Thursday, November 28, 2019

Government Censorship Essays - Content-control Software,

Government Censorship Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. Introduction I. In the Internet community, there is a large volume of technical terms. For this reason, it is first necessary to examine the terminology specific to Internet. 1.The internet is a world wide computer network. 1.Electronic mail (email), which is one component of the Internet, approximates person to person letters, memoranda, notes and even phone calls. 2.Another term that is often used is electronic news (enews/Usenet), enews is a broadcast, free to the Internet medium. 3.The term FTP is also frequently used. File transfer protocol (FTP) started as an Internet archival and retrieval medium, somewhat analogous to traditional libraries. 4.The world-wide web (WWW), which is another component of the Net, can be used to publish material that would traditionally appear in journals, magazines, posters, books, television and even on film. 2.It is also essential to give a brief history on the internet. 3.The U.S. government is now trying to pass bills to prevent misuse of the Net. II. In order to understand the need for the ever-growing body of legislation, it is important to explore the controversy, and the current problems involved with the Net as it exists must be introduced. 1.The problem that concerns most people is offensive materials such as pornography. 2.Another crucial internet crime is the stealing of credit card numbers. III. One reaction to this inapplicability has been the Censor the Net approach (the censorship bill), we are now to compare its advantages and disadvantages. 1.First, the meaning of Censoring the Net must be explained. 2.However, many experts have pointed out that government censorship is not possible. 1.First, it is not fair to exclude the freedom and damage the atmosphere of freely expressing ideas just for the safety of children. 2.Most internet users are enjoying their freedom of speech on the Net, which is supposed to be protected by our First Amendment. 3.Additionally, only a very small portion of the Net contains offensive material, most people do not use the Net for pornography. 4.It must be understood that censoring the Net is technically impossible. 5.While people are concerned about Internet pornography, it should be recognized that pornography is sometimes legal; for example, pornography is legal in video and magazines. IV. There are many alternative measures to government censorship which would prevent misuse of the Net and would have the same effects as censorship. 1.It is very important for parents to provide moral guidance for their children, and parents should have this responsibility. 2.However, at the same time as we carry out moral guidance, we have to come out with some short term approaches to solve the problem in a more efficient way as well. 3.An alternative to government censorship is the technological fix, which would prevent misuse of the Net and would have the same effects as government censorship. 1.One example of technological fix is the SurfWatch software. 2.Also, commercial Internet service providers, such as America Online, allow parents to control what Internet relay chat (IRC) sessions are available to their children. 3.Another technological fix is for parents and guardians to have a separate proxy server for their children's web browser. 4.There are no computer programs to automatically and reliably classify material; only people can do it. As a result, while practicing technological fixes, the classification of the contents of the material when posting is very important. 5.Nowadays, most internet users classify their postings with standard categories, and leave signatures at the end of postings. 6.The combination of the installation of censoring software and the classification of materials is a much better solution than government censorship. Conclusion Bibliography The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical world society as a whole conspires to protect children, but there are no social or physical constraints to Internet surfing. The Internet Censorship Bill of 1995, also known as the Exon/Coats Communications Decency Act, has been introduced in the U.S. Congress. It would make it a criminal offense to make available to children anything that is indecent, or to send anything indecent with intent to annoy, abuse, threaten, or harass (Stop the Communications ... n.p.). The goal of this bill as written (though not

Sunday, November 24, 2019

Essay on Philosophy Aristotle

Essay on Philosophy Aristotle Essay on Philosophy Aristotle Essay on Philosophy AristotleAccording to Aristotle, a human being behaves morally and reaches eudaimonia the state of human flourishing when he or she practices moral virtues. A virtue in Aristotelian sense is a specific pattern of behavior, a tendency to think, desire, act and feel in an appropriate, harmonious way (Mosser, 2013). Different philosophers defined virtues in different ways; in particular, Aristotle in his Nichomachean Ethics defined virtue as the optimal middle between an overly expressed trait and a lack of that trait (Mosser, 2013). Furthermore, Aristotle emphasized that a virtue was not merely an average point between the two extremes, rather it was a weighed choice of behavior according to the time, situation and circumstances (Warburton, 2004).In my opinion, two key virtues that are important to living a successful life are confidence and courage. Confidence forms the basis on ones life and shapes self-perception of an individual, perception of this individual by others and the alignment between these perceptions. The person who has confidence objectively perceives own self with all positive and negative sides and strives to reduce negative aspects while enhancing positive characteristics. Someone who lacks confidence might be either overly self-focused and arrogant, or self-humiliating. In both cases, it is not possible to flourish without confidence because social relationships will be distorted.With regard to courage, the characteristic behavior of a courageous person is taking risks and responsibility when it is appropriate and avoiding unnecessary or excess risks or responsibilities. Someone who lacks courage cannot flourish because he or she might miss new opportunities and might be vulnerable to aggression and impudence. Those people who are too courageous and take all risks without consideration also cannot flourish since they will sooner or later make damage to themselves due to such risk-taking.Therefore, confidence can be viewe d as a harmonious balance between conceit and self-deprecation, and courage can be viewed as the middle between cowardice and recklessness. These conclusions support Aristotles concepts of virtues as the golden mean between the lack of certain quality and the excess of this quality.

Thursday, November 21, 2019

Globalisation Friendly Policies of China Essay Example | Topics and Well Written Essays - 3000 words

Globalisation Friendly Policies of China - Essay Example The economic part of globalization is the key because with the whole world becoming a kind of global village, barriers between the countries are broken with integration happening mainly in the economic aspects. So, Globalisation has made an impact and developing majority of the countries all over the world including China. That is, countries like China are following many ‘globalisation friendly’ policies, thereby developing themselves, and to show they are developing, they, in turn, are impacting other countries through that development. When one closely looks at the annals of many countries, it will be clear that for a nation to develop and reach the top echelons, particularly in the aspect of giving its people the needed facilities and also to achieve superiority over other nations, its economy should be very strong and still growing. This economic strength will elevate the country in other aspects of military strength, space power, sports, etc, etc, thereby impacting other countries. As any country’s economy cannot exist like an island insulated from any impacts, its growth or lack of growth will surely have an impact on many countries both in the positive as well as in the negative direction. So, this paper will examine how China has developed optimally through ‘globalisation friendly’ policies, and how that development is visible in the way the Chinese economy and its people have developed, and also how this development of China is turning out to be an economic challenge to the United States and Europe. For a long time, China mainly depended on agriculture for its economic generation as well as for the livelihood of its people. However, after the onset of globalization, China started to focus on industrial growth.  

Wednesday, November 20, 2019

How the USA Patriot Act Effect Law Enforcement Research Paper

How the USA Patriot Act Effect Law Enforcement - Research Paper Example This illustrates that the USA Patriot Act is aimed at enforcing the law enforcement agencies by enabling them to be in a position to competently deal with terrorism attempts. However, enormous debate has revolved as pertains to whether the USA Patriot Act positively or negatively effects the law enforcement. It is with this regard that the thesis statement that this paper seeks to affirm is that the Patriot Act is designed to offer positive benefits to the goals of law enforcement and federal intelligence agencies that protect the American populations (Van Cleef 73). Topic sentence 1: Withstanding the presumed negatives that have come with intelligence investigation after the passing of the Patriot Act, surveillance strategies are actually necessary for securing the public welfare. The patriot Act is mainly aimed at protecting the nationals of the United States against terrorist attacks and surveillance form the enforcement agencies. Surveillance intelligence has widely been reviewed in the case of Mayfield following the terrorist Act and was typically depicted as Patriot Act on trial in the Nation Newspaper. This was a case that took shape in March 2004 where intelligence surveillance after conducting investigations, the FBI concluded that following the cross matching of partial finger prints in one of the bomb detonator bags, it matched that of Mayfield and he was arrested. His arrest was affirmed by in depth investigations that revealed that he was a Muslim convert and had been involved in a movement of Taliban’s that had wanted to go to Afghanistan to fight against the United States (Sarasohn 1). However, Mayfield being an attorney knew that the United States had no charges against him and being a citizen of the United States, challenged his arrest and conviction on the wake of the Patriot Act. This led to his release following additional surveillance that revealed that he was not the perpetrator behind the terrorism attack. This led Mayfield to chal lenge the protection assured by the Patriot Act since he affirmed that his protection, safety and privacy had been violated by the enforcement agencies during the investigations. The Mayfield trial is a clear indication of the effect the Patriot Act has on law enforcement especially with reference to intelligence investigations. Consequently, surveillance strategies depicted in the Patriot Act and Mayfield trial, affirm that the Patriot Act is indeed aimed at securing the public welfare. This therefore affirms the thesis statement that the Patriot Act is designed to offer positive benefits to the goals of law enforcement and federal intelligence agencies that protect the American populations (Sarasohn 1). Topic sentence 2: Patriot Act makes it possible for law officers to conduct search and seizure procedures without first notifying the individuals involved. Patriot Act of the United States gives law enforcement officers the mandate to seizure and act without warning in terrorist at tempts. This gives the law enforcement officers an upper hand in the investigations and especially in the financial sector which has become a major terrorist avenue. The Patriot Act has provisions that enable the treasury to secure its finances by implementing anti-money launder mechanisms. These are

Monday, November 18, 2019

International Tourism Development Essay Example | Topics and Well Written Essays - 1000 words

International Tourism Development - Essay Example Organizations like the WTO (World Tourism Organization) and WTTC (World Travel and Tourism Council) are aimed at regularizing and streamlining international tourism in all aspects. International tourism is revered as one of the fastest growing economic sector of the present day world, one of the largest export earners and a very crucial source of employment. In not only ushers in newer opportunities for the local people, but also generates substantial revenues. Recognizing these strengths of international tourism most of the organizations work towards bringing in coherence amongst various governments and local bodies and encourage them to play a more active role in promoting international tourism. In the business oriented world, tourism has almost become synonymous with trade. Whenever a tourism based activity is initiated, it generates trade in some form or the other. To further capitalize on this financial aspect of tourism, various strategies and policies are being adopted by various international organizations. In this regard the WTO releases annual reports on Tourism Market Trends reports which analyze global tourism results and their impact on a country's economy. Acute attention is given to various tourism products like special events, cruises, sports, ecotourism etc. to comprehensively analyze annual tourism trend of a particular country and its effect on the local as well as global trade. A special theory called PEST analysis is often implemented to assess a country's market potential. PEST analysis means adjudging a place on various aspects such as Political factors, Economical factors, Socio-cultural factors and Technological factors. Stability of the government or polity in a country, its economical status, its social and cultural setup and its technological background , all have a vital role to play in determining a country's tourism potential. As today's largest and fastest growing industry international tourism holds immense potential for unprecedented economic boom, globally. It has not only enhanced global trade and generation of revenue but has also given rise to novel ways of economic growth, especially to the developing countries. International tourism organizations are now working towards bringing in symmetry to the whole concept and to achieve global economical growth and prosperity through it. Answer 2: International tourism is present days' fastest growing economic sector and hence its continuous development and regularization is indispensable. Apart from generating huge tax revenue, this industry is also a vital source of foreign exchange and employment. Hence it becomes imperative for any nation to pay acute attention towards development and maintenance of its tourism resources. Tourism stakeholders play a vital role in shaping and sustaining tourism of any place. Tourism stakeholders could be any government or private body engaged in some form of tourism activity. Global tourism stakeholders may also include airports, travel agents, hotels, tour operators etc. Generically, each and every organization, which contributes towards tourism in some form, becomes its stakeholder. Tourism development is a complex activity, which not only includes tourism destinations, countries generating tourism, motivations and influences, but also relationships between people and institutions

Friday, November 15, 2019

An Architecture for Source Code Protection

An Architecture for Source Code Protection Abstract—Due to great competition in software industry the source code and binaries have to be protected. Source code available in plain form could be easily stolen and launched on any computer using IDE. We will discuss a protocol that will be used in both (single user and teaming environment) in order to provide source code protection. This would be achieved though authentication, authorization, encryption/decryption and hashing. Keywords—Encryption; Authentication; Authorization; Hashing; Source code SC; Binaries; Integrated development environment (IDE); Authentication server Ticket Granting Server (ATGS) INTRODUCTION In software industry, the most important asset of the industry is the source code of the software which is being developed. There is a lot of work that has been done in the secure communication, secure databases, and other security services in applications but the source code itself is not being protected which might result in a great financial and data loss for an organization. Due to great competition in software Industry Company coming up with new and unique ideas and launches it in the market will in return generate great revenue. So in software industry it’s just about the idea that matters. Most of the software companies don’t leak out their upcoming products until they are ready to be released in the market. Due to the importance of the idea and source code, source code theft is the biggest threat in software industry. Source code theft could be physical or via some botnet. In physical source code theft a person might get access to your system and copies the source files and takes it to his own system to recompile with the IDE. He got access to all of your work without any difficulty. The other case could be a Lab environment where many users have access to a common machine. In this situation any person logging on the system can view history in the IDE he could also access those source files if they are made available. In the second type where your competitors know the importance of your system might launch a botnet on your machine. In this ways all your important files (including source files etc) could be stolen and sent to a remote machine. The person getting access to these source files might get a great benefit from it. Our work is to encrypt these source files and binaries generated by the IDE using cryptographic technique. Because if we don’t protect the binaries, the binary could be reversed engineered to extract source code using some decompiler [1]. JAD could be used to launch a reverse engineering attack on binaries [2]. Some software’s are available in the market that encrypts your files (including source files etc) but these files have to be encrypted manually every time. Due to this extra effort people just skip it. In our model source files and binaries would be automatically encrypted whenever the user performs the Save, Save As and Execute operation. In this way the developer could pay his full attention on software development without caring about its protection. Our technique will provide confidentiality to source code and binaries, tempering of source code and idea leaking. RELATED WORK The idea of protecting source code and its binaries was influenced from some of its related work Guy-Armand Yandji, Lui Lian Hao, Amir-Eddine Youssouf, Jules Ehoussou [3] presented a model for normal file encryption and decryption. The paper describes a methodology using AES and MD5 for encrypting files. The outcome file that will as a result be hashed and strongly encrypted through the software. Xiufeng Zhang and Qiaoyan Wen [4] described the flexibility of Java language, which makes the protection become very difficult. Using decompiler [5] such as Jad we can easily extract the source code from the binary file. Therefore, any malicious users can use the anti-compiler tools to make reverse-engineering attacks. The paper presented an AOP-Based J2EE Source Code Protection technique in they gave solution to the problem that arises when encrypting J2EE applications. ByungRae Cha [6] presented a CRYPTEX model for protecting software source code. The model presented safe protection and access control of software source codes. The access control to the source code was achieved using digital certificate. The CRYPTEX consisted of software source codes and an algorithm to control access. A White Paper sponsored by CA Technologies [7] for Protecting API’s against attack and hijack presented a secure API architecture. APIs are windows into applications and as with any window an API can easily be misused. APIs put applications under the hacker mi croscope and increase attack surface on client application. So a solution was presented using SecureSpan API proxy. SVN [8] and CVS [9] are used to control versions. A version control system keeps track of all work and all changes in a set of files, and allows several developers to access them. Access to these files is controls using authentication and authorization if the files are not open source. Subversion can operate on network which will allow various people to modify and manage the same set of data. RISK FACTORS Source code is the main asset of any product, if somehow the source code is compromised the whole product get compromised. It should be necessary to become aware of the threats that are caused when source code or the binaries are compromised: Source code can be used to steal the idea behind that product and can be used to make a similar product. Source code can give attackers information about the working of your application and it will also provide him the loopholes in your application which would help him to launch attacks. Binary files can be revered engineered to generate source files using a decompiler and possible attacks could be launched by those source files. By having the source code or binaries the attacker can add some unwanted feature to that product and make that malicious product available to the public Bypass license checks (patching) in your product and make a free copy available to public. MANUALLY ENCRYPTING AND DECRYPTING You can encrypt and decrypt the source files and binaries manually using some software but in our approach the source files and binaries would be encrypted and decrypted automatically without any extra effort. Time Consuming Because we have to do encryption and decryption manually with the help of some software so existing approach might be more time consuming then ours. Purchase of extra Software We might need to purchase extra software in order to perform this encryption and decryption of source files and binaries. In our approach no extra software is required to perform this task. This would be a feature inside the IDE. More Secure Our approach is more secure than the existing one because the developer might forget to do this operation and leave the source files and binaries unencrypted. While in our approach whenever you exit the IDE the source files and binaries would be encrypted before closing IDE. In our approach developer won’t need to care about the protection of source files and binaries these would be secured automatically at backend. SOURCE CODE PROTECTION ENVIRONMENTS Our focus is on two types of source code protection environments Single User Environment Teaming Environment Single User Envirnoment In a single user environment a single user using IDE on his system would face all the challenges to the source code that we have discussed above. The Source code is stored on the local drive onto the system in plain form. Anyone getting access to that drive can misuse the source code. We have to protect this source code by providing some kind of security measures. Proposed Solution First the user will be authenticated. So when the user launches the IDE a login screen will appear he would enter his username and password if his logging for the first time he has to get registered and the hash of the password would be taken and stored with username at some secure place (i.e. database ). If his already registered the entered password has to be hashed and is compared with the hash that is already stored with a particular username. Now if the both hash match then the user would be logged in to the IDE with a particular ID as shown in figure 1. If there is some kind of error the user would be asked to re-enter again, Skip and run IDE normally or exit. Fig. 1. Authentication sequence diagram Our main emphasis would be on Save, Save As, Open and execute operations because these operations require security enforcement. Say the user tries to open an existing

Wednesday, November 13, 2019

Age of Enlightenment Essay -- World History, 18th century

The 18th century is referred to as the ‘Age of Enlightenment’. The trends in thought and letters from Europe to the American colonies brought a new light and attention upon mankind. This new movement described a time in Western philosophy and cultural life in which reason was advocated as the primary source and legitimacy for authority. ‘To understand the natural world and humankinds place in it solely on the basis of reason and without turning to religious belief was the goal of the wide-ranging intellectual movement’ (Hackett). At the heart o this age, a conflict began between religion and the inquiring mind that wanted to know and understand through reason based on evidence and proof rather than belief on faith alone. Many scholars believed that this was primarily a French movement because the French culture dominated Europe and their ideas were expressed in the environment of the Parisian salon. IN my opinion, this movement was even more influential on the world because it was primarily a middle-class movement.. These pioneers labored for man in general and for humanity. This was also an era that public readings by scholars and philosophers came into existence because of increased literacy. These philosophers however, lived a very precarious life due to the fact that they did not know if they would be imprisoned or courted for their public performances. The analytical methods of Newtonian physics placed its stamp on the Enlightenment Era. Order and regularity came from the analysis of observed facts. The new ideal of knowledge was simply a further development of the 17th century logic and science with a new emphasis on; 1. The particular rather than the general. 2. Observable facts rather than principles. 3. Experience ra... ... because human beings are more willing to question their belief systems now and that is thanks to the Age of Enlightenment. I believe the most important issues involving the Enlightenment period was the recognition of the middle class. Most of the influential people of the period were from the working class. The rise in literacy gave the middle class more opportunities to spread their wings and become an influential voice in society. References Copestone, Frederick., A History of Philosophy. London. Search, 1946.Print. Roman, Chris. A World of Ideas. New York. Palatine. 1999.Print Thackeray, Frank. Events that Changed the World in the Eighteenth Century. Westport. Greenwood Press.1998. Print. World History Project. World History International. 1995-2006. Web. 19 Dec. 2010 Rempel, Gerhard, Western New England College. 2007.Web. 19 Dec 2010