Tuesday, August 25, 2020
Marketing in Healthcare Industry Term Paper Example | Topics and Well Written Essays - 1000 words
Promoting in Healthcare Industry - Term Paper Example A promoting administrator ought to comprehend the targets of the firm when all is said in done and think of a corporate advertising procedure which should address the item, dissemination channels and strategies to be utilized. A vital showcasing plan starts by concocting a vital specialty unit that is free founded on the board, access to assets, rivalry, clients and situating procedure. The significant components that one spotlights on incorporate ID of the venture, circumstance examination, thinking of procedures and control foundation all in a key specialty unit. A showcasing plan as a rule includes a portrayal of the item based on any unmistakable highlights introduced, a spending plan for doing the mindfulness which incorporates the adverts and limited time exercises, valuing systems which rely upon the expense of creation, advertise division and a full depiction of business area. Key showcasing ought to likewise concentrate on the business condition which right off the bat will focus on the financial variable which will evaluate whether the economy is in downturn or in extension (Berkowitz, 2011). Besides, system will investigations the effects of mechanical on the speed, procedures, creation and market and attempt to remember this for promoting plan. The third factor is political mediation which centers around guidelines, charges, detailing prerequisites and how these impact showcasing methodologies. Another factor to consider is the social elements which identifies with the impression of a specific item in various social decent varieties. These are mental elements that adjust the interest patters and the market elements realizing an adjustment in the benefits of a firm. At long last, the vital showcasing should concentrate on inward survey process. This checks the administration and data frameworks, rivalry, spending plans, dissemination channels, advertise plan, deals projections, cost investigation and a general depiction of the promoting plan. Before a purchaser can think of a buy, different variables both inside and outside impact the dynamic procedure. An individual can decide to buy an item not on the grounds that it is required but since of a discernment that it is valuable. The purchaser conduct is dictated by inside components, for example, sentiments, tastes and inclinations, while outer variables identify with advertisements, the showcasing capacities of the firm or coupons mirroring the item. Be that as it may, beginning goal must be made before a buyer can make a buy. The decision caused will to be affected by the expense of the item and on assessment or perception on the nature of the thing being referred to (Berkowitz, 2011). An individual may likewise decide to purchase an item out of past fulfillment on the utilization of the thing. Organizations might be intrigued to guarantee that merchandise being delivered for selling ought not make intellectual cacophony with respect to the customer which decides buy esteem. T he advertising technique to be embraced by an ordinary business venture is unique in relation to that to be utilized by a medicinal services industry. This is on the grounds that the objective populace is extraordinary. While the business concentrated on the general buyer, the medicinal services concentrated on a constrained class, for example, the matured, the wiped out and those needing clinical consideration. For this situation, their methodology is limited on that business
Saturday, August 22, 2020
How Women Abolitionists Fought Slavery
How Women Abolitionists Fought Slavery Abolitionist was the word utilized in the nineteenth century for the individuals who attempted to abrogate the organization of bondage. Ladies were very dynamic in the abolitionist development, when ladies were, all in all, not dynamic in the open circle. The nearness of ladies in the abolitionist development was considered by numerous individuals to be outrageous not as a result of the issue itself, which was not generally bolstered even in states that had nullified subjection inside their outskirts, but since these activists were ladies, and the predominant desire for the best possible spot for ladies was in the household, not the general population, circle. By the by, the abolitionist development pulled in a significant number ladies to its dynamic positions. White ladies came out of their local circle to neutralize the subjugation of others. Dark ladies talked from their experience, carrying their story to crowds to evoke sympathy and activity. Dark Women Abolitionists The two most acclaimed dark ladies abolitionists were Sojourner Truth and Harriet Tubman. Both were notable in their time are as yet the most well known of the dark ladies who neutralized bondage. Frances Ellen Watkins Harper and Maria W. Stewart are not also known, however both were regarded scholars and activists. Harriet Jacobs composed a diary that was significant as an account of what ladies experienced during subjugation, and carried the states of subjection to the consideration of a more extensive crowd. Sarah Mapps Douglass, some portion of the free African American people group in Philadelphia, was an instructor who additionally worked in the abolitionist development. Charlotte Forten Grimkã © was likewise part of the Philadelphia free African American people group associated with the Philadelphia Female Anti-Slavery Society.â Other African American ladies who were dynamic abolitionists included Ellen Craft, the Edmonson sisters (Mary and Emily), Sarah Harris Fayerweather, Charlotte Forten, Margaretta Forten, Susan Forten, Elizabeth Freeman (Mumbet), Eliza Ann Garner, Harriet Ann Jacobs,à Mary Meachum, Anna Murray-Douglass (first spouse of Frederick Douglass), Susan Paul,à Harriet Forten Purvis, Mary Ellen Pleasant, Caroline Remond Putnam, Sarah Parker Remond, Josephine St. Pierre Ruffin, and Mary Ann Shadd. White Women Abolitionists More white ladies than dark ladies were unmistakable in the abolitionist development, for an assortment of reasons: Despite the fact that the development of all ladies was confined by social show, white ladies had more opportunity than dark ladies to move about.White ladies were bound to have the pay to help themselves while doing abolitionist work.Black ladies were, after the Fugitive Slave Act and the Dred Scott Supreme Court choice, in danger of catch and transport toward the South in the event that somebody asserted (properly or wrongly) that they were gotten away slaves.White ladies were commonly preferable instructed over dark ladies were (despite the fact that not in the least on a standard with the training of white men), remembering for formal speech abilities well known as a subject in training at that point. White ladies abolitionists were regularly associated with liberal religions like the Quakers, Unitarians, and Universalists, which showed the profound uniformity all things considered. Many white ladies who were abolitionists were hitched to (white) male abolitionists or originated from abolitionist families, however a few, similar to the Grimke sisters, dismissed the thoughts of their families. Key white ladies who worked for the nullification of subjection, helping African American ladies explore an out of line framework (in order request, with connections to discover increasingly about each): Louisa May AlcottSusan B. AnthonyAntoinette Brown BlackwellElizabeth BlackwellEdnah Dow CheneyLydia Maria ChildLucy ColmanPaulina Kellogg Wright DavisMary Baker EddyMargaret FullerAngelina Grimke and her sister, Sarah GrimkeJulia Ward HoweMary LivermoreLucretia MottElizabeth Palmer PeabodyAmy Kirby PostElizabeth Cady StantonLucy StoneHarriet Beecher StoweMary Edwards WalkerVictoria WoodhullMarie Zakrzewska Progressively white ladies abolitionists include: Elizabeth Buffum Chace, Elizabeth Margaret Chandler, Maria Weston Chapman, Hannah Tracy Cutler, Anna Elizabeth Dickinson, Eliza Farnham, Elizabeth Lee Cabot Follen, Abby Kelley Foster,à Matilda Joslyn Gage,à Josephine White Griffing, Laura Smith Haviland, Emily Howland, Jane Elizabeth Jones, Graceanna Lewis, Maria White Lowell, Abigail Mott, Ann Preston, Laura Spelman Rockefeller, Elizabeth Smith Miller,à Caroline Severance,à Ann Carroll Fitzhugh Smith, Angeline Stickney, Eliza Sproat Turner,à Martha Coffin Wright.
Sunday, July 26, 2020
100 Must-Read Musician Memoirs and Biographies
100 Must-Read Musician Memoirs and Biographies Were giving away a brand-new, top-of-the-line Kindle Voyage. Go here to enter for a chance to win, or just click on the image below. One of the best ways to get into a new (old) band or musician is to find their memoirs and biographies. Immerse yourself in the creation of these gifted humans, stare googly-eyed at the photos printed on glossy pages in the middle of the book, and then jam out to their music. Its all a win. At least, thats how I ended up obsessed with Guns N Roses. And The Doors. And Motley Crue. And Aerosmith. And, in the future, many more that Im holding on to for just the right moment. Here are 100 musician memoirs and biographies, sorted by the musics genre (loosely defined), to get you rockin and rollin and movin and groovin. Country/Folk My Cross to Bear by Gregg Allman Bound for Glory by Woody Guthrie Rat Girl by Kristin Hersh Love, Janis by Laura Joplin Loretta Lynn: Coal Miners Daughter by Loretta Lynn, George Vecsey Shakey: Neil Youngs Biography by Jimmy McDonough Reba: My Story by Reba McEntire, Tom Carter Its a Long Story: My Life by Willie Nelson Lynyrd Skynyrd: Remembering the Free Birds of Southern Rock by Gene Odom, Frank Dorman Simple Dreams: A Musical Memoir by Linda Ronstadt Hip Hop The 50th Law by 50 Cent, Robert Greene Sentences: The Life of MF Grimm by Percy Carey, Ronald Wimberly Fight the Power: Rap, Race, and Reality by Chuck D, Yusuf Jah The Way I Am by Eminem Ice: A Memoir of Gangster Life and Redemption-from South Central to Hollywood by Ice-T, Douglas Century Unashamed by Lecrae Moore The Tao of Wu by The RZA The Rose That Grew From Concrete by Tupac Shakur How to Ruin Everything: Essays by George Watsky Gone Til November by Lil Wayne Jazz The Good Life by Tony Bennett The Godfather of Soul: An Autobiography by James Brown Kansas City Lightning: The Rise and Times of Charlie Parker by Stanley Crouch Miles: The Autobiography by Miles Davis Cant Be Satisfied: The Life and Times of Muddy Waters by Robert Gordon Blues All Around Me: The Autobiography of B.B. King by B.B. King, David Ritz John Coltrane: His Life and Music by Lewis Porter Jazz Cleopatra: Josephine Baker in Her Time by Phyllis Rose Now and Then⦠by Gil Scott-Heron Pops: A Life of Louis Armstrong by Terry Teachout Pop/Punk/Reggae/Ska Catch a Fire: The Autobiography by Melanie B. Black By Design: A 2-Tone Memoir by Pauline Black Passion Is a Fashion: The Real Story of the Clash by Pat Gilbert Tranny: Confessions of Punk Rocks Most Infamous Anarchist Sellout by Laura Jane Grace If Only by Geri Halliwell Herbie Hancock: Possibilities by Herbie Hancock, Lisa Dickey Reckless: My Life as a Pretender by Chrissie Hynde Rotten: No Irish, No Blacks, No Dogs by John Lydon Ill Never Write My Memoirs by Grace Jones, Paul Morley A Natural Woman: A Memoir by Carole King Army of She: Icelandic, Iconoclastic, Irrepressible Björk by Evelyn McDonnell Lobotomy: Surviving the Ramones by Dee Dee Ramone Get in the Van: On the Road With Black Flag by Henry Rollins Be My Baby: How I Survived Mascara, Miniskirts, and Madness, or My Life As a Fabulous Ronette by Ronnie Spector, Vince Waldron Rod: The Autobiography by Rod Stewart Diana Ross: A Biography by J. Randy Taraborrelli In the Pleasure Groove: Love, Death, and Duran Duran by Nigel John Taylor I, Tina by Tina Turner, Kurt Loder Catch a Fire: The Life of Bob Marley by Timothy White Pharrell: Places and Spaces Ive Been by Pharrell Williams Rock n Roll Clothes, Clothes, Clothes. Music, Music, Music. Boys, Boys, Boys. by Viv Albertine Between a Heart and a Rock Place: A Memoir by Pat Benatar Chuck Berry: The Autobiography by Chuck Berry Moonage Daydream: The Life Times of Ziggy Stardust by David Bowie Hunger Makes Me a Modern Girl by Carrie Brownstein Lips Unsealed: A Memoir by Belinda Carlisle Cash by Johnny Cash Clapton: The Autobiography by Eric Clapton Journals by Kurt Cobain Not Dead Yet by Phil Collins Unfaithful Music Disappearing Ink by Elvis Costello Room Full of Mirrors: A Biography of Jimi Hendrix by Charles R. Cross Neon Angel by Cherie Currie Touching from a Distance: Ian Curtis and Joy Division by Deborah Curtis Hammer of the Gods by Stephen Davis Things The Grandchildren Should Know by Mark Oliver Everett Fleetwood: My Life and Adventures in Fleetwood Mac by Mick Fleetwood, Stephen Davis Girl in a Band by Kim Gordon Last Train to Memphis: The Rise of Elvis Presley by Peter Guralnick Diary of a Rock n Roll Star by Ian Hunter Dancing with Myself by Billy Idol Mercury: An Intimate Biography of Freddie Mercury by Lesley-Ann Jones Scar Tissue by Anthony Kiedis White Line Fever by Lemmy Kilmister The Dirt: Confessions of the Worlds Most Notorious Rock Band by Tommy Lee Searching for the Sound: My Life with the Grateful Dead by Phil Lesh Dirty Blonde: The Diaries of Courtney Love by Courtney Love The Long Hard Road Out of Hell by Marilyn Manson Inside Out: A Personal History of Pink Floyd by Nick Mason, Philip Dodd Itâs So Easy: And Other Lies by Duff McKagan Autobiography by Morrissey Joan Jett by Todd Oldham, Joan Jett I Am Ozzy by Ozzy Osbourne Rocks: My Life in and out of Aerosmith by Joe Perry Elvis and Me by Priscilla Presley Life by Keith Richards Crazy from the Heat by David Lee Roth Bird Lives!: The High Life Hard Times of Charlie (Yardbird) Parker by Ross Russell Slash by Slash, Anthony Bozza Somebody to Love?: A Rock-and-Roll Memoir by Grace Slick, Andrea Cagan Just Kids by Patti Smith Face the Music: A Life Exposed by Paul Stanley Seven Deadly Sins: Settling the Argument Between Born Bad and Damaged Good by Corey Taylor Who I Am by Pete Townshend The Real Frank Zappa Book by Frank Zappa, Peter Occhiogrosso Soul Dream Boogie: The Triumph of Sam Cooke by Peter Guralnick Lady Sings the Blues by Billie Holiday, William Dufty Divided Soul: The Life of Marvin Gaye by David Ritz Escaping the Delta: Robert Johnson and the Invention of the Blues by Elijah Wald Hit Me, Fred: Recollections of a Sideman by Fred Wesley
Friday, May 22, 2020
Chemical Warfare During World War II - 1450 Words
Chemical Warfare in World War 1 Chemical Warfare is defined as ââ¬Å"Tactical warfare using incendiary mixtures, smokes, or irritant, burning or asphyxiating gasesâ⬠. This is the usage of a chemical to harm the opposing side in order to get an advantage in the war at hand. Three of the main chemical weapons used during World War 1 were Lachrymator (tear), Chlorine and Phosgene, and Mustard gas. Chemical warfare was overall effective in World War 1 because it added to the weaponry needed to win the war. In the start of World War 1 gasses were considered inhumane and uncivilized. These three types of gasses show exactly why that was the thought all around the world on chemical weaponry. Lachrymator (tear gas) - caused temporary blindness and irritation to the victimsââ¬â¢ nose and throat. A gas mask would give the troops relatively good protection from this type of gas. Sternutator (poisonous gas) - chlorine, phosgene. Chlorine gas combines with moisture so it attacks the soldiersââ¬â¢ eyes and lungs. Phosgene gas was used along with Chlorine gas; it would cause less coughing allowing more to be inhaled. Also the effects were delayed for a longer time than when Chlorine gas was present. Troops would most likely be affected up to 48 hours after their body was initially introduced to the chemical. These two where later mixed together. The Chlorine helped the vapor to spread wider and faster than Phosgene had before causing both gases to be deadlier then before. They were also int roduced inShow MoreRelatedTechnology Changed The Dynamics Of War During World War I1587 Words à |à 7 PagesAdvances in technology changed the dynamics of war during World War I. WWI was the first extensive war in which all nations felt the effects of war whether through a social, political, or economic impact. through One of the major impacts of trench warfare was that it made it difficult for the Allied and Central Powers to secure a victory. New technology such as the machine gun brought massive death and casualties. Armies in all nations started to need a larger population of soldiers to fight becauseRead MoreThe Development and Usage of Gas Warfare Essay1348 Words à |à 6 Pages Gas warfare was first introduced in World War I and continued to be used throughout World War II. It was most commonly used in the front lines, and was feared by many. Gas warfare was a very effective war tactic. The effects of gases were unbearable, which is what caused them to be so heavily feared. Luckily, by the time that World War II came about protective masks called, gas masks had been invented. This resulted in a decrease of use in World War II compared to World War I, however it did notRead MoreThe Difference of Warfare between World War 1 and World War 21009 Words à |à 5 PagesWorld War Warfare was one of the greatest examples of technological advancement and strategic challenge, with the introduction of inventions such as the aircraft and the tank the battlefield transformed from attrition as scene in the early years of the war to decisive by the end of the war. Naval Warfare World War 1 While the naval war is usually known for only little attention in histories of World War I, the Royal Navys blockade of Germany played a dangerous role in the War. The U.S. Navy linkingRead MoreHistory of Nuclear, Biological, and Chemical (NBC) Reconnaissance977 Words à |à 4 PagesCBRN Reconnaissance Platoon There is a long and rich history of Nuclear, Biological, and Chemical (NBC) reconnaissance, today also known or referred to as Chemical, Biological, Radiological, and Nuclear (CBRN) reconnaissance within the United States Army. Scholars and experts believe that as early as 1935 Chemical-Warfare schools publications discussed the need to identify, mark, and produce a method to avoid contaminated areas. Avoidance is the most important fundamental of NBC Defense. In additionRead MoreWeapons of Mass Destruction790 Words à |à 4 Pages * 4 Chemical weapons * 5 Nuclear weapons * 5.1 Non-proliferation * 5.1.1 By region * 5.2 Weapons limitation * 5.3 Cooperation (4) Nuclear (or) Atomic (4.1) Nuclear warfare * 1 Types of nuclear warfare * 2 History a. 2.1 1940s i. 2.1.1 Atomic bombings of Hiroshima and Nagasaki ii. 2.1.2 Immediately after the Japan bombings b. 2.2 1950s c. 2.3 1960s d. 2.4 1970s e. 2.5 1980s f. 2.6 Postââ¬âCold War Read MoreThe War Against Human And Insect Enemies886 Words à |à 4 Pagesââ¬Å"The ability to get rid of somethingâ⬠. Well thatââ¬â¢s exactly what was trying to be conquered during the war against human and insect enemies that extended from 1914 to 1945. Chemical warfare is the use of chemicals as a weapon and during many wars, it was one of the most popular types of assault. American history students should study this topic because it teaches students the crucial effects of chemical warfare. They should also study this topic because it shows the rise and fall of a once miracle drugRead MoreThe World War I Ended1744 Words à |à 7 Pages World War One began on July 28, 1914 after the Austrian-Hungarian emperor was assassinated by coordination of The Black Hand secret society, a Serbian nationalist group. The war between Serbia and Austria-Hungary began. The First World War is known for its trench warfare, alliances, and technological advancements. World War I ende d on November 11, 1918 ending in an allied victory. World War II, also known as the Second War, began on September 1, 1939. World War II was much more brutal than WorldRead MoreUsing Chemicals as Weapons in War Essay example999 Words à |à 4 PagesThere has been war since man has been on Earth. Over time, war tactics, weapon, armor, and even the soldier has changed. The main weapon that has changed the battlefield has been the use of chemicals to stun, immobilize, or cause death. Chemical warfare isnââ¬â¢t a new form of fighting; it has been around since 400 B.C., but even a powerful and versatile weapon has its disadvantages. Nature always finds a way to fight in a battle too. The threat of a chemical attack haunts every country today. The extremeRead MoreEssay about Chemical Warfare1340 Words à |à 6 Pagescontorted with a pain that comes from within. Chemical warfare has long been acknowledged as a devastating tactical weapon, but the origin of this impression is now bein g debated. While it is a common held belief that chemical warfare is a form of modern warfare and that the First World War is recognised for introducing this type of combat, recent archaeological finds show this may prove otherwise. According to accepted definitions of chemical warfare, newly discovered battle tactics used by humanityââ¬â¢sRead MoreTechnology And Weapons During The Civil War Essay1446 Words à |à 6 PagesTechnology and weapons in wars since the Civil War have been progressing each and every day since then. There has been a number changes both good and not so good that has affected how our countries military forces react to the battle field. The advancements that has been made over the many years have killed millions and millions of people during time at war. Since the American Civil War there has been drastic changes to how war that have been fought. Why has technology in war been so important and helpful
Friday, May 8, 2020
Violent Media Essay - 1316 Words
Gerard Jones is quite a fan of The Hulk and Tarzan comic books. In his essay ââ¬Å"Violent Media is Good for Kidsâ⬠Jones argues that the violence in those and other comics teach valuable lessons that will help children understand difficult emotions. Jones states that in ââ¬Å"try (ing) to protect our children from their own feelings and fantasies, we shelter them not against violence but against power and selfhood.â⬠Throughout the essay Jones relies on personal anecdotes that reveal his opinions about violence in comics and other media instead of citing formal research. Jonesââ¬â¢ personal experience is that violent media is not generally harmful, and fills an important place in childhood imagination and play. It is true that as children we findâ⬠¦show more contentâ⬠¦Social psychologist Brad Bushman at Ohio State University showed students violent pictures as part of a study: one picture was of a man shoving a gun down another man s throat; another was of a man holding a knife to a woman s throat. What we found is for people who were exposed to a lot of violent video games, their brains did not respond to the violent images, Bushman said. They were numb, if you will.[3] I believe that this numbness is what the concern about violence in the media is based on. It concerns society because of the potential threat to society posed by learned violence. Chris Ferguson, a psychologist at Texas AM International University said Many of the [video] games do have morally objectionable material and I think that is where a lot of the debate on this issue went off the rails, we kind of mistook our moral concerns about some of these video games, which are very valid ââ¬â and then assumed that what is morally objectionable is harmful.[4] I personally find it hard to view the Tarzan comic books that got Jonesââ¬â¢ son to climb a tree in the same category as Call of Duty. I think that the potential impact of much media has been exaggerated. Towards the end of his essay Jones mentions that he cannot argue that violent media is completely harmless saying ââ¬Å"I think it [violent entertainment] has helped inspire some people to real-life violence. I am going to argue that itââ¬â¢s helped hundreds of of people for every one itââ¬â¢s hurt, and that it can helpShow MoreRelatedViolent Media Is Good for Kids Essay942 Words à |à 4 PagesViolent Media is Good for Kids Analysis From infancy onward, parents and teachers have drilled into the young generation that violence should be avoided at all costs. They have preached cooperation, tolerance, and ââ¬Å"using oneââ¬â¢s wordsâ⬠as tactics to combat difficult situations. Although those lessons are valid, Gerald Jones claims there is an alternative way. In his essay, ââ¬Å"Violent Media is Good for Kids,â⬠Jones argues that ââ¬Å"creative violence- bonking cartoons, bloody videogames, toy guns-givesRead MoreViolent Media Is Good For Kids Essay1083 Words à |à 5 PagesViolent Comics Are the New Superheroes In the writing of Gerard Jones ââ¬Å"Violent Media is Good for Kidsâ⬠is very interesting essay in which he describes how violent media can help kids to overcome obstacles, but whether it is convincing or not, I am not truly sure because the way the essay is written is biased. Jones as writer is making this controversial topic to gain more audience to read his writings, in addition, this essay fails in detail, it needs more statistics to support the examples thatRead MoreEssay on Violent Media...Good for Kids? 970 Words à |à 4 PagesIn ââ¬Å"Violent Media is Good for Kidsâ⬠Gerard Jones introduces us to his fearful and lonesome childhood. He lived in a world where he was taught to be the violence fearing, and passive boy his parents wanted him to be. But, when one of his motherââ¬â¢s students gave him a Marvel comic book, his fearfulness was transformed into inspiration. He found a way to escape these discouraging feelings through the ââ¬Å"stifled rage and desir e for powerâ⬠(Jones 285) that he had newly found. The popular comic book heroRead More Does a Violent Media create a Violent Society? Essay627 Words à |à 3 PagesDoes a Violent Media create a Violent Society? This issue is one of constant debate, with no real solution. There are many things society as a whole and individuals can do to appease or inflame the issue, however each argument has a counter argument and a counter argument will exist for that and so on. Because it is an issue of such heated debate with no answer or possibility of an answer should we just leave the issue be and choose not to address it further? Or should we make the issue widelyRead MoreEssay about Violent Media Is Good for Kids1069 Words à |à 5 PagesVIOLENT MEDIA IS GOOD FOR KIDS By Gerard Jones In our class book Practical Argument, I chose ââ¬Å"Violent Media is Good for Kidsâ⬠by Gerard Joneson page 36. In this article Jones states and tries to prove that violent media is undeniably good for children. He challenges this by saying what he believes also how he grew up too passive because he was sheltered from the media. Upon hearing that the media has lofty messages of pacifism and tolerance (par.2), his mother had borrowed some comics for himRead MoreEffects of Violent Media on the Youth Essay1700 Words à |à 7 Pagesthe Xbox One, which is perhaps the hottest gift this season. Everybody wants it. But most of the Xbox games like Call of Duty, Assassinââ¬â¢s Creed, and Halo are extremely violent, depicting war, blood, and gore very nonchalantly. The television channel FX constantly shows movies such as the latest Batman trilogy which includes violent depictions of beatings, graphic shootings, dozens of explosions, neck snapping and back breaking, along with choking s, hand to hand combats, and dead bodies. These portrayalsRead More Media Violence and the Violent Male Adolescent Essays2229 Words à |à 9 PagesMedia Violence and the Violent Male Adolescent à à à à à à à à à My research led me to form some new hypotheses on the correlation of violence in the media, namely television, movies, and video games, to the rise in violent behavior in adolescents. For this essay, I will focus on male adolescents. I will use multiple lenses for my research to (1) establish the increase in violent acts by adolescents in the past two decades; (2) use proven research to show the impact of media violence on the individual;Read MoreShould Violent Media Be Banned Essay818 Words à |à 4 PagesShould violent media be banned? Many teenagers are now being introduced into playing or watching violent media at very young ages and society are wondering if they should be concerned about it; they are wondering whether it can cause aggressive behaviour within the children/teenagers. Violent video games and violent action films normally have age restriction son them so that children under the age of 15 or in some cases 18 cannot buy them. You see many teenagers with these games and moviesRead MoreViolent Media Does Not Have an Effect on Children Essay1974 Words à |à 8 Pages Violent media is a prominent part of Americas culture. America is the home to dozens of multimillion dollar industries that specialize in making violent media. This media usually has a rating label on it, categorizing it as being made for young children, teens, or adults. The purpose of this is to protect children from the disturbing and/or violent scenes depicted in the media. Yet, millions of children under the age of 17 still have free access to violent media. However, even though childrenRead MoreEssay on Media Violence Does NOT Cause Violent Behavior2932 Words à |à 12 Pagesthe human psyche. This is an assertion that could be supported, in no small part, by the manifestations o f the human psyche we see in our own violent, erotic and chaotic dreams. As a culture, again with religious fundamentalist and perhaps politically-correct feminist exceptions, we pretty much take these literary forms for granted in terms of their violent and seemingly antisocial content. Parents lovingly read their children to sleep with images of forced drudgery, painful mutilations, and vengeful
Wednesday, May 6, 2020
Compair and Contrast Zombies vs. Teenagers Free Essays
Danger: Zombies and Teenagers are Ahead Mindless and blood lusting bodies fill our streets. Dragging themselves around without purpose or progressive thoughts. One would think that they should close the doors and lock the windows. We will write a custom essay sample on Compair and Contrast: Zombies vs. Teenagers or any similar topic only for you Order Now However its not just decaying zombies that I speak of, its our teens. The biggest difference is the plain fact that teenagers are alive and zombies are undead. While both teenagers and zombies are completely different looking on the outside, on the inside they are very similar. Both are dangerous when they roam in groups. They have no choice of who they are, but I would like to show you how to understand both of them by comparing them to each other. Even how to destroy them. Danger is something teenagers are always getting themselves into, and when zombies are around everything else is in danger as well. Danger can be described as being put in harms way or threatening harm to others. A teenager is dangerous to themselves and other teenagers. They are reckless and donââ¬â¢t think before they act. Being reckless is a serious issue for teenagers because they think they are invincible. Believing nothing bad will happen to them. However because of this thought process, teenagers are the ones who get harmed, or in trouble more often then any other age group. The reason for this is because the people who watch out for them arenââ¬â¢t around at the times when teens are making the important decisions, that hold weather they get good or bad consequences. As a child an adult is all ways there to hold their hand and watch their back. As an older adult after the college years, ones life has calmed down and the realization of mortality sinks in therefore they are more careful about what they do with there bodies and minds. Young adults and teens are new to a world full of wonders, they do much experimenting, to learn the cause and effect of the actions and decisions they make. For example a teenager is about to drive a car with many other teens in the vehicle. One teen turns the radio up and everyone is dancing in there seats, screaming and laughing. The driver is being put in a dangerous situation. With all the distractions, he could do serious damage to the car and everyone in it. Its true that sometimes the driver is fine and nothing bad happens but the situation is still dangerous because of the possibility of a harmful ending. Putting other people in danger is something that zombies do as well. Obviously zombies are dangerous to other people. They attack with no warning. They spread diseases, and donââ¬â¢t even have the thought process to care about who they are hurting. However what is not as obvious is that they are a danger to themselves. A zombie will walk right into danger without realizing they might die. The reason they donââ¬â¢t realize this is because their is only one thing on their mind and that is BRAINS! A zombie will walk straight toward a crazy redneck with a shot gun and wont even flinch at a warning shot. A zombie with continue trying to eat a dog even after someone has chopped an arm or leg off of it. When a zombie wants something they will do anything to get it, and this puts themselves in a whole lot of danger. Similar to a zombie a teenager is dangerous to themselves and others, luckily this behavior of recklessness will change and they will mature as they get older. A zombie on the other hand will never be cured and most likely they will not live very long if they keep their recklessness up. Ever wonder why teens and zombies are never by themselves? Its because they want to protect themselves. Teens like to move in packs and the bigger the pack the better. They go to the movies in a group of three and they meet another group in line for popcorn and they have grown in size. Teens show up at the mall because they know that someone they know will be their. If a teen is somewhere public alone they could be mistaken as a loser, and that would be traumatic for their reputation. Therefore they always have at least four to five buddies with them. Just like teens zombies need to be with other zombies, however its not for the company. Zombies like to go in packs everywhere because if they outnumber people, then they are more likely to be successful at their initiative attack. They are considered much more dangerous when in groups larger then three. If one were to spot a zombie alone they would feel superior and have no problem taking them down. Therefore zombies travel in groups no less then one hundred-sixty-six other brain eating peers. Weather someone is a teenager or a zombie they really donââ¬â¢t have a choice on becoming what they are. Teenagers become teenagers through the lifecycle. Everyone wishes they could skip the hormonal, emotional, and awkward stage in their life, but they cant. Its part of being human. The reason teens are different then other age groups is the crazy thing that happen to their bodies. Which I wont go into because this is not a, ââ¬Å"What is Happening To My Bodyâ⬠pamphlet. Everyone goes through being a teenager, but not everyone will be a zombie. However once someone is bitten they have no choice to becoming a zombie. Its a disease that travels through a violent contact. The only thing one can do to stop it is to not be bit, by fighting back. If you want to know how to destroy a zombie or even a teenager it is all very similar. Go for the brain. A teenagers mind is what keeps them going in life if you make them feel terrible, then they will be miserable. If one were to embarrass them or destroy their reputation then they will never be able to live it down and until their dying day they will have never forgotten about the day their life was destroyed. Harsh? However so is bashing a zombies scull. It is their mind that would need to take damage to be destroyed. This is also the same way zombies are killed. Destroy the brain. Even though zombies donââ¬â¢t use their brains, their body is still dependent on it to be undead. the brain must be smashed or shot or in some way mutilated to make sure the zombie doesnââ¬â¢t come back. Disconnecting the body from the head is not enough. The body will still wander around and the head will still try to bite. The mechanics of this biological phenomenon are not completely understood by scientist yet. However the important thing is that if you kill the brain then you kill the zombie. The mind is a powerful organ for zombies and teens, and if you can take it out then you will succeed in destroying teenagers and zombies. While teenagers and zombies are on different levels of status, they are surprisingly similar to each other in many ways. Being dangerous and stupid are things that are not very positive to their attributes. However they can outnumber any other group. What they must go through is difficult on both of them as well. A teenager goes through body changes and is very sensitive and can be taken down easily through hurtful words. A zombie goes through a disease where they body decays and every one is trying to kill them. It seems like they are on the same boat. I wouldnââ¬â¢t want to meet either one in a dark alley. How to cite Compair and Contrast: Zombies vs. Teenagers, Papers
Tuesday, April 28, 2020
What it Takes to Become an Adult Essay Example For Students
What it Takes to Become an Adult Essay When thinking of the transition from childhood to adulthood, one typically pinpoints a certain age or event. However, is it really the passage of time that makes you into an adult? I believe that its not a certain age, but a variety of events, triumphs, and tribulations that define the transfer from being a child to an adult. Nonetheless, even the true definition of being an adult is a bit skewed. Yes, there are certain conditions you must realize and partake in before reaching adulthood, but can one truly ever claim to obtain and/or practice such circumstances on a daily basis? We will write a custom essay on What it Takes to Become an Adult specifically for you for only $16.38 $13.9/page Order now Adulthood isnt the practice of being a model citizen every second of ones life. In fact, being able to care for yourself, as well as for others, demonstrates true human maturity. Terms such as responsibility, compassion, independence, and so forth all appear in our heads when we think of adulthood, but as humans we cant be perfect. So to put it simply, you do not become an adult overnight, nor can you claim that a single event in your life gave you all the prowess necessary to be an adult. From my 18 years on this planet, I cant claim to have faced all the challenges of adulthood, nor can I claim that I ever will, but certain events in my life, if not giving me the experience directly, have given me insights into the next phases of life. You see, adulthood isnt the final stage of life. Life is an ever-progressing phenomenon with perpetual tasks, hardships and even mysteries. However, I believe that from my experiences I have reached the blossomings of adulthood, entering the new stage from child to adult. A collection of things in my lifetime have started to pave the path to adulthood. There have been a variety of experiences in my life that have made me grow into the person I am today. Firstly, in early 2012, two very significant events happened. I got my first job and earned my drivers license; two things that are very important to a growing adolescent. My job is very important to me. I take a lot of pride in my work and make my best effort to attend to all my responsibilities. Ive gained a plethora of skills and experiences from my work, such as maturely dealing with the needs of customers and pitching in when my employer is short-handed for workers. Being a part of the workforce has taught me not only responsibility, but numerous other skills that have helped me realize the importance of commitment. Shortly after gaining my employment, I received my drivers license, which gave me the freedom of being an adult. This allowed me to gain more independence from my parents, and opened my eyes to the corresponding responsibilities.. It would be impossible for me to list all the experiences and events that have aided in my transition from child to adult within the context of 650 words because the process has been quite complex. As part of the metamorphosis from childhood to adulthood, many things are lost, some good, some bad, but more importantly many lessons are gained that impact us for the entirety of our lives. This transition does not occur sporadically, nor should it. It takes time, experience, and patience to reach the next level of life. Some may claim to know the exact moment when they became adults, and they may not be wrong. In my opinion, it is impossible for a person to acquire all of the knowledge required to be considered an adult in one instance and that adulthood is a true test of the transitions in life that we must all embark.
Thursday, March 19, 2020
Free Essays on Troy
The book the Iliad an epic by Homer which was later followed by the book the Odyssey is one of the most known stories in history. The myth was so historicized some historians believe that the events really did take place. The book the Iliad was recently made into a motion picture which made lots of money. While some critics say the movie was completely off from the book, but I say from whose perspective, a journalist or me a college student looking to see a cool movie with a girl on Friday night. The book the Iliad was an interesting book to read for the fact that it listed as many character as they could and unless youââ¬â¢re an intellectual person people donââ¬â¢t want all those details that teachers will only in the future use on exams and make it twice as confusing. For one the book named too many non important people and it made it three times as harder to remember the important people, unlike the movie which named the major characters like Hector and Achilles. But then another question rises in my head is to say that a man of lesser achievements in the movie wasnââ¬â¢t the main characters? To answer that one must first look at that personââ¬â¢s role and what was his purpose. Iââ¬â¢ll start with Achilles, in the book he is rarely talked about only when major fighting happens and he is begged to help morale the men back to battle. In the book Agamemnon gives a speech to help boast the men courage and morale by saying ââ¬Å"Has shackled me in chains of blindness, hard god! Once he promised me that I would sack the fence.â⬠(Homer/Iliad p102) in the movie the morale was gained by Achilles himself and coming back into the war. Now Achilles in my opinion is the main character because I saw the movie before I read the book so in my mind the movie is the real version for me. Achilles has to be the main the character in that of a hero also because who wants hero to be someone that isnââ¬â¢t as strong or skilled as Achilles who for that ... Free Essays on Troy Free Essays on Troy The book the Iliad an epic by Homer which was later followed by the book the Odyssey is one of the most known stories in history. The myth was so historicized some historians believe that the events really did take place. The book the Iliad was recently made into a motion picture which made lots of money. While some critics say the movie was completely off from the book, but I say from whose perspective, a journalist or me a college student looking to see a cool movie with a girl on Friday night. The book the Iliad was an interesting book to read for the fact that it listed as many character as they could and unless youââ¬â¢re an intellectual person people donââ¬â¢t want all those details that teachers will only in the future use on exams and make it twice as confusing. For one the book named too many non important people and it made it three times as harder to remember the important people, unlike the movie which named the major characters like Hector and Achilles. But then another question rises in my head is to say that a man of lesser achievements in the movie wasnââ¬â¢t the main characters? To answer that one must first look at that personââ¬â¢s role and what was his purpose. Iââ¬â¢ll start with Achilles, in the book he is rarely talked about only when major fighting happens and he is begged to help morale the men back to battle. In the book Agamemnon gives a speech to help boast the men courage and morale by saying ââ¬Å"Has shackled me in chains of blindness, hard god! Once he promised me that I would sack the fence.â⬠(Homer/Iliad p102) in the movie the morale was gained by Achilles himself and coming back into the war. Now Achilles in my opinion is the main character because I saw the movie before I read the book so in my mind the movie is the real version for me. Achilles has to be the main the character in that of a hero also because who wants hero to be someone that isnââ¬â¢t as strong or skilled as Achilles who for that ...
Tuesday, March 3, 2020
How to Tour the Nevada Nuclear Test Site
How to Tour the Nevada Nuclear Test Site The Nevada Test Site is the location where the United States conducted atomic testing. Did you know you can visit the Nevada Test Site, formerly called the Nevada Proving Grounds and now known as the Nevada National Security Site? Here is how to take the tour. Get on the List The Nevada Test Site is located about 65 miles northwest of Las Vegas, Nevada on US-95, but you cant just drive up to the facility and look around! Public tours are conducted only four times a year, with specific dates determined a few months in advance. The size of the tour group is limited, so there is a waiting list. If you want to take the tour, the first step is to call the Office of Public Affairs to get your name on the waiting list for the tour. In order to get accepted for the tour, you must be at least 14 years old (accompanied by an adult if you are under 18). When you make a reservation, you need to supply the following information: Full nameDate of birthPlace of birthSocial Security number Keep in mind the tour date may change if the weather isnt cooperative, so its good to build a little flexibility into your schedule. What to Expect Once you register for a tour, youll get an email confirmation of your reservation. A couple of weeks before the visit, youll get a packet in the mail that includes an itinerary for the trip. The tour is free.Radiation badges are no longer used. In order to get badged for security, you will need to present a drivers license or valid passport (foreign nationals) upon arrival.Expect a full day of activities. Visitors meet in Las Vegas to board a tour bus at 7 am, returning to Las Vegas at 4:30 pm.Youll need to pack a lunch.Dress appropriately. Wear comfortable, sturdy shoes. You will not be allowed to take the tour if you are wearing shorts, a skirt, or sandals! Las Vegas is (very) hot in the summer and (very) cold in the winter, with temperatures ranging anywhere in between the extremes. Consider the season when packing for the trip.You cannot bring in any recording devices or electronics of any kind. Do not bring a cell phone, camera, binocular, recorder, etc. Mandatory checks are conducted. If you are caught with a recording device, youll get thrown out and the whole tour group will be returned to Las Vegas.No firearms are permitted.
Sunday, February 16, 2020
Primary Network Characteristics Assignment Example | Topics and Well Written Essays - 1000 words
Primary Network Characteristics - Assignment Example They will require a wide range of equipment and plant, which will go along the schedule and sequence of activities that have been put in place. Thus, as indicated by Hecht (2012, par. 1), the accomplishment of this project will involve the use of fiber optic cables that are established in the submarine manner. As such, due to the challenges posed by the sea conditions and icebergs, it will be necessary to lay the cables using ships that are meant to work in icy conditions. These are the ice-rated ships (Hecht 2012, par. 3-5). The laying of the cable will need a distribution with the use of bandwidth that is composed of microwaves and terrestrial cables. Among the other equipment that will be necessary for this project include the cables, and repeaters of different wavelengths and capacities (Articfibre 2014, par. 1-5). Buffers or the outer jackets, claddings that are made of glass, as well as calculators will be important in finding the distance and fiber loss during the operation (I MC networks 2009, p. 9). It will be vital to note that these activities can only be performed during particular months of the year. In order to install the fiber optic, it could be wise to use a bandwidth of about 1 or 10 GB/s since it has the capacity to enhance the performance required. However, in the installation of the fiber optics, there are certain specific considerations that have to be made. They include the security of the fiber optic cables and their related expenses. The cables are left exposed and therefore hackers can gain access. The installation of fiber optics is associated with many expenses thus proper planning must be enhanced to ensure cost minimization.
Sunday, February 2, 2020
Management week 8 Dis Board Article Example | Topics and Well Written Essays - 250 words
Management week 8 Dis Board - Article Example en a team or a group of people need to move towards a specific direction, feedback can be used to help determine the required changes so as to enhance performance. Thirdly, positive feedback helps in developing the required skills to succeed in a given task by creating good understanding. Finally, when positive feedback is given, it goes a long way showing others that they are valued. This way, they will see the need to continue performing optimally or make the required changes that will enhance their performance. Positive motivation has helped me in several work situations. One of such situations was when I was working on a report on the new changes that were required to make the team in my area of work to improve its output and productivity. Having spent a lot of time doing the draft, I kept doubting if it would be accepted. Hiver, after presenting the initial report and getting positive feedback that I was in the right track, I was very motivated. I went ahead to come up with a very concrete and good final
Saturday, January 25, 2020
Role of Edutaintment for Safe Motherhood Education
Role of Edutaintment for Safe Motherhood Education THE PRACTICE OF SAFE MOTHERHOOD: CAN EDUTAINMENT BE THE WAY FORWARD? INTRODUCTION The Safe Motherhood concept was delivered worldwide to bring about reduction in maternal mortality. This concept has been successful to some extent but it has been discovered that Nigeria is yet to meet its 75% target of curbing mortality by year 2015 to its lowest ebb. Despite the Safe Motherhood initiative in Nigeria, pregnant and Post-partum women especially those in the rural communities still do not have a favorable disposition to practicing safe motherhood. This could be as a result of poor knowledge of these women about the concept of safe motherhood (Igbokwe and Adama, 2011). However, Mass Media as channels of mass communication is to inform, educate and persuade its audience to accept new ideas and technologies to enhance their living conditions. Edutainment is a form of communication used for the purpose of entertaining and education to create social change. Edutainment uses popular entertainment such as dramas, folklores, documentaries, talk shows and discussions to tackle social issues for the purpose of inciting change and promote positive attitude. Soul City Institute (2013) further defines edutainment as: any communication project that sets out to use popular culture to educate and challenge people. Edutainment is not a theory but a strategy to bring about individual and social change. It uses popular entertainment formats to tackle serious social issues in an innovative and entertaining way Singhal and Rogers (1999) points out that ââ¬Å"Entertainment-through television, radio and music is one of the most effective communication strategies for reaching the public to promote family planning and other public health issuesâ⬠. Therefore, mass media can shape health beliefs of people while promoting knowledge and awareness of health messages. The Mass media play a major role in peoples everyday lives. This is evident in how routine it has become to watch television, listen to the radio, surf the internet, and read newspapers and magazines. Television as a major tool of information dissemination and entertainment programs is a veritable tool for mass education. Since it is a visual medium, women can see examples of the various family planning methods available and safe health practices can be demonstrated during edutainment programmes. Also, television has the capacity to reach larger groups of women simultaneously thus, helping to facilitate and create awareness amongs t women on prevention and ways to handle health issues they are plagued with. STATEMENT OF THE PROBLEM Reduction in maternal deaths has become the major preoccupation of stakeholders in maternal health today as evidenced by its frequent appearance in most developmental objectives in the world today. It is also the 5th goal in the Millennium Development Goals (MDGs). World Health Organization (WHO) citing Graham indicates that the women dying are in their prime of life: they are crucial to society and the economy; they sustain the next generation; they make up more than half the workforceâ⬠. The discussion paper of Tinker et al (2000) reported that ââ¬Å"womens low socioeconomic status and reproductive role expose them to risks of poor health and premature deathâ⬠. They assert, further, that Womens reproductive biology, combined with their lower socioeconomic status, results in women bearing the greater burden from unsafe sex which includes both infections and the complications of unwanted pregnancy. Over the years, women in Nigeria and Africa, at large, have been plagued with health issues such as high mortality in childbirth. To combat maternal morbidity/mortality and other health issues that women face, there is the need for quality reproductive health services, such as medical care which includes family planning, safe pregnancy, delivery care, treatment and prevention of sexually transmitted infections, such as HIV and AIDS. Kalyani (2007) notes that while health issues on women are rampant and on the increase, the attitude of women towards seeking information on their health is low with little done in research about how women seek information pertaining to their health. Studies have revealed further that not all women understand and are able to process the health messages they come across. An example is the Findings from the National Adult Literacy Survey which indicate that ââ¬Å"almost half of the U.S. adult population has limited literacy skills, and one-quarter is functionally illiterateâ⬠. Flores, Weber, Kilker, Dang and Lindsey (2007) observe that this is so as Health information often includes ââ¬Å"technical terms and concepts that are hard to understand, regardless of ones level of education or literacyâ⬠. However, reading, understanding, and using health information can be a difficult task for those with limited literacy skills. Thus, the need for media programmes on health, as media cut across literacy level. To reduce these health challenges to their lowest ebb, television as a medium of entertainment and information seek to keep the ââ¬Ëwomanââ¬â¢ educated and informed. There is the need for media education on health a s a result of the complexity and population of the Nigerian society which health workers cannot handle alone. Objectives of the study The general objective of this study is to examine the extent to which edutainment programmes on the broadcast media have helped in promoting the practice of safe motherhood. Other objectives are: To determine if pregnant and post-partum women through Health edutainment programmes on the broadcast media have the knowledge of Safe Motherhood. To find out if pregnant and post-partum women practice the health messages on Safe Motherhood they watch or listen to. Research Questions To what extent do pregnant and post-partum women have the knowledge of Safe Motherhood as a result of health edutainment programmes on the broadcast media? What is the attitude of pregnant and post-partum women to the practice of Safe Motherhood? Scope of the study This thrust of this study is to investigate the extent to which edutainment programmes on the broadcast media have helped in promoting the practice of safe motherhood. This study will cover pregnant and post-partum women in Ilisan Community within the ages 15 to 49 years of age. Ilisan community is a town located in Ikenne Local government area of Ogun state. It is a community that has a number of her female populations is either illiterate or semi-literate. It is also a community that has a high rate of teenage pregnancy. LITERATURE REVIEW Safe Motherhood Geefhuysen (2000) defines Safe Motherhood as is the ââ¬Å"culmination of services for women from the beginning of life and the ability to choose when to become pregnantâ⬠. The concept of safe motherhood includes taking necessary steps when preparing to get pregnant such as adequate preparation for the well- being of the mother and the growing fetus before conception and taking appropriate measures to ensure successful delivery. The purpose of Safe Motherhood initiative is to decide when to get pregnant through the use of contraceptive to promote family planning, prevent maternal mortality by saving for possible maternal emergency while receiving healthcare delivery service from a trained provider. This is affirmed by Igbokwe and Adama (2011) who pointed out that ââ¬Å"safe motherhood is aimed at preventing maternal and prenatal mortality and morbidity. It also enhances the quality and safety of womens live through the adaptation of combination of health and non- health strateg iesâ⬠Maternal mortality The issue of maternal mortality has been a growing concern to world leaders and stakeholders in this field. ââ¬Å"Maternal mortality is a single most important health issue facing obstetricians, gynecologists and Nigeriansâ⬠(Society of Obstetric and Gynecology of Nigeria- SOGON). This problem arises from unequal power between men and women in sexual relationships which expose women to involuntary sex, unwanted pregnancy, and sexually transmitted infections including HIV and AIDS (Tinker, Finn and Epp, 2000). The world maternal ratio also necessitated the 5th Millennium Development Goals to have reduced maternal mortality ratio (MMR) by year 2015. The recent report by United Nations Fund for Population Activities UNFPA (2014) shows that: Globally, the maternal mortality ratio dropped by 45 per cent between 1990 and 2013, from 380 to 210 deaths per 100,000 live births. Worldwide, almost 300,000 women died in 2013 from causes related to pregnancy and childbirth. Maternal death is mostly preventable and much more needs to be done to provide care to pregnant women. Health Messages and Edutainment Programmes Yahaya, Fadairo and Ogunele (2009) explain that information, entertainment and education are very important to women. Therefore, health communicators should always include some elements of information, education and entertainment in their health and other development messages targeted at women in order to attract or gain their attention. They summarised from their study in Lagos that women experienced a serious improvement in knowledge and a positive change in their health behaviour as a result of watching and listening to various health programmes on Entertainment-Education channels. For instance, 61.2% indicated serious improvement in knowledge, while 59.8% had a positive change in their health behaviour due to programmes on family planning on television and radio respectively. Also Farhana Ahmed (2008), in their report, affirms that mass media techniques that combine entertainment with health education are particularly effective in producing behaviour changes. This they discovere d in their findings on a soap opera in Tanzania ââ¬Å"Twende na Wakatiâ⬠(Letââ¬â¢s Go with Times) ââ¬Å"which has influenced about one- fourth of its listeners to adopt family planning methods and HIV/ AIDS prevention while 65.5% of the participants said they discussed pregnancy and maternal health issues after the campaignâ⬠Also, several studies, Singhal and Rogers, 1999; Brown and Singhal, 1999 and Tufte, 2002 point out that Entertainment-through television is one of the most effective communication strategies for reaching out to the public to promote social change. Singhal and Rogers (1999) also notes that television soap operas, popular music, street theatre and comic books have all been used to educate the public about such health issues as family planning, HIV and AIDS prevention, environmental health, female equality, improved sanitation, female genital mutilation (Singhal, Rogers, 1999). Findings from their study showed that entertainment-education in developing countries confirm that the strategy changes behavior. Methodology Design: The structured questionnaire for the survey was designed in English but the data collectors were trained to interpret the questions in the local dialect. The design is considered appropriate because the study will essentially focus on people. Setting: The study was carried out in Ilisan Remo, Ogun State. Ilisan is a community located in Ikenne local government area of the state. It has a primary health care center, a teaching hospital owned by Babcock University and a few other privately owned hospitals that provide medical care. Ilisan also have a couple of Traditional Birth Centers which a great number of pregnant women visit. Procedure: a total of 110 copies of the questionnaire were distributed. The copies of the questionnaire were administered at homes, shops, the market place, private offices, hospitals, institutions, churches and mosques. 100 were returned and analysed using descriptive statistics such as frequency tables and percentages. Brown, W. and singhal, A. (1999) Entertainment-Education Media Strategies for Social Change Promises and Problems. In Demen, D. and VIIInnmath, K. (ed.), Mass Media Social Control and SocIal-Amea. Iowa: Iowa State Univenity Press. Retrieved from http://utminers.utep.edu/asinghal/Articles%20and%20Chapters/singhal_usdin_scheepers_goldstein_japhet.pdf Farhana, S. Ahmed, J. (2008).Entertainment-Education to Promote Safe Motherhood: In the Context of Bangladesh. Canadian Social Science 4(4). Canadian Research Development Center of Sciences and Cultures. Retrieved from http://www.questia.com/read/1P3-1584808581/entertainment-education-to-promote-safe motherhood Flores, L., Weber, K, Kilker, P., Dang, P. Lindsey, L. (2007). Health Education Efforts in Uncertain Times: Helping to Ensure Healthy Pregnancies in a Time of Crisis. American Journal of Health Education. Vol 38(4). Gale Group Geefhuysen, C. (2000) Safe Motherhood in Indonesia: A Task for the Next Century. In: Berer, M. and Ravindran, S. (ed.) Safe Motherhood Initiatives: Critical Issues. Retrieved rom http://www.rhmjournal.org.uk/publications/SafeMotherhood.pdf Igbokwe, C. and Adama, G. (2011) knowledge and practice of Safe Motherhood among childbearing mothers Attending maternal and child health (mch) Clinics in nsukka health district. Journal of Research in Education and Society Vol.2(1). Retrieved from http://www.icidr.org/jres_v2nos1_april2011/Knowledge and Practice of Safe Motherhood Initiative (SMI) among Childbearing Mothers attending Maternal and Child Health (Mch) Clinics in Nsukka Health District.pdf Kalyani, A. (2007). Information-Seeking Behavior of Women in Their Path to an Innovative Alternate Treatment for Symptomatic Uterine Fibroids. Journal of the Medical Library Association, 95(2): 164-172. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1852624/ Soul City Institute (2013) Edutainment: Using stories media for social action and behaviour change. Retrieved from http://www.google.com.ng/url?sa=trct=jq=esrc=ssource=webcd=2ved=0CCIQFjABurl=http%3A%2F%2Fwww.soulcity.org.za%2Fresearch%2Fpublished-articles%2Fedutainment-using-stories-and-media-for-social-action-and-behaviour-change%2Fdownloadei=VnP9VNuaI8vfapqSgYAOusg=AFQjCNFzf-ESEywiAXHtnk-_U6bJe_jkAAsig2=QdJ7fbpcrFiNaSEMB4mSNQbvm=bv.87611401,d.d2s Singhal, A. Rogers, E. (1999). Entertainment-Education: A Communication Strategy for Social Change. Mahwah, NJ: Lawrence Erlbaum Associates. Retrieved from http://www.questia.com/read/57758858/entertainment-education-a-communication strategy SOGON, (N/A).Fact Sheet on Reproductive Health in Nigeria: Facts and Figures. Tinker, A., Finn, K. Epp, J., (2000). Improving Womenââ¬â¢s Health Issues and Interventions. Health, Nutrition, and Population Family (HNP). The International Bank for Reconstruction and Development / The World Bank. Washington, DC 20433 Tufte, T. (2002) Edutainment in HIV/AIDS Prevention. Building on the Soul City Experience in South Africa. In: Servaes, J. (ed.), Approaches to Development Communication, Paris: UNESCO. Retrieved from http://www.unesco.kz/publications/ci/hq/Approaches%20Development%20Communication/CHP13.PDF UNFPA (2014). The Millennium Development Goals Report. Retrieved from http://www.un.org/millenniumgoals/2014%20MDG%20report/MDG%202014%20English%20web.pdf WHO (World Health Organization) (2013, February 6-7). Meeting to Develop a Global Consensus on Preconception Care to Reduce Maternal and Childhood Mortality and Morbidity. A Meeting Report presented at the World Health Organization Headquarters, Geneva. Retrieved from http://www.who.int Yahaya, M., Fadairo, S and Ogunele, A. (2009). Attitude and the Effect of Health-based Entertainment-Education Strategies on the Knowledge and Behaviour of Women in Lagos State. International Journal of Agricultural Economics Rural Development 2 (1): 2009. Retrieved from http://www.ijaerd.lautechaee-edu.com
Friday, January 17, 2020
Sms Banking
Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India [emailà protected] com Abstractââ¬â M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain te xt form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2].Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, i t is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objec tive is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into t he GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumerââ¬â¢s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumerââ¬â¢s mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the bankââ¬â¢s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily ha cked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired tra nsaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techn iques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and /or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerââ¬âside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuou sly. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senderââ¬â¢s address by altering respective field in origin al SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fieldsââ¬â¢s to accommodat e for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fieldsââ¬â¢s as shown in above figure.Account Number: ââ¬â It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: ââ¬â It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted ses sion keys stored in file, which will be stored on customer handset. ISSN : 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: ââ¬â This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: ââ¬â Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message ââ¬Å"Wrong Account Numberâ⬠to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message ââ¬Å"Wrong Pin Numberâ⬠to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side ââ¬Å"Fake Transactionâ⬠and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framewor k and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm donââ¬â¢t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation propert y of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side applicati on. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, ââ¬Å"Mobile banking Services in bank areaâ⬠, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,â⬠Spanish Mobile Banking Services: An Adoption Studyâ⬠, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,â⬠Improving Mobile Banking Security Using Steganography ââ¬Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,â⬠Mobile Banking Services Based On J2ME/J2EEâ⬠, CADSMââ¬â¢2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,â⬠Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literatureâ⬠, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,â⬠Secure end-to-end mobile payment Systemâ⬠. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,â⬠MMPS: A Versatile Mobile-to-Mobile Payment Systemâ⬠, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,â⬠An Efficient Steganography Scheme for M- Commerceâ⬠. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â⬠Text Steganography in SMSâ⬠, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, â⬠Secure Display and Secure Transactions Using a Handsetâ⬠, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, ââ¬Å"A Novel Security Mobile Payment System Based On Watermarked Voice Chequeâ⬠. M. Shirali-Shahreza, ââ¬Å"Stealth Steganography in SMSâ⬠, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, ââ¬Å"Security of Mobile Bankingâ⬠. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud ,â⬠Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data typesâ⬠, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,â⬠Implementation of LSB Steganography and its Evaluation for various bitsâ⬠. ISSN : 0975-4024 Dec 2011- Jan 2012 479 Sms Banking Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India [emailà protected] com Abstractââ¬â M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain te xt form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2].Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, i t is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objec tive is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into t he GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumerââ¬â¢s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumerââ¬â¢s mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the bankââ¬â¢s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily ha cked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired tra nsaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techn iques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and /or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerââ¬âside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuou sly. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senderââ¬â¢s address by altering respective field in origin al SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fieldsââ¬â¢s to accommodat e for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fieldsââ¬â¢s as shown in above figure.Account Number: ââ¬â It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: ââ¬â It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted ses sion keys stored in file, which will be stored on customer handset. ISSN : 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: ââ¬â This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: ââ¬â Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message ââ¬Å"Wrong Account Numberâ⬠to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message ââ¬Å"Wrong Pin Numberâ⬠to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side ââ¬Å"Fake Transactionâ⬠and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framewor k and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm donââ¬â¢t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation propert y of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side applicati on. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, ââ¬Å"Mobile banking Services in bank areaâ⬠, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,â⬠Spanish Mobile Banking Services: An Adoption Studyâ⬠, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,â⬠Improving Mobile Banking Security Using Steganography ââ¬Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,â⬠Mobile Banking Services Based On J2ME/J2EEâ⬠, CADSMââ¬â¢2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,â⬠Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literatureâ⬠, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,â⬠Secure end-to-end mobile payment Systemâ⬠. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,â⬠MMPS: A Versatile Mobile-to-Mobile Payment Systemâ⬠, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,â⬠An Efficient Steganography Scheme for M- Commerceâ⬠. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â⬠Text Steganography in SMSâ⬠, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, â⬠Secure Display and Secure Transactions Using a Handsetâ⬠, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, ââ¬Å"A Novel Security Mobile Payment System Based On Watermarked Voice Chequeâ⬠. M. Shirali-Shahreza, ââ¬Å"Stealth Steganography in SMSâ⬠, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, ââ¬Å"Security of Mobile Bankingâ⬠. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud ,â⬠Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data typesâ⬠, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,â⬠Implementation of LSB Steganography and its Evaluation for various bitsâ⬠. ISSN : 0975-4024 Dec 2011- Jan 2012 479
Subscribe to:
Comments (Atom)