Things To Take Into Consideration When Selecting A Topic For Research Paper
Monday, September 30, 2019
How Does Steinbeck Use The Character Of Crooks To Highlight Certain Issues Essay
1930ââ¬â¢s hit, America lay in financial ruins and deep devastation as the great depression strikes. Causing economic depression throughout the 20th century and leaving many lives in tatters as American citizens face losing money, stock, homes, savings and more importantly jobs. Dealing with unemployment men turn helplessly to migrant working. Moving away from home (if they have one) and getting into manual labour on farms for low pay and a place to stay although it wasnââ¬â¢t structured employment and they found themselves moving from place to place. As Poverty led to working on ranches ââ¬Ëof mice and menââ¬â¢ was born, a novel written in the late 1930ââ¬â¢s to unravel the issues and unfair ways of the 30ââ¬â¢s and the great depression. Highlighting poverty, loneliness, sexism and more importantly Racism, the main theme of the story. Being a major issue Racism swarmed America and started taking over most white peoples heads. Black slavery was behind them but unfortunately racism/discrimination towards different races wasnââ¬â¢t and the Jim Crow laws were soon introduced quickly segregating coloured people and making them outcasts in there own countries. So we were 100 years after slavery, but we were smack bang in the middle of segregation and this, was also not a nice experience for the black race. In a bid to stop the black Americans from being equal, the southern states passed a series of laws known as Jim Crow laws which discriminated against blacks and made sure that they were segregated from whites. Blacks were gradually fired from most jobs and had to use different transport, bathrooms ect. To white people, whites started to rule America. ââ¬ËCrooksââ¬â¢ Is a character Steinbeck created to highlight how unfairly this time was and with no real importance to the story crooks has a major importance in the book as he was put there to show us how wrong segregation really was and how lonely and miss treated these people were. We first get an idea of crooks in chapter two where he is first bought up, not being on the scene yet we get a little picture of what heââ¬â¢s like and what his role is. Candy explains how when the boss is in a bad mood itââ¬â¢s always taken out on the stable buck stating ââ¬Å"Anââ¬â¢ he give the stable buck hell, too'â⬠meaning Crooks, Instantly the first time Crooks is mentioned in the whole book its in a negative way as through innocence heââ¬â¢s treated as if done something wrong. Candy informs George and Lenny why the stable buck gets hell by simply adding on ââ¬Å"ya see the stablebucks a niggerâ⬠in those days racial slurs such as the language used towards black pe ople wasnââ¬â¢t looked upon as bad but looked upon as normal, they were allowed to say things like that whereas now days youââ¬â¢d get in a lot of trouble as racism isnââ¬â¢t accepted. Candy goes on to tell them how Crooks isnââ¬â¢t allowed in the bunk house, the small typically western and simple room full of beds were they all sleep. He isnââ¬â¢t allowed in simply because heââ¬â¢s black and segregation prevents him from doing so as its mixing with white people which was frowned upon at the time. He says ââ¬Å"they let the nigger in that nightâ⬠reminiscing one Christmas when Crooks was allowed in the bunk house ââ¬Å"smitty took after the nigger, done pretty good tooâ⬠he tells of how a white man called smitty decided to beat crooks up just for fun and says ââ¬Å"the guys wouldnââ¬â¢t let him use his feetâ⬠on account of crooks having a crooked back they thought although beating him up for no reason, just entertainment they think its fair because he couldnââ¬â¢t use feet. But were not getting all negative trades from crooks, candy also says ââ¬Å"Nice Fella,too.â⬠ââ¬Å"He Reads a lot, got a lot of books in his roomâ⬠Steinbeck has made crooks intelligent, heââ¬â¢s made it so crooks won the fight against smitty and has made him a ââ¬Ënice guyââ¬â¢ because he wanted to avoid the typical stereotype victim of a black man he does so by giving him pride, identity and not showing major weekness. Heââ¬â¢s also made him crippled to give him more strength and more of a heroic side. It also means heââ¬â¢s trapped at the ranch as it would be rare for any other place to take him in so already before we meet this character we have a lot of sympathy and respect for him and all heââ¬â¢s going through. We finally do get to meet him in chapter 3, although it is fairly brief. Crooks pokes his head through the door of the bunkhouse as he isnââ¬â¢t allowed to step into it, knowing he cant step any further he calls slim but instead of saying slim he says ââ¬Å"Mr slimâ⬠, black people had to formally address white people so crooks was expected to use Mr and Mrs or Maââ¬â¢am and Sir when approaching a white person, if approaching one at all otherwise heââ¬â¢d get in a lot of trouble and maybe be hung, he was thought to respect white people as if not worthy to them. We then officially meet Crooks in chapter 4, a whole chapter dedicated to him which in such a short novel with such an unimportant character is very rare but Steinbeck obviously felt very strongly about racism and getting an image across that crooks had an identity and personality, he was just like the rest of them but was hated because of the colour of his skin. Crooks has the longest introduction to his character and where he lives in the book so that we get a vivid description and a chance to get to know him, and that he is a real character with a personality and feelings. Crooks is said to live in ââ¬Å"a little shed that leaned off the wall of the barnâ⬠, putting crooks in the barn and saying ââ¬Å"crooks had an apple box over his bunk, and in it a range of medicine bottles, both for himself and the horsesâ⬠shows his status is that of an animal, they class him as dirt, lower then the horses. His bed is just a box on hay and blankets as well, which is also Steinbeck creating an image of a man treated like an animal. Stereotypes would of thought he was a dirty black man but in actual fact crooks is a ââ¬Å"proudâ⬠and clean man. Being old, crippled and most importantly black crooks has been unable to get himself a girlfriend and being like he is never will, so as a substitute to a female he has ââ¬Å"dirty booksâ⬠. When Lenny Meets Crooks he doesnââ¬â¢t have a clue about racism, he isnââ¬â¢t racist in any shape or form as he has the mind of a child and doesnââ¬â¢t understand it. He asks ââ¬Å"why ainââ¬â¢t you wantedâ⬠because he cant see why crooks wouldnââ¬â¢t be allowed in the bunk house which shows racism isnââ¬â¢t natural or in genes or occurs to you as a kid, racism is taught to you by the people you grow up with and by pictures you see in the society. Lenny doesnââ¬â¢t use his white status in his discussion with crooks what so ever and in the conversation crooks actually has the upper hand for once. Crooks says ââ¬Å"this hereââ¬â¢s my room. Nobody got any right in here but meâ⬠and trys to get rid of Lenny, but its not that he doesnââ¬â¢t want the company because he does, thatââ¬â¢s what he craves the most but itââ¬â¢s a matter of principle, he has the idea that white people donââ¬â¢t let him in there room, so why should he let them in his room? Heââ¬â¢s read up his place in society and he knows his rights, and one of his rights is his room. Crooks snaps at Lenny saying ââ¬Å"I aint no southern nigroâ⬠showing he hasnââ¬â¢t accepted the fact that heââ¬â¢s less of a man then Lenny, he knows heââ¬â¢s the same apart from a colour and he has a confidence. He starts patronizing and teasing Lenny to make himself feel better as he seeââ¬â¢s someone thatââ¬â¢s an easier target then himself to pick of which proves a nasty streak. Upsetting Lenny saying things like ââ¬Å"spose George went into town and you never heard of him no moreâ⬠and ââ¬Å"theyââ¬â¢ll take you to the booby hatch. Theyââ¬â¢ll tie you up with a collar, like a dogâ⬠. Crooks didnââ¬â¢t always used to be segregated either, he went to a normal school and had white friends but his dad didnââ¬â¢t approve as he knew it wouldnââ¬â¢t last and theyââ¬â¢d grow up and turn on him. ââ¬Å"on my old mans chicken ranchâ⬠his family owned a chicken ranch so he wasnââ¬â¢t from a poor typical black slave family, showing the great depression could put you in circumstances unlike the ones you grew up in. he says ââ¬Å"its just a nigger saying itâ⬠recognising nothing he says means anything and he doesnââ¬â¢t have a say because heââ¬â¢s black. In Lenny and Crooks conversation there on completely different wave lengths, speaking on different levels completely. Its easy for crooks to tell his story and to have someone to talk to about his feelings and loneliness because he knows Lenny isnââ¬â¢t taking anything in and wont remember a thing, its just a physical presence to talk to so he isnââ¬â¢t talking to himself. Crooks only picks on Lenny because of power and status, most his life heââ¬â¢s been teased and tortured and the boss gives him such hell so heââ¬â¢s finally found someone he can tease and torture back. We get an insight of crooks loneliness and understand how much its really getting to him so we forgive him for the teasing because we know Lennyââ¬â¢s situation is no were near as bad as Crooks, crooks has no one but Lenny has always had George, Crooks expresses this crying ââ¬Å"you know heââ¬â¢s going to come back, spose you didnââ¬â¢t have nobody, spose you couldnââ¬â¢t go into the bunk house and play rummy because your blackâ⬠he obviously is so desperately lonely, he wants someone to talk to more then anything and its made even worse as he hasnââ¬â¢t always been like this. He explains how he ââ¬Å"had two brothers, they were always near me, always there. Used to sleep in the same roomâ⬠so he was used to having his brothers around, sharing a room and having someone to talk to all the time. Heââ¬â¢s been separated from family and friends for a lifetime alone and with social levels rock bottom stifling loneliness Is putting him in a mental state and heââ¬â¢s trying to put Lenny in his shoes. Crooks seems very cynical and sceptical about Lennys dream and has given up all hope in religion saying ââ¬Å"nobody ever gets to heavenâ⬠he doesnââ¬â¢t believe a god would put him through this. Crooks also defends himself saying ââ¬Å"you say I smell, well you all smell to meâ⬠he most probably doesnââ¬â¢t really thing white people ââ¬Ësmellââ¬â¢ itââ¬â¢s just a matter of if you can say it to me, I can say it to you. Itââ¬â¢s almost childish, you smell, no you do! Then Candy comes onto the scene and joins Crooks and Lenny. Crooks is happy to have all this sudden company, something heââ¬â¢d dreamed of happening and is more then pleased to have people in the barn with him not that heââ¬â¢d let that on. Candy says ââ¬Å"I been here a long time, an crooks been here a long time. This is the first time Iââ¬â¢ve been in this roomâ⬠heââ¬â¢s proving the real depth of segregation as theyââ¬â¢ve both been there years and years but they have never seen each otherââ¬â¢s rooms but segregation like this was normal. Crooks proves just how lonely he is when he offers to give up all freedom and pay to work for nothing and become almost a slave for George, Lenny and Candy and in return, just some company hesitatingly saying ââ¬Å"if youâ⬠¦guys would want a hand to work for nothing-just his keep, why Iââ¬â¢d come an lend a hand.â⬠. Then itââ¬â¢s all unsettled by Curleyââ¬â¢s wifeââ¬â¢s appearance. Sheââ¬â¢s nearly as lonely as crooks, not allowed to talk to anyone but her husband who she doesnââ¬â¢t feel for at all. He leaves her alone to go to the whore house and sheââ¬â¢s expected to talk to nobody. Sheââ¬â¢s hurt and looking for some company, just someone to talk to. She expresses her loneliness saying ââ¬Å"what am I doing? Talking to a bunch of bindle stiffs- a nigger an a dum-dum and a lousy ol sheep and im liking itâ⬠although sheââ¬â¢s insulting them sheââ¬â¢s just as desperate for some company and wants them to talk to her, but they have other ideas. They have it drummed into there heads sheââ¬â¢s trouble and Crookââ¬â¢s especially knows he shouldnââ¬â¢t be talking to her. He coldly shouts at her saying ââ¬Å"I had enough, you got no rights coming in a coloured mans room. You got no rights messing around in here at all. Now you just get out an get out quick. If you donââ¬â¢t, im gonna ask the boss not to ever let you come in the barn no moreâ⬠crookââ¬â¢s overstepped the mark in the society he lives in. he canââ¬â¢t in reality boss around a white woman. He hasnââ¬â¢t said anything unreasonable, he knows his rights but heââ¬â¢s threatening her giving himself a level of authority. She replyââ¬â¢s to that in a bad way snapping at him ââ¬Å"listen, nigger you know what I can do to you if you open your trap? You know what I could do?â⬠he realises heââ¬â¢s overdone it and returns to his normal lonely self responding with a simple ââ¬Å"yes maââ¬â¢amâ⬠and ââ¬Ësits down on his bunk drawing into himselfââ¬â¢. After having Candy and Lenny in the room and being able to have normal conversations leaving out any racism heââ¬â¢s almost forgotten himself and segregation, the time he had with the other two was more like a bit of fantasy not reality. He thought for a minute he could have an equal friendship but then Curleyââ¬â¢s wife comes and snaps him out of it and reminds him of his place and status. What he did was paralyse his childhood when he played with white kids, he just fooled himself into thinking they were maybe his friends but after the argument he soon realises that this would never happen, he would never be accepted so after she leaves he changes. He turns cold on the other two again and withdraws his offer to work for company although heââ¬â¢d still love to do it, he thinks itââ¬â¢s just a far away dream as black people will never have equal friendships with white people. Curleyââ¬â¢s wife has proved sheââ¬â¢s racist but sheââ¬â¢s not alone in that, she threatened to have him hung. All sheââ¬â¢d of had to do was run back to the ranch and tell the boss or Curley he touched her and heââ¬â¢d be killed without trial, just as a form of revenge. Crookââ¬â¢s would just have to be accused by a white person and there authority would get him killed, that was the reality of being a black man, that was the reality of crookââ¬â¢s situation. Taking the racism and unfairness of segregation in the 1930ââ¬â¢s Steinbeck has successfully created this character of a black man, trapped in his crippled body, desperately lonely and abused but given him an identity, a personality, a proper background and family and made him a real person. Heââ¬â¢s highlighted how badly they were treated, how they felt, what they went through and what we cant let happen again in the future. Crooks wasnââ¬â¢t a part of the story as such but he was there to represent what it was like at the time and the seriousness of the horrors of racism that went on and heââ¬â¢s done that outstandingly giving a perfect picture and make us as an audience feel for the character of Crooks and actually think about what went on back then and to help ensure segregation will never return.
Organizational studies Essay
Prof. Andras Tilcsik, Rotman School of Management andras. tilcsik@rotman. utoronto. ca (preferred contact method) https://portal. utoronto. ca/ 416-946-0610 (email preferred) 95 St. George St. , Room 7018; Thursdays 2:30-3:30pm & by appointment TBA Course Scope and Mission Organizations are all around us in society: we study in them, work for them, rely on them for goods and services, and we are regulated and influenced by them. Understanding organizations, therefore, is key to becoming more effective actors in the organizations that we are, or will be, part of. Organization theory is the scientific study of how organizations function as collective social systems in their particular environment. Applied to business, organization theory primarily focuses on how different organizational design choices facilitate or hinder the achievement of organizational goals (e. g. , profit, survival, growth) in competitive marketplaces. In this course, we will explore organization theory with an emphasis on understanding organizations as systems, and on the practical applications of these theories for organization management. The primary focus of our course materials, analysis, and discussion will be on organizations (not the people who comprise it). Thus, this courseââ¬âlike organization theory more generallyââ¬âoffers a unique perspective for those interested in business and management. By the end of the course, you will achieve the following to become a more effective organizational actor: ? Familiarity with key elements of organizational structure, design, processes, and context 1 of 10 ? ? Skills in organizational analysis and the diagnosis of strengths andà weaknesses Ability to apply organizational theory to real world organizations Course Prerequisites RSM260H1/ MGT262H1 Course Exclusions RSM360H1/ MGT363H1 Required Readings ? ? Daft, R. L & Armstrong, A. (2012). Organization Theory and Design (2nd Canadian edition). Toronto: Nelson. (ISBN-10: 0176503684 / ISBN-13: 9780176503680) Supplemental material will be occasionally handed out in class, or posted on Blackboard. Evaluation and Grades Grades are a measure of the performance of a student in individual courses. Each student shall be judged on the basis of how well he or she has command of the course materials. Work Class Participation & Attendance Individual Short Paper Team Project Proposal Presentation Report Closed-book short quizzes Open-book final exam Bonus credit 10% 15% 0%* 5% 30% 10% 30% (up to 3%) Due Date Ongoing January 28, 2013 February 11, 2013 Variable March 18, 2013 Variable FAS final period (March 25, 2013) * Final project reports from groups that fail to submit the proposal on time will NOT be graded. 1. Class Participation & Attendance (10%) In each class, I might randomly call five to six students to present their work or ideas or to lead class discussion at any time. It is likely that I will open the class by asking someone to summarize the readings or cases briefly, or answer a short question. Please be prepared to participate in class by ensuring that you have read the assigned material before class. I also strongly recommend taking detailed in-class notes and reviewing them after class, while the material is fresh in your mind. I expect you to attend every class on time, and stay for the entire session. If you have an unavoidable conflict, which makes it impossible for you to attend a particular session, please notify me at least 24 hours in advance. 2 of 10 2. Individual Short Paper on Management Fads (15%) This assignment asks you to gather some information on a current and a past trend or fad in management and consider the causes and effects of these fads. This assignment is explained in more detail in Chapter 5 of the textbook (p. 195, ââ¬Å"Chapter 5 Workbook: Management Fadsâ⬠). Make sure that your address all three questions in the assignment. Your report should read like a coherent (short) essay, rather than just a set of disconnected answers to different questions. If it is helpful for your analysis, you might consider how the institutional perspective on organizations (pp. 188-193) helps explain your findings. The paper should be approximately 800 words, typed double-spaced. Write clearly and concisely and indicate all your sources. If you are not sure where to start looking for information, or how you might think about these questions, please see me well in advance of the due date. 3. Team Project (35%) In teams of 5 to 6, you will analyze a caseââ¬âor a set of casesââ¬âby applying appropriate theories to generate insights about organizational theory, design, and change. The project also requires you to be creative in how you present the insights. More information about the final case project will be posted on Blackboard and provided in class on January 28, 2013. 4. Closed-book Short Quizzes (10%) To enhance your overall learning effectiveness, I will give 4 short pop quizzes through the semester. Your best 3 quiz scores will count towards your grade. Further details will be announced in class. 5. Open-book Final Exam (30%) The final exam will be an open-book written examination, in which non-electronic aids are permitted. The final will cover all readings and course content (e. g. , lectures, class discussions). 6. Bonus Credit (up to 3%) Organizational scholars sometimes run experimental studies to test new hypotheses. You can earn extra credits up to 3% by participating in research studies conducted through the Rotman Participant pool between January 7, 2012, and March 25, 2013. These credits will count towards your cumulative course grade, and your participation in a study will help contribute to cutting-edge research on organizational behavior, marketing, or other business issues. You will receive 1% extra credit for each hour of research in which you participate. To participate in a research study, sign up for an account online at http://rotman-credit. sona-systems. com. When you request an account, make sure you fill out all of the information accurately, including selecting the correct course and section, to ensure that you receive credit. Once you have an account, you may read over the descriptions of research studies that are posted online. When you identify a study in which you would like to participate, you may view available timeslots for that study and sign-up online to participate. Participation in the actual research study will take between 45 and 60 minutes. You will be debriefed at the end of the study, and you will be asked to answer a question about some aspect of the study. Once you correctly answer the question, you will be given credit for completing one study. COURSE FORMAT AND EXPECTATIONS For Written Assignments: Please note that clear, concise, and correct writing will be considered in the evaluation of all your written work for this course (i. e. , individual short paper, team project report, and final written exam). That is, you may lose points for writing that impedes communication: poor 3 of 10 organization, weak paragraph development, excessive wordiness, hard-to-follow sentence structure, spelling mistakes and grammatical errors. Students who require additional support and/or tutoring with respect to their writing skills are encouraged to visit the Academic Success Centre (www. asc. utoronto. ca) or one of the College Writing Centres (www. writing. utoronto. ca/writing-centres). These centres are teaching facilities ââ¬â not editing services, where trained staff can assist students in developing their academic writing skills. For Class Participation: It is my hope that our class can serve as a riskless environment in which we all feel comfortable testing new ideas and pushing the boundaries of our thinking. This may be a different experience than you have had in previous classes, but exploring your ideas out loud by participating in the discussion will serve you well in other classes and in your future careers. I know that some of you may be shy or uncomfortable speaking publicly and/or English is not your first language. If you are particularly worried about your in-class contributions, please check in within the first two weeks of the semester, and I can work with you in creative ways to help your contributions. There is, however, no alternative to participating in class discussions. But if you do fall into this category, please come see me early in the term, and we will work together to come up with ways to facilitate your participation. There is no charge for the instruction and support. For Group Work: The final project requires students to work in teams of 5 to 6. Learning to work together in teams is an important aspect of your education and preparation for your future careers. That said, project-based teamwork is often new to students and you are therefore reminded of the following expectations with respect to behaviour and contributions to your team project. 1. Read the document entitled, ââ¬Å"Working in Teams: Guidelines for Rotman Commerce Studentsâ⬠which is available on the RC portal under the Academic Services tab. 2. When working in a team, Rotman Commerce students are expected to: â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Treat other members with courtesy and respect; Honour the ground rules established by the team; Contribute substantially and proportionally to the final project; Ensure enough familiarity with the entire contents of the group project/assignment so as to be able to sign off on it as original work; Meet the project timeline as established by the team. 3. Resolving differences: Conflicts can ââ¬â and do ââ¬â occur. Conflicts are part of the teamââ¬â¢s process of learning how to work together effectively and can actually generate exciting debate and creative solutions ââ¬â if managed appropriately. Student teams are collectively expected to resolve disputes or misunderstandings as soon as they arise (and prior to submission of the final project). In cases where teams are unable to reach a mutually agreeable solution, the entire team must meet with the Rotman Commerce Team Coach** as soon as possible. The Coach will listen to the team and help develop options for improving the team process. All members of the project team must commit to, and, utilize their action plans. ** The Rotman Commerce Team Coach, Nikoleta Vlamis, may be reached 4 of 10 at nikoleta@nikoletaandassociates. com for an appointment. Nikoleta is an expert in team dynamics and facilitation. Note that Nikoletaââ¬â¢s role is to provide guidance, support and advice on team matters ââ¬â not to formally evaluate or assess teamwork for academic purposes. 5 of 10 WEEKLY SCHEDULE (subject to change) Session 1 Date Jan 7 Topic and cases Introduction: Organization Theory & Design Textbook readings Chapter 1 2 Jan 14 Organization Design & Strategy Chapter 2 3 Jan 21 Organizational Structure Short Case: Aquarius Advertising (pp. 124-127) External Environment & Inter-Organizational Relationships Final case project announced Organization Design in an International Environment Short Case: Ivanhoe Mines (pp. 236-238) Halfway Point: Taking Stock and Looking Ahead Case: Tim Hortons (pp. 510-513) Chapter 3 Chapter 4 & 5 Individual short paper due Chapter 6 4 Jan 28 5 Feb 4 6 Feb 11 Team project proposal due No class Feb 18 University Closed (Family Day). No Class. 7 Feb 25 Organization Size, Life Cycle, and Decline Short Case: I Love Rewards Inc. (pp. 348-350) Organizational Culture Short Case: Closing the Gap (pp. 386-387) Innovation & Change Management Case: The Hospital for Sick Children (pp. 514-520) Chapter 9 8 Mar 4 Chapter 10 9 Mar 11 Chapter 11 Chapter 12 Team project report due Chapter 13 10 Mar 18 Decision-making 11 Mar 25 Conflict, Power & Politics Final team presentations (1) Final Review & Debrief Final team presentations (2) 12 April 1 N/A TBA by FAS. FINAL EXAM All course materials 6 of 10 POLICY AND PROCEDURE Missed Tests and Assignments (including midterm examinations) Students who miss a test or assignment for reasons entirely beyond their control (e. g. illness) may submit a request for special consideration. Provided that notification and documentation are provided in a timely manner, and that the request is subsequently approved, no academic penalty will be applied. In such cases, students must notify Rotman Commerce on the date of the missed test (or due date in the case of course work) and submit supporting documentation (e.g. a medical certificate) to the Rotman Commerce Program Office within one week of the originally scheduled test or due date. Students who do not provide Rotman Commerce or the instructor with appropriate or sufficient supporting documentation will be given a grade of 0 (zero). Note that the physicianââ¬â¢s report must establish that the patient was examined and diagnosed at the time of illness, not after the fact. The Faculty will not accept a statement that merely confirms a later report of illness made by the student to a physician. Late Assignments Assignments are due at the beginning of the class of the weeks specified in the outline. The grade will normally be reduced by 10% if the assignment is not received by the specified time, and by an additional 10% per day late. Students who, for reasons beyond their control, are unable to submit an assignment by its deadline must obtain approval from the instructor for an extension. Supporting documentation will be required as per the policy on missed tests and assignments. Accessibility Needs The University of Toronto is committed to accessibility. If you require accommodations for a disability, or have any accessibility concerns about the course, the classroom or course materials, please contact Accessibility Services as soon as possible: disability. services@utoronto. ca or http://www. accessibility. utoronto. ca/. Attendance of Other Sections I teach two sections of this class on Monday. You must attend the section in which you are registered. Under exceptional circumstances, however, you may attend a different section on the same day (each section will cover the same material) provided that you receive permission from me at least three days in advance. Email Policy & Office Hours At times, the course instructor may decide to communicate important course information by email. As such, all UofT students are required to have a valid UTmail+ email address. You are responsible for ensuring that your UTmail+ email address is set up AND properly entered on the ROSI system. For more information please visit http://help. ic. utoronto. ca/category/3/utmail. html Forwarding your utoronto. ca email to a Hotmail, Gmail, Yahoo or other type of email account is not advisable. In some cases, messages from utoronto. ca addresses sent to Hotmail, Gmail or Yahoo accounts are filtered as junk mail, which means that important messages from your course instructor may end up in your spam or junk mail folder. 7 of 10 Blackboard and the Course Page The online course page for this course is accessed through Blackboard. To access the course page, go to the UofT Portal login at https://portal. utoronto. ca/ and log in using your UTORid and password. Once you have logged in, look for the My Courses module where youââ¬â¢ll find the link to all your course websites. If you donââ¬â¢t see the course listed here but you are properly registered for the course in ROSI, wait 48 hours. If the course does not appear, go to the Information Commons Help Desk in Robarts Library, 1st floor, for help, or explore the Portal Information and Help at www. portalinfo. utoronto. ca/students and review the Frequently Asked Questions. Classroom Norms Consistent with the general goal of mutual respect for all course participants, students are expected the following: Attending the class. Each class benefits from the attendance and participation of all students. Your grade for participation will be affected by absences. You should sit in the assigned seat, if relevant, and display a legible name card at all times. Arriving on time. Late arrivals are disruptive to both lectures and class discussion, and show disrespect to those who are on time. Class starts 10 minutes after the hour. Minimizing disruptions. All cell phones and pagers should be turned off during class. You should not leave and re-enter the class. You should avoid engaging in side conversations after class has begun. Focusing on the class. Laptops, iPads, and other electronic devices should be turned off during class. Being prepared for class. You should be ready to discuss any assigned readings and to answer any assigned questions for each dayââ¬â¢s class, including being ready to open a case assigned for that day. Respect. You should act respectfully toward all class participants. Prepare using only class materials. Before a case is analyzed in class, you should neither read an analysis of the cases nor discuss it with students who have previously discussed it in class (either in a previous year or in a different course or section). Similarly, you should not share the notes handed in class with another student who may take the course at some later time. If you are in violation of this policy, or know of someone who is, please discuss it with the professor. How to Prepare for Class For all lectures: ? Start by skimming the readings, looking at headings and subheadings to understand what the reading discusses. ? Then, delve into the readings and consider the following questions. What are the central points of the reading? Why are these points important? What is not addressed? What assumptions are being made? 8 of 10 For cases: While there is no set method of case preparation, one approach involves the following: 1 ? Start by reading the textbook or any theoretical readings or articles that are also assigned. Consider what the case is designed to accomplishââ¬âwhy this case, now, in this course? Use the other readings as a way to frame your reading of the case ? Read the exhibits (if any) first. What do they say about the case? Then, skim the case. ? Read the case. Take notes on important issues. Draw links between the other readings and the assigned case. Apply any tools discussed in the other readings. ? Reread the exhibits (if any). ? Also, donââ¬â¢t forget what weââ¬â¢ve learned in prior classes. Often, using our tools of analysis will give you new insights into a particular case. ? Itââ¬â¢s often helpful to summarize your perspective of the case on a single page of notes. It requires you to focus on the larger issues at hand, rather than feeling that every fact is important. ? Take a stand. What are the core issues in this case? Why are they so important? What should be done? What will happen if your idea is implemented? Academic Integrity Academic Integrity is a fundamental value essential to the pursuit of learning and scholarships at the University of Toronto. Participating honestly, respectively, responsibly, and fairly in this academic community ensures that the UofT degree that you earn will continue to be valued and respected as a true signifier of a studentââ¬â¢s individual work and academic achievement. As a result, the University treats cases of academic misconduct very seriously. The University of Torontoââ¬â¢s Code of Behaviour on Academic Matters http://www.governingcouncil. utoronto. ca/policies/behaveac. htm outlines the behaviours that constitute academic misconduct, the process for addressing academic offences, and the penalties that may be imposed. You are expected to be familiar with the contents of this document. Potential offences include, but are not limited to: In papers and assignments: â⬠¢ Using someone elseââ¬â¢s ideas or words without appropriate acknowledgement. â⬠¢ Submitting your own work in more than one course without the permission of the instructor. â⬠¢ Making up sources or facts. â⬠¢ Obtaining or providing unauthorized assistance on any assignment (this includes collaborating with others on assignments that are supposed to be completed individually). On test and exams: â⬠¢ Using or possessing any unauthorized aid, including a cell phone. â⬠¢ Looking at someone elseââ¬â¢s answers â⬠¢ Misrepresenting your identity. â⬠¢ Submitting an altered test for re-grading. 1 This section borrows from Prof. Anita McGahanââ¬â¢s notes on case preparation (article forthcoming) 9 of 10 Misrepresentation: â⬠¢ Falsifying institutional documents or grades. â⬠¢ Falsifying or altering any documentation required by the University, including (but not limited to), medical notes. All suspected cases of academic dishonesty will be investigated by the following procedures outlined in the Code of Behaviour on Academic Matters. If you have any question about what is or is not permitted in the course, please do not hesitate to contact the course instructor. If you have any questions about appropriate research and citation methods, you are expected to seek out additional information from the instructor or other UofT resources such as College Writing Centres or the Academic Success Centre. Recording Lectures Lectures and course materials prepared by the instructor are considered by the University to be an instructorââ¬â¢s intellectual property covered by the Canadian Copyright Act. Students wishing to record a lecture or other course material in any way are required to ask the instructorââ¬â¢s explicit permission, and may not do so unless permission is granted (note: students who have been previously granted permission to record lectures as an accommodation for a disability are, of course, excepted). This includes tape recording, filming, photographing PowerPoint slides, Blackboard materials, etc. If permission is granted by the instructor (or via Accessibility Services), it is intended for the individual studentââ¬â¢s own study purposes and does not include permission to ââ¬Å"publishâ⬠them in anyway. It is absolutely forbidden for a student to publish an instructorââ¬â¢s notes to a website or sell them in any other form without formal permission.
Saturday, September 28, 2019
A Peaceful Woman Explains Why She Carries a Gun Essay
In the article ââ¬Å"A Peaceful Woman Explains Why She Carries a Gun,â⬠the author, Linda M. Hasselstrom, has a credible argument for carrying a gun. Hasselstrom has a solid ethical appeal and her argument had logic based on her many dangerous personal experiences. Although her argument is credible, she uses many fallacies to make it seem that if women have a gun they can protect themselves from men. Ms. Hasselstrom has ethical appeal because she used credible personal situations to support her authority to possess a gun. Because she was such a peace-loving woman, carrying a gun would be a fallacy. Her cause and effects gave this article logical appeal on the subject of carrying guns for safety purposes. Although she establishes good logical appeal, she failed to include statistics that could have made her argument more credible. Despite Hasselstromââ¬â¢s characteristics of being a peace-loving, caring woman, a series of unfortunate dangerous situations caused her to feel the need to protect herself. She states in the article ââ¬Å"I am a peace-loving woman. But several events in the past ten years have convinced me Iââ¬â¢m safer when I carry a pistol. â⬠Although she feels that a firearm may be a security blanket for her, she struggles with the thought of possessing one. Before she eventually purchased a gun and obtained a license, she had taken some action to prevent this from happening. One action that she took to prevent from having to purchase a firearm was taking a kung fu class, which teaches self defense when someone enters your space without permission; another was to carry spray deodorant acting as mace. She had the most difficultly convincing herself mentally that she could shoot a person. The sense of safety made her sometimes doubt her ability to ever shoot a person. The article states that ââ¬Å"she was against firearms, and local police told us that mace was illegal. â⬠Although she did not like the thought of possessing a firearm, she felt as if it was her last resort. Throughout Hasselstromââ¬â¢s many dangerous personal life threatening situations and her need to feel safe had emotional appeal, especially to women. The threat of realizing that locking her windows and car doors and avoiding places that are known as dangerous, was not providing her the safety she needed. She then practiced shooting a gun and made it legal by purchasing a license. Although she sates in the article, ââ¬Å"just carrying a pistol is not protection; avoidance is still the best approach to trouble,â⬠she usually put herself in these life threatening situations. All through her many dangerous situations, her main fear seemed to be of men. Hasselstromââ¬â¢s goal of reaching the feeling of safety was met. She had many personal experiences that made her argument ethical and logical. Although after reflecting on the men that caused such fear in her life, she began to look at her situations from a different point of view. She states that ââ¬Å"A pistol is not the only way to avoid being raped or murdered in todayââ¬â¢s world, but, intelligently wielded, it can shift the balance of power and provide a measure of safety. â⬠Although she does not enjoy the thought of possessing a firearm she has realized that it is a measure of safety that she needs.
Friday, September 27, 2019
Arist Statement Paper Essay Example | Topics and Well Written Essays - 750 words
Arist Statement Paper - Essay Example I have endeavored to depict these moments since they progressively change as life goes on. My prints are an attempt to establish a connection between the viewer and the images. Art is the driving force of my etchings and is lies within the contemplative illustrations. The function of color in my prints is to generate a sentimental instinctive reaction to personal themes like scenes from my childhood and family legacy. I intend to evoke a sense of familiarity in the viewer as I correlate with a specific image. Printmaking acts as vehicle for infinite combinations of color juxtaposition. A variety of techniques and various combinations offer innumerable new opportunities. I am particularly enchanted by the forms, colors and shapes in printmaking. The art of printmaking is all about anticipation and moments of admiration or distress as the paper or screen is separated to expose the image. I especially focus on intricate compositions, in an attempt to transform my ideas into magnificent prints to put across profound sentimental content. Since the beginning, the process of etching seemed magical to me. Over the years, it has assisted me in presenting my inner vision to outer reality and thus led to a sense of achievement. Story-telling has always been an integral component of Slavic folklore. I have delved in my family history and culture at length, struggling to create profiles based upon renewed memories and recollections from old relatives. The supreme inspiration behind this collection is my Russian grandmother, Marina who used to narrate invigorating and inspirational stories to us in our childhood. With the passage of time and migration, the content of these conventional tales have been modified to some degree, now I relate the same stories to my daughter, Millicent. Therefore, my aim is to deconstruct these stories, lullabies and family heritage that play an imperative role not only in our childhood but in our adult life too. Our perception and connection wit h subject matter evolves and assumes new significance as we pass through time. The conceived fabricated reflection of embroidered memories is the foundation of my figurative connection between past and present established on my lineage. Memories comprise of only selective chapters of our past, frequently concealing imperative features, revealing only fractured bits and pieces of the entire picture. Some are crystal clear while others are blurred and altered, making it difficult to discern reality from illusions. I aspire to rediscover our self identity by accessing and repossessing our memories. I have tried to direct the attention of the observers to rediscover their own memories by building up relationships with the prints presented and analyze the pliability of their memories. My work is targeted at recreating, deforming, exposing and obscuring memories. My prints encompass various patterns and denote personal associations and an aesthetic appeal which I feel for each object. Our minds formulate memories according to a specific configuration and then recognize segments of our inner emotional nature. My goal is to illustrate the various surfaces of memory by discovering the bond between physical remembrance and the subtle temporary sentiments that activate as well as summon our memories. Experience, sentiment and perception are reflected by the
Thursday, September 26, 2019
Research on Nursing Coursework Example | Topics and Well Written Essays - 2000 words
Research on Nursing - Coursework Example This factor will have impacts on the health status of the individuals who reside in these rural communities as well as influence health care services and affect delivery of medical services. This paper will address the areas of family health care that play a vital role in promoting health and ensuring wellness in family self-care. Nurses are encouraged to take upon a more pro-active approach when they are working with families, whether in an urban or a rural setting. This will ensure quality health care promotion is the main focus in most families. Recent research shows that there are changes which are taking place in family health care as well as family life. Research further indicates that there is an upcoming international perspective in which individuals and the community at large feels the need for recognition of the common attributes about family life across the different cultures as well as promotion of family health issues in the nation. Nursing practice is aimed at ensuring managed care in rural and family health. Nurses continue to face challenges in delivery of medical services to individuals and families residing in the remote and rural communities. These challenges inhibit nurses from delivering quality nursing care to individuals in rural setting. Limited medical resources present challenges in rural communities. ... hem to take part in functions that require advanced practice and skills so that they can effectively fulfill the needs of individuals who reside in medically underserved regions. The distance between the patients and the medical providers, and the low population density contribute to the remoteness of the rural environments. There is a great diversity in terms of economic, social and cultural patterns between rural and urban communities. The diversity has been identified as the main issue that has brought about disparities in health care systems in different geographic locations. In most rural communities, nurses are expected to be the sole care givers since there are few or even no physicians available. The rural nurses, therefore, have to develop a variety of virtues that will guide them in the understanding and ability to provide adequate health care to rural patients and families. Nurses in rural communities have adapted resilience in addition to adaptability, resourcefulness and creativity. It is because of this that they are enabled to be expert generalists. Rural nurses have also developed a great attribute of knowing about the formal and informal resources available in the rural community in which they are based. They have identified how to use the resources effectively and sustainably for the sole benefit of the rural population. Nurses in the rural settings should still be able to know how they could care for patients with various diseases and health conditions. The nurses should be flexible as well as excellent team players so that they can handle difficult medical conditions with expertise and function more effectively in nursing roles that continue to expand. Nurses continue to face challenges in situations of delivering nursing services and health care to
Starbucks the experience Essay Example | Topics and Well Written Essays - 3000 words
Starbucks the experience - Essay Example Basically, employees who are also committed to the organizational goals improve the overall quality of the workforce. Several research studies prove that a high level of customerââ¬â¢s satisfaction could eventually lead to a high customer loyalty. (Entel et al., 2007; Jones & Sasser, 1995) In line with this matter, the constantly increasing Starbucks revenue is a positive sign that shows how well the company is serving its customers. The market share of the company can be very much affected when a customer fails to receive a prompt service from the company. Starbucks HRM approach in providing at a total of five classes workshop training prior to serving the customers is essential in ensuring the delivery of a good quality customer service. (UW Business School, 2003) Considering that not all customers are after low price coffee, the company needs to strive hard in order to retain the loyal of its prospective customers. price they have to pay. (Jiang, 2004) To achieve a good ââ¬Ëafter-delivery satisfactionââ¬â¢, it is a challenge for the company to maintain its reliability at all times. ââ¬ËReliabilityââ¬â¢ is often linked with aspects such as delivery time ââ¬â whether each cup of coffee will be delivered as promised, and the consistency of customer service including the order tracking, on-time delivery, customer support and quality of product and services that meets the customerââ¬â¢s expectation. (Smith et al., 2000) The company also extend employee benefits such as medical, dental, vision and short-term disability insurance, paid vacation and holidays, mental health or chemical dependency benefits, employee assistance program, career counselling, product discounts, 401(k) savings plan, and a stock option plan. (UW Business School, 2003) According to Schultz, it is difficult for employees to feel financially and spiritually attached with their jobs without these employement benefits. (Wyss, 2006; MSNBC, 2005) He added that the stock option plan could
Wednesday, September 25, 2019
Reading Respond#3 Essay Example | Topics and Well Written Essays - 250 words
Reading Respond#3 - Essay Example U.S, and of the armed forces of the numerous states, when given the actual service of America and commission all the service personnel of the United States (The Founders Constitution 1). The separation of war powers within the U.S Constitution does not appear so uncertain. While the President is given some exclusive authorities (Straub 1-2), the immensity of the authority to take the country to war depends on Congress (Kinkopf 2). According to U.S. Constitution, there is separation of powers of war. With Congress having the power to proclaim war, select and sustain the armed forces, and manage war funding (Article I, Section 8). At the time the Constitution was outlined (Kinkopf 2), the framers evaluated the singular willpower of the Executive against the Legislatureââ¬â¢s consultative function, whose components would ultimately carry the cost of battle (The Founders Constitution 1). The ultimate responsibility for any military engagement is held by the congress. This is clear as it is supported by the Supreme Court. The Supreme Court has been fast to remind the people that, where overlaps in the authorities given by the Constitution prevail, reverence goes to Congress. This is a clear declaration of Supreme Court that when Congress, acting in the vast aspects of overlapping authority, tells the President no, the President ought to comply (Kinkopf 2). Straub, Steve. Alexander Hamilton, Federalist Paper #69, On Command of the Army and Navy. On March 21, 2011. Accessed from
Tuesday, September 24, 2019
Case analysis Essay Example | Topics and Well Written Essays - 2250 words
Case analysis - Essay Example This paper analyzes one of the managerial blunders that were taken by a company. This is in regard to the construction of terminal five, at the Heathrow Airport, in Terminal Five. The company that was responsible for constructing this terminal was British Airways. British Airways is the largest airline carrier in the United Kingdom. This is based on the number of fleets it operates, the size of the company, and the international destinations of the company. The intention of the company in constructing this terminal was that it should give it the capacity of increasing its revenue, and improving its public status and image. However, this turned out to be one of the strategic blunders of British Airways. This paper would examine this blunder, in relation to the theories of strategic management. Initially, the air transport industry was a government owned and managed industry. This is in almost all the countries of the world. However, because of the emergence of capitalism, and liberalization of the economies, various governments began to liberalize the airline industry, and allow for private ownership. This includes countries such as the United Kingdom which has allowed for the private ownership of the airline industry (Barney and Hesterly, 2006). For example, the British Airports Authority is a private company that manages and operates six airports in the United Kingdom, and this includes the London Heathrow Airport. It is at this airport that British Airways decided to construct the terminal five, which was to enable it expand its operations, and increase the number of its passengers. It is important to explain that the airline industry is driven mainly by profits, and this makes it to be one of the most competitive business industries in the world (Fojt, 2006). This is the reason why there is an emergence of other airline companies operating in the United Kingdom, and they include Virgin Atlantic, British Midland International
Monday, September 23, 2019
Practical Guide to Environmental Management Essay
Practical Guide to Environmental Management - Essay Example The concept of environmental corporate responsibility is one that is first defined in this book as one that has to be set within the internal and external environment. The author notes that sustainable development with environmental responsibility will not be effective unless policies and internal settings take place. The focus is to change the performance within a company specifically by developing policies and implementing regulations with the environmental practices in the work area. The policies include changing the use of environmental resources as well as monitoring and managing the different environmental needs. The author also states that the policies and implementation within the workforce should directly impact the stakeholders and the external environment, specifically by allowing the corporate responsibility to be seen by stakeholders who can then support the trends and direct action taken (Friedman, 80). The author doesnââ¬â¢t only focus on environmental issues such as saving in resources. It is also noted that corporate responsibility should incorporate changes in the process of creating products, examining the management of a certain area and enhancing the system used for better safety and environment. The environmental issues then become directly linked to the corporate culture and the ability to enhance what is being done within a corporation. The responsibility of management is to implement the policies for environmental changes and to be credible for both environmental damage and enhancement that is within the corporate culture. The suggestions that the author makes are to create policies and to implement these at various levels.Ã
Sunday, September 22, 2019
Role of Human Resource Management Essay Example for Free
Role of Human Resource Management Essay Its the people in an organization that carry out many important work activities. Managers and HR professionals have the important job of organizing people so that they can effectively perform these activities. This requires viewing people as human assets, not costs to the organization. Looking at people as assets is part of contemporary human resource management and human capital management. Role of Human Resource Management The human resources management team suggests to the management team how to strategically manage people as business resources. This includes managing recruiting and hiring employees, coordinating employee benefits and suggesting employee training and development strategies. In this way, HR professionals are consultants, not workers in an isolated business function; they advise managers on many issues related to employees and how they help the organization achieve its goals. Collaboration At all levels of the organization, managers and HR professionals work together to develop employees skills. For example, HR professionals advise managers and supervisors how to assign employees to different roles in the organization, thereby helping the organization adapt successfully to its environment. In a flexible organization, employees are shifted around to different business functions based on business priorities and employee preferences. Commitment Building HR professionals also suggest strategies for increasing employee commitment to the organization. This begins with using the recruiting process or matching employees with the right positions according to their qualifications. Once hired, employees must be committed to their jobs and feel challenged throughout the year by their manager. Building Capacity An HRM team helps a business develop a competitive advantage, which involves building the capacity of the company so it can offer a unique set of goods or services to its customers. To build the an effective human resources, private companies compete with each other in a war for talent. Its not just about hiring talent; this game is about keeping people and helping them grow and stay committed over the long term.
Saturday, September 21, 2019
Cryptography: Types, Methods and Uses
Cryptography: Types, Methods and Uses CHAPTER-1 INTRODUCTION 1.1 Introduction to Cryptography Cryptography is art of writing and reading the secret information. It is used to send the information between the various participants. It can be used in such a manner so that it could not be seen by the others. Cryptography is used to prevent the information from the attacker. It provides various services as : Integrity checking Authentication Confidentiality In case of integrity checking recipient thinks that the message is alter by the third party or attacker. Hence the user assures the recipient that the message has not been altered by any other source. In case of authentication the identity of the person is check by the user. The user verifies the identity of the person and handle over the right to use the particular data. In case of confidentiality the attacker watch the data carefully when it send from user to recipient. The third party canââ¬â¢t change the data. The message which is in the original form is known as the plaintext. The user encrypted the message before sending to the recipient is known as cipher text. When the cipher text is produces from plaintext, this process is known as encryption. [1]. The reverse process of encryption is called decryption. In the cryptographic systems an algorithm and a key is used. The key is known as the secret value. Cryptography is a field of computer networks which transforms (encrypts) the information (plain text) into an unreadable form (cipher text). And this cipher text can be decrypted only with the help of a secret key. Cryptography acts as a method of keeping the information secret. Cryptography protects the information by using mathematics in science. Electronic security is a major issue as various forms of electronic media and internet are becoming more prevalent. Cryptography is used to secure the data and to prevent the data from various attacks. Cryptography is necessary when communicating over any un-trusted medium. Authentication, digital signatures, e-commerce are major applications of cryptography. Generally in the cryptographic systems it can broadly classified into two systems. Symmetric key systems. Public key systems. In the symmetric key cryptography, single key is used for the encryption and the decryption purpose. The same key is used at the sender and the recipient side. On the other hand, in case of public key system, two types of keys are required. One is the public key and other one is the private key. Public key is known to all but the private key is known only to the recipient of messages uses. One of the techniques used in Cryptography is known as the visual cryptography. It is a cryptographic technique, which allows visual information to encrypt. The data is encrypted in such a way that decryption becomes a mechanical operation. For these kinds of operations computer is not required. Earlier the developers used visual secret sharing scheme. In this scheme the image was broken into many parts. The third party thinks that all these parts are used to decrypt the image. But the n âËâ 1 parts of the image revealed no information about the original image. In this technique each part has its separate transparency. The decryption is performed by overlaying the parts. When all the parts were overlaid, then the original image would appear. Cryptogra phy is the technique, which is used to protect the information from the external viewers. It plays a vital role in security. The public key encryption and decryption is one of the most important types of cryptography. In public key cryptography the key should be unique. There are two ways of key production. The first one is mathematical like AES, DES and the other one is based on the theory of natural selection. The multimedia technology plays an important role in our society. In this case the digital images play a very important role. The digital images are used to fulfil the security and privacy in various applications. Encryption of image plays a very important role; it helps to save the image from the unauthorized attack. Many solutions are providing to save this image; one of the techniques is mask the image data. For the encryption purpose many algorithms are required, such as [2] : DES AES RSA Broadly, Cryptographic systems provide us three types of cryptographic algorithms namely, Secret Key Cryptography (SKC), Public Key Cryptography (PKC) and Hash Functions [3]. The Secret Key Cryptography (SKC) uses a single (same) key for the process of encryption and decryption. The most commonly SKC algorithms used now-a-days include: 1.2 Data Encryption Standard (DES) It was designed in 1970ââ¬â¢s by IBM and was ratified in 1977 by the National Bureau of Standards (NBS) for commercial use. It is a block cipher that operates on 64-bit blocks employing a 56-bit key and 16 rounds [4]. Although DES has been around long back but no real weakness has been identified. The biggest disadvantage of DES is the 56 bit key size. 1.3 Advanced Encryption Standard (AES) It was designed by Vincent Rijmen and Joan Daemen and was introduced in 1998. The algorithm can use fickle key length and block length. The key length can include 128, 192, or 256 bits and block length can be of 128, 192, or 256 bits [5].AES is a highly efficient and secure algorithm. The drawback lies in its processing as it requires more processing. 1.4 Rivest Cipher (RC) Ronald Rivest developed this algorithm and thus, the name of the algorithm was put after Ronaldââ¬â¢s Rivest name. It provides a series of RC algorithms including RC1, RC2, RC3, RC4, RC5 and RC6 [6]. 1.5 Blowfish It was developed by Bruce Schneie and was first published in the year 1993. This block cipher has 8 rounds, having the block size is of 64 bits and the key length can vary from 32 to 448 bits. Blowfish was proposed as a substitute was DES [7]. This algorithm is significantly faster than other algorithms and the key strength is excellent. Blowfish algorithm is apt only for applications where the key mostly remains the same. The Public Key Cryptography (PKC) uses one (public) key for encryption and another (private) key for decryption. The PKC algorithms that are in use today are: 1.6 RSA The RSA algorithm was publicly described in 1977 by Ron Rivest,Adi Shamir, and Leonard Adleman at MIT; the letters RSA are the initials of their surnames, listed in the same order as on the paper. RSA is a cryptosystem, which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it wasnt declassified until 1997. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message. Breaking RSA encryption is known as the RSA problem. It is an open question whether it is as hard as the factoring problem. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to be- transferred is enciphered to cipher text at the encoding terminal by encoding the message as a number M in a predetermined set. That number is then raised to a first predetermined power (associated with the intended receiver) and finally computed. The remainder or residue, C, is computed when the exponentiated number is divided by the product of two predetermined prime numbers (associated with the intended receiver). Operation of RSA The RSA algorithm involves three steps: Key Generation Encryption Decryption. 1.6.1 Key Generation RSA involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. The keys for the RSA algorithm are generated the following way: Choose two distinct prime numbers p and q. For security purposes, the integers p and q should be chosen at random, and should be of similar bit-length. Prime integers can be efficiently found using a primarily test. Compute n = pq.n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length. Compute Ãâ (n) = Ãâ (p)Ãâ (q) = (p âËâ 1)(q âËâ 1), where Ãâ is Eulers totient function Choose an integer e such that 1 e is released as the public key exponent. e having a short bit-length and small Hamming weight results in more efficient encryption ââ¬â most commonly 216 + 1 = 65,537. However, much smaller values of (such as 3) have been shown to be less secure in some settings. Determine d as d âⰠ¡ eâËâ1 (mod Ãâ (n)); i.e., d is the multiplicative inverse of e (modulo Ãâ (n)). This is more clearly stated as: solve for d given d.e âⰠ¡ 1 (mod Ãâ (n)) This is often computed using the extended Euclidean algorithm. Using the pseudo code in the Modular integers section, inputs a and n correspond to e and (n), respectively. d is kept as the private key exponent. The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and Ãâ (n) must also be kept secret because they can be used to calculate d. 1.6.2 Encryption A transmits her public key (n, e) to B and keeps the private key secret. B then wishes to send message M to A. He first turns M into an integer m, such that 0 _ m by using an agreed-upon reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to c = memod(n) 1.6.3 Decryption We can recover message m from c by using her private key exponent d via computing Given m, we can recover the original message M by reversing the padding scheme.(In practice, there are more efficient methods of calculating cd using the precomputed values below.) 1.7 Enhanced RSA The RSA algorithm based on the variable N which consisting of multiplying each of the P and q, which are relying on that of where to find the variable d, as the variable d is, hence the higher value of n. The variable d increases its size, the higher value of p and q the value of d increases, which means that the algorithm depends entirely on the adoption of the prime numbers because they generate a key d, depending on p and q are already primes numbers. The weaknesses of RSA algorithm when we use two primeââ¬â¢s number are the following points which are used to break the algorithm in most cases. These weaknesses are: (a) Small encryption exponent, if you use a small exponent like e=3 and send the same message to different recipients. (b) Using the same key for encryption and signing. (c) Acting as an oracle: there are techniques to recover the plaintext if a user just blindly returns the RSA transformation of the input. The idea of the new approach is, instead of using two primes numbers to generate a public key and private key, we use three primes numbers with reduced size, generates the variable N Large and the process of analysis of the factors is more difficult than the original algorithm, as well as, increases the ease of generating Public key and private key. The key strength of the RSA depends on the two prime numbers p and q. The process of factorizing of n will lead to gain the values of p and q. It is much easier to find two numbers from factoring n than finding the value of three numbers from n. In this case it is very difficult for the intruder to find the three values from factoring n. 1.7.1 Key Generation in Enhanced RSA (a) Choose three distinct prime numbers p, q and s. (b) Find n such that n = p*q*s.n will be used as the modulus for both the public and private keys. (c) Find the Phi of n, à ¯Ã à ¹ (n) = (p-1)(q-1)(s-1). (d) Choose an e such that 1 (e) Determine d which satisfies the congruence relation d*eà ¯Ã¢â¬Å¡Ã º 1(modà ¯Ã à ¹(n)) In other words, pick d such that de 1 can be evenly divided by (p- 1)(q-1)(s-1), the Phi, or à ¯Ã à ¹(n).This is often computed using the Extended Euclidean Algorithm, since e and à ¯Ã à ¹(n) are relatively prime and d is to be the modular multiplicative inverse of e*d is kept as the private key exponent. The public key has modulus n and the public (or encryption) exponent e. The private key has modulus n and the private (or decryption) exponent d, which is kept secret .The encryption equation is c à ¯Ã à ¹ me (mod n) and the decryption one is m à ¯Ã¢â¬Å¡Ã º cd (mod n). 1.8 Diffie Hellman This algorithm was introduced in1976 by Diffie-Hellman. The Diffie-Hellman algorithm grants two users to establish a shared secret key and to communicate over an insecure communication channel [10]. One way authentication is free with this type of algorithm. The biggest limitation of this kind of algorithm is communication made using this algorithm is itself vulnerable to man in the middle attack [11]. Diffieââ¬âHellman establishes a shared secret that can be used for secret communications while exchanging data over a public network. The following diagram illustrates the general idea of the key exchange by using colors instead of a very large number. The crucial part of the process is that Aand B exchange their secret colors in a mix only. Finally this generates an identical key that is mathematically difficult (impossible for modern supercomputers to do in a reasonable amount of time) to reverse for another party that might have been listening in on them. A and B now use this co mmon secret to encrypt and decrypt their sent and received data. Note that the starting color (yellow) is arbitrary, but is agreed on in advance by A and B. The starting color is assumed to be known to any eavesdropping opponent. It may even be public. 1.8.1 Explanation including encryption mathematics The simplest and the original implementation of the protocol uses the multiplicative group of integers modulo p, where p is prime and g is primitive root mod p. Here is an example of the protocol, with nonsecret values in blue, and secret values in red. Small integers are used for clarity, but actual implementations require using much larger numbers to achieve security. Fig 1.1 Process of Diffie Hellman 1. p = 23 and base g = 5. 2. A chooses a secret integer a = 6, then sends B A = ga mod p A = 56 mod 23 A = 15,625 mod 23 A = 8 3. B chooses a secret integer b = 15, then sends A B = gb mod p B = 515 mod 23 B = 30,517,578,125 mod 23 B = 19 4. A computes s = Ba mod p s = 196 mod 23 s = 47,045,881 mod 23 s = 2 5. Bob computes s = Ab mod p s = 815 mod 23 s = 35,184,372,088,832 mod 23 s = 2 6. A and B now share a secret (the number 2) because 6 Ãâ" 15 is the same as 15 Ãâ" 6. Both A and B have arrived at the same value, because (ga)b and (gb)a are equal mod p. Note that only a, b, and (gab gba mod p) are kept secret. All the other values ââ¬â p, g, ga mod p, and gb mod p ââ¬â are sent in the clear. Once A and B compute the shared secret they can use it as an encryption key, known only to them, for sending messages across the same open communications channel. Of course, much larger values of a, b, and p would be needed to make this example secure, since there are only 23 possible results of n mod 23. However, if p is a prime of at least 300 digits, and a and b are at least 100 digits long, then even the fastest modern computers cannot find a given only g, p, gb mod p and g amod p. The problem such a computer needs to solve is called the discrete logarithm problem. 1.9 El-Gamal It was developed in the year 1984 by Taher Elgamal. It is an asymmetric key algorithm and is based on Diffie-Hellman key exchange. ElGamal encryption can be described over anycyclic groupG. The security relies upon the issue of a problem inGrelated to computing discrete logarithms [12]. Fast generalized encryption for long messages and data expansion rate are the two biggest advantages of this algorithm [13]. The chief drawback of ElGamal is the requirement for randomness and its slower speed [14]. ElGamal encryption can be defined over any cyclic group G. Its security depends upon the difficulty of a certain problem in G related to computing discrete logarithms. The Algorithm ElGamal encryption consists of three components: the key generator, the encryption algorithm, and the decryption algorithm. 1.9.1 Key Generation The key generator works as follows: It generates an efficient description of a multiplicative cyclic group G of order q with generator g. Sender chooses a random x from (1,â⬠¦Ã¢â¬ ¦q-1) He computes h= gx A publishes h , along with the description of G,q,g , as her public key. He retains x as her private key which must be kept secret. Fig 1.2 El-Gamal Algorithm 1.9.2 Example of El-Gamal Algorithm: Fig 1.3 Example of El-Gamal Algorithm. Hash Functions, also known as message digest, are the algorithms that do not use any key. Based upon the plain text, a fixed length hash value is generated.Hash algorithms that are commonly used today include: 1.10 Message Digest (MD) algorithms It produces a hash value of 128 bit from an arbitrary length message. The MD series includes MD2, MD4 and MD5 [11]. 1.10.1 MD5 algorithm The MD5 algorithm was developed by Rivest in 1991 and is an extension of the MD4 message-digest algorithm and is bit slower than MD4. This algorithm results in a 128 bit hash value. It is mostly used in security based applications. MD5 is more secure than MD4 [15]. It is suitable to use for standard file verifications but it has some flaws and therefore, it is not useful for advanced encryption applications [16].
Subscribe to:
Posts (Atom)