Wednesday, January 29, 2020

2004 Indian Ocean earthquake & Sanaysay Essay Example for Free

2004 Indian Ocean earthquake Sanaysay Essay A tsunami is a series of water waves caused by the displacement of a large volume of a body of water, generally an ocean or a large lake. Earthquakes, volcanic eruptions and other underwater explosions(including detonations of underwater nuclear devices), landslides, glacier calvings, meteorite impacts and other disturbances above or below water all have the potential to generate a tsunami.[3] Tsunami waves do not resemble normal sea waves, because their wavelength is far longer. Rather than appearing as a breaking wave, a tsunami may instead initially resemble a rapidly rising tide, and for this reason they are often referred to as tidal waves. Tsunamis generally consist of a series of waves with periods ranging from minutes to hours, arriving in a so-called wave train.[4] Wave heights of tens of metres can be generated by large events. Although the impact of tsunamis is limited to coastal areas, their destructive power can be enormous and they can affect entire ocean basins; the 2004 Indian Ocean tsunami was among the deadliest natural disasters in human history with over 230,000 people killed in 14 countries bordering the Indian Ocean. The Greek historian Thucydides suggested in his late 5th century BC, History of the Peloponnesian War, that tsunamis were related to submarine earthquakes,[5][6] but the understanding of a tsunamis nature remained slim until the 20th century and much remains unknown. Major areas of current research include trying to determine why some large earthquakes do not generate tsunamis while other smaller ones do; trying to accurately forecast the passage of tsunamis across the oceans; and also to forecast how tsunami waves would interact with specific shorelines. A tsunami is a series of ocean waves that sends surges of water, sometimes reaching heights of over 100 feet (30.5 meters), onto land. These walls of water can cause widespread destruction when they crash ashore. Tsunami are waves caused by sudden movement of the ocean due to earthquakes, landslides on the sea floor, land slumping into the ocean, large volcanic eruptions or meteorite impact in the ocean. Earthquakes Most tsunami are caused by large earthquakes on the seafloor when slabs of rock move past each other suddenly, causing the overlying water to move. The  resulting waves move away from the source of the earthquake event. Landslides Underwater landslides can cause tsunami as can terrestrial land which slumps into the ocean. View our landslide generation animation which demonstrates how a landslide induces a tsunami. Volcanic eruptions Less common are tsunami initiated by volcanic eruptions. These occur in several ways: destructive collapse of coastal, island and underwater volcanoes which result in massive landslides pyroclastic flows, which are dense mixtures of hot blocks, pumice, ash and gas, plunging down volcanic slopes into the ocean and pushing water outwards a caldera volcano collapsing after an eruption causing overlying water to drop suddenly. An earthquake is the shaking of the earth that occurs after pieces of the crust of the Earth suddenly shift. The term earthquake describes the sudden slip on a fault and includes the ground shaking and radiating seismic energy that is caused by the slip. Volcanic activity, or other geologic processes, may cause stress changes in the earth that can also result in an earthquake. Earthquakes can occur anywhere in the world although some areas of the globe are more likely to experience an earthquake than others. Earthquakes occur in all types of weather, in all climate zones, in all seasons of the year, and at any time of day making it impossible to predict with any certainty when an earthquake is likely to occur. The best seismologists (scientists who study earthquakes) can do is to look at the historical record of earthquake activity for any geographical area and use this data to calculate the probability of an earthquake occurring in the future. Earthquake prediction is still in the future. A tsunami is a series of sea waves that can be caused by earthquakes or landslides at or beneath the sea floor. The displacement of the sea floor that occurs during certain large submarine earthquakes and landslides causes displacement of large volumes of the sea water above it producing large, fast moving waves. When a coast line experiences a tsunami it can be due to an earthquake near the coast or due to a quake occurring in a distant part of the ocean. Coastal areas may experience little or no damage from an  earthquake but can be devastated by the resulting tsunami. 2010 Haiti Earthquake Haiti suffered one of the largest earthquakes in more than 200 years in 2010. The 7.0 magnitude earthquake was centered about 10 miles from Port-au-Prince and set off a swarm of tsunamis that killed three people and destroyed several homes. The waves were averaged to be about 10 feet high. 2010 Sumatra Earthquake/Tsunami he October 2010 Sumatra earthquake occurred on the same fault as the 2004 Indian Ocean earthquake. The second time wasnt as disastrous but there was still substantial damage. This time around the earthquake was 7.7 on the Richter scale and developed a tsunami that struck the Mentawai Islands. The tsunami, which had a wave of 9 feet, destroyed many of the villages on the island. It displaced more than 20,000 people and reportedly killed 435. 2010 Chile Earthquake/Tsunami A 8.8 magnitude earthquake struck Chile on February 27, 2010 with intense shaking that lasted for about three minutes. It triggered a tsunami that destroyed several coastal towns in south-central Chile. The tsunami raced through the Pacific Ocean that 53 countries had to post warning, though there was little damage as it moved past Hawaii, Australia and Japan. The death toll was 521 victims. 2011 Tohoku Earthquake/Tsunami The 9.0-magnitude megathrust earthquake that hit the Tohoku region of Japan on March 11, 2011 was the largest earthquake to have ever hit the country. Japanese Prime Minister Naoto Kan even called it the toughest and most difficult crisis for Japan since the end of World War II. The tsunami that traveled along the Pacific coast of Japans northern islands was measured to be at least 9.8 feet high. Entire towns and cities were swept away and about 5,692 are said to be dead, with 9,522 missing and 2,409 injured. 1771 Great Yaeyama Tsunami On April 24, 1771, the Yaeyama Great Earthquake caused the formation of the 1771 Great Yaeyama Tsunami. The tsunami hit both the Ishigaki and Miyakojima Island of Japan and killed a total of 12,000 people. Agriculture was severely damaged and the population decreased about one-third of what it was. The tsunami at Ishigaki reportedly reached a height of 262 feet. 1792 Mount Unzen The 1792 eruption of Mount Unzen in western Kyushu, Japan is the most deadliest volcanic eruption ever in Japan. It caused a megatsunami that reached up to 330 feet and killed 15,030 people. 1896 Meiji-Sanriku Earthquake The 1896 Meiji-Sanriku earthquake hit Japan on a day when the country was celebrating both the return of soldiers from the Sinto Japanese War and a Shinto holiday. The 7.2 magnitude earthquake that took place was small but the tsunami that struck the coast of Sanriku 35 minutes later was much greater. Waves as high as 125 feet were measured and nearly 9,000 homes were destroyed. 22,070 were reported dead and an unusually high count of victims with fractured skulls and broken or missing limbs. Hawaii also suffered some destruction from the tsunami as waves of 30 feet were measured there. 1868 Arica Earthquake/Tsunami The estimated 8.5 to 9.0 magnitude earthquake near Arica (then part of Peru, now part of Chile) in 1868 nearly destroyed all of Arica and its surrounding cities. The tsunami it produced almost completely destroyed the port city of Pisco. It also caused some damage in Hawaii, New Zealand and Japan. About 25,674 casualties were reported. Aug. 27, 1883: Eruptions from the Krakatoa volcano fueled a tsunami that drowned 36,000 people in the Indonesian Islands of western Java and southern Sumatra. The strength of the waves pushed coral blocks as large as 600 tons onto the shore. June 15, 1896: Waves as high as 100 feet (30 meters), spawned by an earthquake, swept the east coast of Japan. Some 27,000 people died. April 1, 1946: The April Fools tsunami, triggered by an earthquake in Alaska, killed 159 people, mostly in Hawaii. July 9, 1958:Regarded as the largest recorded in modern times, the tsunami in Lituya Bay, Alaska was caused by a landslide triggered by an 8.3 magnitude earthquake. Waves reached a height of 1,720 feet (576  meters) in the bay, but because the area is relatively isolated and in a unique geologic setting the tsunami did not cause much damage elsewhere. It sank a single boat, killing two fishermen. May 22, 1960: The largest recorded earthquake, magnitude 8.6 in Chile, created a tsunami that hit the Chilean coast within 15 minutes. The surge, up to 75 feet (25 meters) high, killed an estimated 1,500 people in Chile and Hawaii. March 27, 1964: The Alaskan Good Friday earthquake, magnitude between 8.4, spawned a 201-foot (67-meter) tsunami in the Valdez Inlet. It traveled at over 400 mph, killing more than 120 people. Ten of the deaths occurred in Crescent City, in northern California, which saw waves as high as 20 feet (6.3 meters). Aug. 23, 1976: tsunami in the southwest Philippines killed 8,000 on the heels of an earthquake. July 17, 1998:A magnitude 7.1 earthquake generated a tsunami in Papua New Guinea that quickly killed 2,200. Dec. 26, 2004: A colossal earthquake with a magnitude between 9.1 and 9.3 shook Indonesia and killed an estimated 230,000 people, most due to the tsunami and the lack of aid afterward, coupled with deviating and unsanitary conditions. The quake was named the Sumatra-Andaman earthquake, and the tsunami has become known as the 2004 Indian Ocean tsunami. Those waves traveled the globe – as far as Nova Scotia and Peru. March 11, 2011: A massive 8.9-magnitude earthquake struck northern Japan, triggering tsunamis that reportedly swept up cars, buildings and other debris. The Japan Meteorological Society has forecast more major tsunamis in the area, with some expected to reach more than 30 feet (10 m) off the coast of Hokkaido, Japans second largest island. A tsunami was also generated off the coast of Hawaii, one that could cause damage along the coastlines of all islands in the state of Hawaii, according to the Pacific Tsunami Warning Center. Tsunami warnings are in effect across Hawaii as well.

Tuesday, January 21, 2020

Differing Views on the 1969 Woodstock Music Festival Essay -- American

Differing Views on the 1969 Woodstock Music Festival On August 15, 1969 at five-o’clock p.m., on a 600-acre hog farm in the small town of Bethel, NY, Richie Havens took the stage as the opening act at the legendary Woodstock Festival. Destined to become the largest gathering of people in one place at one time, Woodstock stood for three days of peace, love, and music amidst the horrors of the Vietnam War. Hundreds of thousands of men, women, and children made their way to the Catskills in New York to take part in the festival and hear their favorite music groups live. Even though tickets for the event had been pre-sold, the directors of the Woodstock declared it a free event on the same day that it started. All over the country people watched footage and read about the festival that many believed was going to be a disaster. But they were proved wrong. Music was the peacekeeper at Woodstock, as the people in attendance listened to over twenty-five music groups that performed from the afternoon of August 15 through the morning of August 18. This weekend during 1969 marks a milestone in American history, where almost 500,000 people joined together in peace for the sake of music. Since that mesmerizing time during the August of 1969, numerous books have been written about the Woodstock Musical Festival. The books allow people to dig deeper and go behind the scenes to find out what made Woodstock such a success. On the other hand, one can always search the newspaper archives and retrieve an account of Woodstock from a reporter’s view at the same time the festival occurred. The only difference between a book written at a later date and a newspaper article written during the summer of 1969 is the formality. ... ...n the same level of formality as does the newspaper articles. Both present the material about Woodstock in a different manner, but at the same time they both include very pertinent information about the festival. Each form of writing puts its own twist on the interpretation of Woodstock. Clearly there are differences in the way that Woodstock was presented in the 1969 Washington Post and in the 1979 book, Barefoot in Babylon. Both prove to be very acceptable sources on the Woodstock festival. From the kind of information given in the sources to the form of writing used to the formality of the content, they all add up to two different views about Woodstock. Works Cited Spitz, Robert Stephen. Barefoot in Babylon: The Creation of the Woodstock Music Festival, 1969. New York: The Viking Press, 1979. The Washington Post, August 15 – 21, 1969.

Monday, January 13, 2020

Payment Methods in Ecommerce

With the rapid advancement in technology and the expansion of business, more and more companies are venturing into E-commerce in a race to grow not just regionally but also internationally. E-commerce adaption necessitates the change of the business model companies have been following traditionally and with it comes the change in the modes to make the payments.With the popularity of the internet for common use in business since 1990, E-commerce has been growing and touching the new horizons in every category of business , there are organizations today that depends heavily upon the E-commerce and there are examples amongst the fortune 500 giants which have seen tremendous growth in the era of E-commerce conducting the business online .(â€Å"Microsoft†,n. d) When the companies conduct business online the modes of financial payments become different from that of the traditional business payment ways like cash , checks, debit cards etc.Since while buying online, there is generall y no physical presence involved and customers could order the products sitting anywhere using their computers. B2B ( Business to Business)E-commerce today accounts for more than the 95 percent of total E-commerce and the B2B E-commerce means both the buying companies and the selling companies are the organizations and which consequently refer to larger amount of payment flow which is linked with buying or selling the products online , so electronic payment systems that are in place have to be very advanced when it comes to preciseness, security, privacy and the speed of processing the amount. â€Å"Turban et al† , 2004) There are always risk associated with the information that could be revealed over the internet while making a transaction and could lead to something unexpected like misuse of the instruments like credit cards and E-checks used to make the payment online. In an effort to make electronic payments more robust and error free, there are various protocols that are being utilized to encrypt the information being sent over the internet and these protocols differ in the encryption techniques. (â€Å"Electronic Commerce,† n. ) E-commerce is based on an ever advancing technology that gives birth to high end safety measures that could be applied while making the financial payments over the internet however internet Frauds, thefts still take place and need to be addressed since E-commerce is growing and would keep on growing at a fast pace as companies look to expand and make technology their platform for success in the retail market particularly. Introduction E -commerce is not limited only to buying and selling it also is an effective way of facilitating the inter and intra organizational flow of information and providing the customer service.There could be more than one way to define the E-commerce depending upon the prospective of the business and application of the technology, from a business prospective E-commerce is application of tech nology to make business more automated when it comes to day to day transactions and work flow, similarly if applied to the service industry E-commerce would mean a tool to address the service costs at the same time increasing the quality and speed of the service.The essay touches the various modes of electronic payment systems that are being used today as part of E-commerce today however it particularly concentrates upon online credit card payment systems, the terms related to the credit cards, their transactional process over the network, protocols that make credit card transaction secure over the internet . Some evolving electronic payment methods are simply electronic version of existing payment systems such as paper checks and credit cards and some other are based on the digital currency technology.Essay also focus upon the various protocols which exist to encrypt the information that is being sent over the internet to make the transaction exact and secure, the encryption techno logy that is being used along with the algorithms implanted in the cryptography techniques, the advantages and disadvantages of the various mode of payments that could make a difference when customers are concerned about the privacy and the security while making a transaction online keeping in view the amount of transactions that would take place in day to day business have been discussed since with increase in number of transactions number of thefts, frauds will also increase.Concept and Size of Electronic Payment Since payment systems use the electronic and computer networks, the nature of these payments is more complex than payment systems used in the conventional commerce so companies dealing in E-commerce should constitute frequent practice in banking. Most common form of the payments in E-commerce are payments made in Business to Business since they make more than 95 percent of total E-commerce payments today and these are executed through a proper network of electronic commun ication that would include digital telephony , IP telephony and use of internet to complete the transaction. (Turban et al, 2004 ) The amount of payment made in the electronic payment system varies from one type to another of the E-commerce; the payments that are made in the Business to Business E-commerce are quite higher than what are made in Business to Consumer or Consumer to Business types of the E-commerce.There are transactions that may range from $1 to $ 10 which generally take place in Business to Consumer form only and by their nature are known as the micro payments. Payments up to $ 500 are still mostly done under Business to Consumer form of E- commerce however are not considered micro payments, example of this could be buying a customized laptop from the Dell website which could cost around $500. (Danial, 2002) Payments higher than $1000 would generally fall under Business to Business E-commerce since individual customers who have to make a purchase bigger than this amo unt would preferably like to buy the products physically. â€Å"B2B transactions account about 95% of e-commerce transactions, while others account about 5%†. Turban et al, 2004 ) Modes of Payment in Electronic Payment system in E- commerce. There have been dozens of modes of payment in electronic payment system some of them are widely accepted and common however some of them are not. Some of them are just the electronic versions of the conventional methods that are there in regular form of commerce. Following are some common forms that are used in daily forms of E-commerce. 1. Electronic Fund Transfer. 2. Credit Cards. 3 E –cash. 4. Smart cards. 5. E –checks. 6. Electronic Debit Cards. Online Credit Card Payment System. â€Å"It seeks to extend the functionality of existing credit cards for use as online shopping payment tools.This payment system has been widely accepted by consumers and merchants throughout the world, and by far the most popular methods of pa yments especially in the retail markets†. (Laudon and Traver, 2002) A credit card is generally issued by the banks or other financial institution. It comes with a fixed amount of spending limit depending upon the type of the credit card and payment is to be made to the issuing institution within a stipulated time period it could be 30-40 days after which customer has to pay interest on the amount due. Following are the few terms that are related to the use of credit cards. 1. Card holder: – a card holder is the authorized person who is entitled to do purchases online using the card. 2.Card issuer: – Card issuer could be financial institution or a bank that has issued the credit card to card holder after a certain amount of verification about the card holder. 3. The merchant:- Merchant is the one who accepts payment via credit card used online in exchange of goods or services offered by him. 4. The acquirer: – a financial institution that establishes an acc ount for merchants and acquires the vouchers of authorized sales slips. 5. Card brand/card type :- there are types of credit cards that are accepted worldwide and different institution take care of different types of credit cards such as Visa and Master Card. (Turban ,Lee, King, chung , n. d)Process of using Credit Card While making a purchase online using a credit card, the transaction goes through a series of steps and following are few terms that need to be understood before understanding the transactional process, all these terms are kind of processes that could take place while processing a transaction. * Sale: A sale is when the card holder purchases a product or service from a merchant and the money is transferred to the merchant's account. *   Preauth: A preauth is not a sale transaction however it is a transaction to make sure that the credit card is valid and it typically charge around $1. 00(Techrepublic ,n. d)  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   * Postauth: â€Å"A p ostauth involves purchasing something before it is shipped. The customer can preorder something, and the amount is deducted from the customer's credit limit. No money is transferred, but the card hold is maintained on the customer's card.When the merchant fulfills (typically, ships the product), the merchant can perform a postauth to transfer the money and remove the card hold from the customer's card†. (Techrepublic, n. d) * Credit: This transaction is used while returning the good according to the procedure under the agreement and merchant puts the money back into the account. * Chargeback: A chargeback transaction is used in case of dispute settlement. In case of a dispute customer files a case and the financial institution involved temproraly withdraws money from the merchant`s account and transfers it to customer`s account. Each party have a certain number of days to prove the right billing and depending upon that amount goes in the account of right party. (â€Å"Techrep ublic† ,n. ) Steps involved in the online transaction While making a transaction customer fills in the credit card information on the HTML page and the information is sent over the server. 1. Server receives the information and sends it to the code that validates the information added by the user and if found valid this information is formatted into data that gateway could understand and is sent to gateway. (â€Å"Techrepublic† ,n. d) 2. â€Å"The gateway receives the formatted data from the HostRAD code, validates the card, and checks to see whether the amount for the transaction is available in the user's account†. (â€Å" Techrepublic† n. ) Upon validation if the card is found invalid or if there is not enough amount on the card a disapproval goes to the code and gateway charges the merchant money at this point of transaction even if it goes bad and if everything is found right the transaction is approved and an approval message is sent to the code. 3. Depending upon the type of the type of the card(Visa, Master card) gateway is batched upto the appropriate clearing house transactions arrive at the gateway, they're batched through to the appropriate clearinghouse. The clearinghouse that is used is determined by the credit card type and the bank that issued the card. As the clearinghouses receive transactions from all the gateways, the clearinghouses batch the transactions for all the banks involved, transferring monies from bank to bank.For providing this service, the clearinghouse takes between two percent and five percent of the total sale. (â€Å"Techrepublic†, n. d) 4. As the clearinghouses batch the transactions they receive, they transfer money from the customer's bank to the merchant's bank. 5. The merchant's bank receives the transactions from a clearinghouse and then transfers the appropriate amount of money for the customer transaction (started in box 1) into the Merchant's Card Not Present merchant account (†Å"Techrepublic†,n. d) Credit Card Transaction Security â€Å"More than 100 million personally-identifiable customer records have been breached in the US over the past two years. Many of these breaches involved credit card information. Continued credit card use requires confidence by consumers that their transaction and credit card information are secure†. (â€Å"Texas department of information resource† ,2009)The Payment Card Industry (PCI) Security Standards Council is the authoritarian agency that issues the standards and policies that help reduce the internet crimes in use of credit cards and all vendors that accept credit cards in their transactions have to abide by these laws . PCI council includes all the major Card brands like American Express, Discover Financial Services, JCB International, MasterCard , and Visa International. â€Å"Texas department of information resource† ,2009) â€Å"The Council created an industry-wide, global framework that d etails how companies handle credit card data – specifically, banks, merchants and payment processors. The result is the PCI Data Security Standard (DSS) – a set of best practice requirements for protecting credit card data throughout the information lifecycle†. (â€Å"Texas department of information resource† ,2009) â€Å"The PCI compliance security standards outline technical and operational requirements created to help organizations prevent credit card fraud, hacking, and various other security vulnerabilities and threats. The PCI DSS requirements are applicable if a credit card number is stored, processed, or transmitted.The major credit card companies require compliance with PCI DSS rules via contracts with merchants and their vendors that accept and process credit cards. Banks, merchants, and payment processors must approach PCI DSS compliance as an ongoing effort. Compliance must be validated annually, and companies must be prepared to address new a spects of the standard as it evolves based on emerging technologies and threats†. (â€Å"Texas department of information resource† ,2009) Following are some terms related to online Credit card frauds â€Å"Phishing – This technique refers to randomly distributed emails that attempt to trick recipients into disclosing account passwords, banking information or credit card information. This one scam has played a major factor in the crisis we face today.Since phishing emails typically appear to be legitimate, this type of crime has become very effective. Well designed, readily available software utilities make it nearly impossible to trace those guilty of phishing. Phishtank, an anti-phishing organization, recently revealed that nearly 75,000 attempts of this nature are made each month† Pharming – This new technique is one of the most dangerous of them all. Pharming involves a malicious perpetrator tampering with the domain name resolution process on th e internet. By corrupting a DNS, (Domain Name System), a user can type in the URL for a legitimate financial institution and then be redirected to a compromised site without knowledge of the changes.Unaware of the background predators, the consumer types in their bank account details or credit card number, making them the latest victim of fraud. Skimming – refers to a process in which a special device is used to copy encoding data from the magnetic strip of a credit or debit card. This device is usually secretly mounted to an ATM machine as a card reader. Dumpster Diving – this act refers to a process in which an individual vigorously shift's through someone else's trash in search of personal and financial information. With a mere credit card approval that contains a name and address, a criminal can easily open up a credit card in your name and accumulate substantial debt in no time.Security measures in online credit card payment systems. Four necessary and important m easures that must to be followed for safe electronic system are as following. 1. Authentication Authentication is a method to verify buyer`s identity before payment is authorized. 2. Encryption Encryption is a process to making data that has to be sent over the internet indecipherable so that it could not be read by unauthorized persons and read only by the persons in authority to do so. 3. Integrity It has to be made sure that information that is sent over the internet is not modified, altered in an intentional or unintentional way. 4. Nonrepudiation This is the quality of a secure system that prevents anyone from denying that they have sent certain data. Here the communication system should be fault tolerant. Server where the transaction has been sent should keep a record log of every transaction and the user can't deny that he or she has not accessed the server. Security Schemes Key security schemes that make sure that information sent over the network while engaging in a transac tion is secure include encryption, digital signature, certificates and certifying authorities. Encryption:-Encryption is a technology that deciphers any kind of information before being sent over the network so that it could not be retrieved and misused by an unauthorized person.Two common encryption technologies that are used to encrypt and decrypt the data are Secret key and public key encryption as explained below. Secret Key encryption In this cryptography technique one key that is known as secret key is used to both encrypt and decrypt the data at sender`s as well as receiver end . Secret key encryption is easy to implement when number of users are less. The algorithm that is used for secret key cryptography is Data Encryption standard (DES) (Schneier ,n. d). The only problem with this encryption method is that the key has to be sent over to the counterpart. (â€Å"Dret†, n. d) Public key cryptography/Assymetric encryption.In this kind of encryption there are two keys th at form the part of encryption technology they are the public key and the privaret key . the public key is known to allthe users however the private key is only known to one user the owner. there are two methods the kep pair could be used eithet the data could be encrypted by the receiver`s public key and it will be decrypted by his private key but there is a problem with this method since the encrypting key is public key no body will know who sent the message the other way is encrypting the data with receiver`s private key and decrypting it by public key however this method also has an issue every public key holder will be able to decrypt the message so it has to be combination of keys.The data is encrypted using the receiver`s public key and reencrypted using the receiver`s private key the reciver has to use combination of keys to decrypt the data fully which means that the first the reciver`s private key and then the sender`s public key. The algorithm that is used in this techniq ue is RSA. (â€Å"turban, 2004) (â€Å"Dret†, n. d) Electronic Protocols. SET (Secure Electronic Transaction) protocol is an e-commerce protocol designed by Visa and MasterCard. Customers can purchase online and their personal information would be protected and also their buying habits would be recorded along with the information they provided. â€Å"SET developed by Visa and MasterCard is an open standard for encryption and security specification for credit card transactions on the Internet.The SET is a set of security protocols and formats that main section are application protocol and payment protocol†. (â€Å"Itig† , n. d) SET has many merits: SET has provided merchant protective method, cost-cutting and enough security for the electronic payment. It helps making the online E-commerce free from online fraud to quite an extent. SET keeps more secrets for the consumer to improve the satisfaction of their on-line shopping experience. SET helps the bank and the credit card company to expand the service to more broad space –Internet. And it lowers the probability of credit card on-line fraud. Therefore SET seems more competitive than other online payment method.SET has defined interface for all quarters of online transaction so that a system can be built on the products made by the different manufacturers. SET protocol based E-commerce model Although SET has been widely used in the electronic payment area and has gained more attention from the electronic commerce promoter, the SET transaction mode model only. Even for B2C model, its application is also limited. (â€Å"Itig†, n. d) DES algorithm and the RSA algorithm are used in SET protocol to carry on the encryption and the decryption process. SET protocol use DES as symmetrical encryption algorithm. However, DES was no longer a safe algorithm right now. Therefore, DES should be replaced by more intensive and safer algorithm.Moreover, along with the development of processing speed and storage efficiency enhancement of the computer, the algorithm will be cracked successively. It is necessary to improve the extendibility of encryption service. SET protocol is huge and complex in the application process. In a typical SET transaction process, the digital certificates need to be confirmed 9 times, transmitted 7 times; the digital signature need be confirmed 6 times, and 5 times signature, 4 symmetrical encryptions and 4 asymmetrical encryptions are carried out. (â€Å"cs. ucf†,n. d) SET protocol involves many entities such as customers, merchants and banks. All of them need to modify their systems to embed interoperability.As the SET requests installment software in the network of bank, on the business server and PC of the customer and it also need to provide certificates to all quarters, so running cost of the SET is rather high. The protocol cannot prove transactions which are done by the user who signs the certificate. The protocol is unable to pr otect cardholder and business since the signature received finally in the protocol is not to confirm the content of the transaction but an authentication code. If cardholders and trade companies have the dispute, they cannot provide alone the evidence to prove its transaction between themselves and the banks. Although there are some drawbacks in the SET protocol, it is still the most standard and the safest in the present electronic commerce security protocol and the international standard of the security electron payment.In order to overcome the defect that SET protocol only supports credit payment style, PIN(Personal Identify Number) digital items are modified in this paper; with regard to the other deficiencies such as complexity, slow speed, poor safety and adaptation of SET protocol, this paper also makes a model of architecture security control mechanism, introduces electron transaction authentication center and strengthens the security of transaction process of SET protocol. (â€Å"cs. ucf†,n. d) Transmission control Protocol (TCP) which is the main protocol used to send data over internet was not designed back then keeping in view the security issues that could arise in today`s World where E commerce plays an important role. The data transmitted through TCP could be read, intercepted and altered.Security breach still happens while an email is being sent or files are being transferred over the internet. Customer is always concerned over security when processing a transaction and sending information over the internet. Credit card information like name, number and date of expiration. Presently most of the companies use SSL (Secure Socket Layer) protocol to provide security and privacy this protocol encrypts the order at PC before sending it over the network however this protocol may not provide all the security needed. There is another more secure protocol Secure Electronic transaction (SET) however SET is is a slow protocol and may take long time to respond and also it requires that the digital wallet is installed on the customer pc.Electronic Fund Transfer â€Å"Electronic funds transfer† means any transfer of funds, other than a transaction originated by check, draft, or similar paper instrument, that is initiated through an electronic terminal, telephonic instrument, or computer or magnetic tape, so as to order, instruct, or authorize a financial institution to debit or credit an account. Electronic funds transfers shall be accomplished by an automated clearinghouse debit, an automated clearinghouse credit, or by Federal Reserve Wire Transfer†. † (Turban ,Lee, King;amp; chung ,n. d) Electronic Checks. E check is the electronic version of the traditional paper based checks , Paper check has been one of the most important way of payments that has been in use for a long time keeping in view the same concept E check has been designed to serve the same purpose. E-check contains the same information like acco unt number, issuing bank, address of the issuing bank and the amount of check.To validate the authenticity of the person, instead of signatures it has a digital code which is generated while filling in a check and is cross verified with the database while encashing it. Electronic Check offers many advantages over the traditional paper check since all the information is filled in electronically over the computer and it is not revealed as it passes through very few people who are in authority. E checks are cheaper by many folds because of ease of processing, also E-checks are lot faster in procession since the data is sent electronically and the chances of getting a check bounced are almost negligible. Electronic Wallets Electronic wallets or the e wallets also referred to digital wallets.An e wallet is a software program that contains user`s payment information in encrypted form to ensure its security, for example an individual`s e wallet could contain credit card number , bank accou nt number ,contact information and shipping location . This information can then be automatically and securely transferred to an online order form. †. (Turban ,Lee, King;amp; chung ,n. d) Virtual Credit Cards â€Å"Closely allied to e wallets is concept of virtual credit card. A virtual credit card is an image of a credit card placed on the computer desktop. With one click of the credit card image the card holder access the account information and pays for the online purchases.Customer can even drag and drop the virtual card from desktop onto an online checkout page . The credit card number and contact information is automatically entered into the checkout form and the customer just needs a pin to enter or other form of identification to authorize the transaction†. (Turban ,Lee, King;amp; chung ,n. d) Concluding Remarks Although there are many online payment systems available to choose from while making a purchase under E-commerce however the credit card is still the do minant and the most popular way not only because of the convenience it has but also because of its worldwide acceptability.Despite of the several security measures in place, credit card frauds do take place and protection of the information provided over the internet while making a purchase is of utmost importance. Encryption using the DES and RSA algorithms make the data indecipherable while being transmitted over the network and these encryption technologies are hard to break into however there are other ways credit card information could be disclosed. Phishing and Pharming as mentioned above in the essay are recent threats that are becoming common and are needed to be addressed as soon as possible since the users who are not really aware of these threats could unintentionally disclose information they are not supposed to.Credit card has wider acceptability because of its long established network thanks to the credit card brands like the Master card, Visa international and America n express and because of its friendly characteristics like ease of carriage, fast processing, 24 hour purchasing facility and the convenience of making purchase sitting anywhere. With the advancement of technology new protective measures like thumb imprint, retina scan are gaining popularity however it will take time for them to become common and implemented everywhere while making an online transaction since there are the cost and awareness issues related to these high end technology gadgets.

Sunday, January 5, 2020

The Polio Vaccine Essay - 1082 Words

The Polio Vaccine The discovery of the polio vaccine was an important medical and scientific breakthrough because it saved many lives since the 1950s. In the summer of 1916 the great polio epidemic struck the United states. By the 1950s hundreds of thousands of people had been struck by the poliomyelitis. The highest number of cases occurred in 1953 with over 50,000 people infected with the virus. When hygienic conditions were poor polio attacked infants. The disease was spread by contaminated water and contact with fecal contamination. Many infants died when the conditions were poor. But as conditions improved the virus spread differently. It was spread more through playmates and family members, the contamination came from the†¦show more content†¦Dean William McEllroy talked Salk into joining the university full-time. Though the schools research budget was a grant from the American Society for the Study of High Blood Pressure in the amount of $1,800, he saw the opportunity to do two things. One was to continue the work he was doing on influenza, second was to begin working with the polio virus. A few months after arriving in Pittsburgh, Salk was visited by the director of research at the National Foundation for Infantile Paralysis. The director asked Salk if he would be willing to participate in a polio typing program. I had no experience working with polio, but it provided me with an opportunity. . . Salk said in an interview. This gave Salk a chance to get funding, equipment, a laboratory facility, and to hire a staff to work for and with him. Salks previous work gave him the idea that a killed virus could in fact work when others thought it couldnt. To type the polio virus Salk infected monkeys with polio by injecting it into them or feeding it to them. If a monkey survived it built up antibodies to protect against the virus. The monkeys that survived were then given another type of virus to see if the same antibodies protected against the second type. If it did, i t told Salk and his assistants that the two types were related. If it did not, that told Salk that they were not related. EventuallyShow MoreRelatedPolio Vaccine in America1048 Words   |  5 PagesThe Polio Vaccine in America When my daughter was a baby, and we decided to delay vaccination, a friend of my mother-in-law seemed thrilled with our decision. However, she advised to look into the polio vaccine because there wasn t much they could do if someone did contract polio. During my research, I have found that the polio vaccine is all but completely  unnecessary for anyone in the United States. Let s take a look at some of the most interesting information I have found. Taken directlyRead MoreThe Discovery Of The Polio Vaccine1963 Words   |  8 Pagesdiscovery of the Polio vaccine will be discussed and broken down into deeper thought on why and how it was discovered. Poliomyelitis is an infectious disease that reached epidemic levels in the mid twentieth century. People that were unfortunate to receive this disease faced hardships including fevers, sore throat and vomiting(Allaby). These are just symptoms but Polio can be a vicious disease leaving their patients paralyzed. The majority of people who are diagnosed with Polio don’t get paralyzedRead MoreThe Discovery Of Polio Vaccine Essay2213 Words   |  9 Pagespoliomyelitis, otherwise known as polio. However, a breakthrough was reached when Jonas Salk managed to developed the first vaccine, which he brought to the public in 1955 after testing the drug on himself, family, and others. Salk developed a killed-virus vaccine through tissue-culture methods discovered by the scientist John Ende rs. Unfortunately, Salk’s vaccine was not the cure that the scientific community, and the world, had hoped for, as the results of the vaccine took a critical turn for the worseRead MoreEssay on Polio Vaccine633 Words   |  3 PagesPoliomyelitis (shortened to polio) has been around for thousands of years, and there is still no cure, but at the peak of its devastation in the United States, Dr. Jonas Salk introduced a way to prevent it. Polio attacks the nerve cells and sometimes the central nervous system, causing muscle wasting, paralysis, and even death. The disease, whose symptoms are flu like, stuck mostly children, and in the first half of the 20th century the epidemics of polio were becoming more devastating. SalkRead MorePolio Vaccine : An Infectious Disease1028 Words   |  5 Pagesâ€Å"A 1916 Polio epidemic in the United States killed 6,000 people and paralyzed 27,000 more† (â€Å"Polio Vaccine†). This lead to the creation of the polio vaccine that has helped to prevent polio for a very long time. The IPV and OPV vaccines played a huge role in all of this. Jonas Salk, who created the IPV vaccine and Albert Sabin, who created the OPV vaccine saved millions of people all around the world from polio (Petersen, Jennifer B). The IPV and OPV polio vaccine helped eliminate polio from theRead MoreThe Polio Vaccine Through The Eyes Of Its Creator1218 Words   |  5 Pagescreation of the polio vaccine through the eyes of its creator. Salk also describes his childhood and the events that lead up to his medical breakthrough. Latour, Bruno , Steve Woolgar, and Jonas Salk. Introduction. Laboratory Life. 1986.Reprint. Princeton: Princeton University Press, 1986. 11. Print. It showed the way that Jonas Salk studied polio and how he came to the conclusion that the vaccine was correct. He also taught that it is a life taking job and that polio vaccine was a difficultRead MoreThe Erradication of Poliomyelitis: Inactivated Polio Vaccine (IPV), and Oral Polio Vaccine (OPV)1076 Words   |  5 PagesIntroduction Poliomyelitis, commonly known as â€Å"Polio†, is an acute motor disease caused by the poliovirus that targets the anterior horn cells of the human spinal cord, and in severe cases results in acute flaccid paralysis (Alberta Health and Wellness, 2011), which can progress to permanent paralysis. It mainly affects children under the age of five, although individuals of any age may contract it (World Health Organization, 2013 [C]). Historical outbreaks, most prominently the 1916 and 1952 epidemicsRead MoreThe Relationship between the Polio Vaccine and AIDS in Africa550 Words   |  2 PagesIn the late 1950s, several groups of researches and scientists were developing some vaccines against polio. At that time, polio was still an epidemic worldwide disease. One of these vaccines, made by Dr. Hilary Koprowski MD (1916-2013) was used to test it on millions of people in Africa, after first being trailed in the USA. The vaccine virus was grown in tissue cultures taken from macaque mon keys before being introduced to millions of people , who were largely living in Burundi, Rwanda, and CongoRead MoreJonas Salk and the Polio Vaccine Essay example554 Words   |  3 Pagesand virologist who developed the first safe and effective polio vaccine. Before this vaccine was created, polio vaccines usually contained live, weakened forms of the virus, but Salk developed a vaccine that contained an inactivated, dead form of polio, the first of its kind. Until the Salk vaccine was introduced on April 12, 1955, polio was considered the most frightening health problem in the United Sates. Just 3 years before the vaccine was released, almost 58,000 cases were reported, with 3,145Read MorePrevention Of The Polio Vaccine880 Words   |  4 Pagesimmunizations, such as: Dtap, Polio, Hep A, and Varicella. Dtap and Polio is part of Maxe’s primary immunization. First, I would ask mom if she would like her son to receive 4 mentioned above vaccines (consent needed). If mom agreed to vaccination, I would verify if her son didn’t have any of the following symptoms after receiving last Dtap: a brain or nervous system disease within 7 days, non-stop crying for 3h or more, a seizure or collapse, and fever over 105F. For the Polio vaccine I would verify if Max