Tuesday, August 25, 2020

Propaganda In China During The Cultural Revolution Took On Many Essays

Promulgation in China during the Cultural Revolution took on numerous structures; there were mass Red Guard exhibits in Tianamen Square in backing of Mao Zedong, pictures of Mao were set up in each possible area from cafés to the backdrop in nurseries, what's more, leaflets and books of Mao's lessons were appropriated to each Chinese resident. One of these promulgation distributions Quotations from Administrator Mao which later got known as the Little Red Book contained cites from Mao Zedong and was disseminated to each Chinese resident. The historical backdrop of the Red Book gives probably the most ideal manners by which to examine Chinese publicity during the Cultural Revolution and see the manners by which the Chinese government had the option to create and adequately inculcate the Chinese individuals with Mao Zedong Thought. Official Chinese magazines from the time of 1967 to 1970 are filled with numerous photos of residents holding, perusing, and remembering the Red Book. This proposition will follow the ascent and fall of pictures of the Red Book in the official Chinese distribution China Reconstructs. This proposition will utilize a graphical examination of pictures in this distribution from 1966 to 1973 to show that promulgation was not only an apparatus of the Socialist gathering yet additionally an impression of inward force battles inside the gathering during the Cultural Revolution. The Red Book was composed quite a while before it turned into the object of national love and an instrument for the Cultivation of Mao's character Cult. The historical backdrop of the Red Book and its brilliant ascent from a hand book for military enlisted people to obligatory perusing for all Chinese residents, is intently attached to its engineer Lin Biao's ascent to power. Lin Biao was conceived in 1907 and was fourteen years more youthful at that point Mao; he joined the socialist party in 1925 and until the socialists caught control of China was at different occasions accountable for opposition powers, and multitudes of socialist officers. At the point when the socialists took control in 1949 Lin Biao was behind Mao Zedong, Liu Shaoqi, Zhou Enlai, Chen Yun, and Deng Xiaoping in rank (Yan and Gao, 1996: 179). Yet, after eighteen years during the stature of the Cultural Revolution Lin Biao by winning kindness with Mao by distributing and supporting the Red Book and the Cult of Mao turned out to be second just to the Chairman in force and position (Ming-Le, 1983: 80). In 1959 Peng Dehua was excused as clergyman of barrier and Lin Biao was designated in his place. At a military gathering for high frameworks during September of that year Lin Biao, vivaciously began advancing the Cult of Mao saying, Learning the works of confidant Mao Zedong is the alternate route to learning Marxism-Leninism. Executive Mao's works are anything but difficult to learn and can be put to utilize right away. Persistent work will deliver profits many crease. (Yan and Gao, 1996: 182) His references to easy route and snappy profits in his discourse went unnoticed at the time as not many predicted the impacts of making a Clique around Mao. Be that as it may, thinking back on the Cultural Revolution and Lin Biao, we can see his utilizing the Cult of Mao was for sure an easy route that created enormous profits both for himself and for Mao. Mao to the Chinese individuals was an image sway and the development of communism; to them acclaim for Mao was fitting with his emblematic job in the public eye. Beginning in 1959 Lin Biao before military crowds so as to assist development with supporting for the Cult of Mao utilized such expressions as, the critical need of securing Mao Zedong's idea, to examine the works of Mao Zedong with questions as a primary concern is to shoot bolts with focus in sight, we should arm our minds with Mao Zedong's idea (Yan a Gao, 1996: 181). Lin Biao's objective of working up both himself and the Cult of Mao lead him in September of 1960 to pass a goals at the gathering of the Military Commission, which called for progressively political instruction among the furnished powers (Yan and Gao, 1996: 181) Mao Zedong Thought is the compass for the Chinese individuals' transformation and communist development, the amazing ideological weapon against dominion, and the amazing ideological weapon against revisionism and dogmatism..... raise high the red pennant of Mao Zedong Thought, go further and assemble the brains of all officials and warriors with Mao Zedong Thought, and resolve to make sure that Mao Zedong Thought, and resolve to ensure that Mao Zedong Thought is in order in all periods of work... Truly learn by heart the Mao Zedong Thought! Peruse Chairman Mao's books,

Saturday, August 22, 2020

Evidence Based Psychotherapies and Adolescents †Free Samples

Question: Examine about the Evidence Based Psychotherapies and Adolescents. Answer: Presentation: Training has adjusted Anas conduct by advancing her interest and industriousness. Kat and Sarah have been steady of her from the start by helping her. Childs early limits rely upon a few impetuses and interventions; that guardians and gatekeepers ought to consistently be accessible to guide and help the youthful ones when they are growing up. Operant molding, old style molding, and social getting the hang of molding are the essential learning standards clear for this situation. In the first place, operant molding alludes to a procedure that changes an individual conduct through the utilization positive and negative reinforcement(McLeod, Skinner-Operant Conditioning, 2015). Uplifting feedback involves the rousing things that an individual is presented at to get familiar with a specific conduct. On the opposite side, negative support includes compromising or compelling exercises that impact a person to adjust to the ideal conduct. Through operant molding, an individual makes coordinated effort between a specific conduct and its outcomes. This learning guideline holds that the most fitting way to deal with comprehend a reaction is to break down the reasons for an activity and its repercussions. In this situation the spectator from the perception room urges Kat to monitor Anas conduct including diet, resting designs when she heads to sleep and to what extent she takes while dozing as this will assist with extricating the reason for her social changes. Three kinds of reactions follow conduct in this rule incorporate; impartial operant (natural responses that don't modify with the likelihood of an activity being rehashed), strengthens reaction (biological reactions that improve the probability of a conduct being rehashed) and punishers reaction that is the ecological reactions that decrease the chance of a practices repetition(Weisz, 2010). Also, the traditional molding is a rule of realizing which happens when an adapted boost is matched with an unconditioned improvement (Goldman, 2012). It includes programmed or reflexive reactions. The vital strategy for this is impartial boosts can be matched with positive improvements with the unbiased upgrades being anything as long as it incites no response from the youngster. The particular motivating forces dependably bring about a characteristic reaction. From this situation, Ana was extremely uncooperative in the perception room. She was crying, hitting Kat her mom however when she was with chocolate and toys to play with, her resentment quieted down. Kat says that at whatever point she cries or gets steamed, she for the most part gives her lovely easily overlooked details to eat like chocolate and desserts, things which make her resentment to chill off. Thirdly, the social picking up molding shows that people obtain conduct by watching others. Through simply watching others conduct demeanor and the practices' result, one figures out how to act in a specific situation(Sarah, 2011). For this situation, Kat says that, when Ann is disturbed, Kat smacks her leg, this makes her cry, correspondingly, Kat gripes, at that point they nestle and Ann quits crying. Consequently obviously Ann sees how her mom carries on and she duplicates her. Anas Probable Stage of Psychosocial and Cognitive Development Ana is at the operational stage, third phase of intellectual improvement as displayed by(Oswot, 2010). This stage keeps going that happens in youthful ones when they are around seven to eleven years old. It is constantly portrayed dependent on the judicious and sorted out speculation as appeared by Ana when she can imagine that she is an incredible kid to Kat, her mom (Mm-gee. Im a decent young lady, arent I mother?). Basic assessment of preservation undertakings when a youngster offers an off-base response to an inquiry people will in general recurrent a similar issue as a method of indicating the kid that they have offered an inappropriate response (McLeod, 2010). This was accomplished by Piaget by asking a kid a similar inquiry over and again. At the point when Ana was inquired as to whether the lady who deals with her at the childcare community read stories to her, she addressed adversely. This made the persona to rehash a similar inquiry, yet Ana remained firm with her reaction. This factor has caused Ana to comprehend the idea of protection that her sitter at the childcare doesn't peruse stories to her a thing which has made her abhor her. She built up a discernment that her colleagues at the childcare don't care for her. Characterization This is the capacity to recognize properties controlled by specific classifications and relate them to each other to take care of issues utilizing explicit data (McLeod, 2010). For instance, gathering objects as indicated by certain measurements that they share. At the point when Ana picked toys at the Observation place, she felt free to start arranging bits of Lego (Ana currently unobtrusively plays with the toys for some time. The commotion of her assembling sections of Lego proceeds out of sight. It is through this factor Ana has gotten progressively legitimate and sorted out, however she was still concrete. She got annoyed with the eyewitness at the childcare and had the option to understand that the main way she could recapture her joy was through conversing with Kat her mom once more. Manners by which issues with Memory Impact Ana Memory can encode, crowd, protect and review past happenings and data inside an individual brain(Mastin, 2010). It is viewed as the utilization of related involvements to impact one's current conduct. It is the aggregate of what people recollect and enables them to learn and adjust to our ongoing happenings. It is the store and review of the things that have happened to people later on. Memory is the minds filling framework. It permits individuals to recollect and recover data that we have learned, or review and recover valuable data that we put away previously. For instance, Ana can overlook that when one gets to a bustling street, they are required to look left and right at that point stroll over the road. References Goldman, J. G. (2012, January 11). What is Classical Conditioning? (What's more, Why Does It Matter). Recovered from The Thoughtful Animal: https://blogs.scientificamerican.com/attentive creature/what-is-classicle-molding and-why-does-it-make a difference/ Kendra, C. (2018, March 16). Piaget's Theory: The 4 Stages of Cognitive Development. Recovered from Very Well Mind: https://www.verywellmind.com/piagets-phases of-intellectual improvement 2795457 Mastin, L. (2010). What is Memory? The Human Memory, 1-2. McLeod, S. (2010). Concrete Operational Stage. Recovered from Simply Psychology: https://www.simplypsychology.org/concrete-operational.html McLeod, S. (2015). Skinner-Operant Conditioning. Recovered from Simply Psychology: https://www.simplypsychology.org/operant-conditioning.html Oswot, A. (2010, June 9). Subjective Development: Piaget's Concrete Operations. Recovered from Mental Help.net: https://www.mentalhelp.net/articles/intellectual develpment-piaget-s-solid tasks/ Sarah, S. M. (2011, January 25). Social Learning Theory. Recovered from Explorable.com: https://explorable.com/social-learning-hypothesis Weisz, J. R. (2010). Proof Based Psychotherapies for Children and Adolescents. Guilford Press.

Friday, August 7, 2020

Summertime Science

Summertime Science Hey! Remember me? No? Hi. Im Elizabeth. I graduated last June. But here we are, me crufting on the blogs, you not knowing who I am. I never officially said goodbye, and I STILL have that post. Im working on it. Proof: (This is how I brainstorm most of my doodle entries, for those of you who are curious.) But in any case, if you dont know who I am, all you need to know is that I love science (and other things, like bluegrass music, Parks and Rec, and the Oregon Ducks). Another thing on the list of things I love is my brother, Ryan. He is 11. This summer he told me he didnt like science. My reponse? When youre at a place like MIT, its easy to forget that people have actually managed to pull off the incredible feat of making science unbelievably boring.  So while I was at home this summer, I did as any nerdy sister would do to remedy the situation of a little brother (who is a total ham) not being jazzed about science. I set up a fake science show where Ryan and I would do experiments in our backyard. Its very nerdy. Its very dorky. Its very embarassing. And its on the internet. Here is episode 2: Did you guys ever do science experiments like this?

Saturday, May 23, 2020

Advantages and Disadvantages of Biometrics - Free Essay Example

Sample details Pages: 22 Words: 6594 Downloads: 7 Date added: 2017/06/26 Category Information Systems Essay Type Analytical essay Did you like this example? ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote convenient methods such as online banking and use of ATM for their customers to access their money strives to ensure only the right person has access to the account. Also, military and national security services store high sensitive and critical information that must only be accessed by specific individual thereby deploying security measures to keep this tradition. Don’t waste time! Our writers will create an original "Advantages and Disadvantages of Biometrics" essay for you Create order However, achieving these goals largely depends on securing and controlling the assets as documented which means only authorised individuals have access to these environments and eventually the assets. Sequel to the importance of access control, different security techniques have been deployed to safeguard these assets which ranges from PINs and passwords, ID cards, smart card est. Vulnerabilities to these methods have lead to the recent surge in biometrics industry as many believe this is the future. Reasons such that the physical presence of the authorized person is needed at the point of access and also, the fact that it is unique and almost impossible to duplicate emphasis the benefit of biometrics and explain its glooming popularity. However like any other security methods, biometrics has limitations and threats which can impact its effectiveness and efficiency. It is not suitable for every application and can be a very wrong choice for certain applications. Therefore, it i s essential to manage these limitations and threats properly to enhance the success factor of biometrics. Finally, it is important for any sector deploying biometrics to understand the various issues associated with biometrics such as privacy, standards and what the law requires of biometrics. CHAPTER ONE INTRODUCTION Organizations strive to secure their assets and provide means of controlling access to these assets. This process requires identification and authorization to ensure the right person is accessing the right asset. Over the years, traditional methods of authentication, mainly passwords and personal identification numbers (PINs) have been popularly used. Recently, swipe card and PINs have been deployed for more security since one is something you have and the latter something you know. However, these methods still have vulnerabilities as swipe card can be stolen. Also, bad management of passwords has left people writing them on papers and desks or simply choosing easy and general words for quick remembrance which expose the password to intruders. More recently, stronger identification and authorization technologies that can assure a person is who he claims to be are becoming prominent and biometrics can be classified to this category. Biometric technology makes use of a persons phy siological or behavioral characteristics in identification. Every human being is unique in nature and possesses physical parts completely different from any other person. The September 11, 2001 terrorist attack did not help security concerns as governments and organizations all around the world especially the border security agencies have greatly embraced this human recognition technology. As both private and public entities continue to search for a more reliable identification and authentication methods, biometrics has been the choice and considered the future. WHAT IS BIOMETRICS? Biometrics refers to the automatic identifications of a person based on his or her physiological or behavioral characteristics (Chirillo and Blaul 2003, p. 2). It is an authorization method that verifies or identifies a user based on what they are before authorizing access. The search for a more reliable authorization method to secure assets has lead to the revelation of biometrics and many organizations have shown interest in the technology. Two main types of biometrics have been used mainly physical and behavioral. A physical biometrics is a part of a persons body while, a behavioral biometric is something that a person does (Lockie 2002, p. 8). He added that although there are some more unusual biometrics which may be used in the future, including a persons unique smell, the shape of their ear or even the way they talk, the main biometrics being measured include fingerprints, hand geometry, retina scan, iris scan, facial location or recognition (all physical), voice recogniti on, signature, keystroke pattern and gait (Behavioral). However, it has been argued by Liu and Silverman (2001) that different applications require different biometrics as there is no supreme or best biometric technology. HISTORY OF BIOMETRICS According to Chirillo and Blaul (2003, p. 3) the term biometrics is derived from the Greek words bio (life) and metric (to measure). China is among the first known to practice biometrics back in the fourteenth century as reported by the Portuguese historian Joao de Barros. It was called member-printing where the childrens palms as well as the footprints were stamped on paper with ink to identify each baby. Alphonse Bertillon, a Paris based anthropologist and police desk clerk was trying to find a way of identifying convicts in the 1890s decided to research on biometrics. He came up with measuring body lengths and was relevant till it was proved to be prone to error as many people shared the same measurement. The police started using fingerprinting developed based on the Chinese methods used century before by Richard Edward Henry, who was working at the Scotland Yard. Raina, Orlans and Woodward (2003, p. 25-26) stated references to biometrics as a concept could be traced back to over a thousand years in East Asia where potters placed their fingerprints on their wares as an early form of brand identity. They also pointed Egypts Nile Valley where traders were formally identified based on physical characteristics such as eye color, complexion and also height. The information were used by merchant to identify trusted traders whom they had successfully transacted business with in the past. Kapil et al also made references to the Bible, first pointing to the faith Gileadites had in their biometric system as reported in The Book of Judges (12:5-6) that the men of Gilead identified enemy in their midst by making suspected Ephraimites say Shibboleth for they could not pronounce it right. The second reference is to The Book of Genesis (27:11-28) where Jacob pretended to be Esau by putting goat skins on his hands and back of his neck so his skin would feel hairy to his blind, aged fathers touch. This illustrates a case of biometric spoofing and false acceptance. They finally wrote Biometrics as a commercial, modern technology has been around since the early 1970s when the first commercially available device was brought to market (p. 26). HOW BIOMETRICS SYSTEMS WORK A biometric system is essentially a pattern-recognition system that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristics possessed by the user (Blaul 2003, p.3). Biometrics has so far been developed to work in two ways mainly verification and identification. Verification systems are designed to give answer to the question, Am I who I claim to be? by requiring that a user claim an identity in order for a biometric comparison to be performed. The user provides data, which is then compared to his or her enrolled biometric data. Identification systems gives answer to the question, who am I? and do not require a user to claim an identity as the provided biometric data is compared to data from a number of users to find a match (Nanavati 2002, p. 12). An illustration of a scenario using an identifying biometrics system is given below and thus gives an answer to the question Who am I? In October 1998 in the Unite d Kingdom, Newham Council introduced face recognition software to 12 town centre cameras with the sole purpose of decreasing street robbery. Images are compared against a police database of over 100 convicted street robbers known to be active in the previous 12 weeks. In August 2001, 527,000 separate faces were detected and operators confirmed 90 matches against the database. Where a face is not identified with any in the database, the image is deleted; if a match is found a human operator checks the result. The introduction of face recognition technology to Newham city centre saw a 34% decrease in street robbery. The system has not led directly to any arrests, which suggests that its effect is largely due to the deterrence/displacement of crime. The face recognition system has been widely publicised by the council and 93% of residents support its introduction (Postnote Nov 2001, p. 1). The case study below illustrates a verifying biometrics system and supply answers to the quest ion Am I who I claim to be? The US Immigration and Naturalization Service Passenger Accelerated Service System (INSPASS) has been introduced at eight airports in order to provide a quick immigration processing for authorised frequent flyers entering the US and Canada. On arrival at an airport, a traveller inserts a card that carries a record of their hand geometry into the INSPASS kiosk and places their hand on a biometric reader. A computer cross-references the information stored on the card at registration with the live hand geometry scan. The complete process takes less than 30 seconds. If the scans match, the traveller can proceed to customs; if not, travellers are referred to an Immigration Inspector. There are more than 45,000 active INSPASS users with, on average, 20,000 automated immigration inspections conducted each month (Postnote Nov 2001, p. 1). Verifying system is often referred to as a one-to-one process and generally takes less processing time compared to the i dentifying systems. This is due to the fact that in identifying systems, a user is compared to all users in the database (one-to-many). Verifying systems are also more accurate since they only have to match a users data against his or her stored data and do not need hundreds, thousands or even millions of comparisons like the identifying systems. However, it is important for an organization to decide the type appropriate for the applications. RESEARCH METHODOLOGY The research methodology designed for this dissertation is mainly the qualitative approach. A quantitative approach has been overlooked due to limited time as designing surveys, distribution take time and response time could not be predicted. Therefore, my effort will be concentrated on critically reviewing previous literatures in order to acquire an overview of, and intakes on the topic. For more details, Journals, Books, Publications, Documentaries and previous dissertations related to the topic will be reviewed, compared and analyzed. The objectives will be achieved by purely reviewing literatures and previous researches and the literatures critically analyzed by comparing information obtained from different sources. Findings, recommendations and conclusions will be made from the analysis. OBJECTIVES OF THE STUDY The main aim of this research focus on critically analysis of biometric security as an emerging and booming industry by examining the positives and negatives and providing ways of improving the method effectively and most importantly efficiently. Since biometrics applies to many applications, access control will be the main focus of this dessertation. Also, issues such as privacy, laws governing biometrics and standards will be examined. The main objectives of this research are; To review biometric security and issues related to it. To evaluate the threats, advantages and disadvantages of biometrics. To propose ways of improving the effectiveness and efficiency of biometrics from previous researches. CHAPTER 2 LITERATURE REVIEW This chapter is aimed at critically reviewing and analysis of numerous works of researchers in the area of biometrics, threats to biometrics, advantages and disadvantages and ways of improving biometrics efficiency in access control. The effect of privacy (human rights) and the need to conform to biometrics standards will also be examined and reviewed. DEFINITION OF BIOMETRICS According to Jain, Ross and Pankanti (2006, p. 125), one great concern in our vastly interconnected society is establishing identity. Systems need to know Is he who he claims he is, Is she authorized to use this resource? or simply who is this? Therefore, a wide range of systems require reliable personal recognition schemes to either verify or identify of an individual seeking access to their services. The purpose of that scheme is to ensure that the rendered services are accessed by only the authorized and not any intruder or imposer (Ross 2004, p. 1). Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and, or behavioral characteristics (Jain, 2004 p. 1). Woodward (2003, p. 27) cited biometric industry guru Ben Millers 1987 biometric definition: Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physical or behavioral characteristic. Shoniregun and Crosier (2008, p. 10) provided several definitions of biometrics which include: Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological science. Biometrics = identification/verification of persons based on the unique physiological or behavioral features of humans. Biometrics is the measurement and matching of biological characteristics such as fingerprint images, hand geometry, facial recognition, etc. Biometrics is strongly linked to a stored identity to the physical person. Nevertheless the various definitions, it can be seen that the science of biometrics is based on the fact that no two people are the same and this has a significant influence on its reliability and success factor. THE BIOMETRICS INDUSTRY According to Lockie (2002, p. 10), the biometric industry did not really get established until the middle of the twentieth century. The researchers at that particular time were investigating whether various human parts and characteristics, such as the iris or the voice, could be used to identify an individual. This was made public by publishing papers and as a considerable number of these strands of research began to form a piece, the biometrics industry as we know it these days was established. As organization search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention (Liu 2001, p.27). Higgins, Orlan and Woodward (2003, p. xxiii ), emphasized that even though biometrics have not become an essential part of all systems requiring controlled access, the emerging industry has come a long way from its modern founding in 1972 with the installation of a commercial finger measurement device o n Wall Street. He made reference to the highly respected MIT Technology Review called biometrics one of the top ten emerging technologies that will change the world. The growth in biometric industries is reflected in the numbers. The trio cited Rick Noton, the executive director of the International Biometric Industry Association (IBIA), who reported in the Biometrics 2002 Conference in London, United Kingdom, that the industrys trade association has indicated the surge in biometric revenues over recent years. From $20 million in 1996, it has increased to $200 million in 2001 and Norton believes they will increase as the years pass on significantly in 5 years time. Also, a forecast made by the International Biometric Group (IBG), which is a biometric consulting and integration firm located in New York City, estimate that biometric revenues totaled $399 million in 2000 and will increase to $1.9 billion by 2005. Both IBIA and IBG believe that the private sector will be responsib le for much of the growth. These give evidence of the relevance of biometrics in organizations in modern times. BIOMETRICS AND ACCESS CONTROL Over the years, biometrics has evolved rapidly and many vertical markets such as governments, transport, financial sectors, security, public justice and safety, healthcare and many more have adopted biometrics. Due to this wide range of users, biometrics has been deployed to many applications. Biometrics has been of high benefit to organization as they seek a reliable security method to safeguard assets. Fully understanding how biometrics work, it can be said that the ultimate aim of applying biometrics in the vertical markets listed above is to control access to a resource irrespective of the system used whether a verifying or an identifying process It has been stated by S. Nanavati, Thieme and R. Nanavati (2002, p. 14), that biometric systems are deployed for two primary purposes which are physical and logical access. LOGICAL VERSUS PHYSICAL ACCESS Physical access systems monitors, restricts, or grant movement of a person or object into or out of a specific area (Thieme 2002, p. 14). This could be implemented to control entry into rooms or even the main building. Popular examples are control towers, bank vaults, server rooms and many other sensitive rooms requiring controlled access. In physical access, biometrics replaces the use of keys, PIN codes access cards and security guards although any of these could be combined with biometrics as a complementation. Common physical access application is time and attendance. Thieme also gave a definition of logical access systems as one that monitor, restrict or grant access to data or information listing examples such as logging into a PC, accessing data stored on a network, accessing an account, or authenticating a transaction. In this case, biometrics replaces and can be designed to complement PINs, passwords and also tokens. Basic biometric functionality precisely acquiring and comparing of biometric data is often identical in both physical and logical systems. For example, the same iris scan data can be used for both doorway and desktop applications. Thieme explained that the only difference between the two is the external system into which the biometric functionality is integrated. The biometric functionality is integrated into a larger system. This applies for both physical and logical access system and actions such as access to any desktop application or access to a room via a doorway are effected by a biometric match. However, not every system can be classified as physical or logical access as the end result does not indicate access to data or a physical location and the result therefore may be to investigate more. An ATM secured by biometrics allows access to money, a physical entity. This is made possible by allowing the user logical access to his or her data. In the example above, the application is even difficult to classify as either physi cal or logical. Thieme (2002, p. 15) suggested that the distinction between physical and logical access systems is a valuable tool in understanding biometric. He noted that key criteria such accuracy, fallback procedures, privacy requirements, costs, response time and complexity of integration all vary effectively when moving from logical to physical access. WHAT ARE BIOMETRIC STANDARDS Stapleton (2003, p. 167) defined a standard in a general term as a published document, developed by a recognized authority, which defines a set of policies and practices, technical or security requirements, techniques or mechanisms, or describes some other abstract concept or model. The growth of the biometric industry has been relatively slowed by the absence of industry wide standards and this has also impeded various types of biometric deployment. Nanavati (2002, p. 277) stated that the relative youth of the technology in use, coupled with the disunified nature of the industry, has impacted the developments of standards resulting in a sporadic and frequently redundant standards. Nanavati also noted that the live-scan fingerprint imaging is the only segment of biometric industry with widely accepted and adopted standards. Due to this absence of biometric standards, some institutions have been concerned of being tied into technologies they actually believed as not mature or even d evelopmental. However in an effort to actively address the standards issue, the biometric industry has finalized some blueprints and the process of getting industries to accept these standards is ongoing WHY IS STANDARDIZATION NECESSARY? The high rate of biometric development and rapid growth in adoption of biometric technologies in recent years has resulted in ever-increasing levels of what is expected in terms of accuracy, adaptability, and reliability in an ever-wider range of applications. Due to the adoption of biometric technologies in large-scale national and international applications, involving a potentially unlimited range of stakeholders, Farzin Deravi (2008, p. 483) stated that it has become essential to address these expectations by ensuring agreed common frameworks for implementation and evaluation of biometric technologies through standardization activities. Majority of biometric systems, including both the hardware and software are made and sold by the owner of the patent at this stage in their development. They are being proprietary in numerous aspects including the manner in which biometric devices and systems as a whole communicate with applications, the method of extracting features from a bi ometric sample, and among many more, the method of storing and retrieving biometric data. This resulted in many companies in most cases, being wedded to a particular technology, once they agree to implement that particular technology. Nanavati (2002, p. 278) stated that in order to incorporate a new technology, the companies are required to rebuild their system from scratch upward, and in some cases duplicating much of the deployment effort. Deravi (2008 p. 483) noted that the need for interoperability of biometric systems across national boundaries has implied a rapid escalation of standardization efforts to the international arena, stating that the sense of urgency for the need for standardization has been the priority of internal security concerns. The industry wide or universal adoption of biometric standard will not make biometric technology interoperable at least, to the state where an old device can be replaced by a new device without rebuilding the system. However, Nan avati (2002 p. 278) argued the core algorithms through which vendors locate and extract biometric data are very unlikely to be interoperable or standardized, the reason being that these algorithms represents the basis of most vendors intellectual property. Numerous reasons are responsible for the motivation towards standardization. These include the desire for reducing the overall cost of deploying biometrics technologies and optimize the reliability of biometric systems, to reduce the risk of deploying solutions to biometric problems, to ensure in the area of encryption and file format, that the basic building blocks of biometric data management have been developed based on best practice by industry professionals. Nanavati (2002 p. 278) concluded that standards ensure that, in the future, biometric technology will be developed and deployed in accordance with generally accepted principles of information technology. EXISTING BIOMETRIC STANDARDS Shoniregun and Crosier (2008 p. 22) stated that the evolving interest and developments have made developments of standards a necessity with the sole aim of allowing compatibility of different systems. The detailed standards in the Biometrics Resource Centre (2002) report are summarised below: Common Biometric Exchange File Format (CBEFF): The Common Biometric Exchange File Format (CBEFF) sets a standard for the data elements essential in supporting biometric technology in a common way irrespective of the application involved or the domain in use. It makes data interchange between systems and their components easier, while promoting interoperability applications, programs as well as systems based on biometrics. INCITS MI-Biometrics Technical Committee: The committee which was established by the Executive Board of the International Committee for Information Technology standards (INCITS) with the responsibility to ensure a focused and reasonably comprehensive approach in the United States for the rapid development and approval of previous national and international generic biometric standards (Shoniregun ad Crosier 2008, p. 22) BioAPI Specification (Version 1.1): The BioAPI standard defines the architecture for biometric systems integration in a single computer system. (Deravi 2008, p. 490). The Bio API specification has been one of the most popular standards efforts since it was formed in April 1998 according to Nanavati (2002, p. 279). Nnavati stated that the standard was formed to develop an API that is both widely accepted and widely available while being compatible with various biometric technologies. Other general standards available are Human Recognition Module (HRS), ANSI/NIST-ITL 1-2000, American Association for Motor Vehicle Administration and American National Standards Institute (ANSI) which specifies the acceptable security requirements necessary for effective management of biometric data especially for the financial services industry. BRITISH BIOMETRICS STANDARDS The British Standards Institution (BSI) commenced work in June 2004 on biometrics standards and since then, has published according to Shoniregun and Crosier (2008, p. 24) a set of four new BS ISO/IEC 19794 STANDARDS, reported to have covered the science of biometrics, and using biological characteristics in identifying individuals. The objective of publishing these standards is to promote interoperability between the several products in the market. BS ISO/IEC 19784-2:2007: This standard defines the interface to an archive Biometric Function Provider (BFP). The interface assumes that the collected biometrics data will be managed as a database, irrespective of its physical realization. Crosier (2008, p. 24) defined the physical realization as smartcards, token, memory sticks, files on hard drives and any other kind of memory can be handled via an abstraction layer presenting a database interface.) BS ISO/IEC 19795-2:2006: According to Shoniregun (2008, p. 25), this standard provides recommendations and requirements on collection of data, analysis as well as reporting specific to two types of evaluation (scenario evaluation and technology evaluation). BS ISO/IEC 19795-2:2006 further specifies the requirements in the development and full description of protocols for scenario and technology evaluations and also, in executing and reporting biometric evaluations. BS ISO/IEC 24709-1:2007: ISO/IEC 24709-1:2007 specifies the concepts, framework, test methods and criteria required to test conformity of biometric products claiming conformance to BioAPI (ISO/IEC 19784-1). (www.iso.org). Crosier (2008, p. 25) stated ISO/IEC 24709-1:2007 specifies three conformance testing models which allows conformance testing of each of the BioAPI components mainly a framework, an application and a BSP. BS ISO/IEC 24709-2:2007: The standard BS ISO/IEC 247 defines a number of test assertions composed in the assertion language explicitly required in ISO/IEC 24709-1. The assertions allow a user to test the conformance of any biometric server producer (BSP) that claims to be a conforming implementation of that International Standard to ISO/IEC 19784-1 (BioAPI 2.0) (www.iso.org). BIOMETRICS AND PRIVACY The fact that biometric technologies are based on measuring physiological or behavioral and archiving these data has raised concerns on privacy risks, and also raised discussion on the role biometrics play when it comes to privacy. As stated by Nanavati (2002, p. 237), increase in the use of biometric technology in the public sector, workplace and even at home has raised the following questions: What are the main privacy concerns relating to biometric usage? What kinds of biometric deployments need stronger protections to avoid invading privacy? What biometric technologies are more prone to privacy-invasive usage? What kinds of protections are required to ensure biometrics are used in a non privacy-invasive way? Woodward (2003, p. 197) cited President Clintons speech in his commencement address at Morgan State University in 1997: The right to privacy is one of our most cherished freedomsWe must develop new protections for privacy in the face of new technological reality. Recently, Biometrics has been increasingly deployed to improve security and a very important tool to combat terrorism. Privacy issue is central to biometrics and many people believe that deploying biometrics poses a considerable level of risk to human rights, even though some are of the opinion that biometrics actually protect privacy. Human factors influence the success of a biometric-based identification system to a great extent. The ease as well as comfort in interaction with a biometric system contributes to how people accept it. Jain, Ross and Prabhakar (2004 p. 24) stated an example of a biometric system being able to measure the characteristic of a users without touching, such as those using voice, face, or iris, and concluded that it may be perceived to be a more user-friendly and hygienic system by the users. They added that on the other hand, biometric characteristics not requiring user participation or interaction can be recorded without the knowledge of the user, and this is perceived as a threat to human privacy by many individuals. According to Sim (2009, p. 81), biometrics compared to other security technologies has significant impacts on users privacy (Civil Liberties). It can protect privacy when deployed in an appropriate manner; but when misused, it can result in loss of privacy. ADVANTAGES OF BIOMETRIC OVER TRADITIONAL METHODS Password and PINs have been the most frequently used authentication method. Their use involves controlling access to a building or a room, securing access to computers, network, the applications on the personal computers and many more. In some higher security applications, handheld tokens such as key fobs and smart cards have been deployed. Due to some problems related to these methods, the suitability and reliability of these authentication technologies have been questioned especially in this modern world with modern applications. Biometrics offer some benefits compare to these authentication technologies. INCREASED SECURITY Biometric technology can provide a higher degree of security compared to traditional authentication methods. Chirillo (2003 p. 2) stated that biometrics is preferred over traditional methods for many reasons which include the fact that the physical presence of the authorized person is required at the point of identification. This means that only the authorized person has access to the resources. Effort by people to manage several passwords has left many choosing easy or general words, with considerable number writing them in conspicuous places. This vulnerability leads to passwords easily guessed and compromised. Also, tokens can be easily stolen as it is something you have. By contrast, it is almost impossible for biometrics data to be guessed or even stolen in the same manner as token or passwords. Nanavati (2002 p. 4) was of the opinion that although some biometric systems can be broken under certain conditions, todays biometric systems are highly unlikely to be fooled by a p icture of a face He further added that this is based on the assumption that the imposter has been able to successfully gather these physical characteristics which he concluded as unlikely in most cases. INCREASED CONVENIENCE One major reason passwords are sometimes kept simple is because they can be easily forgotten. To increase security, many computer users are mandated to manage several passwords and this increases the tendency to forget them. Card and tokens can be stolen and forgotten as well even though attaching them to keyholders or chains can reduce the risk. Because biometric technologies are based on something you are, it makes them almost impossible to forgot or manage. This characteristic allows biometrics to offer much convenience than other systems which are based on having to keep possession of cards or remembering several passwords. Biometrics can greatly simplify the whole process involved in authentication which reduces the burden on user as well as the system administrator (For PC applications where biometrics replaces multiple passwords). Nanavati (2002 p. 5) stated that Biometric authentication also allows for the association of higher levels of rights and privileges with a succ essful authentication. He further explained that information of high sensitivity can be made more readily available on a network which is biometrically protected than one which is password protected. This can increase convenience as a user can access otherwise protected data without any need of human intervention. INCREASED ACCOUNTABILITY Traditional authentication methods such as tokens, passwords and PINs can be shared thereby increasing the possibility of unaccountable access, even though it might be authorized. Many organizations share common passwords among administrators for the purpose of facilitating system administration. Unluckily, because there is uncertainty as to who at a particular point in time is using the shared password or token, accountability of any action is greatly reduced. Also, the user of a shared password or token may not be authorized and sharing makes it even hard to verify, the security (especially confidentiality and integrity) of the system is also reduced. Increase in security awareness in organizations and the applications being used has led to the need for strong and reliable auditing and reporting. Deploying biometrics to secure access to computers and other facilities eliminates occurrence such as buddy-punching and therefore provides a great level of certainty as to who access ed what computer at what point in time. DISADVANTAGES OF BIOMETRICS PROCESSES OF BIOMETRICS COMMON BIOMETRICS Biometric technologies can either be physiological or behavioral. Physical biometrics includes fingerprint, facial recognition, hand geometry, iris scan, and retina scan. Voice recognition, signature and keystroke are all examples of behavioral biometrics. The commonly used biometrics are briefly described below. FINGERPRINTING Fingerprints are the impressions of the papillary or friction ridges on the surfaces of the hand (Higgins 2003, p.45). He stated further fingerprints are the oldest and most widely recognized biometric markers. This statement is backed by Chirillo and Blaul (2003, p. 4) who stated that fingerprint recognition is one of the oldest biometric technologies. Lockie (2002, p. 16) also stated that fingerprints are the most commonly used biometric. Fingerprints have been used by humans for personal identification and access control for centuries. The matching accuracy using the biometric type has shown very high figure. Fingerprints of even identical twins are different and so are the prints on each finger of the same person which increases the rate of accuracy. According to postnote (2001), at a national level, automated fingerprinting is the only biometric used generally in the United Kingdom. An investigative project, which was to be completed by April 2002, was looking at the con cept of using a single biometric identifier, likely to be fingerprints by default, throughout the Criminal Justice System including police, prisons and courts. Prisons already take ink fingerprints from convicted prisoners. These can be compared against the police database as proof that the right person is being held. An automated system would give rapid confirmation of a persons identity and allow Information about individuals to be shared quickly and easily. Below are some strengths and weaknesses of fingerprinting according to Nanavati (2002 p. 45). Strengths of deploying fingerprint technology include: It can be used in a range of environment. It is a mature and proven core technology capable of high level accuracy. It employs ergonomic and easy-to-use devices. The ability to enrol multiple fingers can increase system accuracy and flexibility. Weaknesses of fingerprint technology include: Most devices are unable to enrol some small percentage of users. Performance can deteriorate over time. It is associated with forensic applications. FACE RECOGNITION Facial scan technology employs distinctive features of the human face in order to identify or verify a user. Face appearance is particularly, a compelling biometric because of its everyday use by nearly everyone as the primary source of recognizing other humans. It is more acceptable than most biometrics because of its naturalness. Faces have been institutionalized as a guarantor of identity in identity cards and passports since photography became prominent. However, Chirillo Blaul (2003 p. 55) stated that most face recognition and identification devices do not indeed perform a scan but instead, capture an image of the face in a video or picture format. He further added that the information is converted to a template or a data representation of the captured information, while the initial information is stored. After this process, subsequent scanned faces can then be compared to the original captured faces. Strengths and weaknesses of face recognition technology are given bel ow according to Nanavati (2002 p. 63). Strengths of facial recognition include: It is capable of leveraging existing image acquisition equipment. It is capable of searching against static image such as passports and drivers license photographs. It is the only biometric capable of operating without user cooperation. Weaknesses of this technology include: Matching accuracy is reduced by change in acquisition environment. Matching accuracy is also reduced by changes in physiological characteristics. Tendency of privacy abuse is high due to non-cooperative enrollment and identification capabilities. IRIS-SCAN Bolle et al (2004 p. 43) defined iris as the colored part of the eye bounded by the pupil and sclera. He added that iris has been purported as a universal biometric identifier with very good discriminating characteristics. Iris-scan technology uses the distinctive characteristics of the human iris in order identify or verify the identity of the users. Nanavati (2002 p. 77) stated that Iris-scan technology has the potential to play a major or large role in the biometric marketplace if real-world systems as well as solutions meet the theoretical promise of this technology. He further added that Iris-scan technology has been successfully deployed in high-security physical access applications, ATMs and also kiosks for banking and travel applications. The technology is also being positioned for desktop usage. Nanavati (2002) stated some strengths and weaknesses of Iris-scan technology. Strengths of Iris-scan technology: It has the potential for exceptionally high levels of accuracy. It is capable of reliable verification as well as identification. It maintains stability of characteristics over a lifetime frame. Weaknesses of Iris-scan technology: It has a propensity for false rejection. Acquisition of the images requires moderate attentiveness and training. Some users exhibit a certain degree of discomfort with eye-based technology. A proprietary acquisition device is required for deployment. VOICE RECOGNITION; VOICE SCAN According to Chirillo Blaul (2003, p. 201), Voice recognition actually s comprised of two different types of technology which are voice scan and speech recognition. They explained further that voice-scan is deployed to authenticate a user based on his or her voice characteristics; while on the other hand, speech recognition is used for the technological comprehension of spoken words. Voice-scan technology makes use of the distinctive aspects of the voice to identify or verify the identity of users. Voice-scan is sometimes taken as speech recognition, a technology that works by translating what a user is saying (the process in speech recognition is unrelated to authentication). Nanavati (2002, p. 87) described voice-scan technology as one that verifies the identity of the user who is speaking. Bolle et al (2003, p. 40) stated that similar to face appearance, voice-scan (also known as voice recognition) is often used due to its prevalence in human communication and its day to day use. They further added that voice is a behavioral biometric but it depends on some underlying physical traits, which govern the type of speech signals we are able and likely to utter. Examples of these physical traits are the fundamental frequency (which is a function of the vocal tract length), cadence, nasal tone. Nanavati (2002, p. 87) stated the strengths and weaknesses of voice-scan. Strengths of voice-scan technology: It is capable of leveraging telephony infrastructure. It effectively layers with other processes such as speech recognition and verbal passwords. It generally lacks the negative perceptions associated with other biometrics. Weaknesses of voice-scan technology: It is potentially more susceptible to replay attacks than other biometrics. Its accuracy is challenged by low-quality capture devices, ambient noise, etc. The success of voice-scan as a PC solution requires users to develop new habits. The large size of the template limits the number of potential applications. HAND-SCAN Hand -scan is one of the most established biometric technologies. It has been in use for years in several applications especially for verification of individuals. According to Nanavati (2002, p. 99), hand-scan technology make use of the distinctive parts of the hand particularly, the height and the width of the back of the hand as well as the finger. Hand-scan is more of an application specific solution than majorities of biometric technologies and is used exclusively for physical access and also, time and attendance applications. Although hand-scan geometry biometrics is still a technology that is growing slowly, Chirillo Blaul (2003, p. 145) stated that estimates forecast revenues to increase to approximately $50 million in 2005, which is approximately 2 to 5 percent of the whole biometric market. They gave primary reason for the minimal forecast as limited usages and aptness mainly for access control and time and attendance applications. Nanavati (2002, p. 99) stated the strengths and weaknesses of hand-scan technology. Strengths of hand-scan technology: It is able to operate in challenging environments. It is an established, reliable core technology. It is generally perceived as non intrusive. It is based on relatively stable physiological characteristics. Weaknesses of hand-scan technology: It has limited accuracy. The form factor limits the scope of potential applications. The ergonomic design limits usage by certain populations. Chirillo Blaul (2003, p. 146) stated cost as a weakness stating that approximately, hand-scan reader cost $1,400 to $2000, placing the devices towards the high end of the physical security spectrum. WHERE NOT TO USE BIOMETRICS Biometrics offer great amount of benefits in safeguarding systems and is perceived as more reliable than other security techniques (traditional security methods). However, biometric technologies are not the perfect security to be deployed for every application and in some cases biometric authentication is just not the right solution. One of the major challenges facing the biometric industry is defining those environments in which biometrics offer the strongest benefits to both individuals and institutions, and then showing that the benefits of deployment outweigh the risk as well as the costs (Nanavati 2002, p. 7).

Tuesday, May 12, 2020

Your Rights and Responsibilities As a New U.S. Citizen

Becoming an American citizen with all the freedoms and opportunities the nation has to offer is the dream of many immigrants. Those who are fortunate enough to be in a position to pursue naturalization gain the same rights and privileges of citizenship as natural-born American citizens except one: Naturalized U.S. citizens are not eligible for the offices of the president of the United States and vice president. With these new rights, citizenship also brings with it some important responsibilities. As a new U.S. citizen, it is your duty to you give back to your adopted nation by fulfilling these responsibilities. Rights of Citizens Vote in elections: While voting isnt mandatory, it is a vital part of any democracy. And as a new citizen, your voice is as important as every other.Serve on a jury: Unlike voting, jury duty is mandatory if you receive a summons to serve. You might also be called be called to be a witness at a trial.Fair speedy trial if accused of a crime: This right is technically is also extended to non-citizens.Bring family members to the United States: Once you become a citizen, you can sponsor other family members to join you as green card holders. While green card holders can sponsor only a spouse or child to live with them in the United States, citizens can also sponsor parents, siblings, or other relatives.Obtain citizenship for children born abroadTravel with a U.S. passport: More than 100 countries allow American citizens to travel inside their borders for a specific amount of time without a visa if they have a U.S. passport.Run for federal office: Once you are a U.S. citizen you are qualif ied to run for any local, state or federal office, except president and vice president of the United States. Those two offices require a person to be a natural-born citizen.Become eligible for federal grants and scholarshipsApply for federal employment that requires U.S. citizenshipFreedom to express yourself: Again, this freedom is granted to non-citizens and visitors in America as well, but as a new citizen, it is now enshrined as a special right.Freedom to worship however you wish (or to refrain from worship): As said before, this right is granted to anyone on American soil, but as a citizen, you can now claim the right as something all your own.Registering with Selective Service: All males ages 18 to 25, even if non-citizens, must register with Selective Service, the program used if a military draft is ever re-initiated. Responsibilities of Citizens Support and defend the Constitution: This is part of your oath taken when you became a citizen. You now bear your allegiance to your new country.Serve the country when required: This could represent taking up arms, noncombat military service or work of national importance under civilian direction when required by the law, according to the U.S. Citizenship and Immigration Services.Participate in the democratic process: More than just voting, this involves getting involved in causes or political campaigns you believe in.Respect and obey federal, state, and local lawsRespect the rights, beliefs, and opinions of others: This is a bedrock of American society.Participate in your local community: Your fellow citizens need you as much as you need them.Be informed on issues that affect your communityPay local, state, and federal income taxes honestly and on time

Wednesday, May 6, 2020

Pirates of the Caribbean Critical Essay Free Essays

A key character that ensures we enjoy the film throughout is captin jack sparrow. The first time we meet jack he is portrayed as a powerful figure standing tall on top of his ship. As the scene progresses we see that he is drunk and unorganised sailing on his own on a sinking boat. We will write a custom essay sample on Pirates of the Caribbean Critical Essay or any similar topic only for you Order Now The director shows us this by using a wide array of camera shots and other techniques. When we first see jack he is standing on top of his ship. Although he is standing tall and proud his clothes are weather beaten and he has clearly been at sea for a long time. The low angle camera shots that the director uses help the impression that he is powerful and strong. The director also uses an over the shoulder shot to help connect the audience to jack. The director then thatters this illusion by panning down the mast to reveal that he is on a small boat, that is quickly taking on water ,all on his own. The director does this to make jack an instantly likeable character and to make us want to fing out more about him. The change from jack being a drunk to a skilled swordfighter makes the character of jackmore interesting. The second time we meet jack he is in the blacksmiths where William turner is an apprentice. The camera angle that the director uses a wide shot so that you see that the workshop is small and to emphasize that he is agile and quick. The director does this so we find out slightly more about jack and become more interested. Through out the film jack is portrayed as an anti- hero and this is emphisized as jack does not want to shoot will as he says ‘’this bullet is not ment for you ‘’ meaning he went to port royal with a mission. The director does this to reveal a major plot point. he director of â€Å"the pirates of the caribbean† portrays miss elizabeth swann as a naive and dependent girl but this impression is ruined the second time we meet her. in the first encounter we see elizabeth trying on a dress her father has bought her from london. she seems very feminine, well educated and wealthy but she has something to hide. a medallion she had taken off of will whe she and her majestys navy first found him. this adds to the enjoyment of the film by adding a twist that changes the whole story as this medallion lands elizabeth and the man she loves in alot of trouble. Read Critical Essay about Skurzynski’s Nethergrave In this scene she appears quite rebellious in the way she wants will to speak to her using her first name instead of miss swann but will has to remind her that this cannot happen because there is a difference between their two classes. the director does significant and clever he has elizabeth standing at the top of a stair case and will at the bottom during this conversation subtly  signifying that elizabeth is of a higher class but as the conversation progresses elizabeth walks down the staircase as she thinks that her and will are of the same class. he reason elizabeth treats will like this is because ever since  she laid her eyes on him six years ago on the crossing from england to port royal she hhas loved him madly. howthis makesthe film more enjoyable is by putting in a romantic element to the story meaning the two cant live with out the other so they are both trying to save the other by putting their own lives on the line creating excitement and suspense. How to cite Pirates of the Caribbean Critical Essay, Essays

Friday, May 1, 2020

Behavioral Structures Of Captive Animals †Myassignmenthelp.Com

Question: Discuss About The Behavioral Structures Of Captive Animals? Answer: Introducation Environment enrichment is the concept that defines that environments of captive animals can be changed for the benefits of the animals. This also describes the behavioral enrichment. Alternatively, it also refers to the process of improving or enhancing the zoo animal environment. Practically it is implicated to increase the behavioral diversity, reduce the frequencies of the abnormal traits and thus increase their positive utilization of environment (Young, 2013). Environment enrichment is taken to improve animal welfare of the captive species. For many years, this has been the popular area of research and has interested t animal keepers, carers, industrial professionals. The captive animals are those which are kept under the human care. The environment enrichment is more impoverished in terms of sensory cues. Research was made in area focusing on the auditory, olfactory and visual methods of sensory stimulation zoo animals. The sensory stimulations results to changes suggest that the environment enrichment has enhanced the welfare of the physical and psychological welfare (Keen et al, 2014). The zoo housed animals mainly need environment enrichment to increase the quality of the captive animals in optimal psychological and physiological well-being of the species. Thus the behavioral enrichment in the environment promotes the reduction of the frequency of the abnormal behaviors. The environment enrichment will increase the better survival of t he zoo animals by increasing their development in behavior, social development. Provide brief details about your chosen species in the wild. What is its natural habitat? Is it endangered? Is it a social or semi-solitary species? (3 marks). Panthera leo is found all over the areas of Africa and Sub Saharan regions. Their preferred habitat is to have a broad habitat tolerance. Their natural habitat can include savannah, woodlands to desert, mountains and they tend to prefer thick bush, scrub, grass that will ensure their cover during hunting. African lions are social animals as they live in groups which are also known as LION PRIDE. The lions are social animals so that they can hunt efficiently, and for raising the cubs, infanticide (Eby et al, 2013). The large family groups of lions which are known as pride comprise of dominant male and a dozen of females with their offspring. Lioness in the group helps for hunting and babysitting duties. Description Of Information On Adelaide Zoo Webpage About Your Species About your species and IUCN Red list (2 marks). The chosen species from the Adelaide zoo is marketing as Vulnerable from IUCN (Riggio et al, 2013). The conservation status reveals that has more likely chance to become endangered and so the circumstances that threaten their survival must be improved. The Vulnerable species occur due to loss of their habitat. From the Aldelaide zoo web page, a huge amount of information and status of the selected species can be found. It has been estimated that 16-30,00 lions are found in the wild. However, new data has revealed that lion can be classified critically endangered in Africa with less than 400 individuals remaining in the sub Saharan Africa. The majestic male African lion, Mujambi has been moved from Mogo zoo to Adelaide zoo in 2007. Mujambi likes the scent based enrichment like the lemon geranium. The lion faces epileptic like seizes. There are lioness duos, Amani, Yizi. The environment enrichment has also been included for them (Szokalski, Foster Litchfield, 2013). About individual animals housed at Adelaide Zoo (2 marks). Adelaide zoo is the house that is made of 3,000 animals and 250 exotic and native mammals, birds, reptiles and fish. They are provided with their natural environment that helps them in their living. They are exhibited over eight hectares of botanic surrounding. The captive ground encloses the species like Sumatran tigers, orangutans. The front entrance has elephant house. It is also the home for giant pandas named Wang Wang and Puni. The botanic feature of the zoo matches with the natural environment of each species housed in Adelaide zoo (Driml, Ballantyne Packer, 2017). It is also famous for a huge collection of birds with the display of different colors. The zoo also provides the environment enrichment strategies required for the survival and ameliorate the problems caused by containment. They have goals to alter the behavior and increasing their psychological space. Description Of One Suitable Enrichment Object Or Technique For Your Species Describe enrichment object or technique (may include drawing or sketch) (3 marks). The enrichment technique is manipulating the environment of the captive species, African lion as such it increases the behavioral diversity. As the favorable habitat suggests that the lions are more suitable for grassland areas. Their habitat can be constructed on that basis. This will include the increase in the physical space and provide the integration for the pride. The impoverished environment will be extended in such a way that will be suitable for their environment (Wierucka Biziuk, 2014). The environment enrichment for the family of big cats that is the African lion can be made by adding them novel food items and presenting them with new items and smell items. This will encourage the increase of the natural behavior of the captive lions. Figure1- The pictorial representation of the environment enrichment of African Lion Source-( Wierucka Biziuk, 2014) safety and other issues considered (3 marks). There can be possibility of dangerous outcome in enrichment strategies when they are taken. They could lead to fatal, hazards for the animals, The enrichment strategy needs to be shaped in such a way that it concerns the safety of the animals. The other issues may be potential harm to the environment (Haniff et al, 2014). If the enrichment strategies are not constructed well then the changes in behavioral pattern of the species may not be effective. Thus there could be issues with the less social interaction among the captive animals. This could further damage the animals behavior and the required outcome may not be noticed. Since the African lion is a social animal, the social interacting environment should be must in maintaining their environment enrichment. References Driml, S., Ballantyne, R., Packer, J. (2017). How Long Does an Economic Impact Last? Tracking the Impact of a New Giant Panda Attraction at an Australian Zoo.Journal of Travel Research,56(5), 613-624. Eby, S., Mosser, A., Swanson, A., Packer, C., Ritchie, M. (2013). The impact of burning on lion Panthera leo habitat choice in an African savanna.Current Zoology,59(3), 335-339. Haniff, D., Chamberlain, A., Moody, L., De Freitas, S. (2014). Virtual environments for mental healthcare issues: a review.Journal of Metabolomics and Systems Biology,3(1), 1-10. Keen, H. A., Nelson, O. L., Robbins, C. T., Evans, M., Shepherdson, D. J., Newberry, R. C. (2014). Validation of a novel cognitive bias task based on difference in quantity of reinforcement for assessing environmental enrichment.Animal cognition,17(3), 529-541. Riggio, J., Jacobson, A., Dollar, L., Bauer, H., Becker, M., Dickman, A., ... Lichtenfeld, L. (2013). The size of savannah Africa: a lions (Panthera leo) view.Biodiversity and Conservation,22(1), 17-35. Szokalski, M. S., Foster, W. K., Litchfield, C. A. (2013). Behavioral Monitoring of Big Cats Involved in Behind-the-Scenes Zoo.International Journal of Comparative Psychology,26(1). Wierucka, M., Biziuk, M. (2014). Application of magnetic nanoparticles for magnetic solid-phase extraction in preparing biological, environmental and food samples.TrAC Trends in Analytical Chemistry,59, 50-58. Young, R. J. (2013).Environmental enrichment for captive animals. John Wiley Sons.