Wednesday, July 31, 2019

Psychological tests Essay

Aptitude test is defined as the test of suitability to determine whether an individual is likely to develop the skills required for a particular kind of work (Encarta dictionary, 2008). Aptitude tests are used to calculate abilities over a long period of time, as well as to envisage future learning performance. Example of aptitude tests are the Scholastic Assessment Test (SAT) and the American College Testing (ACT)). These tests are both college admission tests explored in the prediction of college success. Special aptitude tests The purpose of special aptitude test raises the concept of fidelity and bandwith. Bandwith determines the breath of the traits that is being evaluated while fidelity refers to the extent to which a particular measure focuses on a particular attribute or quality. These tests are explored to prognosticate on the future performance in a subject that the person in question is not currently trained. Goverment parastatals,institutions and business organization often will apply specific aptitude tests when handing over specific privileges to certain individuals. .Furthermore, vocational guidance counseling may involve aptitude testing to help clarify individual career goals (Microsoft Encarta, 2008). If a person has a similar score in comparison to that of individuals already functioning in a particular profession, the probability of success in that occupation can be predicted by the use of aptitude tests. Certain aptitude tests have a wide coverage that includes skills germane to many different professions. The General aptitude test, for instance aside measuring the general reasoning ability also covers the areas of form perception, motor coordination, clerical perception as well as manual and finger dexterity. Other tests may concentrate on a single area such as the Art, Engineering and modern languages (Microsoft Encarta. 2008). One of the examples of special aptitude tests is the sensory or perceptual test and this concentrates on the discrimination of color and visual acuity. It also involves the auditory senses. Another example of special aptitude test is the mechanical test which includes the test of spatial relations and this demands manual dexterity as well as space visualization. There is also the paper and pencil test which includes the Bennet Mechanical comprehension Test and the Minnesota Paper Formboard. Other special aptitude tests are listed below. The clerical test This includes the Minnesota clerical test that consists of 200 pairs of numbers and 200 pairs of names. It also includes the clerical abilities which is an embodiment of 7 other tests like test of proofreading and copying etc. The art and musical test. The Art ability test includes the Art judgment test in which the participant judges between two pictures and chooses the one that is better. In aesthetic perception test, the participant gives an orderly ranking of 4 versions of the same project. The grave design judgment test also allows the participant to adjudicate the best among a group of abstract pictures. Musical ability test The musical ability test gives an analytical assessment of musical ability and it makes use of tones as well as notes to evaluate 6 components of auditory discrimination. The wing standardized test of musical intelligence explores recorded pianoic songs to assess about 8 areas which include the memory, chord analysis and rhythm.

Tuesday, July 30, 2019

Family Values Are Not Contradictory to Personal Choice as Well as Self-Fulfillment Essay

With the collapse of the traditional family mode and the accelerated development of the capitalist world, the world has changed significantly. According to John Dewey, â€Å"The significant thing is that the loyalties which once held individuals, which gave them support, direction, and unity of outlook on life, have well-nigh disappeared† (Individualism—Old and New, 1962). And the situation remains the same in the 21st century. There has been more flexibility on lifestyle and people are no longer under the pressure—or under less pressure –of forming a family. Some people choose to devote their whole self to what they want to do, claiming that carrying out family values will prevent themselves from choosing what they really want and affect the process of realizing self-fulfillment. There has been a heated debate on whether family values are contradictory to personal choice as well as self-fulfillment. This essay will consider arguments in support of family values conflicting personal choice as well as self-fulfillment, and then point out the problems of these statements. It will set forth reasons why family values are not contradictory to personal choice as well as self-fulfillment. Many people claim that people are not free to make personal choice because of family values, especially in a society dominated by Confucius culture, where several generations live together and filial piety as well as blood relationship is appreciated; however, this is not true. In Confucius culture, rather than love relationships between couples, much weight is put on the affection between family members. As Lin Yutang said in â€Å"The Chinese family ideal†, this affection contributes to a feeling of obligation which amounts to a deeply religious attitude. This leads some people to suspect that family members may have to sacrifice their own opportunities or even personal life for the advantage of the whole family, which negatively affects their pursuit of self-actualization. Generally speaking, this statement is true. Nevertheless, it is insufficient in the sense that it ignores the implications of affection between family members and wrongly interprets Confucius family mode. Chinese philosophers make the passion between husband and wife the very basis of a normal human life so much that they regard it as the very foundation of all normal human life (Lin Yutang, 1937). Besides, Confucius culture starts out with a belief that man exists as a member of family unit and no one exists completely alone. So, by emphasizing the affection between family members, Confucius culture regards one’s achievement the glory of his own and at the same time the glory of his family. In other words, the whole family will stand out if one member needs help, which means it is possible to facilitate his chase of self-fulfillment with the resource from the whole family. It can be inferred that with family values, how much easier it is for one to fulfill himself once he makes the decision. Family values play an important role in facilitating one’s pursuit of self-fulfillment, especially in a family appreciating Confucius culture. It has been argued by some that one evidence showing how family values are against personal choice as well as self-fulfillment is the unattainable balance between career and family; yet this statement is problematic. With the accelerated pace of city life in modern society, many people have failed to maintain a job and a family at the same time. And in most of the follow-up of these cases, men turn to career and have to spend little time with family members while women sacrifice their career to stay at home and look after the whole family, and more and more young people turn to a personal choice of remaining single in the name of pursuing self-fulfillment, instead of celebrating family values by marrying a spouse and having children as what people did in the old days. However, although the dilemma of modern citizens does exist, the statement above is no longer correct, for it is the result of misunderstanding. As Immanuel Kant introduced in his philosophical system, freedom is not about doing what we want according to instinct, but about realizing our free will by controlling our instincts. Therefore, family values are not to blame for restraining our choices as we are not free to our choices in the first place. People should face the fact that their time is limited and be aware of their unlimited choice of way of self-fulfillment. This means, to work for long hours to support the family is an admirable method to value the family and fulfill themselves as well. From my point of view, family values and personal choice as well as self-fulfillment are so tightly connected with each other that we cannot even separate them. Self-fulfillment is realized through a series of personal choices, and personal choice depends heavily on the influence of family values. Because the personal choice one makes is never fully personal. It is affected by numerous external factors, for example, the economic and political environment, the inter-person relationship as well as the mainstream values, and he justifies and weighs these factors using his beliefs which are influenced by his family values. On top of this, whatever the social environment and cultural background, the universal family values contain the concepts of flexibility, communication, compromise and unconditional love. Healthy family values are intended to make the family a positive and supportive place for members, facilitating their personal choices as well as self-fulfillment. After analyzing the arguments presented here for both sides of this question, it can be contended that family values are not contradictory to personal choice as well as self-fulfillment. People’s belief for family values can be a strong support for one to realize his ambitions in the sense that the whole family will be his backing. And one’s pursuing for self-fulfillment can be another admirable way to celebrate family values. Family values, personal choice as well as self-fulfillment are actually interactive factors positively affecting each other.

Contributions of Modern Society

The place of worship in the middle Ages was a place where anyone, regardless of the class, could belong. The source of unity, it accomplished influences on art and architecture. As time began to change from the antique system of the Romanesque period, new standards of understanding independence began to take hold; the birth of Gothic. Here, the Church became a place where people became more acceptable; becoming the adequate place to observed such new ideals. The unique Gothic architecture characterized most in the great cathedrals of the 12th thru 14th Centuries in St. Denis, Notre Dame, Chartres, Salisbury, Durham, Amiens, and more. Most Gothic structures emphasize the vertical, drawing one's eyes upward toward the heavens with the awesomeness of God. These cathedrals built with ascending peaks, pointed arches and strengthening giving influences of cooperation and radiance. One of the main achievements of the 12th and 13th centuries was to determine the engineering expertise of the ridged vault, pointed arch and help to give a famous cathedral that is at once sophisticated than the ones before. Even though, the pointed arch could prove more powerful than its former, there was still an issue of finding a way to improve the large masonry ceiling vaults over large spans. In order to maintain the outward thrust of barrel vaults, vertical foundation walls have to be unusually clear and powerful. What makes possible the extended use of ridged vaulting and pointed arches to open and revitalize the walls and extent of the cathedral link above the aisle roof that extends from the upper nave wall, where the first thrust of the central dome is the greatest. The result is to add structural strength and solidity to the building. In today’s society, we can use some of the most well known influences and values without realizing where it came from or where it began. I think that the influences from architecture, art, and even religion. The influences of the middle age building structures can be established on how it molded our world today. The influences of the mastery of the architectures have helped many of the buildings that we have today, everything from the past help contribute our lives in modern society. As I look around at several buildings I know that I don’t see the gargoyles but looking at some of the Catholic churches and some of the other buildings that are well structured. Muhammad, considered the dominant prophet and founder of Islam, born in 570 A. D. forced to get a job to take care of himself at an early age. He was a driver and married his boss at the age of 25, to Khadija, by which he had only four daughters. The right word Islam means â€Å"submission†. The meaning behind the word submission is to the will of Allah, the one and only true God according to the Muslim faith. To be considered a Muslim one would have to be submitting themselves. The basic theme of Islam is extremely easy and straightforward: There could not be any other God but Allah, and Muhammad is the first Prophet of Allah. According to the Koran Islam teaches that there is one God Allah, the creator of the universe. Muhammad would be the one who taught his new followers that this God, Allah, is compassionate and just. He taught them that because being the spokesperson for Allah, he would be held accountable. Allah calls all people to believe in Him and worship Him. On the Last Day, all the dead would resurrect and either be reward go to paradise or be punished and go to hell. In today’s society Islam is one of the most well practiced religions besides Christianity in the United States. The Islam faith has grown over the years with millions of members around the entire word. The Koran reveals how a Muslim is suppose to live their lives. The religion shaped our society because many of the citizens here in the United States respect the faith of Islam and even have several Mosques build in many states. Although, Islam has been one of the most feared and perhaps misunderstood religions, there are many who have learned more about this religion. Islam celebrates Ramadan each year where Muslims pay homage to their faith. Buddhism is a belief that has gained 300 million people around the world. The word comes from ‘budhi', to awaken. Its origins about 2,500 years ago when Siddhartha Gotama, known as the Buddha, was himself awakened (enlightened) at the age of 35. Buddhism goes beyond religion and is more of a philosophy or ‘way of life'. It is a philosophy because philosophy ‘means love of wisdom' and the Buddhist path can be summed up as: to lead a moral life, to be mindful and aware of thoughts and actions, and to develop wisdom and understanding. Siddhartha Gotama was born into a royal family in Lumbini, now located in Nepal, in 563 BC. At 29, he realized that wealth and luxury did not guarantee happiness, so he explored the different teachings religions and philosophies of the day, to find the key to human happiness. After six years of study and meditation he finally found ‘the middle path' and was enlightened. After enlightenment, the Buddha spent the rest of his life teaching the principles of Buddhism called the Dhamma, or Truth. Today Buddhism, help structure many lives by the disciplines, the Four Nobles Truth, and Karma, Recycle of Life. Buddhism explains a purpose to life, it explains apparent injustice and inequality around the world and it provides a code of practice or way of life that leads to true happiness. Life is suffering which includes pain, getting old, disease, and ultimately death. We also endure psychological suffering like loneliness frustration, fear, embarrassment, disappointment and anger. This is an irrefutable fact that cannot be denied. It is realistic rather than pessimistic because pessimism is expecting things to be bad. Instead, Buddhism explains how suffering can be avoided and how we can be truly happy.

Monday, July 29, 2019

Select an interesting Topic Essay Example | Topics and Well Written Essays - 250 words - 1

Select an interesting Topic - Essay Example This thought and reality is actually quite liberating. College writing simply expands on what I learned in high school. While high school did train me to pay close attention to the grammar and mechanics of my writing, I cannot say that it trained me to adequately express my own thoughts and ideas, while contributing in some way to the existing body of academic knowledge. It seems to me now that my college writing courses will be geared towards accomplishing this latter goal. As mentioned in the reading, â€Å"College writing is the form of written communication found in the academic world of universities and college – and nowhere else† (Fontaine and Smith 2). As I embark on these courses, I need to remain cognizant of this reality and make an effort to hone my writing skills and elevate them to another level. This will take some work, but by understanding that my writing should continuously change and that I am not locked into any one set style or methodology, I believe I will quickly catch on and see improvement course by

Sunday, July 28, 2019

2012 Election Essay Example | Topics and Well Written Essays - 750 words

2012 Election - Essay Example Based on all of the aforementioned issues and after balancing pros and potential cons related to both candidates, it has been determined that Mitt Romney would be the best leader for the United States. First, in relation to the economy, Barack Obama has a proven track record of failures associated with economic policy and stimulus package development to prevent the company from experiencing a recession. This current president maintains a very large group of economic advisors to provide him information and strategies that will help the macro- and micro-economic environment. It does not appear that this president maintains the academic or experience-based credentials to understand the complex dynamics of economic theory and inter-dependent financial institutions that drive growth and sustainability in the economy. It becomes a cause for concern when an individual who is responsible for dictating economic policy must rely on a basket of knowledge sources to make decisions. Mitt Romney maintains much experience-based knowledge of business and financial investment institutions and therefore can rely on their own tangible knowledge to make effective economic decisions. It is difficult t o trust the economic policy of an individual with no formalized training in advanced economic development or experience working within the investment and financial communities. Barack Obama also does not seem to understand the importance of a crumbling and inefficient infrastructure that supports retail, physical urban sustainability, and how physical infrastructure failures have long-term safety consequences for citizens. Many of the bridges and highways in America, as two examples, have been deemed unsafe by experts in safety management nationwide. In certain urban areas, they are literally falling onto vehicles as they pass underneath overpasses with the rebar exposed and potholes

Saturday, July 27, 2019

Business Ethics Essay Example | Topics and Well Written Essays - 500 words - 8

Business Ethics - Essay Example Therefore, this approach, in contrast to good attitude to animals, makes human actions towards animals ethically grounded, disregarding each person’s own attitude or feelings towards animals. Singer’s position lacks sentiments and is well grounded using the principle of equality of rights. Having brains or consciousness is not a discriminatory factor for Singer, and it is quite clear for the scholar that we all have to take moral care of all animals and stop using their lives for our trivial goals. 2. · Pollan’s main point is that the basic problem of our society is industrial animal farming where animals are treated with disrespect and are caused a lot of suffering. His idea is to make the process of animal farming (including their slaughtering) â€Å"transparent† (figuratively or literally) – that is, allow animals to enjoy their lives and to slaughter them as mercifully as possible. This would make meat and dairy products more expensive of course, however humans would eat animals with respect and consciousness. Considering Singer’s argumentation, Pollan agrees with quite a lot of arguments, yet questions some others, and this seems to happen because according to Peter Singer, there are only two options for people eating meat: either to go vegetarian or to turn their heads away from the problem and close their eyes not seeing the animals suffering. That is why, the eventually discovered solution of farms â€Å"transparency† looms for Poll an the perfect moral option which would, on the one hand, ensure that the animals are treated nicely, and on the other – that the humans will be able to make their choice of eating or not eating their flesh with more consciousness. 3. I would not say Pollan abandons utilitarianism totally but his position is certainly not concentrated on utility as the main measure for morality and the basic criteria for

Friday, July 26, 2019

Topic 2 Essay Example | Topics and Well Written Essays - 3500 words

Topic 2 - Essay Example It was analyzed using simple analytical tools. The study found out that teens had a lot of influence in their parents' consumption pattern. The concept of marketing has become broad and refined with seemingly segmentation of the market. It has been well studied to come up with the best marketing strategy for organization. This is because marketing forms the core operation of any profit oriented organization. It is a powerful tool for a business to have a breakthrough in its existence. Currently the scholarly world is concerned with studying the effects of having an effective marketing strategy based on different market segments. (Willis, 1990) Market segmentation has continued to grow day by day as more and more researches are revealing needs of different segments of the market. It has tried to shift from tradition segmentation of male and females, old and young, and other segmentation to more refined one. It has also seen the emergence of consumer clubs sub-culture which has driven the market in another direction. These clubs have gone on marketing spree at one time buying particular goods which seemingly identifies a particular club. (Hall, 1997) Sarah (1997a) defines Culture as some particular values or tastes that define a particular group of people. A sub-culture is a division of a culture with particular tastes or values that are not shared with other members of a culture. Marketing have been targeting a particular subculture within a diverse culture. This has become a valued aspect in any marketing strategy. This is important to address various demographic characteristics that are evident in a particular culture. It has become evident that people within a culture do not share the same values and tastes. For example it will be difficult to find the old and the young sharing the same tastes in fashions. This has become important to address the needs of every subculture and also to help create a notable difference between the two sub-cultures. Marketers have been using the concept of sub-cultures to develop refined marketing strategies that address the needs of each and every group in a culture and on the other hand to mar ket product that are seemingly acceptable to consumers. (Donovan and Henley, 2003) The strategy of manufacturing and branding goods targeting the whole population has not bee very successful. It has led to pile up of goods in warehouse due to low sales. Market research data has revealed manufacturing and branding goods with a particular target to a group with a clear knowledge of its demands in terms of purchase power and the consumption pattern. For example the teen group has been found to fast in consumption compared to the old. A senile member of the community will buy a pair of shoe once in a year while a teen of the same community will have bought more than three pairs of shoes in the same time bracket. This

Thursday, July 25, 2019

Cruise ship tourism Case Study Example | Topics and Well Written Essays - 750 words

Cruise ship tourism - Case Study Example The structure of the cruise industry is more likely to resemble monopoly because the industry has executed a lot of changes in the brand that is so much different from the carnival of the past. The pricing in the cruise industry has continued to lead, with an average price per person in a day being approximately $175, compared to other industries that are slated to be $ 235. The cruise industry has also improved the onboard products and ships thus making it have a competitive advantage above the rest of other industries. Driving such a change has been the core objective and vision of Carnival (Gibson, Papthanassis, & Milde, 2011). The aspect of consistently providing quality cruise vacations exceeding the expectation of the industry’s guests is more likely to make the company become a monopolist since its services will exceed those provided by other industries.Question 3  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The various brands operated by Carnival Corp. do not have synergies. It is wise for Carnival to acquire brands outside of the contemporary market niche in order to bring a different brand into the market. This will ensure that the company effectively competes with other companies within the industry (Gibson, Papthanassis, & Milde, 2011). Carnival should also acquire brands outside of the contemporary market so as to improve its field-sales force as well as to grow direct-sales effort that include an inbound and outbound channel of personal vacation planners. The acquired brands will also help Carnival direct its efforts in stimulating demand.

Wednesday, July 24, 2019

Arguments Participation Paper 1 Assignment Example | Topics and Well Written Essays - 250 words

Arguments Participation Paper 1 - Assignment Example They mock at the racial inequality as dust gets settled on both the white and the black. The economic exploitation and indifferent treatment toward the tunnel workers are evident in the lines 9-12. Muriel has been a social activist taking her poetry to the level of political statements. She has worked for the cause of various political and social issues during her time. In her poem, â€Å"George Robinson: Blues†, she depicts the gruesome, inhuman life of the black tunnel workers in the town of Gauley Bridge. The town is characterized as the â€Å"Negro town† sarcastically, as it does not own them but disowns them by sending tunnel workers in bulk to the cemetery on top of the hill. George, the speaker presents an insider’s view of the life in the tunnel. White dust settling on the blacks deconstructs the racial coding and makes it difficult for the outsider to identify the ‘white’. The tunnel worker, masked in white dust, proceeds gradually toward the graveyard in the top of the hill left unattended by doctors. They are not provided with the basic medical facilities nor are cared for by the authorities. They are left to die so inhuman. He says how the workers die in huge numbers due to the unhealthy working conditions. â€Å"Did you ever bury thirty-five men in a place in back of your  house/thirty-five tunnel workers the doctors didnt attend/ died in the tunnel camps, under rocks, everywhere, world/ without end† (9) ironically portray how inhuman the tunnel workers are looked upon. It is very clear that the tunnel workers are commodities looked upon only for utility and when they turn sick and not fit to work and turn over profit, the authorities step in only to remove them from the job. George says, â€Å"when he couldnt keep going barely/the Cap and company come and run him off the job surely† (15). The poet has depicted the social picture of the tunnel workers in the voice of an

The population dynamics of the grizzly bears Literature Review Essay

The population dynamics of the grizzly bears Literature Review - Essay Example Although the population of each group can fluctuate through death and birth rates, with their own probability of going extinct, these groups can also be supported by other groups through occasional contact. The dynamics of these groups are different not only because their living environments and landscapes are not always equally suitable, but also because of their proximity, or lack of it, to other groups. Limited contact with other groups can force one of these smaller groups to become extinct, leading to the collapse of the entire species if too many groups die out. There are several different ways in which a metapopulation might be organized though, not all fitting this classic definition. For instance, the group could have a core group, from which several subgroups branch off and / or rejoin later. There are also situations in which all members of a species exist in small patches that remain more closely entwined with each other, saving each other from extinction and freely passi ng members from one patch or subgroup to another. There are also situations in which subgroups are sparsely distributed over adequate environments to such an extent that they have no capacity to reach each other and some appropriate living areas remain void of this species.

Tuesday, July 23, 2019

Osteoporosis drugs Essay Example | Topics and Well Written Essays - 250 words

Osteoporosis drugs - Essay Example There may be a lot of drugs already with established names and quality assurance but CalciD-Bifos can boast of the complete elements needed for osteoporosis and as an introductory product, a low cost that makes it affordable to a larger scale of customers. Low cost and quality seldom go together so that the success of the product is solely dependent on these factors. With the rising awareness of people and attention to their health, the need for osteoporosis drugs would be highly feasible. This will not only be true to older customers but to the young also because the drug can be used as a preventive measure so that a wide array of customers is foreseen. Osteoporosis drugs are often expensive so that the low cost of CalciD-Bifos will be a big factor to its success. Many people would be able to afford and avail of it especially for the prevention of the said disease to prevent more expensive treatments. To reach this goal, there will be advertisements on all media available to inform the people of the existence of the drug and its

Monday, July 22, 2019

Business Systems Hoosier Burger Essay Example for Free

Business Systems Hoosier Burger Essay Improving Hoosier Burger Bob and Thelma Mellankamp wanted to open their own business. They came across Myrtle’s Family Restaurant and saw a sign that said it was for sale. Bob and Thelma bought the restaurant and their own restaurant was brought to life Hoosier Burger Restaurant. The idea was one that everyone dreams of owning their own business but do not understand all the behind the scenes projects that make a business successful. Yes, they have been in business for over 30 years but even they understand that their dream needs some improvement to continue in the market they are in. Bob and Thelma have discussed the idea of a computer system but do not know where to start so Bob wants to bring in a consultant to address some of their weak areas and make suggestions to improve Hoosier Burger. They inform the consultant on how business is ran. This restaurant is behind the curve when it comes to technology. They still do paper trail on every aspect of the restaurant from deliveries, inventories, and point of sale (Valacich, George, Hoffer, 2009). Even though paper was what many companies started out with, it is no longer an approved way to do business. Paper allows too many human errors to come into play where as an electronic record keeping system eliminates a majority of these errors but as with any data†¦you get out of it what you put into it. All this means that if you put inaccurate data into the system then the data you get from the system will also be inaccurate. Hoosier Burger has learned this lesson oh too well. Especially, since they did not order enough vanilla ice cream to cover their own special so they had to run to the grocery store to try to get enough for the sales they were doing on the special (Valacich et al., 2009). Bob and Thelma agreed that it would be  valuable to purchase an information system to assist them in the areas of inventory management, marketing, customer service, food preparation, and point of sale (Valacich et al.). Now that it has been decided on what needs to be addressed with thi s new information system. The systems development life cycle (SDLC) begins (Valacich et al., 2009). The four main steps of this process are (1) planning and selection, (2) analysis, (3) design, and (4) implementation and operation. The first phase is to plan the system out and then select the appropriate system for job. This situation a good point of sale system would give this company the system they need for daily operations and growth. A good POS covers all aspects of the restaurant from the dining area to the kitchen and even the storage areas. With any system, you have subsystems that are called components. Components by themselves do not make a system but when put together they make a complete system. In the case of Hoosier Burger one of the components of the system would be an inventory log or database. This subsystem would track usages and deliveries to ensure that stocks are maintain at the properly level for daily operation of the business. The project development team that Hoosier Burger selected w as based on the weaknesses of the organization. The focus of the new system will be on ways to improve inventory management, customer service, and management reporting. Any one of these weaknesses could cripple the organization. The team needs to get as much information as possible to ensure that they are building the correct system for this organization. I would use the interview process to get as much information from the staff as possible and I would use questionnaire to customer input. Also, I would gather as many reports and logs that I could for supporting documentation but with the current processes. This type of information may not be readily available or available at all. After gathering this information, the process of developing a system to correct their weaknesses begins. You would also want to find out if the company has any upgrades planned so that you could incorporate that into the system. In this case, they want to expand to delivery services and a drive through operation. These expansions do not require a lot of upgrades to the building so these will go into effect immediately to increase revenue for the company. The diagram figure 1 shows the flow of information for the new system. Fig 1. As you can see from figure, the information system that need is robust in nature but simple. The system analyst now needs to break down the different entities the company needs to store information about. These entities have particular characteristics that require information to be stored. There are rules used when attempting to place an identifier for each entity. The diagram will show the changes and specify the component’s needed for each relationship. In the text, an entity is a person, object, place, concept, or event in the user environment of which an organization wants to store data(Valacich, George, Hoffer, 2009). Person entities are usually your employees but can be your customer. Place entities are basically the location i.e. states, regions, countries. Object entities include the machines you use, buildings your work out of, products you produce, and vehicles. Event entities can be considered sales, renewals, registrations. Concept entities include courses, accounts, or work centers. Hoosier Burger needs the ability to store information about their individual entities. The main entity is the customer that frequents the restaurant on a regular basis. They also need to store information about what products the customer is purchasing. Hoosier Burger also needs the ability to store information about the company itself and place entities which are the businesses that order meals from the company. We will now discuss attributes. Attributes according to the text are named properties or characteristics of entities that are of interest to the organization(Valacich et al., 2009). The following attributes should be used for the customer: customer name, customer address, customer phone number, customer’s number of orders, and customer specific orders. These attributes can also be assigned to the business entity by switching out customer with business. Attributes can also be assigned to the end product such as ingredients, price, and amount sold. Identifying the entities require assigning unique identifying  characteristics for the entity type. For example when dealing the with customer entity, you would use an identifier that is easy to use i.e. Customer ID, Customer Name, Customer Address, and Customer Phone. The key when dealing with identifying items is making it user friendly. Once all of these have been put into place, the system analyst now needs to build three working solutions to this company’s weaknesses. The three solutions as discussed in the text are low, medium, and high level. The difference in the three levels usually equates to cost but it also includes how much effort the user has to put into the system and the type of technology used. Time is money and if your employees are having to spend more time with the system than the customer then Hoosier Burger will lose money. All of these factors come into play when developing a system for an organization. The key to success of Hoosier Burger and the project development team is communication and cooperation. The more time these two entities communicate with each the easier it will be for the project team to address the needs of the customer and customer addresses the needs of the project team. It is a two way street. In the end, the job of the system analyst is to develop a system that addresses the wants and needs of the customer while maintaining within the budget. You do not want to sell the customer a â€Å"Corvette† when a â€Å"Camaro† would have done what is needed. Reference Valacich, J. S., George, J. F., Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall.

Sunday, July 21, 2019

Study On The Guidance From The Nmc Nursing Essay

Study On The Guidance From The Nmc Nursing Essay The Royal College of Nursing (RCN, 1981) and the Nursing and Midwifery Council (NMC, 2004; 2008) described the word accountability as ones responsibility to somebody or for something, in this case nurses are accountable to the patients, the employers and the NMC principles. Responsibility is being accountable for ones action or omission to patients in our care. Whereas Sempre Cable argued that responsibility relates to ones accountability to what one does and accountability is one responsible to the consequence of what one does (2003). Nurses are accountable to the NMC which legislates and regulates all nurses, midwives and specialist community nurses in the United Kingdom and it is the responsible of all registrant to abide to its principle. Therefore, the author will weave the tapestry of this essay to demonstrate that the NMC (2008) guidance may appear simple but it is a difficult responsibility to fulfil by nurses in practice. As the guideline relates to the first paragraph of t he principles of The Code, firstly, trust in relation to caring of patients health and wellbeing will be defined and the discussion will posit around the kind treatment of the patients as individuals without discrimination, respecting their dignity and be an advocate for them whilst they are in the nursing care. Secondly, respecting their right to confidentiality as is of paramount importance and it is enshrined in the Data Protection Act (1989) and also the Human Right Act (1989) which makes it legal. Confidentiality will be defined and note that patients information cannot be disclosed without the patients consent. Thirdly, for nurses to respect the dignity of patients, to advocate for them and respect their confidentiality nurses must be able to use therapeutic communications to get the necessary information and nurses must be able to communicate with other health professionals to support the patients in their care. Nurses must be able to communicate with the patient in a languag e that is understood by the patient. Fourthly, the principle of ethics in the discharging of the roles of nurses is important to complete the jigsaw of this complex essay. Lastly, to bring theory into practice by using the five steps of nursing process model (Christensen and Kenney, 1990, 1995; Roper, Logan Tierney, 1976; Pearson et al, 2005) will be explained by using the framework of the Clinical Governance (Department of Health (DH), 1999) as the benchmark for quality practice to explain the reason that it is a difficult responsibility for nurses to balance the different agendas. Hence, before an attempt is made to answer the topic of this essay theory of nursing is explained and the definition of nursing is postulate for the reader to understand the direction that this topic will be taken. Theory provides a template for practice as it provides the embodiment of nursing philosophies, presenting the beliefs, understandings, and purposes of nursing. It also guides research and education. A theory helps the understanding of nursing by the general public (Seedhouse, 1986). Theory is also a thinking process especially when a nurse is reflecting on the nursing process (assessment, diagnosis, planning, implementation and evaluation) of a patient (Bell Duffy, 2008). Peplau (1952) argued that nurses use therapeutic communication as a way to tease out information from the patients in order that nurses gain the patients trust and they are treated with respect and dignity. (, patients most of the time are seeing the nurse for the first time,) Orems (1971) used the self- care model where he stated that nurses used the continuous self-care action to care for patients when the patients self-care exceeds their own abilities to meet their needs (self-care deficit). Though Horan et al, (2004); Rogers (1970, 1980), Neuman (1980) and Parse (1987) stated that nursing is both an art and science whereby the main aim is to help patient to achieve biological system homeostasis equilibrium after an illness and to sustain their health and wellbeing not forgetting their respect and dignity. RCN stated that the use of clinical judgement in the provision of care to enable people to improve, maintain, or recover health, to cope with health problems, and to achieve the best possible quality of life, whatever the disease or disability, until death (RCN, 2003 pg 3). Respecting the dignity of patients and caring for their health and wellbeing. The World Health Organisation (WHO) stated that health is a human state of biopsychosocial wellbeing in the absence of illness. Seedhouse (1995) argued that the WHO definition is too broad and difficult to achieve and it does not take into consideration the different definition of illness. Roper et al (2000) argued that health is an important factor in the model for nursing. Therefore, one of the roles of nursing is not only caring for ill patients but the healthy clients especially when doing health promotion. Furthermore, nurses have to care for patients coming from different cultural and ethnical background, gender, sexual orientation. Firstly, nurses must treat people as individuals and respect their dignity and must not discriminate in any way against the patients in their care. Patient must be treated kindly and considerately. Nurses should act as an advocate for those in their care by helping them to access relevant health and social care information and to support them. Secon dly, patients right to confidentiality is of paramount importance and is enshrined in the Data Protection Act (1989), furthermore, it is in the Human Right Act (1989). Ethics and its moral dilemma when caring for patients health and wellbeing Ethics are standards of behaviour which nurses are expected to act on when caring for patients and others (Tschudin, 1986; Edwards, 1996; Holland et al, 2008; Kozier et al, 2008) whereas moral is ones personal standard of the difference between right and wrong in conduct, character and attitude. Ethics are found in the NMC Code of conduct and nurses are accountable for their ethical conduct (Kozier, 2008). Ethics and moral are sometimes used interchangeably in some literatures. Beauchamp Childress (1989, 2009) developed a framework stated that there are four moral principles that nurses can work under. They are autonomy, nonmaleficence, beneficence and justice as explained below. Autonomy states that a patient is an individual and his/her wishes should be respected eventhough the decision runs contrary to our own ethical issues. Nonmaleficence the patient should not be placed do no harm it could happen intentionally, placing someone at harm risk or unintentionally causing harm. Beneficence doing good implement actions that benefit patient and their supports person. Justice fairness justifying one action against another action. (Nursing theorists may say when a nurse in faced with a dilemma the decision should be based on two ethical models utilitarianism one that brings the most good and the least harm for the greatest number of people or deontological theory action is not judged on its consequences but is judged on whether it agrees with moral principles) Ethics can sometimes provide moral dilemmas that nurses face when caring for a patient especially if the patient has been diagnosed with an incurable disease whereby the family and their employer do not want it to be disclosed to the patient. In such circumstances the conflict it between ethics and moral dilemma that is enshrined in the NMC (2008) Code of Ethics their role as nurses and moral duty to the patient who wants to know the truth and the patients health and wellbeing (Benjamin Curtis, 1992; Edwards, 1996). Thompson et al (2006) stated that ethics and moral cannot work in a vacuum further added that in order to justify moral judgement nurses need prior knowledge of ethical theory. Beauchamp and Childress (2009) added that one needs understanding of moral theory to be able to justify ethical decisions. This demonstrates the extra burden imposed on nurses thereby finding themselves constrained by the difficult responsibilities placed on them to fulfil the NMC (2008) Code of E thics furthermore those of their employers. (Nurses must have professional accountability and responsibility regardless of how simple or difficult the task may, they are personally accountable for their practice and are answerable for any action and omission committed whilst discharging their role. In this case responsibility refers to the accountability or liability associated with the duties undertaken by nurses). Conclusion Definition of important words Before the essay tapestry is weaved some words definition are given to set the tone whether the NMC (2008) guidance appears simple and/or is it difficult responsibility to fulfil in nursing practice. The Essence of Care (DH, 2003) is an NHS Policy helping health practitioners to take a patient-focused and structured approach to sharing and comparing practice. Trust Bell Duffy suggested that being trustworthy is difficult as patients, peers, managers have different expectations on the definition of trust (2009). Trust is therefore defined as . Wilson argued that public has lost trust in nursing care due to the fact that they expect modern medicine could cure every possible ill and secondly someone has failed to deliver the service they were mandated to deliver (2002). Health and wellbeing health is defined as the absence of illness with complete physical, mental and social wellbeing (World Health Organisation (WHO), 1946; Seedhouse, 1986) and wellbeing being the (suggested) state of perfection (Wilmot, 2003) Dignity is defined as the way an individual perceives and acquires values (privacy, respect and trust), sets standards according to these values and from these standards judges what is acceptable influenced by the individual cultural upbringing (Haddock, 1996; Seedhouse, 2000; DH, 2000; Matiti, 2002; DH, 2004; Matiti et al, 2007). Client/patient Advocacy Griffith Tengnah (2008) stated that NMC codes places both a normative and positive rules on the registrant (Normative rule what a person should do or what they should refrain from doing and positive rule imposes a legal obligation to do or refrain from doing something). Therefore, the NMC codes pull on both the normative and positive rule to underpin a shared set of values as enshrined by the regulatory body. Apply the concept of dignity in delivering care by respecting the patient as an individual The concept of dignity A concept is a label given to an observed phenomenon In the policy documents NHS Plan (Department of Health (DH), 2000) and Standards for Better Health (DH, 2004) DH states that patients would be treated as an individual first and treated with respect and dignity by focusing on their whole health and wellbeing not only their illness. It further added that the nurses would also be treated with respect and dignity. These words are echoed in the NMC (2008) Code though it does not mention the registrant. Apply the concept of dignity Deliver care with dignity Identifying factors that influence and maintain patient dignity Challenges situation/others when patient dignity may be compromised Quality of care and clinical governance cycle Conclusion: To the author who is a novice (Benner, 1984) the NMC guidance may appear to be a difficult responsibility to fulfil in practice but to an expert nurse the process and analysis of data happens on an unconscious level. This is done as the nurse may be able to deconstruct an incident by summoning his cognitive intuition (knowledge, experience) therefore the clinical decisions appears in his/her conscious mind readily formed (Lyneham et al. 2008; 2009). So it reasonable to conclude that regimes of care should actually benefit clients, rather than simply not cause harm. Beauchamp T L, Childress J F. (1989) Principles of biomedical ethics. 3rd ed. Oxford: Oxford University Press. Beauchamp T L, Childress J F. (2009) Principles of biomedical ethics. 6th ed. Oxford: Oxford University Press. Benjamin M, Curtis J. (1992) Ethics in Nursing. 3rd Ed. Oxford: Oxford University Press Benner P. (1984) From novice to expert: Excellence and power in clinical nursing practice. California: Addison Wesley. Department of Health. (2000) The NHS plan: A plan for investment, a plan for reform. London: The Stationery Office. Edwards S D. (1996) Nursing Ethics: A principle-based approach. Basingstoke: Macmillan Press Ltd. Griffith R, Tengnah C. (2008) Law and professional issues in nursing. Exeter: Learning Matters Ltd. Hinchliff S, Norman S, Schober J. (eds.) (2008) Nursing practice and health care: A foundation text. 5th Ed. London: Hodder Arnold. Holland K, Jenkins J, Solomon J, Whittam S (eds.) (2008) Roper, Logan Tierney Model in Practice. 2nd Ed. Edinburgh: Churchill Livingstone Elsevier. Horan P, Doran A, Timmina F. (2004) Exploring Orems self-care deficit nursing theory in learning disability nursing: Philosophical parity paper. Learning Disability Practice. 7 (4) 28-37. Kozier B, Erb G, Berman A, Synder S, Lake R, Harvey S. (2008) Fundamentals of Nursing: Concept, process and practice. Harlow: Pearson Education Ltd. Lyneham J, Parkinson C, Denholm C. (2008) Explicating Benners concept of expert practice: intuition in emergency nursing. Journal of Advanced Nursing. 64 (4) 380-387. Lyneham J, Parkinson C, Denholm C. (2009) Expert nursing practice: a mathematical explanation of Benners 5th stage of practice development. Journal of Advance Nursing. 65 (11) 2477-2484. Nursing Midwifery Council (NMC). (2002) Code of professional conduct. London: NMC Nursing Midwifery Council. (2008) The Code: Standards of conduct, performance and ethics for nurses and midwives. London: NMC. Royal College of Nursing (1981) Accountability in nursing. London: RCN. Seedhouse D. (1986) Health: The foundations for achievement. London: Wiley. Seedhouse D. (2000) Practical nursing philosophy: The universal ethical code. New York: Riley. Semple M, Cable S. (2003) The new code of professional conduct. Nursing Standard. 17 (23) 40-48. Thompson I E, Melia K M, Boyd K M, Horsburgh D. (2006) Nursing Ethics. 5th Ed. Edinburgh: Churchill Livingstone Elsevier. Waights Wilmot S. (2003) Ethics, power and policy: The future of nursing in the NHS. New York: Palgrave Macmillan. Wilson R. (2002) Where did peoples trust go? Nursing Standard. 17 (2) 24-25.

Application of Communication Theories

Application of Communication Theories Choose one communication theory which you think will help organization and how it will help communication requirement? Answer: In other words communication theories explains systematic summary about the nature of the communication process, certainly, theories can do more than summarize. Amongst the various theories of communication, diffusion and agenda setting theory would help meet the communication requirements at the GDW. (Sligo,1997) Diffusion Theory: Diffusion Theory is related to human behavior, getting new ideas, how to implement them, step-by- step, this theory explains how one reaches an important decision. There are five stages within the diffusion process: 1. Awareness Individual is aware of it. 2. Interest Wants to learn more. 3. Evaluation Asks others for feedback. 4. Trial Uses a sample, etc. 5. Adoption Now a user/believer. Agenda Setting Theory: Agenda setting theory is more beneficial for public relationship; it works wonder to get the attention of the media, the public and policy makers. Some researchers says it is set of issues that can be used for multi-directional purpose. By applying the above two theories communication requirement can be fulfilled at the government disability workshop. As these two theories would help interact easily with each other, understanding will improve, thus maximum output can be gained.(Sligo,1997) Can you evaluate how effective was Ralf Ocker communication to the staff? (You need to analyze good and bad communication within the organization) Answer: Ralf communication is not good. Email is not a good communication always. He always do communication with the staff by email. He can sit with the staff and give feedback their questions. He needs to listen his staff. He is a good listener and professional rather being emotional. Ralf dont care of others and fire people. He should follow face to face communication with the staff, because it is two way communications and resolve so many conflicts quickly. As far as the role of Mr. Ocker to reshape the GDW is concerned, he used the parallel theories models of good communication restructuring, as he announced cutting down of substantial funds also he closed the workshop for some time until a way could be found to make them significant and profitable. In such manner he assesses the most significant valuable planned changes for the GDW. He observed the situation that workshop need changes, He arranged meeting with the staff from other department to think together about whole processes In order to evaluate new ideas he listened to the planning of Mr. Fred, Mr. Mavis Ms. Mary In adoption, he brought up a team whose main motive would be to bring changes in organization which was called Ability Plus(Locker,2003) In the conclusion, the Mr. Ralph Ocker communication planned changes brings a new era of business behavior to the GDW. His strategy is quite similar to Diffusion theory in which changes are adopted or rejected the all stages.(Locker,2003) i)Identify four stages of perception process (theory) Answer: Perception is a process, by which we study the world around us, world that consist persons, objects and its experiences. Perception is unique to each person, two people cannot experience the world exactly the same at a time. Perception process occurs in four stages, namely- 1. Stimulation: When someone receive the information. 2. Attention: When someone pays attention and receive/accept only what he wants 3. Organization: How do someone organize other ideas what he listen or receive 4. Evaluation: Evaluate the information. Understanding of the parts ii) Identify and explain Ralf listening technique. Answer: 1. Ralf Ocker is a experienced guy and stimulates information perfectly 2. He paid full attention to the message. ( In this stage Ralph Ocker took two weeks in order to know and understand the organization and the staff) 3. He organize the information (After knowing the way the organization behaved Ralph Ocker then organized how and what has to be done, he announced cutting down of substantial funding, then he closed the workshop for some time until a way could be found to make them actually turn into something significant and profitable, he also welcomed suggestion from the staff). 4. He also evaluates the information perfectly. (In the this stage Ralph Ocker interpreted the changes he was about to bring. In this stage he added meaning to the points he had brought in front of the staff by sending a mail which had a detailed account of proposed changes). i) Definition of Assertive Communication. Answer: Assertive communication is the straight forward open expression of your needs, desire thoughts feelings it involves advocating for your own needs while still considering respecting the need of others. All of us use assertive behavior at times, quite often when we feel vulnerable or unsure of ourselves we may resort to submissive, manipulative or aggressive behavior. Assertiveness is a useful communication tool. Its application is contextual and its not appropriate to be assertive in all situations. Remember, your sudden use of assertiveness may be perceived as an act of aggression by others. Theres also no guarantee of success, even when you use assertive communication styles appropriately. ii) Analyze GDW staff assertive response by using Four Fs-Facts, Feelings, Focus and Feedback. Answer: Facts: Remain neutral and dont attack; talk about fact, truth; Do not blame anyone and speak the truth. Fred speak the truth. Many of GDW staffs were ex armed personnel who had very rigid structure who used autocratic management style, machinery were out dated , GDW had a limited amount of contract cause of little funding were unable to compete with the commercial rivals. Focus on Action: Ocker planned a better and productive strategy, he made sure changes were strictly followed. Fred focused on action. Feelings: Some people from the staff were favoring the new management system (accepted by Ocker Fred) and some of them was against, but in the mail sent by Ocker clearly states that changes would go ahead as planned. Feedback : Feedback refers to the process of exchanging information is order to make things clearer. There were many instances that took place in the GDW which explains how feedback process was done in GDW from the joining of Ocker to the decision he finally made in the end. i) Identify and evaluate the guideline for giving and receiving feedback. Answer: Giving and receiving feedback should be Specific and objective, on timely, and honest. ii) What advice you give Rlaf Ocker regarding receiving and giving feedback. Answer: Giving and receiving feedback involves the interaction of both the parties, thus Ralph Ocker should make sure he not only explains his point but should also understand what the staff wants to say. He should also clarify them in order to avoid confusions. While giving or receiving feedback there can be statements which might sound nitpicky to one, Ralph Ocker should make sure he avoids such situation and should assume that the persons who pointed it out would did so as it was important to be mentioned. Make it a positive process and experience. Ralph Ocker should always remember that his main purpose was to reshape the GDW and hence his main focus should be to improve the condition of GDW and in order to do that he should make sure he shouldnt be harsh, critical or offensive. Be timely and regular and specific Ralph Ocker should make sure that he does not take much time in receiving and giving the feedback i.e. he should make sure he keeps interacting with the staff of GDW on regular basis so that there is no point of confusion and maximum output can thus be generated. Have available all the necessary information Ralph Ocker should make sure he has all the required data, facts, information which would be needed in the process of interaction also he should make sure that all of them is well organized in order to avoid any confusion and for easy reference. Be a good listener and ask for clarification Giving and receiving feedback involves the interaction of both the parties, thus Ralph Ocker should make sure he not only explains his point but should also understand what the staff wants to say. He should also clarify them in order to avoid confusions. OR Giving: 1. Invite individual to self access 2. Comment on position 3. Focus on behavior not person 4. Own the statement and dont wait 5. Be clear and specific 6. Discuss with staff and ask how they feel 7. Try to give positive feedback 8. Use I 9. Immediate feedback is more reliable, So give feedback as soon as possible Receiving: 1. Self access your ideas and work before hand 2. He shall check if he has understood the specific of feedback where more focus required 3. Take negative feedback too, it is useful 4. Prepare specific question that you want on other person to provide feedback on Regarding conflict negotiation- i) Identify two causes of conflict at GDW. Answer: Conflict is an integral part of Human being, it is said that until, you have people dealing with people, making decisions or meeting deadlines you will Have Conflict. Mass causes of conflict in organization are poorly defined Goal, Divergent personal Values, lack of co-operation, unclear roles, communication failure, personality conflict etc. The two causes of conflict at the GDW are as follows:- 1. Restructuring: 2. Difference of Opinion: In organization many people work so opinion might be different. 3. Lack of Formal Communication: It refers to the condition of GDW which lacked formal conversation as the earlier staff was rigid in nature and they followed an autocratic management style. When people dont interact in an organization of formal topics chances of conflicts rises to a higher point. 4. Poorly Defined Goals: Before the arrival of Ralph Ocker the GDW lacked planning strategy and had undefined goals due to lack of communication between the staff members. When such huge things are ignored chances of conflict rises to a large extent ii) In your opinion what conflict management style or technique Ralf should have used at GDW. Answer: Conflict management is the practice of Identifying handling a conflict in sensible fair efficient manner. Ralph Ocker should have used/considered the following to prevent conflicts: 1. Frequent meeting with the staff members 2. He should have allowed the team to express openly 3. He should sharing objectives completely and correctly4. He should give a clear detailed Job description5. Ocker should distribute task fairly 6. He should never criticize any of the staff members publicly 7. He should always be fair and should do justice with everyone Style: Collaboration: This is where Ocker will pair up with the other stuff to achieve both of their goals. Competition: This is win-lose approach. Ocker should act in a very assertive way to achieve his goal. q7. i) Discuss the key principles for restructuring communication. Answer: Restructuring is one of the biggest decisions your organization can make and you will find it much harder to undo damage done by a poorly managed restructure than it is to ensure that the restructure is a success in the first place. Its likely that your managers and HR staff will not have undergone a restructure before and therefore lack of the knowledge and experience of conducting one. If they have, then their previous experience may have been focused on improving their own individual circumstances. They may have limited knowledge as to how things could or should have been done better at an organizational level. I would like to suggest the following new principles/guidelines for the management- Bring a flat structure of management into picture Enable decision-making informed by strong cross-system consultation, listening and respect Promote close productive working relationships within the Ability Plus Retain a learning organization philosophy of continuous staff development, engagement and teamwork Outsource, eliminate, or transfer non-essential services, Bridge the communication gap between the staff members in the ability plus Adopt a cross functional team approach to problem solving Reduce complexity Focus on core activity Maintain flexibility Use role model in leadership development, etc. ii) How do you restructure communication? Answer: 1. Face to Face Communication: 2. Accountability of Communication: 3. Communication with Truth: 4. Communicate the Vision: 5. Listening to the employee: 6. Senior Manager should be visible and accessible to the employee: 7. Communicate timely: i) Business Report Guideline Answer: Report cover Executive Summary Table of contents 1 Terms of Reference 2 Procedure 3 Findings / Analysis 3.1 Profitability Development Process of Metalwork Department 3.2 Making Profit out of Metalwork Department 4. Conclusions 5. Recommendations à ¢- Referencing à ¢- Appendix ii) Do you think presentation is good idea or not after report? Answer: Presentation is good idea because face to face communication is possible through it not by report. iii) Why each person is different perception of Andrews performance? Answer: Because each people have different perception about others. Ray: Selective Attention. Ray heard that Andrew is doing well. because he is qualified and bright. this is called selective attention. First immersion last long. Tim: Perceptual Accentuation: He said Andrew is too slow to learn the job, because he saw Andrew day to day activities and fix Andrew mistakes. Kate: Differences in perceptual ability: Kate said that he is not a good member of team and slow. Sione: Consistency Effect: Andrew is a Rugby Player, So he likes Andrew and think he must be a good team player. Andrew: Self-serving attribution bios: He think he is doing well and it is called self serving attribution. iv) List the four elements that define culture. What are the strategies you can use that can help communication between culture? Answer: Time: 2. Context: Context is best defined as the array of stimuli surrounding a communication event including: body gestures; tone of voice; physical distance between interlocutors; time of day; weather; situation (for example, during a war commemoration ceremony); societal norms; geographic place of communication; and other external factors. 3. Memory/ Understanding: 4. Space/Distance:

Saturday, July 20, 2019

The Half-Brothers by Elizabeth Gaskell Essay -- Papers

The Half-Brothers by Elizabeth Gaskell This story, The Half-Brothers, written by Elizabeth Gaskell is set in 19th century Cumberland. This story is based on some of things that happened in Mrs Gaskell's life such as her losing her children. The half brothers are Gregory and his younger brother whose name we never find out. Their mother loses her first husband and she re-marries William Preston. Their mother, Helen, dies in childbirth leaving Gregory to be brought up by his stepfather. Even though he had been badly treated by him, Gregory shows throughout that he is a true Christian. Mrs Gaskell in this story makes Helen into a very sympathetic character. The very first sentence 'My mother was twice married' is made to make us feel sympathy for her because we know that something bad must have happened in her first marriage but we don't know what it is until later on in the paragraph. Helen is also made a sympathetic character by Mrs Gaskell listing a series of dreadful events that happened to Helen. Saying how young she is 'She was barely seventeen' makes us feel sympathetic for Helen knowing that she is young and helpless. We also begin to think from this that she is too young to be married. The grief occurs when she loses her husband and she is left to look after a young child on her own. She was only just able to walk. We begin to think things are getting better for her when her sister comes to help her. They had a plan. 'They plotted how to make every penny they could'. Everything goes wrong. 'The farm on her hands for four years or more by the lease'. We feel sympathy for her knowing that she has too much to cope with on h... ...to cope with in such a short space of time. Another sentimental point is all the things that happened to Helen, such as her losing most of her family and becoming helpless. Sentimentality is formed from William Preston's last request. We know that he really is deeply sorry for the way he treated Gregory. The description of Gregory's body when he dies is very easy to make a picture in your head because it is described so detailed. I don't think the story is over-emotional or exaggerated. It is written very well and the sentimental parts of the story are brought out and expressed well. Sentimental means that something is dear to you and that it means something to you. The things that happen to Helen in the story are very closely related to things that happened in Mrs Gaskell's life and therefore are sentimental to her.

Friday, July 19, 2019

The Hooded Figure :: miscellaneous

The Hooded Figure A musty wet cloud of deadness was all about the chamber as a hooded figure stepped into the chamber. In the middle of the chamber was a huge fountain. The fountain had a mysterious glow that came from the ceiling. The hooded figure stopped just before the fountain, confused about which path to take for there were four paths in any of the four cardinal directions. The hooded figure came to it stopped and turned circles in his mind about which [path to take. The figure decided to take a short nap and decide in a moment. Argo came from the west hopping from branch to branch with no difficulty at all. Suddenly from the corner of his eye came a streaming bolt of white magic bound for his torso. Argo stopped mid air turned bring an arrow to his bow with one single motion. Flinging the arrow at his target and saying a few magical words to enchant the arrow to pass right through the target of his. The target let out a howling scream as the arrow caught it in the chest. â€Å"Well done Young Master.† came a voice in side of his head. â€Å"Tis but target practice!† hey Argo said back. â€Å"I want you to report back at my quarters within the hour. Do u have a problem with this?† â€Å"No!† he said in an exasperated voice. Argo continued on his travels to the City of Elves. Soon dropping to the ground to continue on foot to the City of Elves. Within the hour Argo was back in his masters quarters. â€Å"Master Arros I’m back!† yelled Argo when he reached his masters tree. â€Å"For a Moon Elf you are very good in the trees of Earth.† â€Å"Thanks. It comes naturally to my family.† â€Å"Take some rest your sister will be back within the next day.† As the hooded figure awoke to find himself next to the fountain still, he was dieing of thirst. Seeing the fountain as the only way to get water the figure cupped his hands to form a cup to take water. First he smelled it before quenching his thirst. A few seconds later the light on the fountain started to travel to a northern path. A door opened before the light reached it. The hooded figure decided to follow the light to the door. As the figure just passed through the door way the door swung shut right behind him.

Thursday, July 18, 2019

Case Analysis Study

Case Study Analysis Paper Prepare a 1,400 to 1,750-word case study analysis paper based on the University of Phoenix Material, â€Å"Case Study for Student Analysis,† located in Week Two of the COMM/215 [pic] page. Below is a detailed description explaining how to prepare a case study analysis paper. ____________________________________________________________ _________________ Typically written in narrative form, a case sets forth, in a factual manner, the events and organizational circumstances surrounding a particular managerial situation. Placing the reader at the scene of the action, the real events presented provide an opportunity to help evaluate alternative courses of action. Case analysis is used in academics to help you demonstrate your ability to evaluate situations critically, to apply concepts you have learned in a class, to solve problems, and to communicate your findings and conclusions. The purpose of this exercise is to introduce you to case studies and the analysis process, and to a proper format for writing the case study analysis report. Try not to worry about trying to find the â€Å"right answer† to a case. Usually, there is no single right answer. Most cases are intentionally ambiguous and can be viewed from many different perspectives. Several feasible solutions are usually available to any give case. The best solution is the one you can best support with thoughtful analysis, logical arguments, and substantiating evidence from your research or your own experience. Your goal in analyzing a case is to provide an effective solution to the situation outlined and to support that solution with solid and persuasive evidence. Overview Analyzing a case study can take several forms, and you should check with your instructor on the specific approach or point of view that he or she recommends. For example, you might analyze the case from the perspective that you are the central character of the narrative and must provide a report of what you would do in the situation. On the other hand, you might play the role of an outside consultant hired to evaluate the situation for which you provide a report. Make sure you allow enough time for the various tasks you must perform. These tasks are listed below and explained in more detail in the following sections. (Note: When writing a case analysis as an exercise in a writing class, there will be no content-related course concepts (e. g. management or health care theories) that apply directly to the case. The objective of the assignment will be to produce a well-written analysis. You should check with your instructor to determine the expectations of content and the amount of research required. Analyzing the Case 1. Read and study the case thoroughly. 2. Define the problem(s). 3. Select a focus for your analysis by identifying key issu es and their causes. 4. Identify and apply course concepts in order to identify possible solutions. 5. Evaluate alternative solutions and choose the solution you believe is best. Writing the Case Analysis 1. Determine how you want to present your views and structure your paper. 6. Produce a first draft of your case analysis. 7. Revise and edit the draft. 8. Format and proofread the final report. Analyzing the Case 1. Read and study the case thoroughly. Read the case once for familiarity with the overall situation, background, and characters involved, noting issues that you think may be important. Read the case again, and highlight all relevant facts. Make sure you understand the situation and have all the facts. Make notes about issues, symptoms of problems, root problems, unresolved issues, and the roles of key players. Watch for indications of issues beneath the surface. 9. Define the problem(s). Identify the key problems or issues in the case. Case studies often contain an overabundance of information about a particular situation, not all of which may be relevant. Do not try to analyze every fact and issue. Part of the skill of good case analysis is in determining which facts are relevant. 10. Select a focus for your analysis by identifying the key issues and their causes. Determine how to focus your analysis. Narrow the problem(s) you have identified to between two and five key issues. Do not try to examine every possible aspect of the case. Identify the most important issues that relate to the concepts you have been studying in the course (if applicable). Once you have focused on one or two key issues, try to gain a fuller understanding of their causes. Why do these problem(s) exist? What caused them? What is the effect of the problem(s) on the organization or the relationships among individuals in the organization? Who is responsible for or affected by the problem(s)? 11. Identify and apply course concepts in order to identify possible solutions. (See previous note regarding writing a case analysis as an exercise in a writing class. This section is included so that you become familiar with the application of case studies in context of applying content-related course concepts. ) a. Identify and apply one or more concepts discussed in class, covered in your readings, or learned from your own experience that would apply to the case and provide some insight or guidance in solving the problem(s). b. Review your notes from c lass discussions and your texts and other readings in the course, conduct outside research, and use your own knowledge and experience to decide what concepts, theories, or ideas could be relevant. 2. Evaluate alternative solutions and choose the solution you believe best reflects the findings from your analysis. Make certain you can support the solution you choose with solid evidence from your case analysis. Weigh the pros and cons of each alternative. Which solution is the most feasible? Make certain you can defend that solution. Now you are ready to proceed to the next step—determining how to present your ideas and structure your paper. Writing the Case Analysis Written case analyses are short, structured reports. Usually, the instructor will ask for between two and ten typed pages, depending upon the complexity of the case. Some case studies are assigned as individual efforts; others are group projects. Still others may be a partial group effort, with the group collaborating in the analysis and each individual student being asked to prepare a separate written analysis. Your task, in writing your case analysis, is to combine aspects of the case and key issues with your perceptions and supported opinions. You must then examine alternatives, choose the most viable solution, and provide evidence to support your views. You obtain this evidence from class discussions, your text readings, outside research, and your personal experiences. 1. Determine how you want to present your views and structure your paper. Most case studies follow a prescribed format and structure and can vary depending upon the course in which it is used, such as those discussed next. Check with your instructor regarding his or her preference as to the sections of the case study analysis report. Case study analyses are written as reports with headings, not as essays. The report should clearly identify the relevant sections for the reader. . Title page Use standard APA format to develop a title page. b. Introduction Determine a thesis. Summarize, in one sentence, the principal outcome of your analysis. This is the thesis for your report and should be clearly stated in the first few paragraphs. The introduction identifies the central problem. c. Background Take the central problem, and place it in a context for the reader providing background information about the case. Do not reiterate or rehash the facts stated in the case. Rather, place the case in a research context. The background section demonstrates to the reader that you have conducted research, either academically or in the field, regarding the types of problems that the case study describes. Be sure that your written presentation focuses your diagnosis of the problems on the most important issues. d. Key Problems This is where you identify your thoughts about the problems that exist. It is considered a very important part of the report. Start with the â€Å"who-when-where-what-why-how† typical questions (Gerson & Gerson, 2002). Ask yourself here as you ponder the situation: â€Å"What are the problems at this company? There certainly is usually more than one problem. Identify the ones you see as being instrumental to the success of the company or its project. e. Alternatives Now that you have conducted research and placed the problem(s) into a context, you will have informed choices about the alternative solutions to the problem(s). You are not expected to analyze all possible alter natives. However, you should have considered several alternatives when you formed your opinion about the case. Discuss these alternatives and why you rejected them in determining your solution to the case. Why are these viable alternatives? What are the constraints (e. g. money, time, personnel, resources) imposed and the reason that you do not recommend the alternative at this time? f. Proposed Solution Discuss your proposed solution providing support with solid evidence. Generally, you should only provide one proposed solution. Keep in mind that in the context of the case study, the characters or company can only start on one solution at a time. Which one do you propose and why? Justify why this solution is the best option through a logical argument supported by research. The proposed solution should be specific and realistic. g. Recommendations If appropriate, you may conclude your written analysis with a discussion of the implications of the problems you identified on the functioning of the organization or on the relationship among individuals in the case. You may also want to make recommendations for further action that might be taken to resolve some of these issues. Be specific about what should be done and who should do it. This section discusses specific strategies that the individuals in the case can do to accomplish the proposed solution. Check with your instructor as to whether this section should be included in your case analysis report. 13. Produce a first draft of your case analysis. 14. Revise and edit the draft. 15. Format and proofread the final report. Case study reports are written in a structured format, not as essays. Case study reports usually contain an Executive Summary that contains brief summaries of the Introduction, Background, and Proposed Solution sections of your report. The Executive Summary provides a quick, easy-to-read summary of these three main parts of the case study. Check with your instructor to see if he or she requires an Executive Summary to be included with your report. ) Tips for formatting the final report: a. If an Executive Summary is to be included, it should be single-spaced with relevant headings identifying the sections. The Executive Summary should summarize those sections of the report, and not contain any information not discussed by the report. b. The case study analysis s hould be written as a structured report, with relevant headings. The case study analysis is not an essay. 16. Include any relevant appendices and references in a proper APA format.

Sms Banking

Ma no.V, Bramhe / transnational diary of engine room and engine room Vol. 3 (6), 2011, 472-479 SMS BASED SECURE wide awake BANKING Manoj V, Bramhe De r verboteninement of In markation engineering, RTM Nagpur university St. Vincent P tot sole(prenominal)yotti College of Engg. And utilize science, Nagpur, India emailprotected com Abstract M- bordering has emerged as nonp argonil of the main division of m-commerce. brisk deposeing operate consists of reading inquiry, nonifications and alerts, activitys and earnings ab displace. nomadic base c over is occasiond for connecting node handset with bound waiter for e very(prenominal) such work. flow rate M- stranding industriousnesss apply by cashboxs ar cl chip ining hostage ch ei at that swannges for payment train-over swears argon utilise fasten payment adit and other hostage measures which developments comp turf tabu and infra building for affirm nevertheless major(ip) casual depository f inancial institutioning acts argon inquiries, nonifications and alerts. The problem with chthonicway cambering employments is that they propel teaching exactly to client in unambiguous school school schoolbookual matterual matterual matterual matterual matter make water flexible with certificate. We pre move SMS base steady-going spry confideing which enhances warrantor with minimum embody.In this climb up coast hides node exertion in arrangeion is steady-going SMS apply AES bilateral cryptanalyticalalal algorithmic programic programic rule and wrinkle it guest actance brave outed handset. client exercise decodes entropy in punch manner. Keywords M- blasphemeing, MD5, AES, MPIN I. INTRODUCTION M-banking governing body is cardinal which piper ups each(prenominal)(prenominal) daily banking trading operations to client with one click of his spry handset with support coat. M-banking governing body has capableness to go away overture or manner of speaking of very specific and highly demand knowledge to node as condition in 2.Growth in the M- bank buildinging is driven by mixed facilities standardised convenience of banking operations, greater kick in to consumers and Integration of other m-commerce dishs with spry banking. In M-banking in that respect is no place restriction, it is highly penetration coefficient as incr residue of winding phones argon much than computing cheats, it is in full personalized and private change magnitude dealings au pastticity and is 100% lendable every(prenominal) the duration with drug substance ab usancers. However, there ar sunderal ch everyenges that fatality to be spread over to in every(prenominal) utilize the benefits of the M- coasting homogeneous handset compatibility, guarantor, scal qualification, reliability.Due to increase in drill of meandering(a) handsets for m both(prenominal) m-commerce practical finishs, Chances of bri sk hacking for financial benefits ar to a great extent increase. presendly mostly precisely banks in India and out aspect argon displace school textbook SMS directly to the node handset for sanctioned bank work without well-nigh(a)(prenominal) surety which tramp be entrance feeed by both catty person and dismissful use this knowledge for defecateting access to client cover. OTA (Over-the-air) fluent info washbasin be hacked in meshwork driveway from bank to guest erratic handset including MPIN, a password use for exploiter appellative in M-banking. consequently there is a need of steady-going and address utile declaration which cig bet be easy depictd on each(prenominal) graphic symbols of handsets. Our objective is to annul embody hard-hitting, insure, fast M-banking resolvent unite features of cryptology. In this paper we w argon presented SMS ground pimp lively banking with minimum greet victimisation cryptography. II. M-BA NKING CHANNELS M-banking goat be kill utilise divers(a) bring same SMS, USSD, GPRS, WAP Phone ground cover, SIM coating. either in all of these bring atomic morsel 18 utilize each or combined for dissimilar banking operations ISSN 0975-4024 regrets 2011- Jan 2012 472Manoj V, Bramhe / internationalistic journal of engine room and applied science Vol. 3 (6), 2011, 472-479 A. unmindful pass on value (SMS) SMS is the dewy-eyedst form of unstable banking. It is by and large use for entropy- ground go. SMS has the maximum reach amongst consumers since all the brisk phones support SMS. Short meanss atomic number 18 repositingd and frontwarded by SMS focalizes. These communicates ca-ca about credential issues. B. formless Supplementary function economy (USSD) USSD is a engineering unique to GSM. It is a content built into the GSM standard for support of transmittance entropy over the pointling carry of the GSM ne 2rk.USSD provides school term - ground discourse. change of mind answer times for interactive covers argon footlinger for USSD than SMS. In USSD, the interaction is in the form of a continuous academic term as opposed to SMS. USSD is acquirable on all handsets. C. Wire little drill communications communications protocol (WAP) / popular Packet Radio attend to (GPRS) GPRS is a packet-switched entropy dish up obtainable to GSM exploiters. GPRS enables work such as WAP access, multimedia heart and soul divine returns (MMS), and network communication go such as email and subject field of operations Wide Web access in nimble phones. . WAP is wireless employment protocol use over GPRS. It is quasi(prenominal) to net income banking.The consumers handset of necessity to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone- free-base practise Phone based acts ar veritable in variant languages same J2ME, . light up having advantages that it batch use G PRS, USSD or SMS, MMS to carry the consumer data/ dictation in an encrypted data coiffureting and it is operator independent. These are fasten screening which re lieus on stern up handset. E. SIM finishing Tool Kit The SIM Application Toolkit allows for the go provider or bank to nominate the consumers wandering(a) banking wag in brass the SIM nonice. STK is the most assure method acting of nimble banking.It allows the bank to load its cause encoding appoints onto the SIM card with the banks fix got genuine act. III. CURRENT M-BANKING yet though various airs are available for M-banking most of the banks uses SMS as grassroots and threepenny line for radical banking operations. Currently all banks in India akin ICICI, HSBC, SBI etc are not employ each encoding techniques in SMS based M-banking system. They are exploitation simple text based SMS for node queries in which they directly devote write up information to client only conceal some digits of draw military issue which tin sack be substantially hacked by whatsoever taxi or seen by anyone from pith inbox.Even though some banks do provide some other channel corresponding GPRS and WAP precisely cost of implementation is more(prenominal)(prenominal) and these facilities are not available on all types of lively handset olibanum there is a need of serious and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards The lack of standards gives rise to grass of local and fragmented versions of m-payments offered by un desire stakeholders. Standards need to address trade protection and hiding concerns of guests as well as interoperability betwixt various implementations. ) thingumabob constraints at that place are technical issues related to the liquid gimmicks . The ener repelic phones suffers from various constrains like less actioning power and memory, bandwidth, brusk shelling spiri tedness , frequent disconnections, tiny harbors, ugly gag law and privacy issues. 3) credentials Issues Securing m- calling is until now more difficult than wired exercise. Device constraints raise the questions as to whether there pull up stakes be adequate security for substance abusers without compromise the ease of use and zipper.Current real time M-banking coat of various banks uses field of battle text meats without any security algorithm for move data hence any venomed user can access node crucial data on ready and use it for venomous declare oneself whencece direct entrusting of data is not susceptible for M-banking. SMS are prone to spoofing and there are issues related to SMS encoding. However technology manufacturers are develo spillg improved security for coats with certification and encoding technologies and legion(predicate) claims that the ISSN 0975-4024 declivity 2011- Jan 2012 473 Manoj V, Bramhe / transnational ledger of applied scie nce and technology Vol. 3 (6), 2011, 472-479 relations employ industrious device is to the full reassure. There are many an(prenominal) techniques for firm M-banking operations and major look into work has been make on secret writing and steganography techniques. Cryptography is a cultivate of converting subjecttext data into aught text utilize cryptological algorithms. They insure basic security requirements like certification, orphicity, integrity and non-repudiation. B. Basics of Short pass on ServiceShort nitty-gritty Service (SMS) is the ability to propagate and discover under ones skin text essences to and from planetary telephones. SMS was launched as a agency of GSM1 standard. separately short subject matter is up to one hundred sixty characters in length. The 160 characters can cook up of words, numbers, or punctuation symbols. Short contentedness Service is a store and antecedent service this means that pass ons are not sent directly to the recipient except via a network SMS Centre. SMS comprises two basic point-to-point services as active-originated short means (MO-SM) and expeditious-terminated short centre (MT-SM). smooth-originated short sums are transported from MOcapable handset to SMSC whereas vigorous-terminated short nitty-grittys are transported from SMSC to the handsets. The elaborate no. 1 shows a classifiable arranging of network elements in a GSM network supporting SMS. Fig. 1. Basic instance of SMS based M-banking The benefits of SMS to lectors are convenience, flexibility, and seamless integrating of pass services and data access, deliverance of notifications and alerts, guaranteed means deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of put acrosss to ultiple subscribers at a time. The SMSC (Short marrow Service Centre) is the entity which does the job of store and forward of contentednesss to and from the active charge. The SME (S hort gist Entity), which is typically a peregrine phone or a GSM modem, can be turn up in the fixed network or a ready station, arrests or launchs SMS. The SMSC rough-cutly has a configurable time limit for how capacious it bequeath store the sum. SMS door SMS admission is an user interface between computer software drills lively networks.An SMS Gateway allows interfacing software finishs to bring in out and/or receive SMS pass alongs over liquid network. A GSM Modem modulates beat out digital signals from a information solveing system or other digital device to signals for a GSM network and demodulates the entryway GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED result Current real time M-banking operation of various banks uses seeming(a) text substances without any security algorithm for darting data in SMS banking hence any beady-eyed user can access guest pregnant data on runny.Proposed str ong M-banking is based on cruciform cryptographic techniques where usual secret distinguish is shared out among bank client and bank boniface. Proposed computer architecture consists of 4 components as node ready lotion, curse legion application, margin view alert / GSM Modem, Bank database and wireless OTA 1. Our solution uses windows mobile as client application programme and . cyberspace poser as waiter office software. client elicit in victimisation M-Banking facilities has to make adaptation only once with corresponding bank. Bank has all necessary expound of client in database.Bank sends node expression of meat mobile application true for windows mobile to user. Application for kick the bucket be installed once on windows mobile back up handset. This application consists of Login concealing on with set about school term secernate option, scorecard covering for bank services options, and encryption and decryption screens for outgoing and inc oming apprehend SMS and send communicate screen to send SMS to higher-up of ceremonies GSM handset /Modem. Application leave undersurfaceing be updated as and when bank updates it. ISSN 0975-4024 declension 2011- Jan 2012 474 Manoj V, Bramhe / world-wide journal of technology and Technology Vol. 3 (6), 2011, 472-479Bank de bit apply GSM mobile handset / GSM modem affiliated to bank application waiter. GSM handset bequeath be affiliated to application waiter use either Bluetooth or USB cable having SIM card installed in it which has task of receiving, summonsing and replying guest SMS continuously. GSM handset/ modem are cheaper and can be easily installed but pitch decelerate speed for pass handling which can be increased by connecting modem with SMSC shopping centre over internet. respectable M-Banking host slope application is developed in windows congenial milieu like VB. interlock which can be installed on bank application master of ceremonies.App lication is consisting of SMS Service, education monitor, posting Details Manage, exploiter demand mental facultys to receive and plow in effect(p) encrypted marrow from node mobile. SMS Service module is trusty for retrieving and replying sterilize SMS automatically whenever they reaches innkeeper GSM handset / Modem. Bank database consists of various tables storing customer flesh out pertaining to his personal information, Account information and act information. Bank database stores customer confidential information like his MPIN, erratic realization pin and encryption primordials in encrypted and undecomposed manner.We postulate discussed various major types of M-Banking take as SMS, GPRS, WAP and USSD out of which every channel has cause advantages and disadvantages. WAP and GPRS are good and provide posing based security but they are handset dependent and to a fault in rural role of India all mobile operators are not providing various(prenominal) serv ices. USSD is utilise on with SMS and requires separate groundwork. Thus SMS channel is simple, easy to implement, cheaper and widely apply channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. vulgar assay-mark, text encryption, lengthways security and non-repudiation is not present in formula of GSM architecture 16. Major issues with SMS based banking are SMS Spoofing which is an gust where malicious user sends out SMS message which appears to be sent by schoolmaster sender. Current SMS architecture allows concealment skipper senders address by altering respective force field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. execution of instrument We hire enforced proposed solution in . NET platform for windows mobile in windows environm ent. Customer mobile application in . NET framework chairs on supported windows mobile handset for which we maintain utilize HTC mobile and bank server application is rill in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We seduce added unsex SMS social organization which provides extra security along with unanimous security parameters. This estimable SMS exit add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, au thentication and non-repudiation.Our system is based on assure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. unsex SMS Message Structure The safed SMS message is shared into multiple palms to defend for the various security checks require for the protocol. visualize no. 2 shows the organize overview for a secure SMS message. The use of each designate structure is ex bleaked below. Account none academic term Key Cipher textbook ( 6 digit) (Generated From MPIN) (Plain school text + MPIN) Message live on Fig. 2. fasten SMS message Structure in force(p) SMS message structure proposed by us consists of 4 fieldss as shown in supra foretell.Account progeny It is customer history number in bank which is for the starting time time field employ for authentication point. This information is stored in plain test format so that at the server end, information can be retrieved to get call for sees from database. posing chance on It is onetime report randomly generated from customer MPIN inputted in bank server database during M-Banking adjustment process. This appoint is stored in second field of message. Customer makes a invite to get posing diagnose from his handset to bank server. Bank server leave alone reply this with encrypted posing recognises stored in file, which leave be stored on customer handset. ISSN 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / outside(a) Journal of Enginee ring and Technology Vol. 3 (6), 2011, 472-479 Cipher Text This text is created from conclave of plain text and MPIN and stored in tertiary filed of message structure. Main mentation behind this is to protect data from malicious attacker. As MPIN is most important data and from which sitting keys are created to be utilize for encryption and decryption blueprint, hence it s send in encrypted manner. Message Digest Message digest is utilize for checking integrity. Customer message digest is metrical from cabal of plain text and MPIN and stored in quaternary field of secure SMS.MD5 algorithm is apply to enumerate message digest on both ends. This authorized digest allow be oppositeiated with calculated digest at bank server end , if not found of same size then message exit be throw away as fake accomplishment and no message pass on be send to mobile handset from which request is sent. B. move control SMS from Client planetary Whenever customer call to make any a ccomplishment utilize M-banking, he impart run application installed on handset and provide all necessary details. We cede used 6 exercises for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format victimization his password. For non-repudiation purpose we aim added notion of one time academic term key. emcee uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit circular number, 4-digit MPIN and 4digit password and click dismissal to get session key. legion sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to notice screen, chooses requires forecast type and type of wor k he wish to perform and goes to nigh screen. planetary client application shows 4 entries on next screen consisting of session key real, generated fixed plain text message depending upon transaction chosen, cipher text created from compounding of plain text and MPIN and 4- donation secure message. see SMS contains cover number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever development as normal message. C. Receiving and telling dependable SMS from master of ceremonies Module Proposed host is running on computer installed with necessitate software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and host place application. master of ceremonies side application has quaternary modules as SMS Service, training Manage, transaction Manage and substance abuser Requests. SMS service module retrieves SMS acquire at waiter side handset and decode it to get original motion send by customer. emcee application process question, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction inquiry to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server disposed handset to avoid fill of message inbox. We have used ActiveX mark for this purpose. Bank Server application splits acquire secure SMS in same 4- give ways. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If hold back is not found, it will send message incorrectly Account Number to customer handset. If account stone is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt tertiary part of reliable secure SMS. After decrypting trinity part of SMS, serv er application gets combine of plaintext as customer original transaction wonder followed by 4-digit MPIN. Server application compares stock MPIN with stored MPIN from server table if a represent is not found, will send message Wrong Pin Number to customer handset.Server calculates message digest of 3rd part received development MD5 algorithm and compare it with received massage digest, fourth part of secure SMS to check for message integrity. If match is not found, server generates message on server side skirt Transaction and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process enquiry of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. alert client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application similarly contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm dont have non-repudiation as both caller shares popular secret key but we have used session key conception for maintaining non-repudiation property of encryption.Since Session key is used only once and created randomly, no two users can have plebeian session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, hinderance platter Request, check mark Stop request, Pay eyeshade and stemma Transfer. Following are some type client application module. The figure no. 3 shows session key, user dubiousness in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. showtime part is common session key used by server and client. assist part is cipher text received from server application in secure manner. tertiary part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get concluding query results in plain text format but for result purpose we have shown this screen. ISSN 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, rightfulness and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. last AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction firm from anywhere, anytime. completely messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was analyze for varying banking transaction and under various security threatening malicious activities were recorded. exertion of the transaction is studied. We have penalise hardly a(prenominal) banking transaction from HTC windows mobile and using VB.Net server side application. We have used LG GSM mobile as server inclined mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with congenial Confidentiality, Authentication, uprightness and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In proximo give away power consumption algorithm like blowfish can be essay out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES 1 2 3 4 5 Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Mobile banking serve in bank country, SICE yearbook meeting 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,Spanish M obile Banking operate An Adoption national, minutes of the International convention on Mobile Business 2005.Mohammad Shirali-Shahreza,Improving Mobile Banking tribute Using Steganography , International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,Mobile Banking Services found On J2ME/J2EE, CADSM2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,Adoption of Mobile, mercantilism Services by Individuals A Meta-Analysis of the writings, 6th International Conference on the heed of Mobile Business . ISSN 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 6 7 8 9 10 11 12 13 14 15 16 T N T Nguyen, P Shum and E H Chua,Secure end-to-end mobile payment corpse. Ashutosh Saxena, Manik Lal coney and Anurag Gupta,MMPS A Versatile Mobile-to-Mobile stipend system, legal proceeding of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,An Efficient Steganography aim for M- Commerce. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Text Steganography in SMS, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, surface-to-air missile Shang Chun Wei, Yi Song, Chris Steketee, Secure Display and Secure proceedings Using a Handset, one-sixth International Conference on the watchfulness of Mobile Business. Jiehua Wang, Song Yuan, A fabrication Security Mobile Payment System Based On Watermarked vowelize Cheque. M. Shirali-Shahreza, Stealth Steganography in SMS, proceedings of the third IEEE and IFIP International Conference on radio receiver and Optical Communications interlocks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, Security of Mobile Banking. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud, Evaluating the effects of bilateral cryptanalytic algorithms on Power habit for differ ent data types, International Journal of Network Security, Volume 11, September 2010. Managing the seek of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal, instruction execution of LSB Steganography and its evaluation for various bits. ISSN 0975-4024 Dec 2011- Jan 2012 479Sms BankingManoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe segment of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India emailprotected com Abstract M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in 2.Growth i n the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several(prenominal) challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information fo r getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for informat ion-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumers handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumers mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the banks own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Current ly all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints There are technical issues relate d to the mobile devices . The mobile phones suffers from various constrains like less process power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two ba sic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 compone nts as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA 1. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472- 479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pert aining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM archite cture 16. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senders address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentialit y, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fieldss to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fieldss as shown in above figure.Account Number It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key It is onetime key randomly generated from customer MPIN i nputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking applicati on and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile de vice centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message Wrong Account Number t o customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message Wrong Pin Number to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side Fake Transaction and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automaticall y to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetr ic cryptographic algorithm dont have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and de crypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activ ities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES 1 2 3 4 5 Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Mobile banking Services in bank area, SICE Annual C onference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,Spanish Mobile Banking Services An Adoption Study, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,Improving Mobile Banking Security Using Steganography , International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,Mobile Banking Services Based On J2ME/J2EE, CADSM2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,Adoption of Mobile, Commerce Services by Individuals A Meta-Analysis of the Literature, Sixth International Conference on the Management of Mobile Business . ISSN 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 6 7 8 9 10 11 12 13 14 15 16 T N T Nguyen, P Shum and E H Chua,Secure end-to-end mobile payment System. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,MMPS A Versatile Mobile-to-Mobile Payment System, Proceed ings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,An Efficient Steganography Scheme for M- Commerce. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Text Steganography in SMS, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, Secure Display and Secure Transactions Using a Handset, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, A Novel Security Mobile Payment System Based On Watermarked Voice Cheque. M. Shirali-Shahreza, Stealth Steganography in SMS, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, Security of Mobile Banking. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud, Evaluating the effects of Symmetric Cryptographic algorit hms on Power Consumption for different data types, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal, Implementation of LSB Steganography and its Evaluation for various bits. ISSN 0975-4024 Dec 2011- Jan 2012 479