Monday, September 30, 2019

Critical Review of Franklin D. Roosevelt and the New Deal 1932-1940 by William E. Leuchtenburg.

Franklin D. Roosevelt and the New Deal 1932-1940. by William E. Leuchtenburg. Harper & Row, 1963. The Great Depression created a political landscape in the United States that demanded bold action, calling forth people ready and willing to challenge the conventional establishment and allowing them to thrive. Franklin Delano Roosevelt is the prime example of how adversity creates a forging ground were dynamic individuals shape history. In his book Franklin D. Roosevelt and the New Deal Leuchtenburg meticulously describes how Roosevelt changed American during his first two terms and cast some light on why he was the one to succeed in holding the great responsibility of steering the country through the depression without blind praise or unjustified criticism. The author, William E. Leuchtenburg, was born in the early 1920s, therefore was old enough to remember the atmosphere in which the New Deal was happening, though not from the standpoint of an adult, giving him the edge of knowing the actual feel of the era over a younger historian. This may also account for his admiration of Roosevelt, as he often expresses in his book Roosevelt was widely popular amongst a majority of Americans at the time. He has written several books mainly centered around Roosevelt and became a distinguished professor of history at the University of North Carolina. He has also served as President of the American Historical Association. There is no doubt that he is very qualified to write a book on the subject of Roosevelt and even though he obviously is a great admirer of the President, he never shies away from pointing out Roosevelt’s flaws. Leuchtenburg begins by setting the stage that brought Roosevelt into power by describing the Great Depression and how the Hoover administration handled it, not completely negatively stating â€Å"no president ever worked harder in the White House than Herbert Hoover. † Here he first describes Roosevelt with a brief history and leads into how he became President, describing his energy and charisma as key factors. It becomes evident that Leuchtenburg painstakingly presents rounded historical facts to eliminate the chances of a biased presentation and continues to do so through out the book, often leaving a quarter of a page of footnotes. The third chapter is were Roosevelt’s presidency begins. Leuchtenburg describes â€Å"The Hundred Days† were the new president rushed to try to turn the country around with a flood of new legislation and bold acquisition of executive power. He does a good job at pointing out how some legislation, such as the emergency banking bill, passed with little opposition and how other legislation was shaped by opposition or, in the case of the NRA, was generated to curb legislation Roosevelt didn’t favor. Successes and failures are pointed out proportionally and the reasons behind the fate of much of the Roosevelt administrations actions is often speculated on in a well informed and unbiased manner. After much about legislation and policy Leuchtenburg moves to describing those who would challenge Roosevelt and how they shaped Roosevelt’s policies. The introduction of new conflicts here seemed to add a renewed sense of urgency to the book which, along with the extravagance and extremist views of characters such as Hugh Long, managed to renew the pace of the reading. The book goes on to describe interest of lower classes such as laborers and migrant farmers and how Roosevelt was pulled more to the left for what is known as â€Å"The Second Hundred Days† and of course describes the process of securing reelection. Social Security is addressed in a surprisingly negative manner, â€Å"In many respects, the law was an astonishingly inept and conservative piece of legislation† he goes on explaining â€Å"by relying on regressive taxation and withdrawing vast sums to build up reserves, the act did untold economic mischief. † This provides both a prime example of his unbiased approach to the subject and his tendency to ensure no statement goes unexplained. This is broken up by a chapter on foreign policy and continued with Roosevelt’s struggles with the Supreme Court and an increasingly dissident congress before leading up to what would become World War 2 and concludes by outlining what Leuchtenburg believes to be the important points of the New Deal. To begin with, the book takes on a pretty heavy load, and does so in a thorough manner. This leads it into being pretty dense, it is definitely dense enough to through off anyone who is not a serious history student from reading it cover to cover. Leuchtenburg definitely did his best to get all he could into one book, which is a good thing from a research point of view, but makes it unwieldy for a casual reader. There are times I could have done with less information, thankfully I had notes on hand while reading to supplement the book or else I would have become lost in the barrage being tossed out at the thickest sections. This is amplified by the fact the book sometimes goes quite a few degrees of separation from its core subject, or could be more accurately titled â€Å"Roosevelt 1932-1940†. This is evident in chapter 9, which is centered more on the politics of foreign policy, and not just in ways that had a direct effect on New Deal policies. I feel if the book were trimmed down a little more it would make it a lot more accessible, thus justifying the narrower scope. In addition, this would provide more room to hammer in the more relevant subjects with brief overviews so readers such as myself without an in-depth prior knowledge of the New Deal could better understand its intricacies without going back between chapters after these breaks in subject. However, he does his best to make the book flow, especially by keeping it in chronological order for the most part. He mainly departs from this structure when he is explaining policies and events which are usually better explained grouped together, such as foreign policy. Assuming Leuchtenburg did not have a casual reading audience in mind when he wrote the book, its weightiness s not a major downfall. Also, Leuchtenburg does put forth a great deal of effort to provide balanced information. He says himself that â€Å"the New Deal left many problems un solved and even created some perplexing new ones. † It is common for him to follow up a list of success with a list of flaws, or vice-versa. I think he does such a good job at this because he keeps things in a historical perspective. For example, while it is easy to criticize Roosevelt’s initial shying away from government spending or break from the gold standard now, back when there was little precedent for these actions these must have seemed much more radical. This shows a thorough knowledge of the limitations of our government that extremist often ignore. By using an objective view his argument that Roosevelt was ultimately successful despite his downfalls is a thousand times more convincing than a biased pro-Roosevelt outlook would have been. On the other hand, this creates a calm, collected view through out the book which is not as invigorating as more sensational works and fails to incite as strong an emotional response . While not necessarily a negative as far as historical accuracy, it takes away from the books ability to provide enjoyment making it easier to put down. Overall, I believe Leuchtenburg did a good job at explaining such a large, intricate subject without it either reading like an unending encyclopedia of events or skeletal time line, he expresses his opinion in a unobtrusive fashion that maintains historical accuracy and balance and avoids sensationalism, and even though its not flashy it does its job. Franklin D. Roosevelt and the New Deal is a very informative book that provides a convincing argument that Roosevelt and the New Deal were a positive turning point in American history. Franklin D. Roosevelt and the New Deal 1932-1940. by William E. Leuchtenburg. Harper & Row, 1963. (13) Franklin D. Roosevelt and the New Deal 1932-1940. by William E. Leuchtenburg. Harper & Row, 1963. (132) Franklin D. Roosevelt and the New Deal 1932-1940. by William E. Leuchtenburg. Harper & Row, 1963. (346)

Sunday, September 29, 2019

Defy Gender Roles

Christina G. Tarango Professor John ENGL 2342 April 21, 2013 Conform or Defy Gender roles in the society of the human race have always been that the women bare the children and take care of the home while the man is out working and bringing home the money to support his family. In certain societies this is still true and women do not have a say in what they do. The role and identity of women in certain societies has been shaped and it is up to the woman under this conformity to conform or defy.The roles of women through the eyes of Marjane Satrapi as a young girl were quite â€Å"normal† for her. As a young girl she did not realize how different of a life style she was living from other young girls her age living in Iran. For example when she was six she says, â€Å"I wanted to be a Prophet because our maid did not eat with us. † Later on in the story she reveals that their maid named Mehri was eight years old when she had to leave her parents’ home to come to wo rk for Marjane and her family.As a teenager, Mehri begins falling in love with the neighbors’ son. When Marjane’s family finds this out her father goes over to the boys home and tells him, â€Å"I know that Mehri pretends she is my daughter. In reality she is my maid. † Marjane does not understand why this cannot be. Her father says, â€Å"You must understand that their love was impossible, because in this country you must stay within your own social class. † Marjane begins to understand the whole concept of the Revolution and wants to demonstrate against it.Women in the novel conform to and also defy the expectations that are placed on them by going out and demonstrating during the Revolution but also confirm by wearing the veil. Over a broadcast a man declares, â€Å"Women’s hair emanates rays that excite men. That’s why women should cover their hair! If in fact it is really more civilized to go without the veil, then animals are more civ ilized than we are. † Marjane says, â€Å"In no time the way people dressed became an ideological sign. † Marjane says, â€Å"There were two different kinds of women, the fundamentalist woman and the modern woman. The fundamentalist woman covered her entire body with a black veil and only showed her face. The modern woman to show their opposition to the regime would still wear the veil but let a few strands of hair show and they would not cover their entire body either. They would wear pants, boots, and long coats. This was done in order to protect the women from all the potential rapists, it was decreed that wearing the veil was obligatory. As a teenager she was stopped by the â€Å"Guardians of the Revolution. † These women were in place to arrest women who were improperly veiled.At the committee, they did not have to inform parents and they could detain girls for hours or even days. They could be whipped and in short anything could happen. This was quite trau matizing for Marjane however she did not tell her parents. Overall, the effects of these societal expectations on the psyche and development of Marjane as a child were very influenced by the revolution. Her parents tried their best to protect her from what was going on in their country. They tried to still give her all the liberties of that the Western children had.They did not want to take away from her childhood and wanted her to have the absolute best. They wanted her to have the best education and normal social life possible and free of terrorism. At the age of fourteen she was sent away to Austria where she would finish school and be a lot safer. WORKS CITED Satrapi, Marjane. Persepolis. United States: Pantheon Books, 2003. Print. Satrapi, Marjane. â€Å"Persepolis. † The Story of a Childhood. 2003: 6. Medium. Satrapi, Marjane. â€Å"Persepolis. † The Story of a Childhood. 2003: 36-37 . Medium. Satrapi, Marjane. â€Å"Persepolis. † The Story of a Childhood. 2003: 74-75. Medium.

Saturday, September 28, 2019

Oxford Insurance

Without proper management, it is easy for employees to slack off and they may lose their sight of the company goal. If we look at Herbage's two factor theory, you can see that Oxford Insurance Services is lacking some factors that are Important In Job satisfaction and motivation In employees. Challenging work, responsibility and rewards are part of the Intrinsic motivators that attribute to an Individual's sense of satisfaction with their work. It doesn't seem as though there are specific numbers that are set for each person, rather, just numbers that the company as a whole need to make.They could have dad specific attainable goals for each broker so they all have something specific to work towards. Stuart could have also came up with competitions within the group with rewards, such as a bonus. The only reward that they had was casual Friday. Although this is a step, there is not much incentive for the brokers to work hard. Many of the emails started with bad news and letting everyon e know that they are not reaching their goal, this is news and information that they are probably already away of.This sets the mood for the rest of the email. Some of the e-mails were also very short and seemed Impersonal, such as the ones to Mary. It states that Mary Is the type of person who appreciates going straight to business but the emails from Stuart is highly motivating. You don't get the sense that Stuart really cares about her. When she was doing well, Stuart emailed her telling her that she had a good month and that she would not hear from him about that for another 90 days. This does not give her any incentive to continue to work hard.If we fast forward to September when the numbers were falling short, Mary receives an email from Michael telling her that the holiday weekend is over and that she needs to start paying attention to the numbers. We thought this e-mail seemed very rude and disrespectful. Respect Is very important in motivation and If Mary does not feel that she is receiving the respect she deserves then that will show In her work. It also doesn't help the situation that Michael Is half the age of Mary. In Broom's expectancy theory, It states that people will behave a certain way because they think it will lead them to a desired outcome.Stuart and Michael is not giving the Question 2. The case suggests that Mary feels De-energize. Why might that be? Mary was lacking motivation because she was not getting the desired support from ere team. She felt that the staff was not very customer focused whereas she wanted to build good and trustworthy relationships with her customers by providing them better services. Also, there were personality and age differences between Mary and her clerical staff that had a negative impact on their teamwork. Another reason why Mary felt De-energize was because of differences in motivational value.It can be inferred from the case that Mary had a high focus on extrinsic value of motivation. She Joined Oxfords b ecause of high raise and a promise to achieve self-actualization. However, through all the motivational memos, it is evident that rewards were mostly non-monetary benefits. Employees were either praised verbally or would have a chance to wear casual clothes on Friday. There were hardly any incentives like performance-based bonuses etc. Moreover, Mary felt that Stuart was very aggressive with achieving the targeted numbers and was not giving her enough free hands to accomplish her goal of having repeat customers by building trust. . How else might Stuart and Michael foster motivation among the 0. 1. S. Brokers? Identifying and determining ways to motivate employees is vital to every business. A motivated employee in a workplace defines a highly productive staff that will help achieve common goals and objectives of the business. While not every employee will be able to get motivated by similar things, hence, Stuart and Michael should first develop a motivational strategy that includes understanding the difference of what motivates their employees.It is key essential to determine what really drives the majority of their employees so that the company can reach the highest performance. This motivational employee strategy must also include the process of developing orgasm that will eventually motivate employees greatly while also retain the best employee of the business. Therefore, Stuart and Michael can apply the relationship between Measles Need Hierarchy and Herrings Two-Factor Theory.Moscow postulated that every single individual has five basic needs that constitutes the most basic need to the highest needs that will enable managers to understand the value of their employee satisfaction level of motivation. Although it seems that 0. 1. S brokers express self-actualization and esteem regularly, it would be more effective for Stuart and Michael to constantly provide training sessions that will rate more rooms for on-going development for self-actualization. In add ition, it is always better for Stuart and Michael to not Just boost their employees self-esteem by email, buttoner of a direct approach of face-to-face.A direct approach like lunch or dinner invitation may result in a very effective way as a sense of distinct recognition. Not only that it will establish stronger relationship by interaction and affiliating with colleagues, but this may also offer a sense of â€Å"belongingness† within the company. It is very interesting to notice that Mary had been the only one who receive the most or at least direct encouragement. However, it would be helpful if Stuart and Michael discouragement from other employees in accordance to the given task.In terms of giving instructions and motivational messages, this may appear confusing and repetitive on the e-mail, thus, supervision division between Stuart and Michael can be differentiated so that all employees understand and fully aware on instructions. Therefore, it is very important to define a better structure of communication in assigning tasks for their employees with detailed measurement of key performance indicator. This will be very effective for every employees to keep up with their course f action achieve the target and allowing themselves to measure their own accountability or work progress.This key performance indicator (KIP) may also leads to reward systems or individual incentives as described in Herrings Two-Factory Theory under Hygiene Factor on salary. This incentives and reward system should also be diversified all across department without any differences. All age groups should receive equal value from this incentives and rewards. Also, this will indirectly educate employee to understand the expectancy theory where extra effort that shows great performance will lead to valuable outcomes.

Friday, September 27, 2019

German Jewish Immigration to the USA Essay Example | Topics and Well Written Essays - 1500 words

German Jewish Immigration to the USA - Essay Example Since he was guided not by principles but by expediency, he was able upon occasion to moderate his tactics, if not his Jewish policy, when diplomatic or economic considerations made it advisable to do so. Von Hindenburg, the aged president; von Neurath, the Foreign Minister; and Dr. Schacht, the president of the Reichsbank and later Minister of Economics, could occasionally win some concessions. But then came Hitler's evil spirits, such as the demonic Dr. Joseph Goebbels, his Minister of Propaganda; the sadist Julius Streicher, his pornographer; and the enemy of mankind, Heinrich Himmler, his executioner. All of these men served to fan the flame of his hatred. The baseness and the villainy, the lying and deception which were concentrated upon the Jews beggar description. Never was so intense and persistent a drumfire directed towards the destruction of a mighty army as these strategists found it necessary to use in order to make it impossible for 550,000 Jews to exist in the midst of 65,000,000 Germans. "Even 'Aryan' children were stirred to spy upon Jews and Christian non-Aryans and to attack them, and to incite their own parents to extirpate the Jews altogether." From this specimen the world might have learned whither the destructive spirit of the Nazis was leading, but they were gullible and were persuaded that this treatment of the Jews was solely a matter of internal German policy. It was fatal to the world at large (and to the Jews) that the world relied upon the promises of the Reich Chancellor and Reich Leader, of which he kept not one, and did not rather refer to the conclusions of his Mein Kampf, in which the true nature of the revolutionary Hitler was expressed. (Hans W. Gatzke, 1973) The overall aim of Nazi policy in the 1930s was to pressure Jews to leave Germany, but there was no unanimity in the party on how this was to be accomplished. One faction, largely concentrated in the SA and typified by the fanatical Nuremberg Gauleiter Julius Streicher (1885-1946), editor of the bi-weekly anti-Semitic tabloid, Der Strmer, pressed for violent methods to oust the Jews from German society. Almost immediately after Hitler became chancellor, SA-sponsored street terror and hooliganism began, with Jews as primary targets. It was mainly to appease the disgruntled SA militants that Hitler authorized the national boycott against Jewish-owned stores, lawyers, and physicians in April 1933. Streicher was appointed by Hitler to head the committee planning the nationwide boycott, the announced purpose of which was to retaliate against Jewish-sponsored boycotts of German goods abroad. After the end of the official boycott physical assaults against individual Jews and Jewish business es continued sporadically without official sanction. Perpetrators, however, almost always escaped arrest or prosecution. (Hans W. Gatzke, 1973) Some Nazis criticized the SA's campaign of physical violence, not on humanitarian grounds, to be sure, but because it undermined discipline and order, caused property damage, provoked Western charges of human rights abuses, invited retaliatory measures, and seemed an ineffective and counterproductive way of ridding Germany of its Jewish population. Hjalmar Schacht and later HermannGring in his capacity as chief of the Four-Year Plan deplored the adverse impact on the German economy of vandalism

Thursday, September 26, 2019

International oil and gas law Essay Example | Topics and Well Written Essays - 4000 words

International oil and gas law - Essay Example This will start by explaining the types of agreement that the government can enter into when the current term with an oil development company called Noble Oil expires and the reasons why such type of agreement could be suitable. Also, following oil discovery in Amazia, the paper will discuss how the Urbania should go about oil development in that region as well as give an advice on which company the government should work with. Finally, the paper will discuss the various types and sources of finance that are available for Urbania, considering that the country does not have adequate resources to fund oil development projects. A. What type of agreement should Urbania enter into for continued development of, and production from, the Western Plateau region, when the current concession expires? Be sure to give reasons for your recommendation. There are several fundamental agreements that can be made between the government of Urbania and Nobel Oil Company including the Joint Venture Agreem ent, concession, service contract and production sharing agreement.1 The government can decide to continue with the current concession agreement if it wants to guarantee the ownership of the oil resources of the company that will be granted the license. Technically, this ownership is enjoyed in exchange for royalty, which is usually estimated at a fixed rate on the quantity of oil produced. In some situations, the company can also enjoy tax exceptions and reduced custom duties in exchange for the extraction rights. This agreement will present Nobel Oil with a long duration of agreement with the government of Urbania, and it will be difficult for the government to include a ‘lock in’ clause such that it will be hard for any party to pull out for whichever reason. Nevertheless, this type of agreement comes with some disadvantages. For instance, a concession is a long-term agreement, which is usually faced with problems related to adjustment of financial commitments as a r esult of unexpected circumstances. 2 It will also be a disadvantage on the side of the licensed company because it will be required to pay higher amount of pre-oil discovery fee, and following the discovery of oil, the company is likely to pay very high amounts of royalties as well as income tax. The current rate of royalty is 16%, which will somewhat generate a substantial amount of revenue and hence a good reason for the government to retain concession when the current one expires. The concession contains relinquishment clauses, which could compel the Oil Company to either to discover commercial reserves; or following the discovery of commercial reserves within a certain period of time, relinquish usable portions of the concession back to Urbania government. The concession has an express work obligation of a limited period of time within which the Oil Company is expected to commence oil exploration and on discovery of commercial reserves, the company would be expected to develop o il in accordance with good oilfield practice. This means that the government will have some powers to control the activities of the oil company in a manner that ensures the company is following oil industry practices. The joint venture agreement is another option that Urbania government can put into considerations after the current

Group project Essay Example | Topics and Well Written Essays - 750 words - 1

Group project - Essay Example Citigroup; is a financial organization with three segments; global wealth management, investment and corporate banking and global consumer. The company is guided by the slogan â€Å"Knowledge is your greatest asset† and the three segments work collectively to provide financial management services and portfolio management services to its customers (Fortune 500 Mission Statements. (n.d.). Its mission is to the most treasured global financial services enterprise. In conduction its business, Citigroup is guided by the following values and principles; NIKE Inc.; is an American corporation celebrated for designing, advancing, manufacturing and global marketing and selling of apparel, shoes, balls and other sporting equipment and services. The mission of the company candidly exemplifies what the company is out to achieve; â€Å"To bring inspiration and innovation to every athlete in the world† (Fortune 500 Mission Statements. (n.d.). It values culture, the environment and the opportunity to work together with stakeholders and shareholders for delivery of quality services while maintaining the happiness of all those who are connected to it. Additionally, its activities are highly interwoven to provide inclusiveness and offer its employees an environment that bolsters fulfillment of personal goals and attainment of happiness. Its core value of delivering growth in the veracious way seems to be a major factor that has enabled the company to be competitive in the market as its products not only suit the needs of the markets but also giving its employees adequate confidence (Page & Vella-Brodrick, 2009). It further perceives fairness to be an imperative part of sustainability and has always acted fairly towards its employees and its customers. The Walt Disney Company; is a multinational that operates worldwide entertainment collection of entertainment parks, studios, resorts and consumer products including

Wednesday, September 25, 2019

Christianity and the American Indian Research Paper

Christianity and the American Indian - Research Paper Example Specifically, these worldviews were deeply rooted in religion and experiences of the sacred. It is the thesis of this paper that the influence of Christianity on Native American culture played a significant role in reshaping the lives of the Amerindians through suppression of spiritual ceremonies and a flagrant disregard for an existence considered to be based on superstition and ignorance. II. BODY Most of the European settlers who came to America were of a Christian religious orientation.3 A basic experience of the sacred in Christianity is that God is The Father. George Washington, and those who took up management of the â€Å"Indians† under his leadership and after his time, perceived the Europeans to be more civilized, of superior intelligence and leadership capability, and entrusted by God to represent His will in I II converting the â€Å"savages† to Christian values, beliefs, over-all perspective, and guidelines for living.4 It is every Christian’s duty t o evangelize the â€Å"truth†. Government authority in White America, being Christian, must represent God to the Natives. The government presented itself as â€Å"Father†, or â€Å"The Great White Father†5 Identifying themselves as â€Å"Father† was a symbol of God-like self-perception, a belief in their own inviolable sacred authority. â€Å"Father†, from a patriarchal European mindset, indicated a belief in their own omnipotence and omniscience, an assumption that they know best. A father is responsible, loving, kind, truthful, supportive, caring, guiding his children in a right way. The White Father, on the other hand, was irresponsible, violent, continuously telling lies and betraying â€Å"his children†, enforcing policies that depleted Native resources and ruined the land, humiliated, insulted and starved the Indians. The path he led them on was intolerable and destructive. While the government and settlers forced conversion to Christi anity, speaking of a Jesus who loved them, at the same time they were continuously punitive toward the Native Americans. Native children were eventually forced into mission-sponsored boarding schools where they were forced to join and attend Christian churches and demonstrate Christian ideals. Native language and religious traditions were strictly prohibited, and the slightest infractions were severely and violently punished6. III Their parents fared similarly. They suffered terrible challenges and limited resources on reservations. They were molded into helplessness, their traditional ways stripped from them. Practicing their religious traditions was legally forbidden.7 The law allowed Native spiritual leaders to be imprisoned up to 30 years.8. This was the law until 1978, when a new law was finally passed, the American Indian Religious Freedom Act, recognizing the rights of the Native American sovereign nations to practice their own cultural and religious traditions9. This was fol lowed, in 1993, by the Native American Free Exercise of Religion Act, which allowed religious use of peyote, s traditional practice critical to the spiritual practices of Peyote Indians.10 Of course, by then most of these traditions had been lost.. â€Å"Within four hundred years of their first contact, the white man had succeeded in stripping Native American civilizations of virtually all of their land and had nearly wiped their cultures from the face of the earth.11 The Christian concept of there being only one truth, Christian truth, was not congruent with

Tuesday, September 24, 2019

UK employment law on unfair dismissal Essay Example | Topics and Well Written Essays - 1500 words

UK employment law on unfair dismissal - Essay Example 2006) and it is necessary to refer to the common law test for defining the status of employee. The statutory provision is bolstered by the Ready Mixed Concrete test (Ready Mixed Concrete (South East) Ltd v Minister of Pensions & National Insurance [1968] 2 QB 497), which requires an examination of the â€Å"overall picture† (Jupp, 2005) The starting point for determining whether an individual is an employee is the â€Å"control† test (Honeyball & Bowers. 2006). This was established in the case if Yewens v Noakes (1880 6 Q.B.D. 530), where Bramwell LJ asserted that â€Å"A servant is a person subject to the command of his master as to the manner in which he shall do his work† (at p.532-533). However, socio-economic developments in the labour market have changed the shape of employment status, thereby undermining the suitability of the control test as a sole determinant of employment status (Pitt, G. 2007). This was further acknowledged by the Court of Appeal in the case of Walker v Crystal Palace FC ([1910] 1 KB 87), where the control test was given a different slant by focusing on whether the employer had the right to control the background arrangements for the work such as when and where the work was done, payments and holiday entitlements. However, the Walker extension of the control test was further developed into the â€Å"integration† test as propounded by Lord Denning in the case of Stevenson Jordan and Harrison v MacDonald & Evans ([1952] 1 TLR 101) â€Å"†¦under a contract of service, a man is employed as part of the business and his work is done as an integral part of the business; whereas under a contract for services, his work, although done for the business, is not integrated into it but is only accessory to it† (at p.111). Alternatively, factors pertaining to the working arrangement between the Mandox household vis-à  -vis Bill and the nannies will also be important in determining employee status such as responsibility for tax, national

Monday, September 23, 2019

Construction of Nuclear Power Station Case Study

Construction of Nuclear Power Station - Case Study Example Besides the special protected area under the Birds and Habitat Directives, it is testing time to get all the owners to agree on the development. I work for the EDG Energy and I have to comment on three aspects of development and these are: The international legal drivers behind the development of which the largest driver is the Kyoto protocol, how the development will be regulated between central and local government, and how the compulsory purchase mechanism is likely to work for this project. The Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) adopted on 11th December 1997 is the biggest single international driver behind the development. This treaty contains legally binding quantitative commitments for industrialized countries, in force from 16 February 2005. The European Union is signatory to the Kyoto Protocol. As such, the construction of the nuclear power station on the banks of the Six Estuary must satisfy the provisions of Kyoto Protocol. The Kyoto Protocol is a legally binding agreement making it mandatory for industrialized nations to reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990. The goal is to lower overall emissions from six greenhouse gases namely, carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, hydrofluorocarbons (HFCs) and perfluorocarbons (PFCs). The national target for the reduction in the European Union is 8%. Nuclear energy does not require coal or any other element that emits greenhouse gas. However, nuclear energy produces nuclear waste and it is the disposal of this nuclear waste that requires to be handled with abundant care as it can be hazardous to the environment. The issue of handling nuclear waste is exacerbated as a foolproof method has not yet been found. The damaging effects of the Chernobyl nuclear disaster during the 1990s are fresh in people's minds everywhere. Such disasters push back any prospect of nuclear venture right at the proposal stage. In order for favorable decision, it is necessary for the European Union to provide adequately satisfactory record on complying with the Kyoto Protocol directives. The data provided by the European Union on current nuclear facilities usage in Europe does not make satisfactory reading (UNFCCC chief sees Kyoto Protocol countries on their way to reach emissions target). The use of nuclear energy on long time basis does not appear to be the best idea if there is no satisfactory consensus on the safe disposal of the nuclear wastage. Thus, Europe's compliance to Kyoto Protocol is fraught with controversies. There are

Sunday, September 22, 2019

Escalating Costs of Social Health Insurance Essay Example for Free

Escalating Costs of Social Health Insurance Essay Unlike any other country in the world, the United States continually experience rising cost of healthcare provision. Wolfe (1999) reports that healthcare costs has been increasing at a high rate for decades, it is estimated that every 40 months, the share of Gross Domestic Product (GDP) spent on healthcare goes up by 1 percent. Health expenditure which stood at 12. 3 percent of GDP in 1990 increased to 16. 0 percent of GDP in 2006 and is projected to reach 20 percent in the next 7 years. Between 2005 and 2006 alone, healthcare spending increased by 6. 7 percent, exceeding nominal GDP growth by 0. 6 percent, to a whooping $2. 1 trillion, representing an estimated $7,000 spending per person (Kuttner 2008; Catlin et al 2008). Various factors including inflation, aging population and advances in medical technology has been indicted as been responsible for the global increase in health expenditures, however, the American situation appears to be peculiar. Kuttner (2008) contends that the proliferation of new technologies, poor diet, lack of exercise, the tendency for supply (physicians, hospitals, tests, pharmaceuticals, medical devices, and novel treatments) to generate demand and the culture of the American litigation, resulting in excessive malpractice litigations and the practice of defensive medicine, all adds together to ensure that the country experiences the largest and fastest growth in health expenditures, while at the same time, defeating efforts at cost containments. Like every other developed country, health insurance systems, especially social health insurance systems constitute the primarily methods of health financing (Carrin and James, 2004). This arrangement ensures that most of the cost of healthcare are paid by third parties, either through public establishments, as in social (public) health insurance systems, or by private bodies, as in private health insurance system, or in some cases, a mixture of both (Wolfe, 1999). The mixture of private and social health insurance is present in almost every country, with variations in their coverage. While in most European countries, social health insurance is deeply ingrained in societal fabric and provides the largest source of funding and insurance coverage (Saltman, 2004), the vast majority of Americans receive their health insurance coverage through employer based private insurance, with the rest of the country covered by any of the several public health insurance programs (Glover et al 2003). It is estimated that employer private health insurance covers approximately 63 percent of the population, with 51 percent of these amount covered by their own employers, while the remaining 41 percent are covered as a workers dependent; 14 percent are covered by public programs, 5 percent covered by individual insurance policies while an estimated 17 percent of the population are uncovered by any insurance (Devi, 2005). Medicare is largely regarded as the primary national (social) health insurance program in the United States, providing coverage for an estimated 44 million Americans over the age of 65. It is also estimated that Medicare provides health insurance coverage for about 7 million Americans under the age of 65 who have a disability or chronic condition (Fact Sheet, 2007). Social health insurance is a vital part of any countrys health care and health financing program, in some part of Europe, there is a general contention that social health insurance is not just an insurance arrangement, but a way of life, they are seen as a part of a social incomes policy that seek to redistribute wealth and health risk evenly amongst the population, however, the rising costs of these systems, not just in the United States but across the modern world, threatens the system. Before an analysis of the costs and factors driving costs of social health insurance systems, especially in America and in other European countries, it is important to first briefly describe the underlying principles of the social health insurance system and its difference from the private health insurance programs. This will be followed by a description of the United States Medicare program and some social health insurance programs in selected European countries and then a look at the costs of these programs. Steps taken towards cutting costs of the social insurance programs and the differences in cost cutting approaches between the United States and European Union countries will be examined. Lastly, future approaches that could help ameliorate the financial challenges facing the United States public insurance programs shall be recommended. Social Health Insurance Social health insurance, in its basic principle, in any society achieves a set of societal objectives through its peculiar form of financial cross subsidies, which covers redistribution from the healthy to the ill, from the well off to the less well off, from the young to the old and from the individual to the family. This redistributive focus of any social health insurance program distinguishes it from what is nominally regarded as insurance, thus, in several societies, it entrenches solidarity, income redistribution and is thus seen as a key part of a broader structure of social security and income support that sits at the heart of civil society (Saltman, 2004:5) Saltman and Dubois (2004) contend that although Germany is considered the source of the modern day form of social health insurance, when it codified existing voluntary structures into compulsory state supervised legislation in 1883, the history of social health insurance (SHI) dates back longer to the medieval guilds in the late Middle Ages. However, they agreed that the structure and organization of SHI over time has considerably evolved; the number of people covered has increased from a small number of workers in particular trades to a larger portion of the population, the central concept SHI has evolved from wage replacement a death benefit into payment for and or provision of outpatient physician services, inpatient hospital care and drugs; thirdly, the administrative structure of SHI has also evolved from cooperative workers association to state mandated legislative character, beginning with Germany in 1883 and the most recent, 1996 in Switzerland. Structurally, social health insurance everywhere possesses three common characteristics. Social health insurance programs are administered privately in both funding and in the provision of health services; as a result of their private administration, social health programs are self regulating, and lastly, as a consequence of their independence and self regulation, social health insurance programs are relatively stable, both in organizational and financial terms (Saltman, 2004). As a fall out of these structural characteristics, social health insurance posses several core components that differentiate them from private health insurance programs. Under SHI, the raising of funds is tied to income of beneficiaries, usually in the form of a transparent and fixed percentage of wages. As a result, contributions are risk independent and thus encourage maximal risk pooling. Also, collection and administration of revenues for the program are handled by not-for-profit and sometimes, state run funds and these funds are usually managed by board members that are usually representative and elected. The United States Medicare program posses most or all of the characteristics of a social health insurance program. For over 40 years, the program has successfully provided healthcare access for the elderly and millions of people with disability. It is regarded as the nations single largest health insurance program and it covers a wide range of the society for a broad range of health services. For example, Potetz (2008) report that one out of ever five dollars spent on healthcare in 2006 came through the Medicare program. The program is also reported to fund, at least, one third of all hospital stays, nationally. In most European countries too, national, public (social) health insurance programs reportedly covers a large proportion of the population, in most cases, reaching up to 100 percent coverage. Saltman and others (2004) reports that in Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Switzerland and from 1995, Israel, all have health insurance systems where (public) social health programs plays predominant roles in organization and funding of health care services, where between 60 to 100 percent of the population are mandatorily covered. They further argue that even countries like Finland, Sweden and the United Kingdom, Greece and Portugal that have a tax funded National Health Service schemes, segments of SHI based healthcare funding also exists. Explaining the difference between social health insurance programs and private health insurance, Thomson and Mossialos (2004) contend that private health insurance play very insignificant role in the health systems of several European countries, either in terms of funding or access to healthcare. Unlike in the United States where more than 60 percent of the population are covered by private employer based insurance, private health insurance programs covers a relatively small proportion of the population and accounts for less than 5 percent of the total health spending, with the exception of France, Germany and the Netherlands. The most common difference between social and private health insurance includes eligibility, risk pooling and benefits. For social health insurance programs, contributions are mostly based on a fixed or varying proportion of wages, without regard for risks, thus a wider proportion of the people are eligible and benefits i. e. health services offered are broader with less out of pocket costs (Thomson and Mossialos, 2004; Saltman 2004). For private health insurance, the reverse is the case in most situations. Especially in for-profit private health insurance systems, contributions are adjusted according to risks and for the most part high risks individuals are rejected or expected to pay higher premiums. Consequently, eligibility requirements are strict; out of pocket expenses might be higher, while services provided vary significantly across programs, depending on an array of factors. Depending on the generally functions and services offered by private health insurance, the relation to social health insurance can be substitutive, complementary or supplementary. Substitutive private health insurance programs provides insurance covers that is otherwise available from the public programs purchased by individuals or groups who are excluded from the SHI. The larger proportion of the US society is excluded from the public insurance programs, which are usually available to the elderly, the disabled or the very poor, the rest of the population must rely on private employer based insurance. However, in European countries with effective SHI, only certain individuals with income above a certain upper threshold are excluded from the public insurance program e. g. in Netherlands and Germany, while the rest of the population are eligible. Complementary private health insurance programs provide cover for services not fully covered by the SHI programs or totally excluded, the Medicare + Choice plans is an example of such covers. Lastly, supplementary private health insurance provides cover for faster access and also increased consumer choices for individuals who can afford it (Thomson and Mossialos, 2004). Eligibility and Coverage  The United States Medicare program is essentially for the elderly, thus, individuals are eligible for Medicare coverage if they are citizens of the United States or have been a permanent legal resident for five continues years and over 65 years old. Individuals younger than 65 years of age can also be eligible for Medicare coverage if they are disabled and have been on the Social Security Disability Insurance (SSDI) or the Railroad Retirement Board benefits for a period of two years. Further, individuals with end state renal disease (ESRD) or Amyotrophic Lateral Sclerosis (ALS) known as Lou Gehrig’s disease also qualifies for Medicare coverage. However, many people with disability do not qualify for SSDI benefits and by extension, Medicare. To qualify for these benefits, disabled individuals must have a family member under age 65 who have a work history which included Federal Income Contribution Act tax (FICA), an individual may also qualifies for SSDI on the FICA contributions of a parent as a Childhood Disability Beneficiary (CDB) or as a disabled spouse of a deceased spouse. Whichever qualification route applicable, an individual qualifies for Medicare two years after he/she starts receiving the SSDI benefits, except for the Lou Gehrig’s disease where Medicare benefits starts in the first month SSDI payments are received or in the case of the ESRD where Medicare benefits starts within three months of the first dialysis (Fact Sheet, 2007). As of 2007, it is estimated that Medicare provides cover and health services to about 43 million Americans. This figure is expected to double to 77 million by 2031 when the baby boomers of the post World War II period start to retire. However, as mentioned previously, SHI in European countries offer universal coverage that is mandatory in some countries. Coverage for these countries varies from 63 percent in Netherlands to 100 percent coverage in France, Israel and Switzerland. In most of these countries, it is usually the highest income groups that are either allowed or required by law to leave the social health programs for private health insurance (Saltman, 2004:7). Benefits Benefits for Medicare members have continually been modified. The original program has two parts, Medicare Part A and part B. The Part A program known as Hospital Insurance, covers hospital stays with stays in skilled nursing facilities for limited periods if certain qualifying criteria are met. Such criteria include the length of hospital stay, which most be three days, at least, excluding the discharge day and stay in skilled nursing facility must be for conditions diagnosed during the hospitalization. Medicare Part A allows up to a maximum of 100day stay in skilled nursing facilities, with the first 20 days completely paid for by Medicare and the remaining 80days paid in part and requiring a co-payment from the beneficiary. The Medicare Part B covers services and products not covered by Part A, but on an outpatient basis. The benefits under this coverage includes physician and nursing services, laboratory diagnostic tests, influenza and pneumonia vaccinations x-rays and blood transfusions. Other services include renal dialysis, outpatient hospital procedures, Immunosuppressive drugs for organ transplant recipients, chemotherapy, limited ambulance transportation and other outpatient medical treatments carried out in a physicians office. This coverage, to some extent, also includes medical equipments like walkers, wheelchairs and mobility scooters for individuals with mobility problems, while prosthetic devices, such as breast prosthesis after mastectomy or eye glasses after cataract surgery are also covered. The recently added Part C and D of the Medicare benefits slightly deviate from the original Medicare concept. After the Balanced Budget Act of 1997 came into effect, Medicare beneficiaries were allowed the option of receiving their Medicare benefits through private health insurance plans if they do not want to go through the original Medicare plans. These became known as Medicare + Choice as beneficiaries could choose any private health insurance plans and have it paid for by Medicare. The Medicare + Choice or Part C arrangement later became known as the Medicare Advantage Plan after the Medicare Prescription Drug, Improvement, and Modernization Act of 2003 came into effect. The Part D plan, on the other hand, covers mainly prescription drugs and anyone in the original Plan A or B is eligible for this plan. However, in other to receive the benefits of the Plan D, a beneficiary must enroll and be approved for a Stand-alone Prescription Drug Plan (PDP) or Medicare Advantage plan with prescription drug coverage (MA-PD). However, because Plan D is effectively operated by private health insurance companies, there are no standardized benefits, like the plan A and B; the private insurance companies could choose to cover some drugs or classes of drugs and not cover others, with the exception of drugs excluded from Medicare coverage. Beneficiaries are therefore restricted to the drugs coverage of the plans they choose (Merlis, 2008; Potetz, 2008). Contributions towards Social Health Insurance Medicare financing, like social health insurance everywhere, is financed through a complex mix of taxes, contributions, co-payments and the likes. The most important source of financing for the Medicare expenditures is through the payroll tax imposed by the Federal Insurance Contributions Act and the Self-Employment Contributions Act of 1954, while other sources of financing includes general revenue through income taxes, a tax on Social Security benefits, and payments from states required for the Medicare drug benefits which started in 2006. In addition to these, beneficiaries also contribute directly to Medicare financing through premiums, deductibles and co-insurance. It is reported that income cases, physician do charge beneficiaries an additional out-of -pocket balance billing to cover for services rendered (Potetz, 2008). The federal payroll taxes are paid by the working population or by the beneficiaries throughout their work history. The tax equals 2. 9 percent of gross wages, with half (1. 45 percent) deducted from the workers salary and the other half paid by the employer. Initially, there was a ceiling on the maximum amount any single person can contribute; however, beginning from 1994, the maximum limit was removed. Self employed people who do not have an employer to cover the other half of their taxes are mandated by law to pay the full 2. 9 percent of their estimated earnings. However, the contributions from the beneficiaries vary considerably depending on the plan and also range from premiums, deductibles, co-payments or in some cases, the balance billing mentioned previously.

Saturday, September 21, 2019

Strategic approach to entering a new international market

Strategic approach to entering a new international market It is an international marketing planning assignment where I am supposed to launch a product in the foreign market and I have selected UK as my market and Dabur Real juice is my product which I will be introducing in UK. INTERNATIONAL MARKETING PLANNING According to the American Marketing Association (AMA) international marketing is the multinational process of planning and executing the conception, pricing, promotion and distribution of ideas, goods, and services to create exchanges that satisfy individual and organizational objectives THE ANALYSIS: Dabur is the fourth Fast Moving Consumer Goods company in India. Dabur was established in 1884. This Company is giving an excellent performance since 125 years. Dabur has more than 300 products.( www.dabur.com) but the main product of this company is Dabur- Ayurvedic health care products, Vatika-premium hair care, Hajmola-tastey digestives, Real fruit juices and beverages, Fam-fairness bleaches skin care products. It has expended their products in various countries that includes Middle East, North West Africa, EU and the US with its brands Dabur Vatika. had a turnover of approximately US$ 750 Million Market Capitalisation of over US$ 3.5 Billion with brands like Dabur Amla, Dabur Chyawanparas, Vatika, Hajmola and . The company has kept an eye on new generations of consumers with arrange of products that cater to a modern life style while managing no to alienate earlier generation of loyal costumers the companies growth rate rose from 10% to 40%. The expected growth rate for two years was to fold. Dabur foods a subsidiary of Dabur India is expecting to grow at 25%. Its brands of juices namely and active together make it a market leader in fruit juice category. (The Economic Times, www. Dabur.com) According to the above data the market of fruit juice and juice drinks in UK is still has vast market after recession , the sales of fruit juice was 1189 m litres in 2005 but after gradually declining, sales was 1159 m litres in 2009, which is also a good quantity. There is a good chance for Dabur real juice for success in this market. The fruit juice and juice drink market is valued at Pound 3.1 billion in 2009 and while both volumes and value have grown in recent years. (oxygen .mintel.com) Britain now consumes 2.2 billion litres of juice drinks a year around 36 litres for every man, woman and child.(news.bbc.co.uk). This figure shows the future growth of product one it make the goodwill after establishment. UK food market is one of the highly regulated food markets in the world and it is hard for any company to launch a new food product in the UK market. On top of that the existing intense competition by leading corporations selling juice products such as Pepsi Co and Coca Cola made it hard for other brands to enter into UK juice-consumer market. Tropicana is the no.1juice in UK. Tropicana makes the juices and smoothies from the highest quality of fruit, expertly blended. It contain 100% juice no added water.(www.pepsico.co.uk) On the other hand, it represents a unique opportunity for a multinational company to enter such market with a differentiated product attracting a specific customer-base which is spread all over United Kingdom. Dabur, the multi-national company, based in India is one of the oldest Fast Moving Consumer Good company selling range of products to its customers since 1885. It operates in 8 countries worldwide including United Kingdom but selling only limited number of products outside India. Due to its multinational nature and have number of years experience in international trading, it puts the company in the unique place to launch its juice products in the United Kingdom. There are many competitors in the market for new products which has mentioned in above data, in which PepsiCo, princes, Del monte has strong hold over the market.The organisation already sells some of its health products in Britain so already possess UK consumer experience. The UK juice market is competitive in its nature with leading brands established such as Tropicana and Copella. But there is a huge market potential to attract those customers who have some kind of connection with Indian sub-continent and are loyal to the products originated from that continent. TARGET MARKET The target market of my product would be south of London because the majority of Indian people are living there and they already know about the brand, there is a possibility to sale product among the Indian origin people, afterward we will launch the product in all over London. The number of residents in UK according to office of national statistics exceeds 3 million which are spread all over the country hence making an ideal position for a leading company like Dabur to launch its juice brand . According to Dabur.com, It has been the preferred choice of consumers when it comes to packaged fruit juices, which is what makes Indias No. 1 Fruit juice brand. It further clarifies the status of that, has been awarded Indias Most Trusted Brand status for four years in a row. This reflects the unique quality of this juice product which after number of years of hard work has not only get to the top place in the massive retail market of India but also retained the top position for four years. To expand internationally, British market offers best opportunity for this Indian brand targeting initially those customers who has some kind of connection with Indian sub-continent. Its unique entry point into the UK market typically based on the Core quality aspects of the ranges of the juices under brand available together with its augmented services such as the theme of Indian-culture with the core product. UK juice market currently worth at $6602.5 million which includes a 10.9% increase in 2009 according to the datamonitor report on UK juice industry profile. With that it is set to increase by 53% to the total value of $10,118.5 million by year 2014 since 2009.(www.lowpriceshopper.co.uk) The leading competitors include Pepsi INC., Del Monte Foods Company and GSK but do not include any of the Asian brands. UK market represents the 26.2% of EU juice market value (www.fdf.org.uk) hence representing an ideal place for Dabur to launch its juice products in this new market and to have access to EU market. Although the existing competitors face intense competition among selling juices but such rivalry tend to reduce due to the international comparisons and differential market shares in other markets. The juice market typically consists of the following juice types: 100% fruit juice from concentrate 100% fruit juice not from concentrate Nectar 30%-99% juice Fruit drink Vegetable juice The best selling type from the above is the 100% fruit juice not from concentrate. Dabur focuses on producing 100% juice not from concentrate and its juice ranges up to 12 covering almost all types of fruits. There is no single competitor in UK who is covering that many types of 100% juice not from concentrate thus making it ideal for this global FMCG to enter and survive the intense UK juice market and establish its juice brand . Its suitability for growth opportunity depends on the penetration of the brand into the market where there is a high concentration of residents of Indian-subcontinent. Its unique selling point is the existing quality which is on top of range of already established juice brands in UK market plus the comprehensive range of juices and the fact that it has been originated in India from a company which is in existence for more than 125 years. UK market is also considered an ideal market for Dabur due to high disposable incomes, and high health consciousness of UK residents couple with the desire of convenience of having quality products at the doorstep. The brand initially fits the criteria of becoming a successful juice brand in UK market but on top of that it ca n also launch similar juice products such as smoothies to compete with other major competitors such as Innocent. High product awareness means that Dabur can emphasize on the core qualities of its juices which circle around the healthy lifestyles. The biggest obstacle of a foreign market is the language barrier which can end up in high promotional cost. But Dabur already promotes its products in English in India and have large number of employees who are already skilled in English language. Thus entering the UK market will not going to increase its product-development or employee-training cost in anyway. There is also high rates of tourism every year which currently takes place in both countries thus there is already a huge sense of collaboration and exchange of cultural values in place. A big Asian community in UK means that Dabur only need to use different pricing strategies for products rather than starting from the scratch point of heavy promotion of its juices. (Economicstimes. indiatimes.com,www.dabur.com) MODE OF ENTRY BY DABUR REAL JUICE Export (Direct or Indirect) Joint Venture Direct Development Figure: International Market Entry Options Looking at the options above, company on the first instance can use the option of exporting its juice products because of low risk it carries but it will prove unsustainable for the company due to its traditional selling techniques which do not include exporting the products or having a joint venture. Company can make best use of Direct Development option by using its current product and customer base at a little extra cost. It gives company the maximum benefits of ultimate control but comes with the maximum cost without sharing it with any partners. This strategy fits best with Dabur international expansion motives which come with long term commitment in the international market. Direct Development also gives Dabur full control of marketing mix. There are number of marketing options available for Dabur to expand its product base in UK to include its popular brand and it does have number of options. Looking at generic strategies it can enter the UK market through Niche plays by having its brand on display in small corner and town shops present in multi-cultural areas of England such as London, Birmingham and Manchester. Due to the limited number of products offered by Dabur at this stage, it suggests that it has high excess capacity available by looking at the range of products it offers in Indian market. On top of that, the work it has done before on the development of brand in UK, it can be proved very successful for the launch of brand. This international expansion also suggests a good strategy to spread the corporate risk. Assignment 2. You are planning to enter this market as a market challenger. Examine your strategic attack options. To challenge existing competitors, further market analysis is being carried out as given below with discussion on strategic attack options: MARKET SEGMENTATION: First steps towards developing a strategic attach option on the competitors is the market segmentation. As a result of market segmentation company will be in a clear position on how to enter the market and reach the customers. Market Segmentation is the process of identifying different group of users within the market. (Croft, 1994). Dabur will need to use following product distribution networks to reach wider customer audience which is also covered by the competitors thus creating a challenging environment for them. WHOLESALERS: When the market for juice are distributed in UK then these one that is wholesalers falls under a category which deals the juice directly or indirectly with customers. DISTRIBUTERS: They are specialized in the task and well known about the local preferences so its easy to get localized feedback, and they again major consumer of juice. AGENTS: Agent has the all information about the local contractors, distributors and retailers etc. So they can enhance the dealing among the retailers. Agents will help to increase the network. RETAILERS: Retailer is the ultimate person who is directly dealing with customers or direct sales the product, he directly interact the buyers and delivered the information to customer about product due to which buyer buy the product there are a lot of dabur retailers are available in London which are already selling different product of Dabur. TARGETING Targeting is the second stage of the Segmentation Targeting and Positioning (STP) process. After the market has been separated into its segments, the marketer will select a segment or series of segments and target it/them. The task of marketing manager is to plan and execute programs that will assure an elite competitive advantage for any organization. According to Czinkota and Ronkainen (1990), this task has two integral part. They are (1) the determining of of specific target markets and (2) marketing management that consists of certain marketing mix elements. Option 1 THINK GLOBAL ACT LOCAL To target its customer base, company initially needs to take into account the habits of its potential customers such as there cultural and attitude needs and which types of products such customers values. Dabur will have competitive advantage here against any other international FMCG who wish to target similar customer base as it is already aware of the cultural needs of the target customer base. However it needs to act very sensitively to attract and retain customers of Indian origin due to intense rivalry and availability of alternative products. Such customer base can be act as a source of promotion within UK market and outside UK market due to large movement of people globally which is turning world in a single market. Option 2 Decentralisation Theodore Levitt has already commented on international movement in 1983 which was published in Harvard Business Review, Ancient differences in national tastes or modes of doing business disappear, the commodity of preferences leads inescapably to the standardisation of products, manufacturing, and the institutions of trade and commercesuccess in world competition turns on efficiencies of production, distribution, marketing and management. To integrate above, company need to ensure some de-centralisation within its organisation. Although it does have its subsidiaries in 7 other countries including UK, but specifically for the launch of product in UK decentralisation of marketing strategy from its Indian based business will be proved very beneficial. The decentralisation of marketing strategy will bring the benefits to Dabur UK such as addressing local needs more effectively but there will be issues in overall brand protection and strategic continuity of the overall business. Option 3 Using web Looking at high internet access, Dabur should also use the web as the major marketing strategy to attract the customer to its product but it will need to ensure that it tries to use same strategic principles in marketing its Product in UK as it does in India to keep the similarities in communication channels. Communication strategy forms the part of promotional aspects of the Dabur Company which alongside other Ps of the market strategy are discussed in the implementation section of this report in further detail. Assessing the options: How the product differs from others? The Dabur Real juice would be different from other juice products of UK. It contain more nutrient and Ayurvedic substances which will make this product differ from others, ayurvedic substances will give much more energy as compared to others. it will target the customers age group between 10 to 35 but its also attract the customers above 35 due to its nutrition and more energetic factors. To further develop strategic attach options, marketing mix analysis is carried out. The marketing mix is the term which is use to explain the compounding maneuver used by businessman for accomplishment of goal through its products and services. Usually its work on particular target group. It refers all 4 Ps which are few of the vital factors which implies the implementation of the product. Product Price Promotion Place Product : We are going to launch fruit juice it comes in different flavour. fruit juice is the core product. The company will launch its 14 variants in two divisions the first division will include the launch of seven variants and critically analysing the success. The company will launch its next seven variants after a period of 6 months. the juice will appeal to the people of all age group as health is no consider as wealth and juice is capable of nourishing people health of different age group. juice contains some added fleavors which will attract the age group of six to ten. Every product has a life cycle. Which start from Introduction than Growth afterward Maturity than after Declining and ultimately withdrawal last time of product. With the help of this product we can forecast the life of our product Real fruit juice. PRODUCT LIFE CYCLE Price : fruit juice is the natural flavoured juice which consists of various nutrients and vitamins. Based on the investment and quality, we fix a good price for selling. The company has launch its products by CREAMING price technique. Price will also help to show the brand and quality which attract the customers. We are using the direct development of the product strategy to launch this product, so we need to recover the cost of production and also good profit margin. Profit is directly related to price of product in any organization. Price is important as it generates revenue. juice price margin will be excellent due to its brand name. Sometimes customer make general perception that low price means low quality. So we cant ignore the customers like or dislike. Customer think negative about the very low price. They think that is inferior good and in case of too high price customer think product is very expensive. Until and unless company calculate the exact cost of goods and services, then c ompany afford more loss on more sale. Place : Initially we target the Indian dominated place in UK. UK is the highly multi cultural country, where we can find the people from every part of the world. Inside the UK London is the highly multi cultural location, south and west London would be most preferable place for launching the product fruit juice. Apart from London, we will also provide the easy accessibility of fruit juice in Birmingham, Manchester etc. We will try to cover all those places where the transport is very economic. Product would be available in many physical stores as well as on virtual stores over the internet. Promotion : Promotion of any product is a vital process of an organization. We should be very careful about the promotion of fruit juice. Now a days we are living in the modern era, it is easy to provide the information about our product inside and outside of the door. Promotion has 4 vital elements: advertising, personal selling, public relation and sales promotion. Advertising is a channel of communication which influences the listeners, viewers and readers directly or indirectly. With the help of advertisement we will make our product fruit juice among the customers. At this time we advertise fruit juice in various ways through television, radios, electronics, print media, banners and template also. We will distribute the free samples among the people. At the time of launching product in the market, we ned to spend a certain amount of money on advertisement. we can show the quality of product through advertising in electronic as well as print media. News papers and magazines contain the advertisement for a long period. It is one of the effective modes of promotion of goods. Free sample distribution and cash discount enhance the awareness of product in the market with the help of this process people will know about the taste and quality of a product, if they like product, they will start buying regularly. Cash discount always attracts the consu mers attention to buy product. We will also promote our fruit juice by good public relation. Daubur already have good image in the eye of Indian customers, so we will try to maintain this brand level in UK. We will also use the technique of individual sale to promote our fruit juice. Middleman in Distribution: We may reach out consumers either directly that is without help of distribution channel, or may be by using more than two distribution channel. Manufacturer to customer: with the help of direct marketing we can sell juice to buyers by personal selling, direct mail, telephone selling and internet etc. To distribute our fruit Juice we make available our product in to the multiplex, malls and give franchise and open new shop in local market. We will deal with agent, wholesaler and retailer to easy accessibility of our fruit juice to customers. Effective channel of distribution boost the sales of product. Critical Reflection Dabur juice is all set to launch itself in highly competitive juice market and ready to compete with well establish firms of juice market that include Pepsi co, Tesco, Tropicana.with Tropicana sharing the largest market share , Dabur juice can face some tough challenges. As discussed earlier the company using the creaming price technique it could go against the success of the juice in UK as some well established juice companies are charging much more nominal price and offering the similar quality. The company is the new entrant in UK juice market and Direct Development can go against the company which has just now moved their step forward by launching itself in UK market. Direct Development has advantage of getting maximum profits but on the other hand there are certain disadvantages as it is too costly for investment and it bears a lot of risk with it. The company will take much time for recovering its cost as the amount for investment is very high.The company will have to invest a huge amount in promotional activities as it has been mention earlier that in order to promote the juice the company will adopt a policy of distribution of free samples among the prospective consumers that could increase the cost and effect the profit of the company in long run. With the presence of well establish firms there is a perfect competition amongst the rivals, which could effect the success of the business in longer period of a time. Lack of Monopoly Market and presence of perfect competation the company will have to develop some unique strategy to tackle the problem of fierce rivalry in juice market. Although the company Dabur already launched in UK, the product of dabur that is juice is first amongst its categories it is a general perception of people that hesitate on shifting to a new product and juice been a new product could face this kind of difficulties. The company has a strategy of targeting the people of Indian origin it may happen that people of Indian origin may be use to local products so the company is in a great risk of failure in UK market. The company has adopted a direct development technique which involves a huge investment that includes setting ups the industries marketing which include a huge cost and in turn increases the profit earning capacity but at the same time the company has to go through high risk of not recovering it costs due to large investment and using direct development technique. BIBLOGRAPHY The Economics Times, 5 Dec, 2010, http://economictimes.indiatimes.com/news/news-by-industry/cons-products/fmcg/Dabur-rebrands-Real-juice-eyes-Rs-700-cr-from-food-div/articleshow/7046665.cms The complete directory of BBC, http://www.bbc.co.uk/a-z/ Food and Drink Federation, first half 2010 updated, access from, http://www.fdf.org.uk/publicgeneral/Food_and_drink_exports_firsthalf_2010.pdf Low price shopper, access from, http://www.lowpriceshopper.co.uk/vitamins_nutritionalsupplements/products__keyworduk+juice.html Times of India, access from, http://timesofindia.indiatimes.com/search.cms Mintel, http://academic.mintel.com/sinatra/oxygen_academic/my_reports/display/id=479966anchor=atom/displaytables/id=479966#section_554384 The Economic Times, 5 Dec, 2010, http://economictimes.indiatimes.com/articleshow/7046665.cms?prtpage=1 http://www.pepsico.co.uk/brands/tropicana Diet Blog, http://www.diet-blog.com/07/the_10_top_selling_brands_in_the_uk.php IBIS World, http://www.ibisworld.co.uk/industry/default.aspx?indid=495 Oxygen.mintel.com, http://oxygen.mintel.com/sinatra/oxygen/display/id=467867/display/id=479966 Oxygen.mintel.com, http://oxygen.mintel.com/sinatra/oxygen/display/id=467867/display/id=479966/display/id=227778 Adcock, D et al (2001), Marketing Principles Practices, 4th edition, Harlow, Pearson Education Limited, p. 120. Czinkota and Ronkainen, International Marketing 5th ed, (the Dryden Press, 1990) pp 17-19 Burca, Fletcher and Brown, International Marketing: An SME Perspective, (Prentice Hall, 2004) pp 476-78 www.Dabur.com Figures has been taken from Data monitor www.marketingteacher.com Doole I and Lowe R, (2001), International Marketing Stretegy, London, Thomson Learning. Gilligan, C and Wilson, M.S. (2003), Strategic Marketing Planning, Oxford, Butterworth-Heinemann. McDonald M, (2003), Marketing Plans how to prepare them, how to use them, Oxford, Butterworth-Heinemann. Croft, Market Segmentation, 2nd ed, Thomas learning 1994,pg 22-33 Wright, Business to Business Marketing, 1st edition, Prentice Hall 2003,pg 10-22 Kotler Keller, Marketing Management, 13th ed, Prentice Hall 2009, pg 696 Hollensen 2007 Global Marketing 4th ed, pg 481 Keegan, J. W. and Mark C. G, (2003), Global Marketing, New Jersey, Pearson Education Inc. Kotlar, P.C. et al, (2001), Principles of Marketing, 3rd edition, Harlow, Pearson Education Limited, p. 76. Kotler P. C, (2003), Marketing Management, New Jersey, Pearson Education. McDonald M, (2003), Marketing Plans how to prepare them, how to use them, Oxford, Butterworth-Heinemann. Micklethwait, J and Wooldridge, A (2000), Future Perfect: The Challenge and Hidden Promise of Globalisation, New York, Crown Business, p.131. www.siakhenn.trepod.com/capita.html

Friday, September 20, 2019

Development of Intrusion Detection System Software

Development of Intrusion Detection System Software INTRODUCTION Heavy reliance on the Internet and worldwide connectivity has greatly increased that can be imposed by attacks plunged over the Internet against systems. It is very difficult to prevent such attacks by the only use of security policies, firewall or other mechanism because system and application software always contains unknown weaknesses or many bugs. In addition, complex, often unforeseen, interactions between software components and or network protocols are continually exploited by attackers. Successful attacks inevitably occur despite the best security precautions. There for intrusion detection system has become an essential part of the system because they can detect the attacks before they inflict widespread damage. Some approaches detect attacks in real time and can stop an attack in progress. Others provide after-the-fact information about attacks and can help repair damage, understand the attack mechanism, and reduce the possibility of future attacks of the same type. More adv anced intrusion detection systems detect never-before-seen, new, attacks, while the more typical systems detect previously seen, known attacks [1]. MOTIVATION The speed of growth of Internet is very fast without any end. With this growth the threat of attacks is also increasing. Because as we all know that theft can be occurred over the Internet from all over the world. So we require a system which can detect the attack or theft before there is some loss of information and reputation of organization or any individual. There are many solutions has been provided by the researchers and from many companies like firewall, intrusion detection system and IPS to stop the attacks. But still it is very hard to detect the attacks like DoS and worm propagation before they widespread, because regularly thousands of attacks are being developed and for a signature based intrusion detection system it is very hard to detect these kinds of new attacks with perfect accuracy. Mostly intrusion detection system generates many false alarms. These false alarms can affect the other processing of the network. If somehow any attacker gets to know that there is an intrusion detection system in the network then, the attacker will want to disable the intrusion detection system. His/her first target will be the intrusion detection system before attacking the network. So there should be proper security policies for deploying the IDS to take proper advantages of it. PROJECT OBJECTIVES Security is the main concern for any network. Every day thousands of attacks are created so that alarms and logs should be generated properly for reducing their effect. intrusion detection system and IPS are mostly used devices for providing these kinds of solutions. But there are many issues like performance and accuracy. So the main objective of the project is to develop a signature based intrusion detection system for DoS attacks with better scalability and performance i.e. intrusion detection system with minimum false alarms and with better throughput. In this study the example of TCP SYN flood attack will be taken for implementing and evaluating the performance and scalability of the developed intrusion detection system. Second Objective of this study is to discuss the policies for implementing the intrusion detection system securely. And these policies shall also be evaluated. Intrusion detection system intrusion detection systems (IDS) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations [2, 48]. There are many different types of intrusion detection system and they can be characterized by different monitoring and analysis approaches. Each approach has different advantages and disadvantages. All approaches can be described in terms of generic process model for intrusion detection systems. Many intrusion detection systems can be described in terms of three fundamental functional components information source, analysis, and response [2]. OVERVIEW Chapter 1 In this chapter we will give a brief introduction of whole project, what is the motivation for selecting this project. What are the main objectives of this project? And what is the main problem which will be considered in this project. Chapter 2 is all about the literature review. In this chapter many different aspects of the intrusion detection system will be discussed like why we require intrusion detection system, different type of intrusion detection system, need for intrusion detection system, about attacks different types of attacks and many other different facts about intrusion detection system which can help to improve the knowledge about intrusion detection system. Chapter 3 will focus on the analysis and designing part of the intrusion detection system. How a computer system can be designed. What s the system engineering and different type’s models will be discussed. CHAPTER 2 NEED FOR INTRUSION DETECTION SYSTEM Internet is carrying more traffic than ever before and still growing in the size without any end. Along with the explosive growth comes an increased threat from Internet related attacks. The Internet allows theft to occur from anywhere of the world [14]. Many threats impact on the operation of your computer network. Natural threats such as flood fire and tornadoes, causes unexpected disruptions. Most companies have well-defined procedure to handle these natural attacks. Security procedures designed to combat hacker attacks, an unsecured network will definitely be attacked. The only question is when the attack will occur [14]. COMPUTER ATTACKS AND VULRANABILITIES intrusion detection systems have been adopted by many organizations because the organizations know that intrusion detection systems are necessary component of the security architectures. But still intrusion detection system is not too much popular, most organizations lack experienced intrusion detection system operators. intrusion detection system can be most effective if the human operates it. But before developing a signature based intrusion detection system the knowledge of the attacks is must. Signatures is a set of rules that sensor uses to detect typical intrusive activities. These rules are based on various criteria i.e. IP protocol parameters, transport protocol parameter and packet data [12]. THE PHASES OF THE ATTACKS Attack can be divided into three different phases. The first phase is defining the goal for attack. The second phase is the reconnaissance attack, also known as the information gathering. After collecting the information the attacker proceed to the third phase, the attacking phase [12]. FIRST PHASE: GOALS OF ATTACK Before attacking a network or system, an attacker sets her goals or objectives. When attacking network the attacker can have various goals: Data manipulation System access Elevated privileges Denying availability of the network resources MOTIVATION Revenge Political activism Financial gain Attackers attempt to disrupt network to discredit the particular organization’s image [12]. RECONNAISSANCE BEFORE THE ATTACK Collecting the information is the attacker’s second step in launching an attack against the network. Successful reconnaissance is also important for successful attack. Attackers use two main mechanisms to collect the information about the network. Public data source Scanning and probing An attacker sometime starts his knowledge search by examining public information available about company. By using these kind of information the attacker can determine that where the business is located, the business partners, the value of the company assets and much more. And through scanning, the attackers use remote reconnaissance to find specific resource on the network. The goal of the information gathering is to pinpoint weak points on the network where an attack is likely to succeed. By pinpointing specific weakness on the network, the attacker can launch an attack in the future that generates minimal traffic or noise on the network. This greatly reduces the likelihood of detection during the actual attack [12]. For example: ping sweep, vertical scan, horizontal attack, DNS query, block scan and many more. THE ACTUAL ATTACK After an attacker maps the network, he researches known vulnerabilities for the system that he detected. The attacker’s goal at this stage is to gain access to resources of the network i.e. Unauthorized data manipulation, system access, or privilege escalation. ATTACK METHODOLOGY Regardless of the motivation or personal preferences, an attacker has several attack methodologies from which to choose [12]: Ad hoc (random) Methodological Surgical strike (lightning quickly) Patient (slow) AD HOC (Random) An ad hoc attack methodology is unstructured. An attacker using this methodology is usually disorganized and those types of attacks frequently fail. It is difficult to comprehensively locate targets on the network. METHODOLOGICAL It provides a well-defined sequence of steps to attack a network. First, the attackers use the reconnaissance to locate the targets. Next the attacker locates the exploits for known vulnerability on the target. Finally when he satisfies with his toolkit he starts attacking system on the target network. SURGICAL STRIKE (Lightning Quick) Many times the attacker uses an automated script against a network. The entire attack is completed in a few seconds. Before the system administrator or security analysts have time to react and make any decision. PATIENT (Slow) It refers to how quickly the attacker executes his attacks. Usually the one uses a patient (slow) methodology to avoid detection. Many intrusion detection systems have difficulty detecting attacks that occurs over long period of time. BACK DOORS Viruses and worms provide a vehicle for an attacker to wreak havoc on your network and potentially the Internet. However, the spread of viruses and worms is much harder to determine in advance. Viruses and worms are much harder to determine in advance. Trojan horse program enables an attacker to establish back door on systems. However Trojan horse requires some type of transport vehicle [12]. DENIAL OF SERVICE TECHNIQUES The purpose of DoS attacks is to deny legitimate access to the network resources. These attacks include everything from simple one-line commands to sophisticated programs written by knowledgeable hackers. There are different types of DoS attacks some of them are- Network resource overload Host resource starvation Out-of-band attacks Distributed attacks NETWORK RESOURCE OVERLOAD One common way to deny the network access is by overloading a common resource necessary for network components to operate. The main common resource that can be attacked in the network bandwidth in several ways generating lots of traffic, distributing the attack across numerous hosts, and using a protocol flaws that amplifies the attack by soliciting help from many different hosts on the target [12]. Example- Smurf and Fraggle attack. HOST RESOURCE STARVATION The resources available at the hosts are also known as the attack point as well. One such resource is the buffer that a host uses to track TCP connections. OUT-OF-BOUNDS ATTACKS The first out-of-bounds attack category uses over-sized packet, it overflows the allocated buffer and causes the system crash. An over-sized packet attack is ping of death. DISTRIBUTED ATTACKS The latest trend in DoS attacks is for an attacker to compromise numerous hosts and then use all these compromised hosts to provide a massive against a specific target. These types of attacks are known as the distributed denial of service attack (DDoS). DISTRIBUTION EFFECT To disrupt the victims communication very badly, the attacker must compromise an agent machine that has more network resources than the victim. Locating and breaking into such a machine may prove difficult, if the target of the attack is well-provisioned site [16]. Distribution brings number of benefits to the attackers: By using distribution techniques, the attacker can multiply the resources on the attacking end, allowing him to deny service to more powerful machines at the target end [16]. To stop a simple DoS attack from a single agent, a defender needs to identify that agent and take some action that prevents it from sending such a large volume of traffic. In many cases, the attack from a machine can be stopped only if the machine’s human administrator, or network operator, takes action. If there are thousands agents participating in the attack, however, stopping any single one of them may provide little benefit to the victim. Only by stopping most or all of them can the DoS effect be palliated [16]. If the attacker choose agents that are spread widely throughout the Internet, attempts to stop the attack are more difficult, since the only point at which all of the attack traffic merges is close to the victim. This point is called aggregation point. Other nodes in the network might experience no telltale signs of the attack and might have difficulty distinguishing the attack traffic from legitimate traffic [16]. In DoS attack executed from a single agent, the victim might be able to recover by obtaining more resources. For example, an overwhelmed Web server might be able to recruit other local servers to help handle the extra load. Regardless of how powerful a single agent might be, the defender can add more capacity until he outstrips the attacker’s ability to generate load. This approach is less effective in defending against DDoS attacks. If the defender doubles his resources to handle twice as many requests, the attacker merely needs to double the number of agents- often an easy task [16]. TCP-SYN ATTACK The SYN-flooding attack is a Distributed denial-of-service method disturbing hosts that run TCP server processes. The attack take benefit of the state retention TCP performs for some time after receiving a SYN segment to a port that has been put into the listen state. The basic idea is to utilize this behavior by causing a host to retain enough state for bogus half-connections that there are no resources to establish new genuine connections [51, 52]. A TCP implementation may allocate to LISTEN state to be entered with either all, some, or none of the pair of IP addresses and port numbers specified by the application. In many common applications like web servers, none of the remote host’s information is pre known or preconfigured, so that a connection can be established with any client whose details are unidentified to the server ahead of time. This type of â€Å"unbound† LISTEN is the goal of SYN flooding attacks due to the way it is typically implemented by operating systems [51, 52]. For success, [51, 52] the SYN flooding attack relies on the victim host TCP implementation’s behavior. In particular, it assumes that the victim allocates state for every TCP SYN segment when it is received and that there is perimeter on the amount of such state than can be kept at any time. The [51, 52] SYN flooding attack does not attempt to overload the networks recourses or the end host memory, but merely attempts to exhaust the backlog of half-open connections associated with the port number. The goal is to send a quick barrage of SYN segments from IP addresses (often spoofed) that will not generate replies to the SYN-ACKs that are produced. By keeping the backlog full of bogus half-opened connections, legitimate requests will be rejected. Three important attack parameters for success are the size of the barrage, the frequency with which barrages2 are generated, and the means of the selecting IP addresses to spoof. Usually, [51, 52] systems implements a parameter to the typical listen () system calls that allows the application to suggest a value for this limit, called the backlog. 1 To be effective, the size of the barrage must be made large enough to reach the backlog. Ideally, the barrage size is no larger than the backlog, minimizing the volume of the traffic the attacker must source. Typical default backlog values vary from half-dozen to several dozen, so the attack might be tailored to the particular value determined by the victim host and application. On machines intended to be servers, especially for a high volume of the traffic, the backlogs are often administratively configured to higher. Another aspect makes both DoS and DDoS attacks hard to handle: Defenses that work well against many other kinds of attacks are not necessarily effective against denial of service. For years, system administrators have been advised to install a firewall and keep its configuration up to date, to close unnecessary ports on all machines, to stay current with patches of operating systems and other important software, and to run intrusion detection system to discover any attacks that have managed to penetrate the outer bastions of defense [16]. Unfortunately, these security measures often will not help against denial of service. The attack can consist of traffic that the firewall finds acceptable. intrusion detection systems are of limited value in dealing with DoS, since, unlike break-ins and thefts, DoS attacks rarely hide themselves [16]. WHAT IS INTRUSION DETECTION SYSTEM? intrusion detection systems gather information from a computer or network of computers and attempt to detect intruders or system abuse. Generally, an intrusion detection system will notify a human analyst of a possible intrusion and take no further action, but some newer systems take active steps to stop an intruder at the time of detection [4]. The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all—they only identify evidence of intrusions, either while they’re in progress or after the fact. Such evidence is sometimes referred to as an attacks â€Å"manifestation.† If there is no manifestation, if the manifestation lacks sufficient information, or if the information it contains is untrustworthy, then the system cannot detect the intrusion [5]. intrusion detection systems are classified into two general types known as signature based and heuristic based. Pfleeger and Pfleeger describe signature-based systems as â€Å"pattern-matching† systems that detect threats based on the signature of the attack matching a known pattern. Heuristic based systems, which are synonymous with anomaly-based systems, detect attacks through deviations from a model of normal behavior [6]. intrusion detection systems that operate on a single workstation are known as host intrusion detection system (HIDS), while those that operate as stand-alone devices on a network are known as NIDS. HIDS monitor traffic on its host machine by utilizing the resources of its host to detect attacks. NIDS operate as a stand-alone device that monitors traffic on the network to detect attacks. NIDS come in two general forms; signature based NIDS and heuristic based NIDS [7]. PROCESS MODEL FOR INTRUSION DETECTION SYSTEM intrusion detection systems can be described in terms of three fundamental functional components [2, 48]: Information Sources the different sources of event information used to determine whether an intrusion has taken place. These sources can be drawn from different levels of the system, with network, host, and application monitoring most common. Analysis the part of intrusion detection systems that actually organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place. The most common analysis approaches are misuse detection based (signature based) and anomaly detection. Response the set of actions that system takes once it detects intrusions. These are typically grouped into active and passive measures, with active measures involving some automated intervention on the part of the system, and passive measures involving reporting intrusion detection system findings to humans, who are then expected to take action based on those reports. INFORMATION SOURCE The most common way to classify intrusion detection system is to group them by information source. Some intrusion detection systems analyze network packets, captured from network backbones or LAN segments, to find attackers [2]. It can be describe by dividing three different parts. NETWORK BASED INTRUSION DETECTION SYSTEM NIDS are intrusion detection systems that capture data packets traveling on the network media (cables, wireless) and match them to a database of signatures. Depending upon whether a packet is matched with an intruder signature, an alert is generated or the packet is logged to a file or database [8, 48]. Network-based intrusion detection systems often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console. As the sensors are limited to running the intrusion detection system, they can be more easily secured against attack. Many of these sensors are designed to run in â€Å"stealth† mode, in order to make it more difficult for an attacker to determine their presence and location [2, 48]. HOST INTRUSION DETECTION SYSTEM  or HIDS Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity. Some of these systems are reactive, meaning that they inform you only when something has happened. Some HIDS are proactive; they can sniff the network traffic coming to a particular host on which the HIDS is installed and alert you in real time [8, 48]. These types of intrusion detection systems run on host to reveal inappropriate activities on these hosts. The HIDSs are used for detecting the attacks from the inside and outside network. They provide snap shot about the existing system files and connect them to the previous. If the important system files were modified or deleted, the warning is sent to the administrator for inspection. The HIDS example is notice able on the machines with significant task; these machines do not expect the change of their configuration [9, 48]. APPLICATION-BASED INTRUSION DETECTION SYSTEM Application-based intrusion detection systems are a special subset of host-based intrusion detection systems that analyze the events transpiring within a software application. The most common information sources used by application-based intrusion detection systems are the application’s transaction log files. The ability to interface with the application directly, with significant domain or application-specific knowledge included in the analysis engine, allows application-based intrusion detection systems to detect suspicious behavior due to authorized users exceeding their authorization. This is because such problems are more likely to appear in the interaction between the user, the data, and the application [2, 48]. INTRUSION DETECTION SYSTEM ANALYSIS There are two primary approaches to analyzing events to detect attacks: misuse detection and anomaly detection. Misuse detection in which the analysis targets something known to be â€Å"bad†, is the technique used by most commercial systems. Anomaly detection, in which the analysis looks for abnormal patterns of activity, has been, and continues to be, the subject of a great deal of research. Anomaly detection is used in limited form by a number of intrusion detection systems. There are strengths and weaknesses associated with each approach, and it appears that the most effective intrusion detection systems use mostly misuse detection methods with a smattering of anomaly detection components [2, 48]. ANOMALY BASED DETECTION Anomaly detection uses models of the intended behavior of users and applications, interpreting deviations from this â€Å"normal† behavior as a problem. A basic assumption of anomaly detection is that attacks differ from normal behavior. For example, we can model certain users’ daily activity (type and amount) quite precisely. Suppose a particular user typically logs in around 10 Am., reads mail, performs database transactions, takes a break between noon and 1 Pm., has very few file access errors, and so on. If the system notices that this same user logs in at 3 Am., starts using compilers and debugging tools, and has numerous file access errors, it will flag this activity as suspicious. The main advantage of anomaly detection systems is that they can detect previously unknown attacks. By defining what’s normal, they can identify any violation, whether it is part of the threat model or not. In actual systems, however, the advantage of detecting previously unknown attacks is paid for in terms of high false-positive rates. Anomaly detection systems are also difficult to train in highly dynamic environments [5]. MISUSE DETECTION Misuse detection systems essentially define what’s wrong. They contain attack descriptions (or â€Å"signatures†) and match them against the audit data stream, looking for evidence of known attacks. One such attack, for example, would occur if someone created a symbolic link to a UNIX system’s password file and executed a privileged application that accesses the symbolic link. In this example, the attack exploits the lack of file access checks [5, 10]. The main advantage of misuse-based systems is that they usually produce very few false positives: attack description languages usually allow for modeling of attacks at such fine level of detail that only a few legitimate activities match an entry in the knowledge base. However, this approach has drawbacks as well. First of all, populating the knowledge base is a difficult, resource intensive task. Furthermore, misuse based systems cannot detect previously unknown attacks, or, at most, they can detect only new variations of previously modeled attacks. Therefore, it is essential to keep the knowledge base up-to-date when new vulnerabilities and attack techniques are discovered. Figure 2 shows how the misuse detection based intrusion detection system works is [11]. RESPONSE OPTION FOR INTRUSION DETECTION SYSTEM Once intrusion detection systems have obtained event information and analyzed it to find symptoms of attacks, they generate responses. Some of these responses involve reporting results and findings to a pre-specified location. Others involve more active automated responses. Though researchers are tempted to underrate the importance of good response functions in intrusion detection systems, they are actually very important. Commercial intrusion detection systems support a wide range of response options, often categorized as active responses, passive responses, or some mixture of the two [2]. IMPORTANCE OF THE INTRUTION DETECTION SYSTEM Usually we place a burglar alarm on the doors and windows of our home. We are installing an intrusion detection system (intrusion detection system) for our house. The intrusion detection systems used to protect our computer network operate in similar fashion. An intrusion detection system is a software and possibly hardware that detects attacks against our network. They detect intrusive activities that enter into our network. We can locate intrusive activity by examining network traffic, host logs, system calls, and other areas that signal an attack against our network [14]. There are different benefits that an intrusion detection system provides. Besides detecting attacks, most intrusion detection systems also provide some type of response to the attacks, such as resetting TCP connections [14]. DESIRABLE CHARACTERSTICS OF INTRUSION DETECTION SYSTEM There are different characteristics for an ideal intrusion detection system, which are listed below [many references]: An ideal intrusion detection system must run with minimum human supervision. An ideal intrusion detection system must be easy to deploy. An ideal intrusion detection system must be able to detect attacks intrusion detection system must not produce false negative alarms. intrusion detection system must not produce false positive alarms. intrusion detection system must report intrusion as soon as possible after the attacks occur. intrusion detection system must be general enough to detect different types of attacks. An ideal intrusion detection system must be fault tolerant; it must be able to recover from crashes and must restore previous state, either accidental or caused by malicious activities. An ideal intrusion detection system must impose minimal overhead on the system. An ideal intrusion detection system must be configurable to implement the securities policies of the system. THE PERIMETER MODEL AND DoS The perimeter model is an architecture commonly used by today’s organizations to protect critical infrastructures. This security model divides network architectures into two distinct groups; trusted and entrusted. The trusted group is often the finite internal infrastructure, whilst the entrusted group consists of infinite external networks. In this model two types of devices are used; firewall to control the traffic entering and leaving the trusted domain, and intrusion detection system to detect misbehavior of trust with in the trusted area boundary [18]. WHERE IDS SHOULD BE PLACED IN NETWORK TOPOLOGY Depending upon network topology, the intrusion detection system can be positioned one or more places. It’s also depends upon what type of intrusion activities should be detected: internet external or both. For example if the external intrusion activities should be detected, and only one router is connected to the internet, the best place for an intrusion detection system may be just inside the router or firewall. If there are many different paths to the internet, then the intrusion detection system should be placed at every entry point. However, if the internal attacks should be detected then the intrusion detection system should be placed in every network segment 2. Placement of the intrusion detection system really depends upon security policies 3 [8]. Note that more intrusion detection systems mean more work and more maintenance costs. Which defines that what should be protected from the hackers [8]? IDS AGAINST DENIAL-OF-SERVICE ATTACKS (DoS) The goal of a DoS attack is to disrupt some legitimate activity, such as browsing, web pages, an on line radio and many more. The denial of service is achieved by sending message to the target that interferes with its operation and makes it hang, crash, reboot or do useless work [16]. A denial-of-service attack is different in goal, form, and effect than most