Monday, September 30, 2019

Being Mindful Essay

Being Mindful â€Å"Mindfulness described as being in the present moment† (Wood, 2010). The present moment holds a potentially infinite number of things going on both inside the mind and outside the mind. A person is not completely lost in an activity, nor are they completely lost in thought, whether a person is eating a meal, or playing a musical instrument, they are aware of what they are doing. If a person gets all of the worries and regrets out of their mind, it is easier to focus on the things that are happening in the present. A person simply observes whatever is happening, without taking sides or forming attachments to any one single mindset. They are mindful when the mind is open to new thoughts, new ideas, new possibilities, and new ways of thinking. Being mindful contributes to greater effectiveness in the here and now, not the there and then. A person’s mind is not automatically blinded by judgment, evaluation or any one rigid way of thinking, it is the person themselves that create this mind set. In a person’s day-to-day experiences, the conscious mind is always struggling to keep up with the endless flow of changes in the external world. To make the job easier, the mind creates a series of generalizations and assumptions about the world, so we as people believe that we do not have to do as much thinking. Whatever is going on, whether we are working, running, or enjoying a meal, we should always be aware of what is going on around us. Someone should not be overburdened with worries or even dreams of the future, and should not be full of regret or longing for any part of the past, just enjoy experiencing the present moment to its fullest. These three things are important while being mindfulness: Observing with all our senses, one-mindfully (think of one thing at a time), notice when the mind goes somewhere other than the present, and when it does that’s when one needs to then pull it back. University of Rochester researchers report that individuals who are mindful are in tune with their emotions and do act in ways that are compatible with their values and interests. Mindfulness, which is an enhancement of attention too, and awareness of the present, can be linked to better moods, higher self-esteem, a greater life satisfaction, and optimism in all signs of positive psychological health (Rochester, 2010). â€Å"Mindfulness appears to heighten the joys one can experience in everyday events, as well as to be in better touch with what one really needs and feels, It helps people make better choices in a complexworld,† says Ryan, a professor of psychology and psychiatry. To be mindful a person has to put aside their worries about the future and regrets about the past. This can be really liberating since much of what upsets us has happened in other times than the present. I remember listening to my child, tell me about the week they ahead for them of school, but the whole time I was thinking about work that day and what I was going to have to accomplish tomorrow. As the week went on my child came to me and said,† Mommy do you remember I told you about our field trip that we have tomorrow, and you said we could go tonight and get my lunch for the fieldtrip? † Then I realized that she had told me all about it, on that day she was speaking to me; my mind that day had been filled with worries of what had happened at work and of what was, going to happen at work, not on the present moment, it made feel agitated that I had done this to my child. That I had not been very mindful to my child’s needs as I was more concerned with work and the days ahead of me, rather than what I had right there in front of me, that should have been the only thing on my mind at that present moment. In conclusion if more people were mindful to what is in the present moment, be it a parent that is listening to their child, or a student listening to their instructor, parents may have a better understanding of their children and students may have a chance to pass their next test. Being mindful can be a difficult change, but with practice, it is a change many people can make successfully. To have this success a person must remember these three elements: 1) observing with all the senses, 2) one-mindfully (think of one thing at a time) and 3) notice when your mind goes somewhere other than the present, then that is when one needs to pull it back. References Rochester (2010) RetreiviedOctober 2010 From http://www. rochester. edu/news Wood, J. T. (2010). Interpersonal Communication. Wadsworth Cengage Publishing.

Sunday, September 29, 2019

Manager Roles Essay

1. â€Å"A Manager’s role is dynamic and complex.† Discuss this statement, supporting your answer with reference to appropriate theory and practice. Manager’s role is to allocate resources and directs the operations, by making the best use of human and financial and material resources to the organization. Managers are required to do planning, organizing, commanding, coordinating and controlling. Fayol’s theory of a management function which is the POCCC allows the organization to have more effective and efficient in goods and services than other competitors. The dynamic and complex work of a manager is based on interpersonal, informational and decisional roles. Given the above roles according to Henry Mintzberg, the managers are placed in different areas to perform individual task or multiple tasks. Interpersonal roles require a manager to deal outside business like as figurehead who represent as a representative of the company to attend outside meetings a nd gathering. Commanding is required in manager to direct the department to meet its requirement and coordinating the events to ensure the process of the movement. A good manager spends more time outside his office than in his office, allowing himself to liaise to outside and deemed helpful to the organization. A manager monitors his/her own department by understanding the people involving him/herself to the conversation and receiving the information. Being a the head person, allow the first-hand news or information to receive and screen, hence given the choice of disseminating down to the people in the organization. A good manager will decide whether is appropriate to share and distribute information which is useful to others. Company spokesperson can be a manager to relate official company information to inside and outside of the organization like publicity and benefits of the company. Mainly managers are in this role which is the decisional role; allow him/her decision to plan the changes in th e good and services. Restructuring of the entrepreneurial maybe heavily depends on the managers which refer to the top management. Managers must have the power to control the internal factor like strikes, which company cannot afford stoppage of work. Important factor of dealing customer is required to ensure satisfaction of the customers. Manager must be reasonable to determine the pricing of their products sold to the customers and negotiating with them in a professional way. A good manager take cares of their people by allocating sufficient time and personnel in the organization. Pay has to be determined accordingly to individual’s work and ensuring the fairness among the fellow workers.

Saturday, September 28, 2019

The Stanford Prison Experiment Essay Example | Topics and Well Written Essays - 750 words

The Stanford Prison Experiment - Essay Example Such a trend was mostly observed during the post war era, where researchers displayed a keen interest in deciphering human behaviour associated with the two traits mentioned above and understands the psychology of people who showed increased levels of conformity and obedience to their authorities. Such an observation was primarily based on the Nazi concentration camps and the likes, where despite the immorality of the acts, people were seen to be submissive and obeying the orders given to them (Kassin, Fein, Markus, 2010; Smith, Mackie, 2000; Fiske, 2009). Zimbardo’s Stanford Prison experiment: This experiment was conducted to study the psychological impact of prison life on the prisoners. As a part of this experiment, regular students were selected to perform the roles of prison guards and prisoners and were made to go through the exact same routines, as is usually observed in prisons. Newspaper advertisements were formally given out to invite ‘participants’ to p articipate in the experiment, and those who responded were ‘arrested’ without a prior warning and made to go through a thorough physical examination, similar to one carried out on real criminals. Such sudden and unexpected ‘arrests’ of the regular college going students, took them by surprise and the students were reported to experience mild shock, and humiliation due to the whole exercise (prisonexp.org, 2011). The experiment was deliberately designed to imitate the scenes from real prisons and steps were taken to disgrace the prisoners, thus resulting in a series of negative social, emotional, and psychological repercussions. The study, unlike other experiments followed all the major ethical considerations, and did not involve any kind of deception or tricks, it received widespread criticism for the unethical nature of the study. This was mainly because of reports of the participants being made to go through extreme social, psychological and emotional tur moil and the fact that they were deliberately exposed to situations involving high amount of stress. The proponents have argued that the experiment conducted were ethical in nature, since the participants were clearly informed about the type of study they have enrolled in. However, the opponents and critics have stated that the information provided to the participants was incomplete in nature, as their consent was taken based on insufficient data. The participants of this study were arrested without a prior warning or information which was least expected leading to stress and emotional turmoil (Shaugnessy et al., 2006). There were widespread criticisms regarding the authenticity and validity of the experiments conducted, especially with regard to the manner in which the study was replicated. It was argued that there is no way to replicate a real prison and hence highly impossible to extract similar reactions from ordinary individuals, since there is a vast amount of difference betwe en regular college going students and hardened criminals. Over and above the questions regarding the plausibility of the study, there were serious concerns regarding the credibility of the study as well, since critics argued that the study was highly generalized in nature and the observations could easily have been made by observing / studying the prisoners from Nazi concentration camps. Also, the study aimed to completely imitate the behaviour of prisoners from popular prison scenes and hence there was a

Friday, September 27, 2019

Proposal Design Essay Example | Topics and Well Written Essays - 750 words

Proposal Design - Essay Example The instances of the observed conduct disorder (if any) will be recorded. Contrary to the requirements of the ordinary scientific studies, this type of research doesn’t require any control group. For this reason, most of the experimental designs will hardly fit in this study. The most appropriate experimental design for this kind of study would be direct observation, since the symptoms of the conduct disorders are observable (Kenneth & Bruce, 2014). The observation method supports the use of between-subjects research design. In this research, the target population is composed of the patients who underwent conduct disorder treatment, either through the group or home therapy methods. Due to the nature of the target population, each member should be given an equal opportunity of forming the sample group. This is because the treatments that each of the members underwent were similar. In this research therefore, the sampling technique will be simple random sampling. This technique will give each of the members equal chances of being selected to form the sample group. The sample size will be made up of 30 participants, in an equal number, across the two treatment methods. 15 participants will be randomly selected to as representatives, depending on the method of conduct disorder they were subjected to. The nature of this study is comparative in nature (Thorndike & E. L. 1913). For this reason, as opposed to the ordinary scientific researches, this study would not require splitting the sample group into control and experimental groups (Lacort & M. O, 2014).  . The study compares the effectiveness of the home and group treatments for the treatment of conduct disorders. For this reason, in this study, the observations will be made on the persons treated under each category of treatment. The effectiveness of each treatment option will be determined by considering the number of

Thursday, September 26, 2019

Review of a Research Document about Physical Education Literature

Of a Research Document about Physical Education - Literature review Example Review of a Research Document about Physical Education In this regard, a database search was carried out using the keywords / phrase, â€Å"assessment† â€Å"motivation† and â€Å"physical education† using the Education Resources Information Centre (ERIC), where a direct link was provided. The link, however, contained only an abstract similar with the one provided at ERIC and not a full-text paper. Another search was conducted with Google Scholar using the same keywords / phrase. The second phase of the search yielded the full-text article by Standage, Duda and Ntoumanis (2006) in portable document format (PDF). 2. Description of paper Standage, et al (2006) ventured to evaluate the association between the motivational processes among secondary school students of physical education (PE) and their teachers’ ratings of their effort and persistence. Some 394 British students of a secondary school and nine PE teachers voluntarily participated in the study. The study addressed the following research problems: 1. In vestigation of a model of motivational processes predicated on the self determination theory; 2. Verification of the adequacy of confirmatory factor analysis of the measurement model; and 3. Performance of structural equation modelling on the following hypotheses: (a) perceptions of an autonomy supportive environment would positively predict autonomy, competence and relatedness; (b) autonomy, competence and relatedness would positively predict self-determined motivation; and (c) self determined motivation would positively predict positive teacher ratings of student effort and persistence.... theory (SDT) of human motivation in the individual – level, which asserts that â€Å"humans are innately oriented toward growth and health† (Deci and Ryan, as cited in Fortier, Williams, Sweet, and Patrick, 2009, p.156; Deci and Ryan, 2007). SDT impinges on the assumption that the social context influences individual outcomes, including motivation (Weiss and Amorose, 2008; Standage, et al., 2006). In this regard, the social environment can either nurture or hinder an individual’s active, integrating nature as a human being. One such component of the social environment in this study is the PE teacher. Data was gathered from two different state schools in southeast England after ethical requirements have been complied with, based on the standards set by the British Psychological Society. This includes the use of students (i.e., human subjects) in the study, and consent from the high school principals in their capacity as in loco parentis, among others. A multi-sect ion inventory was administered to the student-participants after the researcher has discussed, among others that: responses in the inventory are neither correct nor wrong; the PE teacher will not be able to view their responses to the inventory; and the respondents’ anonymity and the confidentiality of their responses will be safeguarded. Teachers provided their ratings for each student’s motivated behaviour in the PE class in terms of effort and persistence. Self-reported responses were compared with the teacher ratings through a coding system devised by the researchers. The multi-section inventory measured the following variables: autonomy support, autonomy, competence, relatedness, motivational regulations (i.e., intrinsic motivation, identified regulation, introjected regulation, external regulation,

Wednesday, September 25, 2019

The Use of Animals in Psychological Research Essay

The Use of Animals in Psychological Research - Essay Example This research has assisted in the understanding of psychopathological conditions which include schizophrenia and depressive disorders as well as the assessment of the untoward effects of medications used in the treatment of psychological conditions. With the progression of the human understanding, ethics have come into existence and the use of animals in research has been questioned from the ethical point of view. To overcome these problems the American Psychological Association has developed ethical guidelines for the use of animals in this type of research. The main points include the respect for the law of the relevant country and area with regards to experimentation as are applied to the experiments conducted on human beings. The animals that are being used in the process should be under the watch of special overseers who possess knowledge with regards to the proper requirements of the animals. TThis personnel should also guide the researchers regarding these requirements so that the animals are properly taken care of during the experiments. The other important guideline presents the fact that the animals should not be harmed and given unnecessary pain. To learn and progress in any scientific field, research and experimentation is an important part of the process. Hence I believe that animal research is fully justified where it serves this purpose. I believe that to understand completely the functioning of the human brain and the psychological working of the human being, research is essential and using of animals for the right purpose is totally justified. If research serves to enhance the quality of life and works towards the formation procedures which can treat psychological conditions, it should be allowed.

Tuesday, September 24, 2019

Needs to be a current argument of something in the health field some Research Paper

Needs to be a current argument of something in the health field some type of controversy - Research Paper Example They ‘without causing’ any harm to the child will help the child body produce antibodies, which will stay in the body for a longer time, fighting off viruses and bacteria in future as well. However, this vaccination process is not without controversy because there is a view among particular sections of population that it could lead to Autism. Autism is a developmental disorder of brain function. Symptoms of Autism usually occur before the age of 3 and include; impaired social interaction, problems with verbal and nonverbal communication and imagination, and unusual or severely limited activities or interests. People with Autism can exhibit a wide variety of symptoms and behaviors, thus Autism is considered a spectrum disorder. The exact cause of Autism was not yet cornered. However, researches believe it can be caused by specific genes. Other researchers link Autism with vaccinations. Still others believe toxins and pollutants could cause it. Among these reasons for Autism, the reason that vaccination could cause Autism has been subject of controversy for some time, with one section opposing it while another section believing it. The crux of the controversy is that vaccines given to children as part of immunization for various diseases could act adversely and could damage the brain regions leading to Autism. This controversial news entered the public domain in 1998, when British gastroenterologist Andrew Wakefield and his team published an article in The Lancet focusing on the detrimental role of MMR vaccines in causing Autism. (Godlee, Smith and Marcovitch 77). Wakefield and his team examined the digestive tracts of 12 children with behavioral disorders, nine of them being Autistic, who were given MMR (measles, mumps, and rubella) vaccine. On examination, they found that the 9 Autistic children had inflammation of the intestines. Based on this

Monday, September 23, 2019

Technological Advancements in Urinalysis Research Paper

Technological Advancements in Urinalysis - Research Paper Example However, with time, the analysis of urine became exaggerated, such that it violated the privacy and dignity of the patients, resulting in the advancement where urine testing progressed to the use of urine only, without the presence of the patient like was happening before. In the ancient times, the tests of urine were used as the primary method of determining the state of human health. This has progressively changed with the advancement in medicine, such that currently, the analysis of urine is only used to diagnose certain medical conditions only (Armstrong, 2007). Â  The history of urine analysis indicates that at around 4000 BC, urine was used to test the medical condition that is referred in modern-day urinalysis as diabetes, through putting some urine of different patients on the ants path, such that the ants would be attracted to the sweet urine, which would indicate that the patient was suffering from a certain health anomaly (Diamandopoulos & Actuarius, 2001). Later at around the second century, the testing of urine changed to the practical observation of the patients urine condition at around the fourth century, (460–355 BC) where the urine was observed for bubble components and if the bubbles were found to be present in large numbers, then the patient was declared to be suffering from a kidney disorder (Armstrong, 2007). However, it is not until six centuries later, at around (AD 129–200), when the accuracy of urinalysis was attained, with the first description of urine, not as a residual of body tissues, but as a residu al and filtrate of blood, by Galen, a Roman scientist (Armstrong, 2007). Galen made the testing of urine more specific to certain medical conditions, by observing different anomalies in urine production and then relating quantities of urine produced to different medical conditions.

Sunday, September 22, 2019

The Comparison of Conrad Josephs Heart of Darkness and Ford Coppola A Essay

The Comparison of Conrad Josephs Heart of Darkness and Ford Coppola Apocalypse Now - Essay Example Unlike in the film, Marlow harboured no ill intentions towards Kurtz (Willard set out to kill Kurtz). He chose to honour Kurtz by delivering his letters to their specific recipients (Conrad 55). Coppola based his film in Vietnam during the war era, which contrasted the novels setting. Conrad's novel was set deep in the heart of Central Africas Congo. The contrast in the plot, main characters’ names and setting represent more obvious, overt differences between the novel and film. One can describe both Marlow and Willard as determined, focused individuals whereby unforeseen challenges did not deter them from their specific missions. The fact that they were both able to meet Kurtz attests to their extreme determination. For example, Marlow remained hopeful about his journey despite finding the ship assigned to him wrecked and in need of repairs, which were likely to take a long time whereas Willard persevered the volatile and brutal conditions present in Vietnam during the war (Coppola; Conrad 30). In addition, both characters held leadership positions; Marlow was the soon-to-be captain of the ship assigned to him by the Ivory Company whereas Willard served as a Captain in the US Army Special Operations unit. However, Willard and Marlow had contrasting personalities. Willard was more brutal whereby he exhibited psychotic behaviours that were inhumane; for example, he brutally murdered Kurtz with a machete and departed from the gruesome scene unremorseful. Despi te the fact that Willard was simply following orders, his choice of execution method and lack of sympathy indicated a heightened predisposition to engage in brutal, psychotic tendencies. On the other hand, Marlow was more compassionate, as he empathized with others; for example, he chose to lie about Kurtz’s last words when he delivered the letter to Kurtz’s widow who was distraught almost one year after her husband’s demise. In addition, he did not refuse to deliver Kurtz’s letters despite his disapproval of Kurtz’s lifestyle, which encompassed instilling fear among the barbaric native population who resorted to worshipping him.  

Saturday, September 21, 2019

Nation of Kurds Essay Example for Free

Nation of Kurds Essay The challenges revolving around deeper political, cultural and societal understanding has been one of the tenets surrounding ethnic conflict. With the diversity of cultures around the world, the creation of norms and practices among dominant groups often creates a clash among members of the minority – ethnic groups which in turn necessitates into conflicting ideals and values. Thus, the process of ethnic conflict occurs during the eventual analysis of how groups view the current status quo as a barrier for their practices and norms. Defining Ethnic Conflict In defining ethnic conflict, various scholars have come up with various interpretations on as to how such problem emanates. Due to the variety of conflicts and problems created by the said incident, creating a standardized definition would only broaden the scope of such area. Seeing this, various approaches have been made and created several theoretical bases for the explanation of the realm of ethnicity. Seeing this, it may be right to define ethnic conflict to be â€Å"particular kind of such disputes about political, economic, social, cultural or territorial issues between two or more actors in which at least one of them is an ethnic group that defines causes, consequences and potential solutions of the conflict along an actual or perceived discriminating or otherwise distinctive ethnic divide† (Wolff, 2006). The creation of such conflicting patterns necessitates groups to conduct violent means to address the issue and change the status quo. â€Å"Given the lack of agreement on both substance and process, parties tend to turn very often and easily to force-based options, because force seems to be the only common language that both sides understand and honor† (FPDL, 2006). In the end, there is a need for dialogue to cater better understanding and create necessities for change. â€Å"The potential of conflict to generate learning, stimulate creativity and deepen relationships is realized only if we are able to understand its underlying causes and to mutually recognize and respect each other right to address own needs† (FPDL, 2006). The Kurds: A brief historical review The Kurdish people in general are relatively large in number and comprise of various settlements living in various countries. â€Å"In 1987, estimates suggested that probably numbering close to 16 million Kurds, inhabits the wide arc from eastern Turkey and the northwestern part of Syria through Soviet Azerbaijan and Iraq to the northwest of the Zagros Mountains in Iran, represented the population of what has been referred to as Kurdistan† (Global Security.org, 2008). Kurdish movement in various places in the world can be attributed to many factors that have been evident in history. These significant events have been significant in migration of Kurds in different countries and societies. These examples â€Å"such as the failure and collapse of the Mehabad Republic in 1946, collapse of the movement in Southern Kurdistan in 1975, the use of chemical weapons by the Iraqi government against Halabja, Badinan and other areas of Iraqi Kurdistan, and the refugee exodus from there after the uprising and aftermath of the Second Gulf War in 1991† (Sheikhmous, 1998, p.1) Throughout history, the Kurdish people have sought for independence and the recognition as a national entity. However, all the bloody revolts that have been made were all in jeopardy as no movements have ever been successful in the practice. â€Å"Some of the frequent Kurdish revolts in the twentieth century have sought autonomy; others avowedly aimed at complete independence in a sovereign state† (Harris, 1977, p.113). In the end, such events catapulted the rise of many conflicts among neighboring states. This in turn ended up in the escalation of violence and conflict within the region. Inter-ethnic conflict The process of inter-ethnic conflict among the Kurds can be seen in their neighbors such as Iraq and Turkey. On the other hand, there are also incidents of conflict in the Southern Kurdistan and mainly involves the Iraqi KDP and KDPI. â€Å"Among the most obvious types of inter-ethnic conflicts are those that have taken place between the Kurds and the majority ethnic groups i.e. the Arabs and their power elites, since the establishment of the state of Iraq in the 1920’s and their inclusion into the state against the will of their own majority† (Sheikhmous, 1998, p.2) Conflict against neighbors Similarly, occurrence of conflict can also be cited by Kurds against several states bordering the region; namely Turkey, Iran, Syria and Iraq. These conflicts primarily occur due to the intervention of these states in the country’s political affairs and clashes with other ethnic groups. Kurdistan geographical position became an instrument for several states to equally pursue their interest over such region. This is done by â€Å"supporting one or the other party in the competition for power and resources, by inciting incidents of disagreements and war, and by luring one or the other party with false promises and temptations† (Sheikhmous, 1998, p.3) On the other hand, the same situation applies for Kurdish movements. They in turn are guaranteed support only to realize in the end that they become just pawns in the overall plans of each neighboring state. â€Å"The Kurdish movements, too, due to their consideration for their own sectarian interests only, rather than those of the Kurdish nation as a whole, become an easy prey to these cynical games of medieval power politics by the governments of these regional states† (Sheikhmous, 1998, p.3) In the end, the welfare of placed under jeopardy due to such interference and intervention of other states. Creating Solutions Seeing this, there are varied solutions practiced and suggested to improve the current scenario of ethnic conflict within the region. Neutral states can act as both mediators and negotiators in the peace talk’s process between two competing parties. â€Å"Strong mediation by forceful negotiations from the United States and Europe might be able to convince the two Kurdish parties in Iraqi Kurdistan and to return to a peaceful process with formation of a wider new coalition government and holding a new democratic elections under international supervision† (Sheikhmous, 1998, p.3). Economic benefits may be included in the talks so as to encourage parties and states to comply. With the help of international organizations such as the UN, the process can effectively create confidence-building measures and improvements in the region torn by continued conflict and violence. â€Å"A lifting of UN sanctions on Iraqi Kurdistan together with an increased package for economic aid will certainly influence the parties towards more cooperative relations because they will become more self reliant and escape influence from Iraq, Turkey, and Iran as a result of sanction busting along their borders along their borders for customs duties† (Sheikhmous, 1998, p.3). Lastly, peacekeeping solutions can be enforced and help create a better democratic society. In addition, there needs to be an active involvement among groups who partake in the process to create a civil society that addresses the concerns of these ethnic groups. With the â€Å"establishment of interest groups and institutions for the advancement and strengthening of a civil society together with institutions for the preservation of human rights and respect the rule of law together with well trained cadres in conflict resolution would further enhance cooperative relations within Kurdish society† (Sheikhmous, 1998, p.4). References FPDL (2006) What is Ethnic Conflict. Retrieved July 14, 2008 from http://209.85.175.104/search?q=cache:-wSNN0zz3F8J:www.fpdl.ro/WHAT_IS_ETHNIC_CONFLICT_EN.doc+defining+ethnic+conflicthl=tlct=clnkcd=1gl=ph Global Security.org (2008) Kurdistan – Kurdish Conflict. Retrieved July 14, 2008 from http://www.globalsecurity.org/military/world/war/kurdistan.htm Harris, G.S. (1977) Ethnic Conflict and the Kurds in Annals of the American Academy of Political and Social Science. 433. Retrieved July 14, 2008. pp. 112-124. Sheikhmous, O. (1998) Factors for Cooperation and Conflict in Southern Kurdistan. Retrieved July 14, 2008 from http://www.aina.org/articles/sheikhmous.pdf Wolff, S. (2006) Ethnic Conflict and How to explain It: An Overview of Relevant Theories Defining Ethnicity and Ethnic Conflict. Retrieved July 14, 2008 from http://209.85.175.104/search?q=cache:yMs7ugglbUEJ:www.stefanwolff.com/teaching/ethnic-conflict/downloads/lecture-1-notes.doc+defining+ethnic+conflicthl=tlct=clnkcd=7gl=ph

Friday, September 20, 2019

Design of Mobile Banking Application

Design of Mobile Banking Application Mobile banking is the topic of today as internet banking was a few years ago. [3] Globally millions of people already use mobile devices to do their banking transactions. Mobile phones as a device with high security standards and direct connections, allows customers to access a wide range of services throughout the world. This is due to the success of the mobile and internet banking which the mobile device brings both banking channels together as a compact and highly personal channel to make mobile banking a reality. [31] The mobile device also presents new opportunities in payment structure thereby formulating an easy means for transacting payments through the innovative combination of mobile technology. Mobile devices have greater reach all around the world especially in developing nations with lower knowledge of its existence. At the same time they provide a fast and effective way for customers to send money to dependants in other countries or location. As it is said, Mobile banking is big news in Africa which started out in countries as South Africa, Kenya and Nigeria where mobile phone users especially in the urban areas traded minutes by sending credits to their relatives in villages in order to communicate with them when the need arises. But then these transactions took up an increased trend by building awareness for Mobile banking deriving various mobile banking platforms such as the SMS, WAP etc. [21] In West Africa, there are concerns on how this can be implemented and how the customers would embrace such technology. This will be discussed further in chapter 2 and 5. The mobile banking transaction consists of three main components and these are: The User Customers who make use of the application The Device Mobile handset, PDA etc The Mobile Network Operator (MNO) These can be Financial Institutions, Mobile service provider or combination of both. The user can request for the service using a mobile device which connects the client application and the MNO through a wireless network, GPRS etc. [28] The mobile phone has become an invasive device which has fewer disadvantages than most technologies. The answer to this can be said based on its penetration in poor economies (Africa in particular) and a customers demand for the use of telecommunication. With a mobile phone, people can be reachable and have a secure mobile device in the palm of their hands to easily get information anytime they desire which makes communication easy. The Mobile Network Operator may also be classified as a server supplier which serves as a link between the mobile user and the mobile phone in transacting data. [10] Mobile banking offers the prospect of increasing the efficiency of payment systems and also expanding the access to financial services. These objectives may be in tension based on financial integrity or consumer protection. [31] Mobile banking has also had its criticisms, one being security. The fact still remains that there are measures in place to tackle such risks involved especially in terms of fraud or money laundry. [29] The mobile banking services have expanded in Africa cutting across East, West and the southern region of Africa. In Kenya today, a customer can send money via mobile using the Short Message Services (SMS) mobile banking platform. [24] It has been spoken about the potential expansion for mobile banking as its awareness builds around Africa and how it could lower the cost of banking and build a customer-banker relationship. [6] In implementing a mobile banking structure, there are varieties of mobile banking platforms such as short Message Service (SMS), Mobile web (WAP) and Mobile Client application (J2ME, BREW etc.) and so on. Each Mobile banking platform has its strengths and weaknesses which in effect is important to identify, for this will enhance further development in its future prospect and be appropriate for financial services. [17] SCOPE AND PURPOSE The scope of this project is to implement a mobile client based application using Java application (J2ME) and then determine how effective and secure it will be to a society and users. Questions may be asked why mobile client application. This is because it is at the moment known to be the quickest and easiest way of transacting data on the mobile device in any given time. There should be mobile network coverage for the application to function. Mobile client application also known to be standalone mobile application is most suitable to implement for a complex financial transaction. A basic requirement for mobile client application platform to be implemented is that of the software been required to be downloaded on the mobile device before it could be used, though further requirements will be needed to support the development environment (J2ME) to function on the device. [20] The J2ME client application connects to a server through the wireless enabled device or GPRS which allow customers gain access their bank statements and also perform other banking transactions such as money transfers, pay bills etc. With the support of Nokia Ltd, developers have easy access to development tools by opening an online community for developers focused in developing applications based on J2ME. [29] Therefore the scope highlights a broad view of the project in implementing a mobile banking application using J2ME Java 2 application. The hardware devices to be used are a Mobile device and a PC /Laptop. The software tools used are Sun Java Wireless Toolkit 2.5.2 for CLDC, NetBeans IDE 6.8, MySQL server, Apache web server, Edit Plus 3, Notepad etc. The purpose of this project is to design and implement a mobile banking application demonstrating its benefits and tackling flaws encountered in its implementation, thereby creating an awareness of the banking platforms which best ensures a safe and secure means of transacting data in West Africa. Therefore i embark on implementing the project and then demonstrate how it will function. AIM AND OBJECTIVES The project is aimed at implementing a mobile banking application to develop its technology and then demonstrate how it could be beneficial to developing countries and financial institutions as mobile payment system is one of the biggest hits in Africa. This will enable mobile network operators who connect to the everyday reality of the customers, diversify in what is known as a growing market and also implement security measures to ensure a safe and secure mobile banking transaction. The objectives of this project that has been formulated to aid the implementation and success of the project are: To investigate current Mobile banking platforms, methods and technologies used in West Africa and how effective and productive it has been to the countries/nations. This was carried out with the aid of Journals, articles and information from the internet and media. To investigate and determine the benefits, threats, and weaknesses of implementing a mobile banking application in West African region. To investigate on the security breaches in existence and measures to be taken into consideration when implementing the application due to a high risk of data exposure in that region. To derive techniques to be used to implement the application on a mobile device. To design, test and implement a secure mobile client application to make easy access to customers checking their account balances through Mobile Java enabled devices etc BACKGROUND OF THE PROJECT (OVERVIEW) Literature Review (Chapter 2) This chapter will analyze, investigate and discuss views on the methods involved in implementing a mobile client application in West Africa and how this can be implemented. Various challenges that may disrupt the implementation will be discussed thereby formulating a means of solving its challenges and how to improve the current situation. The author will also address general questions arising from exploration of countries in West Africa (Nigeria and Ghana in particular) and how this will be solved. Structure of Mobile Banking (Chapter 3) This chapter will explain the structure, meaning and various types of mobile banking in existence. With a clear structure in place, the project will encompass methods and steps to ensure a successful implementation of mobile banking platforms in West Africa. Mobile Banking Implementation (Chapter 4) This chapter critically examines the implementation process involved in deriving a method that can be implemented, steps to be taken into consideration and testing of the application. The various steps taken will be derived from Unified Software Development Process (USDP). USDP is a generic process for the UML and will apply the iterative lifecycle model of USDP. [17] [10] Project Conclusion and Recommendation (Chapter 5) The final chapter will encapsulate the previous chapters and the author will discuss on further development to ensure the progress of the project, future improvement in the system designed and how it will be beneficial to the case study chosen. The conclusion will talk about the state at which the project was completed and what more can be implemented. CHAPTER 2 LITERATURE REVIEW AND PROBLEM DEFINITION LITERATURE REVIEW This Literature review is about addressing general questions arising from exploration of countries in the West African region in particular. As i mentioned earlier in the previous chapter, one of the objectives of this project is to investigate the use of mobile banking in West Africa, and then determine which mobile banking platform best suites the economies and masses by further expanding the view based on its availability, accessibility, affordability and security. [29] In carrying out my research, i limited my search on few West African countries to accommodate the time limit and information given in completing this project. There are 15 countries in West Africa; but in my research i will engage on using a sample size (limiting my search to two countries Nigeria and Ghana), whereby i will analyze and investigate the development of mobile banking and its effect caused in the implementation in those countries. [2] This will enable a fair view recommendation in my conclusion thereby concluding on which mobile platform can best be applied. Both countries (Nigeria Ghana) have active Mobile banking initiatives currently implemented; but as low and middle income countries respectively, they come from different starting points and face different issues. As such, they help to frame the particular questions which are focused to derive a result in the implementation of Mobile banking in West Africa. These few questions are: What is happening to mobile banking in these developing countries, and is it likely to lead to greater accessibility and affordability? Will Mobile banking in West Africa develop spontaneously and will there be an enablement required for it to function effectively? What are the measures in place (if any) to ensure a fast and secure means of mobile banking. Are financial institutions aware of Mobile banking in Nigeria and Ghana and what mobile banking platforms have been applied? What benefit does Mobile banking contribute to the economy and how will the customers embrace such technology? In this project, various investigations are carried out to identify the elements of an environment in adopting Mobile banking methods which would maximize the likelihood of access to financial services and how it will expand greatly in West Africa. Because of its restricted time and focus, the project was designed to be exploratory, rather than definitive (seeking to understand what was happening in both countries mentioned above) and in the process develop an approach towards market development and awareness of which could be of wider value across the continent. The project comprised the following elements: Investigation on existing mobile banking platforms used as mentioned earlier and the different approaches adopted in different Countries. In my research, i realized that mobile banking platforms follow a wide range of mobile application expansion in West Africa where so many banks are embarking on the system. This was because of the success of new mobile devices manufactured to provide excellent characteristics with larger processing power, large amount of memory, enabled Java programming and GPRS/GPS service.[4] Furthermore, mobile network operators in the Western region of Africa adopted 2.5G network, which uses GPRS as an information bearer. With the expansion of 3G networks, it has made mobile banking more productive. These type of networks enable greater amount of data to be transmitted between the client and server applications using much secure and stable connectivity. [4] With the adoption of the 2G network, WAP was implemented and due to disadvantages in terms of security and availability, the development of the mobile client application was introduced. WAP mobile application was useful for less powerful mobile devices. [4] [9]Taking a look at other West African countries like Gambia, Guinea, Mali, Niger etc. in which they know little about mobile banking, with an awareness and banks adopting mobile banking platforms, these nations will adopt mobile banking platforms. The vast major countries in West Africa in which mobile banking is implemented are Ghana, Nigeria, Liberia and few others. [3] In carrying out my analysis on the growth and implementation of mobile banking in West Africa, i looked at developing countries in that region and examined how effective mobile banking can be. In my research, i sampled two countries Nigeria and Ghana and examined all aspects relating to the project topic. RESEARCH ON MOBILE BANKING IN NIGERIA AND GHANA The growth of Mobile banking in Nigeria started in 2006 beginning with the SMS system of banking which is widely common and still practiced. The WAP and Mobile client application system started in 2008 and ever since has been expanding in technology. Internet banking is one of the mobile banking systems that had a low penetration rate in Nigeria due to poor internet facilities and a high cost of acquiring internet service (Table 2.1).[3] Globa Com a Mobile Network Operator (MNO) uses the SMS system of banking in collaboration using some banks in the country. According to the official of Globa Com, in which he stated that Glo Mobile banking subscribers will soon have access to paying bills and other utility bills on their mobile with a collaboration with several financial organizations. This proves the growth and expansion on Mobile banking in Nigeria and the rest of West Africa. As at 2008, the internet banking system had a 6% penetration rate in a population of 140million in Nigeria. In regards to mobile banking, its penetration rate is close to 50% with a prospect for more expansion as analyzed below. [4] One may ask why a large difference between both banking systems. This is due to low infrastructure and technology in satellite transmission across West Africa. In Ghana, There are measures to ensure the wide spread of Mobile banking services for commercial banks have been advised to introduce mobile banking platforms to enable its customers in carrying out banking services even outside the banking premises which was the only way to transfer funds, check balances etc. [5] Mobile banking service penetration As analyzed above in table 2.1, mobile banking services has penetrated in both countries compared to internet banking which has very low penetration. For Mobile client applications to be implemented, a mobile device with GPRS, WAP enabled and java compatibility should be used. These applications implement secure API and web service technology. Mobile banking features on a mobile phone have been provided to users in which it is secure and easy to use. This concept is a competitive advantage on the market of mobile phone manufacturers in which competitive advantage is the possibility of success. [13] Emmanuel Okoegwale stated in his report that offshore transfer of WAP mobile banking was a disaster based on an internet-based technology applied to the mobile which was a slow, unreliable and costly system for customers in Nigeria with poor coverage, handset limitation and inadequate customer awareness to the system. At the moment, the SMS system of banking is dominant for mobile banking transaction. [4] TECHNOLOGY With the standardization of the 3rd generation mobile communication systems in 2000, technology became a vital impart in the world of mobile banking. In 2000, 2.5G 2.75G network increased the data transmission. Then, the 3G network system which transmits wideband TDMA and CDMA, voice and high bit-rate data and portable units. There are speculations of the 4th generation mobile communication systems called the 4G to be implemented in 2010. The current mobile technology used in Ghana and Nigeria are: SMS (The à ¢Ã¢â€š ¬Ã…“request replyà ¢Ã¢â€š ¬? text application) WAP (Web application) J2ME (Java application) Short Message Service The Short Message Service system involves a user and a Mobile Network Operator exchanging text messages through a secure encrypted channel. But first, the user needs to be registered with the bank to receive the facility. Once registered by the bank, the user will be advised a text will be sent to him to confirm the registration. The service will then be registered and the user would be able to receive text alert once in a while especially when a transaction has taken place in the customers account. The structure of a secure SMS system is therefore highlighted below. An SMS System of banking With the SMS system, the user can request for his current balance by (requesting) sending a text to a bank message code and then get a response. The message code helps to identify the user and then recognise his request, in which it will initiate a response (sending his current balance). The disadvantage of SMS system of banking is that scammers send SMS messages identifying themselves as the bank, and also request for further bank details from the user such as PIN number, account number etc. This fraud has made the SMS system of banking insecure. This method is still experienced in Nigeria and Ghana respectively as i was able to identify that as a challenge. Another disadvantage is the user cannot store his credit card information on the mobile devices to pay a bill due to poor mobile infrastructure in place in West Africa. Also, no payment history can be derived from the mobile device when using an SMS system of banking. WAP (Web Application) The WAP system uses an internet browser on a mobile device. The user accesses his account from the banks website. This is similar to internet banking practiced on a PC or laptop. A major constrain in the WAP system is old mobile handsets have no built-in mobile browser, therefore restricting users in using such method. In Ghana and Nigeria, most mobile handset users use sophisticated handsets with GPRS, 3G and wireless enabled. Few banks such as Diamond, Intercontinental, Bank PHP and Ghanaian Commercial bank have adopted this method of banking, but yet to completely introduce it to all their customers. This is due to the long wait and procedure their customers have to take in registering for the facility. Some banks have created a special web page which will be suitable for their customers to register on their mobile screens. Mobile browsers are vulnerable to the same security risk been experienced in internet banking. However, there are differences in terms of safer means of transacting data on a mobile device than on the PC or laptop. This is because as at June 2009,[21a] creators of Trojan horses viruses and other types have not fully focused on the mobile market; though viruses still affect mobile devices, but it is not as rampant as the PC or laptop. J2ME (Java Application) J2ME is classified as an application used to implement a mobile client application. This application needs to be downloaded and installed on a mobile device which is java enabled, and then linked directly to a server. The application is said to require an effort to install, but it is known to becoming popular around the world. This is because it is faster than logging into the web browser to access a banks website. With further development in its technology, its user interface will be much easier to navigate.[21a] Applications as this are highly secure due to its implementation and information designed to function with a security algorithm, whereby all banks use different security algorithms. The disadvantage in using this method is programs downloaded on a mobile device can be stored and if not signed or logged out, it could be vulnerable to security risk. This can be tackled by introducing a timeout system method when implementing the code.[21a] CONNECTIVITY There are various network connectivity used in mobile transmission. Network Connectivity Mobile device users communicate using wireless networks anywhere at any given time. Mobile devices can be connected as well at any place and at anytime to the wireless network. Wireless network connectivity are regulated by frequencies. The user receives wireless network connection on his mobile on the frequency and wavelength of the antenna. Signal problems may occur based on the blocking and reflection of large buildings, the size of wavelength may be too small and the distance of the wireless antennas (mast) may be too far. This has been further tackled in developed nations, but West African countries still experience these problems. Signals can take many different paths and may case delay (3-12 micro seconds). [17] The effects of low or no signals in West Africa are based on short and long term fading of the signals. The short term fading can be classified as buildings, hills, trees etc., while the long term fading can be said to be the distance between the sender and the receiver, for it may change when the user moves to a different coverage area. MOBILE PLATFORMS Mobile devices come in different ranges, shapes and sizes. This is why mobile developers cannot system the same mobile platforms for another mobile device. For example, mobile applications developed to function on a Nokia handset will not function on a Windows Mobile/ Windows CE handset, though some applications may function on handsets manufactured by different companies. An example is the snake game on a Nokia and Sony Ericsson handset. This is due to the specification in both devices which will be further explained. Also, these devices are manufactured by different companies using different techniques. Mobile devices are categorised into: Microsoft PDA and Smart phones These devices use a mobile 5 and 2003 pocket edition platform to function. Types of devices in these categories are XDA, SPV-M, MDA, I-MATE, HTC S623 etc. Nokia and Sony Ericsson Devices These devices use a Symbian platform to function. Types of devices in these categories are P900, N series, W series, 9300 communicator etc. RIM Blackberry Device The blackberry device is a unique kind of device, for it has its unique platform and for such features (such as push e-mails) to function, it will need to register with RIM company, and then be connected to the blackberry enterprise server (BES). With other devices such the HTC device you can download the outlook e-mail feature from the mobile web. Palm Smart phones The palm device also uses Microsoft mobile 5 platforms along with the palm Operating System (OS) platform. Devices in this category are Treo 600, Treo 650, Centro, Palm pre etc. Microsoft PDA phones, smart phones are also manufactured by Sony Ericsson, Nokia, Palm and other mobile companies. These devices have similar functions which are: They have the push e-mail function You can create, edit and read on the device using applications such as word, powerpoint, spreadsheets etc. There are differences between using a blackberry device and other devices. As mentioned earlier, the blackberry device is a unique kind and this has made its devices more demanding and competitive in the mobile market. Analysing these mobile devices in terms of usage in Nigeria and Ghana, most people are so focus driven when new kinds of mobile handsets are introduced into the market. They look forward to having one without the knowledge of its features or technology. The mobile platforms in use are listed and some are explained below: Symbian platform Palm OS platform Java platform RIM (Blackberry) platform Windows Mobile platform Linux platform Symbian platform The name Symbian was derived based on Microsofts domination in the mobile market, therefore making four mobile companies ( Ericsson, Panasonic, Motorola and Nokia) along with the development team of Psion (a UK based company) form a new company called Symbian. The Symbian platform was also called EPOS. Symbian is known to be an open source operating system (OS) specifically designed for mobile devices and smart phones with frameworks, libraries and user interface originally developed by the company Symbian LTD. [29b] The Symbian platform is specifically engineered to handle error (which is similar to Java) and uses the concept of a server rather than traditional device drivers. The Symbian platform uses an SDK development environment. Figure 2.3 shows the architecture of the Symbian platform. Java platform Java was developed as a language for embedded programming of washing machine, microwaves etc. In 2000, Java language became sophisticated with large classes supporting desktop like application and requiring memory resources and significant processing. The growth of mobile devices reached the critical mass which made Sun re-launch a smaller version of their SDK called J2ME (Java 2 Micro Edition). J2ME now retains integration with larger SDK Sun like Palm OS and Symbian platforms. The architecture of J2ME (as shown in figure 2.3) was further partitioned into the virtual machines, configurations and profiles(as shown on figure 2.4). The J2ME also has support for OTA provisioning. Java ME technology was created in order to handle the constraints connected with building applications for small devices. Palm OS The Palm was launched as a software house developing handwriting recognition software for some manufacturers handheld. In 2001, palm split to become two companies, one responsible for development of operating systems and the other PDAs. Palm functions with a single -tasking third -party kernel which was developed by KADAK. It has a real-time operating system which is able to handle hardware interruption while task switching. EVALUATION AND FINDINGS A search was carried out to analyse the current Mobile banking Structure in West Africa and what banking strategies have been implemented to ensure customers have a safe and secure means of Mobile banking. Before implementing a Mobile client application, such evaluations should be carried out by using SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis, this will enable me carryout a proper implementation of Mobile banking in West Africa. In achieving my findings, I carried out various objectives which are listed below: I carried out a search to analyse the current Mobile banking Structure existing in West Africa and how effective, accessible and affordable it has been to the economies or nations. This was carried out with the aid of Journals, Articles and information from the internet and media. Results: The mobile banking platforms in existence are SMS, WAP and Mobile client application. An evaluation of my findings from my literature search was carried out to determine the benefits, threats, and the weaknesses of implementing a mobile banking application in West African region. Results: The benefits are greater expansion in banking facility and the economy at large. Security measures were derived when implementing the application due to a high risk of data protection in that region. What techniques were introduced in current mobile banking platforms? Results: Techniques derived to implement the application on a mobile device are SMS alert system, banking advertisement and customer-to-bank relationship. ANALYSIS AND INVESTIGATION Analysis and investigation are issues that may arise when implementing a mobile banking platform. To investigate the above given aim and objectives, ill be using a range of resources, like books, journals, but the main source of my information will be the Internet; resources from news websites, white papers and government publications etc. thereby providing an up-to-date information to carryout my research. This method was adopted due to constrains in distance and information from West African countries. According to Sola fanawopo(2008) on the growth in mobile banking services in Nigeria, he stated that à ¢Ã¢â€š ¬Ã…“some of the transactions that can be conducted with Glo Mobile banking include checking balances, viewing of the last five transactions on account. He also stated Glo Mobile (Owner by Globa Com) subscribers can transfer money from one account to another within the same bank.[23] Emmanuel Okoegwale in an article went further to elaborate on when Nigeria started using Mobile banking system which he said started by transaction based activities whereby customers were notified through the SMS system of banking in respect to the recent banking transactions done on their account.[3] With the recent penetration of internet and Java enabled mobile devices, Nigerian banks deployed full fledged banking through mobile device with various means of services made available, but this was made possible in the bank. The internet being a channel to mobile banking had penetration rate of 6 percent (%) in a population of 140million,with mobile technology been close to 50 percent (%) penetration with prospect for growth.( see table 2.1) [4] The banking sector in Ghana has witnessed a significant amount of transformation in the adoption of banking which also known in Ghana as à ¢Ã¢â€š ¬Ã‹Å"m-banking.[3] According to Daniel Nonors report on mobile banking in Ghana, he said à ¢Ã¢â€š ¬Ã…“subscribers to the facility in Ghana still account for a tiny percentage of the banking public, but fast gaining groundsà ¢Ã¢â€š ¬?. He went further to explain the use of advanced mobile phones and services by Ghanaians who have embraced the mobile technology. [1] One of Ghanaians top banks à ¢Ã¢â€š ¬Ã‹Å"Ghana Commercial bank GCB is yet to introduce the mobile client system of banking to their customers in 2010. [24] MTN ( one of West Africans mobile service operators launched mobile banking in Ghana called MTN Mobile Money which will allow customers pay for utility services, transfer money and other banking services. For this to function, customers will have to register with authorized mobile money agents or partnership banks. [5] Ivatury and Mas (2008) predicted that poor people in developing countries are more likely to use mobile phones in undertaking financial transactions. [8] However, there exists poor internet connectivity in most countries in West Af Design of Mobile Banking Application Design of Mobile Banking Application Mobile banking is the topic of today as internet banking was a few years ago. [3] Globally millions of people already use mobile devices to do their banking transactions. Mobile phones as a device with high security standards and direct connections, allows customers to access a wide range of services throughout the world. This is due to the success of the mobile and internet banking which the mobile device brings both banking channels together as a compact and highly personal channel to make mobile banking a reality. [31] The mobile device also presents new opportunities in payment structure thereby formulating an easy means for transacting payments through the innovative combination of mobile technology. Mobile devices have greater reach all around the world especially in developing nations with lower knowledge of its existence. At the same time they provide a fast and effective way for customers to send money to dependants in other countries or location. As it is said, Mobile banking is big news in Africa which started out in countries as South Africa, Kenya and Nigeria where mobile phone users especially in the urban areas traded minutes by sending credits to their relatives in villages in order to communicate with them when the need arises. But then these transactions took up an increased trend by building awareness for Mobile banking deriving various mobile banking platforms such as the SMS, WAP etc. [21] In West Africa, there are concerns on how this can be implemented and how the customers would embrace such technology. This will be discussed further in chapter 2 and 5. The mobile banking transaction consists of three main components and these are: The User Customers who make use of the application The Device Mobile handset, PDA etc The Mobile Network Operator (MNO) These can be Financial Institutions, Mobile service provider or combination of both. The user can request for the service using a mobile device which connects the client application and the MNO through a wireless network, GPRS etc. [28] The mobile phone has become an invasive device which has fewer disadvantages than most technologies. The answer to this can be said based on its penetration in poor economies (Africa in particular) and a customers demand for the use of telecommunication. With a mobile phone, people can be reachable and have a secure mobile device in the palm of their hands to easily get information anytime they desire which makes communication easy. The Mobile Network Operator may also be classified as a server supplier which serves as a link between the mobile user and the mobile phone in transacting data. [10] Mobile banking offers the prospect of increasing the efficiency of payment systems and also expanding the access to financial services. These objectives may be in tension based on financial integrity or consumer protection. [31] Mobile banking has also had its criticisms, one being security. The fact still remains that there are measures in place to tackle such risks involved especially in terms of fraud or money laundry. [29] The mobile banking services have expanded in Africa cutting across East, West and the southern region of Africa. In Kenya today, a customer can send money via mobile using the Short Message Services (SMS) mobile banking platform. [24] It has been spoken about the potential expansion for mobile banking as its awareness builds around Africa and how it could lower the cost of banking and build a customer-banker relationship. [6] In implementing a mobile banking structure, there are varieties of mobile banking platforms such as short Message Service (SMS), Mobile web (WAP) and Mobile Client application (J2ME, BREW etc.) and so on. Each Mobile banking platform has its strengths and weaknesses which in effect is important to identify, for this will enhance further development in its future prospect and be appropriate for financial services. [17] SCOPE AND PURPOSE The scope of this project is to implement a mobile client based application using Java application (J2ME) and then determine how effective and secure it will be to a society and users. Questions may be asked why mobile client application. This is because it is at the moment known to be the quickest and easiest way of transacting data on the mobile device in any given time. There should be mobile network coverage for the application to function. Mobile client application also known to be standalone mobile application is most suitable to implement for a complex financial transaction. A basic requirement for mobile client application platform to be implemented is that of the software been required to be downloaded on the mobile device before it could be used, though further requirements will be needed to support the development environment (J2ME) to function on the device. [20] The J2ME client application connects to a server through the wireless enabled device or GPRS which allow customers gain access their bank statements and also perform other banking transactions such as money transfers, pay bills etc. With the support of Nokia Ltd, developers have easy access to development tools by opening an online community for developers focused in developing applications based on J2ME. [29] Therefore the scope highlights a broad view of the project in implementing a mobile banking application using J2ME Java 2 application. The hardware devices to be used are a Mobile device and a PC /Laptop. The software tools used are Sun Java Wireless Toolkit 2.5.2 for CLDC, NetBeans IDE 6.8, MySQL server, Apache web server, Edit Plus 3, Notepad etc. The purpose of this project is to design and implement a mobile banking application demonstrating its benefits and tackling flaws encountered in its implementation, thereby creating an awareness of the banking platforms which best ensures a safe and secure means of transacting data in West Africa. Therefore i embark on implementing the project and then demonstrate how it will function. AIM AND OBJECTIVES The project is aimed at implementing a mobile banking application to develop its technology and then demonstrate how it could be beneficial to developing countries and financial institutions as mobile payment system is one of the biggest hits in Africa. This will enable mobile network operators who connect to the everyday reality of the customers, diversify in what is known as a growing market and also implement security measures to ensure a safe and secure mobile banking transaction. The objectives of this project that has been formulated to aid the implementation and success of the project are: To investigate current Mobile banking platforms, methods and technologies used in West Africa and how effective and productive it has been to the countries/nations. This was carried out with the aid of Journals, articles and information from the internet and media. To investigate and determine the benefits, threats, and weaknesses of implementing a mobile banking application in West African region. To investigate on the security breaches in existence and measures to be taken into consideration when implementing the application due to a high risk of data exposure in that region. To derive techniques to be used to implement the application on a mobile device. To design, test and implement a secure mobile client application to make easy access to customers checking their account balances through Mobile Java enabled devices etc BACKGROUND OF THE PROJECT (OVERVIEW) Literature Review (Chapter 2) This chapter will analyze, investigate and discuss views on the methods involved in implementing a mobile client application in West Africa and how this can be implemented. Various challenges that may disrupt the implementation will be discussed thereby formulating a means of solving its challenges and how to improve the current situation. The author will also address general questions arising from exploration of countries in West Africa (Nigeria and Ghana in particular) and how this will be solved. Structure of Mobile Banking (Chapter 3) This chapter will explain the structure, meaning and various types of mobile banking in existence. With a clear structure in place, the project will encompass methods and steps to ensure a successful implementation of mobile banking platforms in West Africa. Mobile Banking Implementation (Chapter 4) This chapter critically examines the implementation process involved in deriving a method that can be implemented, steps to be taken into consideration and testing of the application. The various steps taken will be derived from Unified Software Development Process (USDP). USDP is a generic process for the UML and will apply the iterative lifecycle model of USDP. [17] [10] Project Conclusion and Recommendation (Chapter 5) The final chapter will encapsulate the previous chapters and the author will discuss on further development to ensure the progress of the project, future improvement in the system designed and how it will be beneficial to the case study chosen. The conclusion will talk about the state at which the project was completed and what more can be implemented. CHAPTER 2 LITERATURE REVIEW AND PROBLEM DEFINITION LITERATURE REVIEW This Literature review is about addressing general questions arising from exploration of countries in the West African region in particular. As i mentioned earlier in the previous chapter, one of the objectives of this project is to investigate the use of mobile banking in West Africa, and then determine which mobile banking platform best suites the economies and masses by further expanding the view based on its availability, accessibility, affordability and security. [29] In carrying out my research, i limited my search on few West African countries to accommodate the time limit and information given in completing this project. There are 15 countries in West Africa; but in my research i will engage on using a sample size (limiting my search to two countries Nigeria and Ghana), whereby i will analyze and investigate the development of mobile banking and its effect caused in the implementation in those countries. [2] This will enable a fair view recommendation in my conclusion thereby concluding on which mobile platform can best be applied. Both countries (Nigeria Ghana) have active Mobile banking initiatives currently implemented; but as low and middle income countries respectively, they come from different starting points and face different issues. As such, they help to frame the particular questions which are focused to derive a result in the implementation of Mobile banking in West Africa. These few questions are: What is happening to mobile banking in these developing countries, and is it likely to lead to greater accessibility and affordability? Will Mobile banking in West Africa develop spontaneously and will there be an enablement required for it to function effectively? What are the measures in place (if any) to ensure a fast and secure means of mobile banking. Are financial institutions aware of Mobile banking in Nigeria and Ghana and what mobile banking platforms have been applied? What benefit does Mobile banking contribute to the economy and how will the customers embrace such technology? In this project, various investigations are carried out to identify the elements of an environment in adopting Mobile banking methods which would maximize the likelihood of access to financial services and how it will expand greatly in West Africa. Because of its restricted time and focus, the project was designed to be exploratory, rather than definitive (seeking to understand what was happening in both countries mentioned above) and in the process develop an approach towards market development and awareness of which could be of wider value across the continent. The project comprised the following elements: Investigation on existing mobile banking platforms used as mentioned earlier and the different approaches adopted in different Countries. In my research, i realized that mobile banking platforms follow a wide range of mobile application expansion in West Africa where so many banks are embarking on the system. This was because of the success of new mobile devices manufactured to provide excellent characteristics with larger processing power, large amount of memory, enabled Java programming and GPRS/GPS service.[4] Furthermore, mobile network operators in the Western region of Africa adopted 2.5G network, which uses GPRS as an information bearer. With the expansion of 3G networks, it has made mobile banking more productive. These type of networks enable greater amount of data to be transmitted between the client and server applications using much secure and stable connectivity. [4] With the adoption of the 2G network, WAP was implemented and due to disadvantages in terms of security and availability, the development of the mobile client application was introduced. WAP mobile application was useful for less powerful mobile devices. [4] [9]Taking a look at other West African countries like Gambia, Guinea, Mali, Niger etc. in which they know little about mobile banking, with an awareness and banks adopting mobile banking platforms, these nations will adopt mobile banking platforms. The vast major countries in West Africa in which mobile banking is implemented are Ghana, Nigeria, Liberia and few others. [3] In carrying out my analysis on the growth and implementation of mobile banking in West Africa, i looked at developing countries in that region and examined how effective mobile banking can be. In my research, i sampled two countries Nigeria and Ghana and examined all aspects relating to the project topic. RESEARCH ON MOBILE BANKING IN NIGERIA AND GHANA The growth of Mobile banking in Nigeria started in 2006 beginning with the SMS system of banking which is widely common and still practiced. The WAP and Mobile client application system started in 2008 and ever since has been expanding in technology. Internet banking is one of the mobile banking systems that had a low penetration rate in Nigeria due to poor internet facilities and a high cost of acquiring internet service (Table 2.1).[3] Globa Com a Mobile Network Operator (MNO) uses the SMS system of banking in collaboration using some banks in the country. According to the official of Globa Com, in which he stated that Glo Mobile banking subscribers will soon have access to paying bills and other utility bills on their mobile with a collaboration with several financial organizations. This proves the growth and expansion on Mobile banking in Nigeria and the rest of West Africa. As at 2008, the internet banking system had a 6% penetration rate in a population of 140million in Nigeria. In regards to mobile banking, its penetration rate is close to 50% with a prospect for more expansion as analyzed below. [4] One may ask why a large difference between both banking systems. This is due to low infrastructure and technology in satellite transmission across West Africa. In Ghana, There are measures to ensure the wide spread of Mobile banking services for commercial banks have been advised to introduce mobile banking platforms to enable its customers in carrying out banking services even outside the banking premises which was the only way to transfer funds, check balances etc. [5] Mobile banking service penetration As analyzed above in table 2.1, mobile banking services has penetrated in both countries compared to internet banking which has very low penetration. For Mobile client applications to be implemented, a mobile device with GPRS, WAP enabled and java compatibility should be used. These applications implement secure API and web service technology. Mobile banking features on a mobile phone have been provided to users in which it is secure and easy to use. This concept is a competitive advantage on the market of mobile phone manufacturers in which competitive advantage is the possibility of success. [13] Emmanuel Okoegwale stated in his report that offshore transfer of WAP mobile banking was a disaster based on an internet-based technology applied to the mobile which was a slow, unreliable and costly system for customers in Nigeria with poor coverage, handset limitation and inadequate customer awareness to the system. At the moment, the SMS system of banking is dominant for mobile banking transaction. [4] TECHNOLOGY With the standardization of the 3rd generation mobile communication systems in 2000, technology became a vital impart in the world of mobile banking. In 2000, 2.5G 2.75G network increased the data transmission. Then, the 3G network system which transmits wideband TDMA and CDMA, voice and high bit-rate data and portable units. There are speculations of the 4th generation mobile communication systems called the 4G to be implemented in 2010. The current mobile technology used in Ghana and Nigeria are: SMS (The à ¢Ã¢â€š ¬Ã…“request replyà ¢Ã¢â€š ¬? text application) WAP (Web application) J2ME (Java application) Short Message Service The Short Message Service system involves a user and a Mobile Network Operator exchanging text messages through a secure encrypted channel. But first, the user needs to be registered with the bank to receive the facility. Once registered by the bank, the user will be advised a text will be sent to him to confirm the registration. The service will then be registered and the user would be able to receive text alert once in a while especially when a transaction has taken place in the customers account. The structure of a secure SMS system is therefore highlighted below. An SMS System of banking With the SMS system, the user can request for his current balance by (requesting) sending a text to a bank message code and then get a response. The message code helps to identify the user and then recognise his request, in which it will initiate a response (sending his current balance). The disadvantage of SMS system of banking is that scammers send SMS messages identifying themselves as the bank, and also request for further bank details from the user such as PIN number, account number etc. This fraud has made the SMS system of banking insecure. This method is still experienced in Nigeria and Ghana respectively as i was able to identify that as a challenge. Another disadvantage is the user cannot store his credit card information on the mobile devices to pay a bill due to poor mobile infrastructure in place in West Africa. Also, no payment history can be derived from the mobile device when using an SMS system of banking. WAP (Web Application) The WAP system uses an internet browser on a mobile device. The user accesses his account from the banks website. This is similar to internet banking practiced on a PC or laptop. A major constrain in the WAP system is old mobile handsets have no built-in mobile browser, therefore restricting users in using such method. In Ghana and Nigeria, most mobile handset users use sophisticated handsets with GPRS, 3G and wireless enabled. Few banks such as Diamond, Intercontinental, Bank PHP and Ghanaian Commercial bank have adopted this method of banking, but yet to completely introduce it to all their customers. This is due to the long wait and procedure their customers have to take in registering for the facility. Some banks have created a special web page which will be suitable for their customers to register on their mobile screens. Mobile browsers are vulnerable to the same security risk been experienced in internet banking. However, there are differences in terms of safer means of transacting data on a mobile device than on the PC or laptop. This is because as at June 2009,[21a] creators of Trojan horses viruses and other types have not fully focused on the mobile market; though viruses still affect mobile devices, but it is not as rampant as the PC or laptop. J2ME (Java Application) J2ME is classified as an application used to implement a mobile client application. This application needs to be downloaded and installed on a mobile device which is java enabled, and then linked directly to a server. The application is said to require an effort to install, but it is known to becoming popular around the world. This is because it is faster than logging into the web browser to access a banks website. With further development in its technology, its user interface will be much easier to navigate.[21a] Applications as this are highly secure due to its implementation and information designed to function with a security algorithm, whereby all banks use different security algorithms. The disadvantage in using this method is programs downloaded on a mobile device can be stored and if not signed or logged out, it could be vulnerable to security risk. This can be tackled by introducing a timeout system method when implementing the code.[21a] CONNECTIVITY There are various network connectivity used in mobile transmission. Network Connectivity Mobile device users communicate using wireless networks anywhere at any given time. Mobile devices can be connected as well at any place and at anytime to the wireless network. Wireless network connectivity are regulated by frequencies. The user receives wireless network connection on his mobile on the frequency and wavelength of the antenna. Signal problems may occur based on the blocking and reflection of large buildings, the size of wavelength may be too small and the distance of the wireless antennas (mast) may be too far. This has been further tackled in developed nations, but West African countries still experience these problems. Signals can take many different paths and may case delay (3-12 micro seconds). [17] The effects of low or no signals in West Africa are based on short and long term fading of the signals. The short term fading can be classified as buildings, hills, trees etc., while the long term fading can be said to be the distance between the sender and the receiver, for it may change when the user moves to a different coverage area. MOBILE PLATFORMS Mobile devices come in different ranges, shapes and sizes. This is why mobile developers cannot system the same mobile platforms for another mobile device. For example, mobile applications developed to function on a Nokia handset will not function on a Windows Mobile/ Windows CE handset, though some applications may function on handsets manufactured by different companies. An example is the snake game on a Nokia and Sony Ericsson handset. This is due to the specification in both devices which will be further explained. Also, these devices are manufactured by different companies using different techniques. Mobile devices are categorised into: Microsoft PDA and Smart phones These devices use a mobile 5 and 2003 pocket edition platform to function. Types of devices in these categories are XDA, SPV-M, MDA, I-MATE, HTC S623 etc. Nokia and Sony Ericsson Devices These devices use a Symbian platform to function. Types of devices in these categories are P900, N series, W series, 9300 communicator etc. RIM Blackberry Device The blackberry device is a unique kind of device, for it has its unique platform and for such features (such as push e-mails) to function, it will need to register with RIM company, and then be connected to the blackberry enterprise server (BES). With other devices such the HTC device you can download the outlook e-mail feature from the mobile web. Palm Smart phones The palm device also uses Microsoft mobile 5 platforms along with the palm Operating System (OS) platform. Devices in this category are Treo 600, Treo 650, Centro, Palm pre etc. Microsoft PDA phones, smart phones are also manufactured by Sony Ericsson, Nokia, Palm and other mobile companies. These devices have similar functions which are: They have the push e-mail function You can create, edit and read on the device using applications such as word, powerpoint, spreadsheets etc. There are differences between using a blackberry device and other devices. As mentioned earlier, the blackberry device is a unique kind and this has made its devices more demanding and competitive in the mobile market. Analysing these mobile devices in terms of usage in Nigeria and Ghana, most people are so focus driven when new kinds of mobile handsets are introduced into the market. They look forward to having one without the knowledge of its features or technology. The mobile platforms in use are listed and some are explained below: Symbian platform Palm OS platform Java platform RIM (Blackberry) platform Windows Mobile platform Linux platform Symbian platform The name Symbian was derived based on Microsofts domination in the mobile market, therefore making four mobile companies ( Ericsson, Panasonic, Motorola and Nokia) along with the development team of Psion (a UK based company) form a new company called Symbian. The Symbian platform was also called EPOS. Symbian is known to be an open source operating system (OS) specifically designed for mobile devices and smart phones with frameworks, libraries and user interface originally developed by the company Symbian LTD. [29b] The Symbian platform is specifically engineered to handle error (which is similar to Java) and uses the concept of a server rather than traditional device drivers. The Symbian platform uses an SDK development environment. Figure 2.3 shows the architecture of the Symbian platform. Java platform Java was developed as a language for embedded programming of washing machine, microwaves etc. In 2000, Java language became sophisticated with large classes supporting desktop like application and requiring memory resources and significant processing. The growth of mobile devices reached the critical mass which made Sun re-launch a smaller version of their SDK called J2ME (Java 2 Micro Edition). J2ME now retains integration with larger SDK Sun like Palm OS and Symbian platforms. The architecture of J2ME (as shown in figure 2.3) was further partitioned into the virtual machines, configurations and profiles(as shown on figure 2.4). The J2ME also has support for OTA provisioning. Java ME technology was created in order to handle the constraints connected with building applications for small devices. Palm OS The Palm was launched as a software house developing handwriting recognition software for some manufacturers handheld. In 2001, palm split to become two companies, one responsible for development of operating systems and the other PDAs. Palm functions with a single -tasking third -party kernel which was developed by KADAK. It has a real-time operating system which is able to handle hardware interruption while task switching. EVALUATION AND FINDINGS A search was carried out to analyse the current Mobile banking Structure in West Africa and what banking strategies have been implemented to ensure customers have a safe and secure means of Mobile banking. Before implementing a Mobile client application, such evaluations should be carried out by using SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis, this will enable me carryout a proper implementation of Mobile banking in West Africa. In achieving my findings, I carried out various objectives which are listed below: I carried out a search to analyse the current Mobile banking Structure existing in West Africa and how effective, accessible and affordable it has been to the economies or nations. This was carried out with the aid of Journals, Articles and information from the internet and media. Results: The mobile banking platforms in existence are SMS, WAP and Mobile client application. An evaluation of my findings from my literature search was carried out to determine the benefits, threats, and the weaknesses of implementing a mobile banking application in West African region. Results: The benefits are greater expansion in banking facility and the economy at large. Security measures were derived when implementing the application due to a high risk of data protection in that region. What techniques were introduced in current mobile banking platforms? Results: Techniques derived to implement the application on a mobile device are SMS alert system, banking advertisement and customer-to-bank relationship. ANALYSIS AND INVESTIGATION Analysis and investigation are issues that may arise when implementing a mobile banking platform. To investigate the above given aim and objectives, ill be using a range of resources, like books, journals, but the main source of my information will be the Internet; resources from news websites, white papers and government publications etc. thereby providing an up-to-date information to carryout my research. This method was adopted due to constrains in distance and information from West African countries. According to Sola fanawopo(2008) on the growth in mobile banking services in Nigeria, he stated that à ¢Ã¢â€š ¬Ã…“some of the transactions that can be conducted with Glo Mobile banking include checking balances, viewing of the last five transactions on account. He also stated Glo Mobile (Owner by Globa Com) subscribers can transfer money from one account to another within the same bank.[23] Emmanuel Okoegwale in an article went further to elaborate on when Nigeria started using Mobile banking system which he said started by transaction based activities whereby customers were notified through the SMS system of banking in respect to the recent banking transactions done on their account.[3] With the recent penetration of internet and Java enabled mobile devices, Nigerian banks deployed full fledged banking through mobile device with various means of services made available, but this was made possible in the bank. The internet being a channel to mobile banking had penetration rate of 6 percent (%) in a population of 140million,with mobile technology been close to 50 percent (%) penetration with prospect for growth.( see table 2.1) [4] The banking sector in Ghana has witnessed a significant amount of transformation in the adoption of banking which also known in Ghana as à ¢Ã¢â€š ¬Ã‹Å"m-banking.[3] According to Daniel Nonors report on mobile banking in Ghana, he said à ¢Ã¢â€š ¬Ã…“subscribers to the facility in Ghana still account for a tiny percentage of the banking public, but fast gaining groundsà ¢Ã¢â€š ¬?. He went further to explain the use of advanced mobile phones and services by Ghanaians who have embraced the mobile technology. [1] One of Ghanaians top banks à ¢Ã¢â€š ¬Ã‹Å"Ghana Commercial bank GCB is yet to introduce the mobile client system of banking to their customers in 2010. [24] MTN ( one of West Africans mobile service operators launched mobile banking in Ghana called MTN Mobile Money which will allow customers pay for utility services, transfer money and other banking services. For this to function, customers will have to register with authorized mobile money agents or partnership banks. [5] Ivatury and Mas (2008) predicted that poor people in developing countries are more likely to use mobile phones in undertaking financial transactions. [8] However, there exists poor internet connectivity in most countries in West Af

Thursday, September 19, 2019

Negative Effects of Media Violence on Society Essay -- Media Argumenta

Negative Effects of Media Violence on Society    Given the importance of social learning in contributing to violent behavior, we should pay careful attention to the kinds of role models we provide to one another. A powerful source of role models is located in almost every home: the television. Television is the source of more knowledge in the past several decades than any other type of knowledge distributor, such as books and news papers. It is by far the most influential invention of the twentieth century and has established more role models than radio or magazines combined. But to some the role models that are established through the media and television are not upstanding citizens like Ronald Reagan or Larry King, but instead psycopath murderers and serial killers such as David Koresh, Timmothy McVeigh and Charles Manson. Not only are people mesmerized by the media attention that these types of people receive but they are also taken away by the movies that portray the bad guys as tough fighters who can kill people w ith the snap of a finger. Stars such as Steven Segall, Juan Claude Van Damme, and Sylvester Stallone have done as much to the rise in violence because of the media exposure as the actual killers and murderers. "Violence seems to be something everybody feels they can recognize when they see it, yet it is difficult to define unambiguously. Many different definitions are now in use, and there is much disagreement about them.(Wober 41)" Violence is at an all time high because of the sales and publicity that it receives from the public. One of the biggest problems in this day and age is the violence in the media and on television. The media has taken the first amendment to an all new level b... ...ogress and Implications for the Eighties Vol. 1: Technical Reviews. U.S. Dept. of Health and Human Services. 1982 4. National Institute of Mental Health. Television and behavior: Ten Years of Scientific Progress and Implications for the Eighties Vol. 2: Technical Reviews. U.S. Dept. of Health and Human Services. 1982 5. Pearl, David. Violence and Aggresion: Television at the Crossroads. Society, Vol. 21, No. 6, 1984 6. Rowland, Willard D. The Politics of TV Violence. Beverly Hills, CA:Sage Publications, 1983 7. United States Government. Violence on Television. Report. House of Represenatives. Washington, DC: U.S. Government Printing Office, 1977. 8. Van der Voort, Tom H. Chidren and TV Violence: Perception and Experience. Swets and Zeitlinger, 1982. 9. Wurtzel, Alan. Television Violence and Aggresive Behavior. Et Cetera, June, 1977.

Wednesday, September 18, 2019

After coming to America Essay -- Essays Papers

After coming to America All people seem to want the same basic things out of life regardless of race or religion. Universally, people want a good job, a healthy family, and a chance for their children to have a better life than the one they have. Families that already possess these things, whether through their own hard work or merely by way of inheritance, rely on the existing power structures within society to ensure that their future happiness continues . But what do people who do not belong to existing power structures turn to in order to secure these things for their families and children? During the course of America's lifetime, million upon millions of people left their homes and families in other countries and traveled to America in the hope of securing a better life -- the American Dream. What they often found was an unwillingness on the part of those already established in America to share society's benefits with them. For many segments of our American society, people substituted a reliance on family, or friends, or even faith alone, to secure these benefits for themselves and their children that was denied them by those possessing economic and political power. Most blacks came to America involuntarily. Sold as slaves in Africa, they were brought to America as laborers. Being slaves, they were legally considered property and thus were excluded from the legal protections that other people living in America were entitled to. Slave marriages were not legally recognized, and parents and children could be separated at the whim of their owners. As Frederick Douglass and countless other narratives by former slaves have shown us, slaves were forced to rely on a network of extended family members and other slaves to ... ...f ethnic communities that make up our cities is a testament to that reliance on friends that supported these groups of immigrants. While relying on friends and community would ensure that their family was both fed and that they had a place to sleep, faith is what kept hope alive in them from day to day. Faith that, one day, society would allow their children to fully participate in this country. And sometimes, as Thomas Aquinas told us, faith is all we have to have. Works Cited Boroff, David. "A Little Milk, a Little Honey: Jewish Immigrants in America." 1966. Oates. 87-97. Burns, James MacGregor. "Reconstruction: The Revolution that Failed." 1981. Oates. 20-29. Foner, Eric. "From Slavery to Freedom: The Birth of the Modern Black Community. 1990. Oates. 4-16. Oates, Stephen B., Ed. Portrait of America. Sixth Ed. Boston: Houghton-Mifflin, 1995.