this category. Advantages: Good for all ranges of a businesses advertising budget You get what you pay for A target audience is exposed to a single advertisement for a long period of time It picks up the speed due to frequency Timeliness Geographical selectivity Disadvantages: People on transit may not even notice such advertisements, simply because they became used to transit advertising Many of those people may not be interested in you and your product at all; hence, transit ads are not easy to target despite the high level of reach * Design limitations 4. Internet Advertising is a form of promotion that uses Internet and World Wide Web for communicating with the customers. Advantages: Rapidly growing industry Affluent market Selective Targeting Interactive medium Immediate Response In-depth information Disadvantages: Security and Privacy Slow downloads Global marketing limits Untested medium 5. Direct Mailers is a marketing technique in which the seller sends marketing messages directly to the buyer. Direct mail include catalogs or other product literature with ordering opportunities; sales letters; and sales letters with brochures Advantages: Personalized marketing message Effectiveness of the response can be easily measured Control Ad campaign is hidden from the competitors Active involvement- the act of opening the mail and reading it Disadvantages: Selectivity problem Long lead times are required for creative printing and mailing Can be expensive, depending on the target market and size of the campaign Monitoring Advertising Dealing with advertising is still one of the hardest tasks facing marketing people.   It remains notoriously difficult to demonstrate this return, to show clearly that advertising is paying its way.   It is also difficult to understand how advertising works, how consumers respond to it.   How do we choose the best way of developing our advertising, testing it, checking it out, ensuring that it meets the objectives we have set for it let alone evaluating how far it has done so, and how we should improve it? (McDonald, 1998) Research Problem To analyze the change in content and pattern with regard to the nature of print advertisements in the pre-liberalization and post-liberalization era Research Objectives To understand liberalization and the changes resulting as a result of this measure To understand the implications of liberalization on advertising from a regulations perspective To trace the change in the nature of advertisements before and after liberalization Research Methodology The research will be qualitative in nature.   And the method which will be used will be content analysis. An analysis of the advertisements of top five brands in the soaps and chocolates category will be carried out, bathing Soaps, coming in daily usage category and chocolates in occasional usage category. Here print advertisements of the top five brands pre and post liberalization will be taken and a content analysis will be done on them. This will be used to track changes in pattern and using these two categories the results will be extrapolated for the FMCG category as such.

Tuesday, September 3, 2019

GUIDE TO HYPNOSIS :: essays papers

GUIDE TO HYPNOSIS HOW TO GUIDE SOMEONE INTO HYPNOSIS: NOTE THAT I SAID GUIDE, YOU CAN NEVER, HYNOTISE SOMEONE, THEY MUST BE WILLING. OK, THE SUBJECT MUST BE LYING OR SITTING IN A COMFORTABLE POSITION, RELAXED, AND AT A TIME WHEN THINGS ARENT GOING TO BE INTERRUPTED. TELL THEM THE FOLLOWING OR SOMETHING CLOSE TO IT, IN A PEACEFUL, MONOTINOUS TONE (NOT A COMMANDING TONE OF VOICE) NOTE: LIGHT A CANDLE AND PLACE IT SOMEWHERE WHERE IT CAN BE EASILY SEEN. TAKE A DEEP BREATH THROUGH YOUR NOSE AND HOLD IT IN FOR A COUNT OF 8. NOW, THROUGH YOUR MOUTH, EXHALE COMPLETELY AND SLOWLY. CONTINUED BREATHING LONG, DEEP, BREATHS THROUGH YOUR NOSE AND EXHALING THROUGH YOUR MOUTH. TENSE UP ALL YOUR MUSCLES VERY TIGHT, NOW, COUNTING FROM TEN TO ONE, RELEASE THEM SLOWLY, YOU WILL FIND THEM VERY RELAXED. NOW, LOOK AT THE CANDLE, AS YOU LOOK AT IT, WITH EVERY BREATH AND PASSING MOMEMENT, YOU ARE FEELING INCREASINGLY MORE AND MORE PEACEFUL AND RELAXED. THE CANDLES FLAME IS PEACEFUL AND BRIGHT. AS YOU LOOK AT IT I WILL COUNT FROM 100 DOWN, AS A COUNT, YOUR EYES WILL BECOME MORE AND MORE RELAXED, GETTING MORE AND MORE TIRED WITH EACH PASSING MOMENT." NOW, COUNT DOWN FROM 100, ABOUT EVERY 10 NUMBERS SAY "WHEN I REACH XX YOUR EYES (OR YOU WILL FIND YOUR EYES) ARE BECOMING MORE AND MORE TIRED." TELL THEM THEY MAY CLOSE THEIR EYES WHENEVER THEY FEEL LIKE IT. IF THE PERSONS EYES ARE STILL OPEN WHEN YOU GET TO 50 THEN INSTEAD OF SAYING "YOUR EYES WILL.." SAY "YOUR EYES ARE...". WHEN THEIR EYES ARE SHUT SAY THE FOLLOWING. AS YOU LIE (OR SIT) HERE WITH YOUR EYES COMFORTABLY CLOSE YOU FIND YOURSELF RELAXING MORE AND MORE WITH EACH MOMENT AND BREATH. THE RELAXATION FEELS PLEASANT AND BLISSFUL SO, YOU HAPPILY GIVE WAY TO THIS WONDERFUL FEELING. IMAGINGE YOURSELF ON A CLOUD, RESTING PEACEFULLY, WITH A SLIGHT BREEZE CARESSING YOUR BODY. A TINGLING SENSASION BEGINS TO WORK ITS WAY, WITHIN AND WITHOUT YOUR TOES, IT SLOWLY MOVES UP YOUR FEET, MAKING THEM WARM, HEAVY AND RELAXED. THE CLOUD IS SOFT AND SUPPORTS YOUR BODY WITH ITS SOFT TEXTURE, THE SCENE IS PEACEFUL AND ABSORBING, THE PEACEFULNESS ABSORBS YOU COMPLETELY... THE TINGLING GENTLY AND SLOWLY MOVES UP YOUR LEGS, RELAXING THEM. MAKING THEM WARM AND HEAVY. THE RELAXATION FEELS VERY GOOD, IT FEELS SO GOOD TO RELAX AND LET GO. AS THE TINGLING CONTINUES ITS JOURNEY UP INTO YOUR SOLAR PLEXUS, YOU FEEL YOUR INNER STOMACH BECOME VERY RELAXED.

Monday, September 2, 2019

Rwanda Report :: essays research papers

Rwanda Report Rwanda is an African country in East Central Africa. Rwanda is just a very little degrees below the Equator which is not too shabby in my mind. Below the Equator would be in the south and so it is actually in south central. Get it South Central (get it)HA!HA! In Rwanda there are about seven hundred and ten per square which in my mind a whole lot of people I don't think even San Bernardino has that many but what do I know. Rwanda is twenty six thousand three hundred and eighty eight miles squared which in my mind is tiny but I'll say again what do I knows. So to figure out what the exact population of this measly little country you must multiply seven hundred and ten by twenty six thousand three hundred and eighty eight and you get a whole lot but when I looked in the book it said seven million two hundred twenty two thousand people. This enormous number doesn't look right but I am too lazy too get up and get a calculator too check so I'll take their word of it. The capital city in Rwanda is Kigali which is also the biggest city in Rwanda I can't find how big it is but it must be bigger than twenty miles square and under twenty six thousand three hundred and thirty eight square miles. The official name of Rwanda is called The Republic Of Rwanda. Rwanda is also landlocked which doesn't help much either. Since it is landlocked I will tell you which countries it is surrounded by on the north it is by Ughanda, on the east by Tanzanian the south by Burundi and finally on the west it is next to Zaire. Rwanda is one of the poorest countries in the world and it is one of the most densely populated country in the world. One of the reasons for Rwanda being in such a bad state of poverty is that there was a Civil war between the Hutu and the Tutsi which fought for stupid reasons. Well at least I think that they are stupid reasons but to them it was probably some serious stuff that they don't take very lightly. The Hutu are very short people that make up about ninety two percent of the population. The Hutu are not pygmies but they are very short people that are about three feet tall a piece which is about two feet shorter than I am and now that is pretty short in my mind.

The Black Madonna

The Black Madonna The Black Madonna by Muriel spark is a short story about Racism and religion. It aims to explore the real meanings behind what people say and the actions they do. It deals with happenings that closely reveal people’s reactions to it. Muriel Spark does this through subtle humor by the ironic happenings that take place during the short story. The characters in the short story play a huge role in adding to the dramatic storyline. At first impression the married couple Lou and Raymond seems normal to an extent but under scrutinization the couple’s lifestyle seems forced and exaggerated. This could add to the fact that they are not comfortable with who they really are individually and as a couple. Because of the constant stress which they endure of not being able to produce a child (Spark 38) mainly because they are Roman Catholics. Apparently, in the short story Roman Catholics are usually expected to have large families. One could say that this notion can support stress in their chosen religion and in their relationship. Although they are content with luxuries they haveacquired due to the absence of them having children. The couple takes their religion quite seriously and feels displaced if someone strays away and defies the religion. They have expectations that the person would find their way back to the religion. This can be seen with Henry. Who defied the Roman Catholic Church and who is expected by Lou to return back at some point (Spark 40-41). Lou and Raymond strive on inviting guests to their home. These guests are either Roman Catholics or somehow have been connected to the religion. In the text it is not difficult to notice that Lou and Raymond pride themselves on being non- judgmental. But yet they only invite Roman Catholics not caring of their class, may it be high or low class (Spark 39). In the short story Raymond invites two Jamaicans from his work( Spark 39). Why this should be seen as some kind of event if Lou and Raymond are really non-judgmental. This leads one to think that the couple is hypocrites. The couple covers up themselves under a facade that people of different skin color are equal. As well as deserving of every pleasure that life has to bring. We can see this facade clearly in Lou. She leads herself as well as her husband to believe that she is not a snob (Spark 39 and 45). While in actual fact she is the most prominent in her facade. This can be substantiated through when she has an encounter with Tina Farrell; a sorter that the derogatory term â€Å"darkies† should not be used to refer to black people( Spark 40). Well in the right as that is derogatory and degrading. But later in the short story Lou contradicts herself . Lou losing almost her temper with Henry about his opinion about the mentality of Lou’s sister, Elizabeth. Lou in her mind questions the authority of Henry being able to voice his opinion. She furthers her soliloquy in her mind and reveals that because Elizabeth is white she can live any lifestyle that suits her but who might Henry be to comment on that lifestyle if he is black ( Spark 44). One is then able at first to think Lou is a â€Å"sensible† woman. She loves making all people feel welcome and she mixes with all classes of all people. But their color counts when they have their own opinions or when people are not anyhow connected to their religion. Sensibility implies reasoning and in being in control. One finds that it may be a struggle to apply these terms to Lou. When Henry is in the process of making his statement about the mentality of certain types of people, one can see Lou’s impatience and complete disregard for what he has to say. This can be substantiated through Lou not giving Henry a chance to have his view raised in completion (Spark 44). As well in the short story a point is reached where Lou is hysterical and close to portraying a lady on the brink of insanity. Raymond, a hypocrite like his wife seems more disgusted in the way people live than in being a concealed racist. However, Raymond feels just as intensely about religion as his wife does and is compelled to defend his religion. The climax in the short story ultimately reveals the peak of revealing the couple’s actual views on race. When Lou becomes pregnant with what is to be a little black girl, her disgust in herself and in her child is obvious. One could say that the idea if being associated with black people is intriguing to the couple but as being part of their family is not a something which they were going to allow. Her encounter with Tina, the sorter now holds no value. Lou and Raymond is therefore exactly like Tina. Which is a racist but they do not mind being associated or in the company of black people. References Spark, Muriel. â€Å"The black Madonna† Publisher, University of Cape Town press† Publication year: 2010 Page number: 36-51 www. diesterweg. de/lektueren/she_many_voices_of_english/978-3-425-09031-3-Probekapitel,pdf www. enotes. com/blackmadonna. jalen/black www. newsstatesmen. com/200012250052 www. weberburg. de/skool/schwerpunktthema-abitur-one-language-many-voices. html

Sunday, September 1, 2019

Federal government of the United States Essay

 © 2010 Carnegie Endowment for International Peace. All rights reserved. The Carnegie Endowment does not take institutional positions on public policy issues; the views represented here are the author’s own and do not necessarily reflect the views of the Endowment, its staff, or its trustees. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from the Carnegie Endowment. Please direct inquiries to: About the Author Nathaniel Ahrens is a visiting scholar in the Carnegie Energy and Climate Program, where his research focuses on climate, energy, and sustainable development issues in China. He is the president of Golden Road Ventures Ltd., a business development and strategic advisory firm that provides expertise and support for critical projects in China, including sustainable development, government procurement, agriculture, and media. Previously, Ahrens was senior product manager and director of international sales for Intrinsic Technology, a Shanghai-based telecommunications software provider. He also founded Shanghai Pack Ltd., a luxury-brand packaging company based in Shanghai and Paris. Ahrens is a member of the National Committee on U.S.–China Relations, the Asia Society, and serves as an honorary ambassador for the State of Maine. Indigenous innovation1 has become the greatest immediate source of economic friction between the United States and China. This trend is not unique to these two countries; policy makers globally are actively trying to stimulate domestic innovation. The burgeoning markets for biotech and environmentrelated products and services and, potentially even more important, countries’ efforts to emerge from the global economic slowdown all reinforce this trend. Mindful of this global scene, China has made indigenous innovation one of the core elements of its attempt to make a structural shift up the industrial value chain. Recently, however, indigenous innovation has been tarred with a protectionist brush. In both China and the United States, there have been increasing calls for buy-local stipulations and the erection of tariffs and non-tariff barriers to trade. In China, these measures primarily take the shape of government â€Å"local content† mandates and through the preferential treatment given to products officially classified as â€Å"national indigenous innovation products† (NIIP) in the government procurement process. In the United States, they have taken the form of buy-local provisions and efforts to shut out foreign companies. The conflict has been escalating dangerously. In the run-up to the recent Strategic and Economic Dialogue, the U.S. business community ranked indigenous innovation in China as its number one policy concern, above even the currency issue. As of this writing, the key points of contention remain unresolved. Yet despite the loud cries of protest against it, the global trend toward â€Å"homegrown† innovation is a healthy, positive development. Without innovation, countries cannot continually raise wages and living standards.2 Government procurement should play an important role in stimulating innovation, but maintaining open markets and international linkages is critical. But instead of following its current approach of short-term product substitution and picking winners by protecting them from competition, China should focus on proven, market-friendly ways of stimulating innovation. Government procurement’s primary roles should be market signaling, de-risking R&D, bridging the finance gap, and stimulating demand. The United States would also benefit by refocusing its government procurement policies along the lines indicated in the key findings of this paper, especially concentrating on facilitating more open markets and elevating the importance of sustainable procurement. The following set of specific recommendations for China will stimulate innovation through open markets and the effective use of government procurement