Monday, January 27, 2020

Finding the Gravitational Constant: Cavendish Experiment

Finding the Gravitational Constant: Cavendish Experiment Matt Cramb    The experiment explored the story of gravity, how it was discovered and derived from observations and experimentations, and attempted to recreate those initial tests. This was done to determine whether an increase in mass will increase the force of gravity, a statement which was supported by the experimental data, despite the numerous flaws inherent in the experimental design. Finding Gravity Gravity is one of the four fundamental forces of nature, and Nave, R (2017) also explains that it is the force responsible for constructing and regulating the movement of galaxies, stars, and planets. In 1687, Isaac Newton formulated his famous Equation of Universal Gravitation based, purported by Physics Classroom (2016), on an injury in an apple orchard. Whatever the circumstances, it had far reaching impacts on the science of the time. But something crucial was missing from his equation. Newton knew from scientists before him that the force exerted by gravity grew weaker as distance between objects affected by gravity increased, or represented mathematically; Where: This was nothing new for science of the time, but Newtons major discovery was that of the universality of gravity, which indicated that all objects which possess mass also exerted gravitational forces. This discovery led to another addition to the equation, because Kurtus, R (2016) reports Newton realized that objects with less mass exerted weaker gravitational forces. Therefore, he postulated that; Where: To convert this theory into an equation, Newton only needed one more piece. A constant was needed to calculate the exact gravitational forces on objects. This constant was called the gravitational constant, or G. In the equation, G presents as follows: However, the value for G wasnt found until much later, by Lord Henry Cavendish, over a century later.       The Cavendish Experiment In Cavendishs experiment, according to Shectman, J (2003) two spheres were attached at opposite ends of a beam which is suspended from the ceiling of a custom-built shed by a thin wire. Masses are placed to the sides of the spheres, to attract them, exerting gravitational forces sufficient to rotate the beam to a measurable degree. Cavendish measured the movement of the beam using a telescope positioned far from the shed. To use this apparatus to calculate G, a formula must be created, using torque, oscillation period, torsion constant, inertia and gravitational forces. The torque on the beam can be measured by the angle of deflection of the torsion wire, using Hookes Law: Where: However, torque can also be measured by the following expression: Where: Torque can also be calculated as a vector product with this equation: Where: And because, in this experimental setup, r and F are perpendicular vectors, there are two F, and r is half the length of the beam: Combining these two formula together results in the following: From Newton, the formula for force was also known, and could be substituted in from above. The torsion constant was measured by Cavendish by disturbing the beam, then measuring the period of oscillation. This can be done using the below equation. Where: This moment of inertia can be calculated from the sum moments of the two spheres at each end of the beam. The moment of inertia for each sphere is calculated by the equation: Since each sphere had equal mass, the total I is equal to: Inserting this into the period formula and rearranging for the torsion coefficient gives: When inserted into the formula for torsion coefficient above, gives the following: With this equation, the measurements needed to be taken from the experimental apparatus are: Variable: Explanation: Units: m Rad m kg s Using the experimental setup described above, according to Kurtus, R (1997) Cavendish determined: Preliminary Trials Failed Attempts For this experiment, two previous iterations of the experiment were run. The first was to determine the validity of running such an experiment, and the second was a full-scale experiment which provided no useful data. The first experiment was done using a meter-long beam and tennis balls attached to either end. A laser beam reflected off a mirror attached to the torsion wire, giving a result of angle. However, in practice, this rig did not come to a final resting position so that the period of oscillation could be measured. Instead the torque already present in the twine torsion wire twisted the beam against a chair leg, preventing it from fully coming to a balance of forces. The second experiment had results as follows: Variable: Explanation: Units: Results: m 1.25ÃÆ'-101 Rad 9.0ÃÆ'-10-2 m 1.765 kg 1.6 s 2.25ÃÆ'-102 m3kg-1s-2 2.419ÃÆ'-102 The value for G calculated by this experiment was vastly different to Cavendishs value of . This meant the experiment was concluded to be not statistically valid, for a variety of reasons. These experiments were refined and transformed into the final experimental setup. Theoretical Data Using Newtons formula for each of the three experiments which will be conducted can determine the value for . To do this, the masses and distance must be known ahead of time. These can be found below, and copied in the results section. OBJECT MASS (kg) Mass of Sinkers Mass of Cup 1 Mass of Cup 2 Mass of Bowling Pins Using Cavendishs above listed value of G, the projected data can be calculated. MASS (kg) FORCE OF GRAVITY ( Later, these will be compared with the experimental data. Based on the above background research, the magnitude of gravity in the system will increase proportional to an increase in the mass of the large masses. Or, as increases, will proportionally increase. This hypothesis has been supported by the background research, which has guided its creation through empirical data, and researched phenomena. However, because of the precision required to obtain an accurate result, research indicates the final calculated measurement for G will be vastly different from the real value. 25.5cm support beam12cm length of fishing line2x sinkers of mass 3.28g2x plastic cups2x bowling pins of mass 1.6kg1x stopwatch1x ruler1x camera1x plastic storage box approx. 70cm x 40cm 1m2 wire mesh Safety Before the experiment was conducted, a thorough risk assessment planner was completed and approved. Measures were taken to ensure no harm came to experimenter through heavy masses falling or water causing a slipping hazard. These measures included: Constant supervision Correct and appropriate use of safety equipment, which in this experiment meant wearing a lab coat throughout Safe handling of heavy masses and water. A risk assessment matrix provided by the Department of Education (2017) was also completed. Likelihood Consequence Insignificant Minor Moderate Major Critical Almost Certain Medium Medium High Extreme Extreme Likely Low Medium High High Extreme Possible Low Medium High High High Unlikely Low Low Medium Medium High Rare Low Low Low Low Medium The likelihood of injury was unlikely, as experimenter has previous experience. The consequence was also minor, indicating injuries not requiring medical attention (i.e. bruises, minor cuts). Therefore, the total risk was low, which indicates no further control measures need be put into place. However, in due diligence the above measures were still implemented. Procedure Firstly, to limit air flow; a major disturbance in the preliminary trials, the system was constructed inside a large plastic storage container. This container was placed a distance away from walls, to reduce the effects of other gravity sources. Then, two sinkers, whose masses were known, were attached to either end of a support beam, which was hung from the top of the box by a length of fishing line. This was suspended by the wire mesh atop the box. The fishing line was chosen as twine had been used in preliminary trials as the torsion wire, and had been shown to not be effective due to the latent torque. After letting the system come to a complete rest, it was disturbed by gently pushing one end of the support beam. The period of oscillation was measured by a stopwatch. To further reduce misrepresentation of data, six measurements were taken and averaged. The system was then allowed to come to rest again, and a measurement of the rest position taken by a camera from above. This would eliminate the need to reach into the box to take measurements and thus disturb the experiment. It also provided clearer results. Then, the two cups were introduced to the system 6.25cm away from the end of the support beam, at opposing sides and ends, so the attractive forces of the masses rotated the beam. The cups were initially filled with 250g of water, then 500g, then the cups were swapped with the 1.6kg bowling pins. Each iteration of the experiment, when the system came to rest for a third time, a measurement of the final rest position was taken using the camera. This data was recorded and processed by comparing photographs of the different rest positions and calculating angle of deflection. The results were then tabulated. Images of the experimental setup. Mass OBJECT MASS (kg) Mass of Sinkers Mass of Cup 1 Mass of Cup 2 Mass of Bowling Pins Period of Oscillation TEST NUMBER PERIOD (s) 1 20 2 22 3 21 4 21 5 21 6 21 Avg. 21 Rest Position TEST NUMBER MASSES USED ANGLE OF DEFLECTION (Rad) 1 No mass used 0.00 2 Cup 1 9.65 3 Cup 2 3.31 4 Bowling Pins 1.00 OTHER Data Variable: Explanation: Units: Results: m 0.0625 m 0.255 Magnitude of Gravity Using Newtons formula for each of the three experiments will determine the value for . Firstly, the value for G for each equation must be calculated. MASS (kg) VALUE OF G ( Now the force for gravity can be calculated. MASS (kg) FORCE OF GRAVITY ( findings The experiment shows that using Cavendishs method to determine the value for G was flawed, but that the experiment could have obtained an accurate value for G. These flaws will be examined below, but a basic rundown and description of data obtained will be given here. Magnitude of Gravity As can be seen by the graph at the end of the results section, the magnitudes of gravity measured do not accurately match the theoretical data obtained. These values, and the values for G, are vastly different to that originally measured by Cavendish (found in background research), likely because of the various flaws in the experimental design, which will be discussed in the Evaluation section. However, the results far more accurately correlate to the theoretical values than those in previous experiments, and the average trendlines do indicate that the trend matches that predicted. At 250g, the first mass, the experimental data differs wildly from the theoretical. Experimental Data Theoretical Data At 500g, the second mass, it drastically spikes, much higher than either of the other points. Experimental Data Theoretical Data At 1600g, the final point, the data dips down lower than expected again. Experimental Data Theoretical Data Its unclear from the background research conducted whether Cavendishs data deviated so much, but he also had a larger rig, which as discussed below, may have helped his experiments accuracy. Period of Oscillation The average period measured was 21 seconds, which is far shorter than the fifteen minutes measured by Cavendish. This is probably mostly due to the shorter beam, the effect of which can be seen with the torsion coefficient formula derived from the background research. The squared length of the beam demonstrates an exponential relationship between the torsion coefficient, an increase in which will decrease the period, which can be seen in the following formula for period of oscillation: Recording Equipment The equipment used to measure the period of oscillation may not have changed in the two hundred years since Cavendishs original experiment, however all other recording equipment did. A camera and digital analysis was used to take measurements, which may have causes slight issues with the orientation of frames in the software, but overall was more accurate than taking the measurements by hand when compared to the preliminary tests when this was done. The lengths were taken with a tape, and so were only calculated to two decimal places. However, this will likely not impact greatly on the results of the experiment, which can be shown mathematically. Using the same formula as above, and two length measurements as given below, the difference can be theorised. cm Value for k K (2 decimal places) Length 1 (two decimal places) (given by experiment) 6.25 2.35497 2.35 Length 2 (six decimal places) 6.247832 2.35334 2.35 Limitations Recommendations There are several reasons for why the value for G determined by this experiment differed so greatly from Cavendishs value, and these expose various flaws and strengths in the original design. They will be examined each using the following method: Name Explanation of Flaw Effects Comparison to Preliminary Trials Comparison to Cavendish Experiment Recommendation/Refinement Measuring Inaccuracies Various opportunities for error arose when observing and recording data in the experiment. Most of these examples, such as misreporting the period of oscillation by a fraction, would have a m Ethical Issues in Patient Information | Case Study Ethical Issues in Patient Information | Case Study Peeking in the EMR for all the right reasons Patrick Bobst Technology has embedded itself into everyday life and is integrated into everyday human activity. Corporate scandals, violations of intellectual property rights, and violations of customer, patient, employee privacy is uncovering challenging dilemmas and ethical decision-making in every the industry around the globe. Technological advancements not only increase the impact of carelessness, foolishness, recklessness and even malevolence but also enable anyone with access to learn much more and much faster than ever before(Curtain, 2005). Ethics enables individuals with the guidance of rational approaches to make the right justifiable decision. Ethical choices distinguished from other choices involve the continual conflict of fundamental values, as well as incorporating scientific inquiry that may be influential but cannot provide answers(Curtain, 2005). Most notably, ethical choices involve placing one value above another, and because values are of the utmost importance, any decision r eached will have profound, multiple and often on anticipated impact on human concern(Curtain, 2005). Case study Jessica Parker is a nurse that has the burdening task to solely support her three small children and is in severe financial distress since her divorce. Her ex-husband, Frank Parker has evaded court ordered child support obligations for over a year and has been able to evade authorities with no known address or phone number. Jessica’s house is about to be foreclosed upon, and her automobile repossessed. Although Jessica periodically picks up extra shifts, utilizes friends instead of childcare, and despite making multiple drastic cuts to her budget, she is unable to overcome the perils of increasing debt. One day a friend that informs her that Frank Parker received stitches in her emergency department after a minor motor vehicle accident (MVA). The next day she worked Jessica looked up her ex-husband in the EMR and proceeded to gather his needed contact information. Jessica immediately passes along the phone number, living address and employment information to her attorney which in turn succeeded in the actions of court ordered child support payments being automatically garnished from his wages along with a judgment for past due child support in an amount that will stabilize her current debt. Ethical dilemma When a couple chooses the responsibilities of being a parent, it is a commitment for life whether they are living together or separately. Jessica is in a stressful environment where she holds the custody of the children and the other parent is legally obligated to provide financial support to ensure a safe and healthy environment for the children. Jessica is clearly struggling financially and the situation will continue to worsen without the court ordered child support from ex-husband. She solved the dilemma of finding her ex-husband’s whereabouts by utilizing the hospitals EMR. By utilizing the EMR in an inappropriate manner, Jessica violated multiple provisions of the American Nurses Association (ANA) code of ethics including provision 3.1, 3.2, and 3.3. These provisions stipulate the patient’s right to privacy, the duty to maintain confidentiality of all patient information, and the protection of participants in research(Nursing World website, 2011). A breach of the Health Insurance Portability and Accountability Act (HIPAA) may have been committed under the privacy rule where â€Å"patients have a right to expect privacy protections that limit the use and disclosure of their health information†(McGonigle Mastrian, 2012, p. 173). â€Å"However, the privacy rule permits unauthorized disclosures of protected health information to public health authorities for specified public health activities including†¦. child abuse or neglect†(Lee Gostin, 2009, p. 82). Possible Alternatives At the point when Jessica suspected her husband might have been in the EMR system, an alternate path might be (1) hiring a private investigator. The ex-husbands MVA is a matter of police public record and private investigators are trained and have the resources to find information in ways others might not think about; (2) contact the local child support enforcement agency with the information of the MVA; (3) contact her attorney for a medical record subpoena. Hypothesize Ethical Arguments In this scenario, Jessica showed a clear breach to hospital policy, statutory and common-law duties of confidentiality and privacy. However, Jessica’s morals were dealing with the resolution of what is right and wrong in her own situation creating the dilemma of what is morally right and not looking at the evidence that indicates that she is also morally wrong. Depending on the discipline and point of view, the term value can have different meanings. Jessica’s objective moral values may include justice, freedom and welfare, which might be her basis for decision-making. The welfarism normative ethical approach applies to Jessica situation where morality is viewed and centrally concerned with the welfare or well-being of individuals, and where advancing the best interests of individuals makes the most fundamental sense(Keller, 2009). The ethical theoretical Principlistic approach validates itself with its universally recognized moral principles of autonomy, nonmaleficence , beneficence, and justice(Bulger, 2009). Autonomy considers the right of the individual to choose for themselves, nonmaleficence asserts an obligation not to inflict harm intentionally, beneficence refers to actions performed that contribution to the welfare of others, and justice refers to the fair, equitable, and appropriate treatment in light of what is due or owed to a person(McGonigle Mastrian, 2012). â€Å"Principlism is a unified moral approach in which the addition of each principal strengthens the legitimacy of each of the other principles to the extent that each principal is specified and balanced using independent criteria and yet each principal still supports each of the other principles†(Bulger, 2009, p. 121). In Jessica’s scenario she might consider that it is generally morally right to obtain her ex-husbands contact information in the EMR because this action obeys the role moral rule what is due or owed which in turn is derived from the principal justi ce. The crux of the dilemma lies within Jessica’s responsibility of providing her family a safe and healthy environment with financial stability, her utilization of the hospitals EMR balanced with her ex-husband’s medical record confidentiality rights. Investigate, Compare, and Evaluate Alternatives to him In Jessica’s case, there is no ambiguity in our nursing code of ethics when it comes to maintaining patient privacy and confidentiality. All the alternative methods provided to pursue the coveted contact information are the only acceptable legal pathways. These alternative methods safeguard patient rights, do not violate policy and laws, do not result in bad consequences, nor do they nullify rules and regulations. Each alternative provides expected outcomes that far exceed the risk of harm that include â€Å"civil liability, job loss, disciplinary action by state licensing boards, and even criminal investigations and sanctions†(Hader Brown, 2010, p. 270). Chosen alternative Simply from a financial standpoint the alternative chosen for Jessica would be to contact the local child support services agency. Hiring a private investigator or attorney can be cost prohibitive especially with her financial difficulties. Conclusion From nursing school until retirement, nurses are taught there is no leeway when it comes to HIPAA’s integrity and confidentiality of patient information. A problem with ethics is the logic of reasoning being used in moral deliberation and moral justification(Reidl, Wagner, Rauhala, 2005). Jessica’s deliberation of moral reasoning resorted from weighting only the positive self-fulfilling gain and omitted possible alternatives in her morally perplexing situation as well as her personal reasons in moral justification. Principlists consider principles to be at the heart of moral life negotiating between the four fundamental principles and the unique nature of specific moral situations on the other(McCarthy, 2003). With the technological advancements in today’s society the ethical questions evolve around how individuals choose to use or abuse their tools. Healthcare informatics intersects healthcare, ethics and informatics and all practitioners, for the publicâ€℠¢s good, must be bound by additional ethical, moral, and legal responsibilities (Curtain, 2005). Barrie Effy (2008), conclude in their study that ethical education in information technology changed attitudes and aided students in affective learning, an important and necessary component in the overall learning process(Barrie Effy, 2008). References Barrie, L., Effy, O. (2008). Ethical issues in information technology: Does education make a difference. International Journal of Information and Communication Technology Education, 4(2), 67-83. http://dx.doi.org/10.4018/jicte.2008040106 Bulger, J. W. (2009). An approach towards applying principlism. Ethics Medicine, 25, 125-125. Curtain, L. L. (2005). Ethics in informatics. Nursing Administration Quarterly, 29, 349-352. http://dx.doi.org/10.1097/00006216-200510000-00010 Hader, A., Brown, E. (2010). Patient privacy and social media. American Association of Nurse Anesthetists, 78, 270-274. Retrieved from http://www.aana.com/newsandjournal/Documents/legbrfs_0810_p270-274.pdf Keller, S. (2009). Welfarism. Philosophy Compass, 4(1), 82-95. http://dx.doi.org/10.1111/j.1747-9991.2008.00196.x Lee, L., Gostin, L. (2009). Ethical collection, storage, and use of public health data: A proposal for a national privacy protection. The Journal of the American Medical Association, 302(1), 82-84. http://dx.doi.org/10.1001/jama.2009.958 McCarthy, J. (2003). Principlism or narrative ethics: must we choose between them? Medical Humanities, 29(2), 65-71. http://dx.doi.org/10.1136/mh.29.2.65 McGonigle, D., Mastrian, K. G. (2012). Nursing informatics and the foundation of knowledge (2nd ed.). Burlington, MA: Jones and Bartlett. Nursing World website. (2011). http://www.nursingworld.org/MainMenuCategories/EthicsStandards/CodeofEthicsforNurses/Code-of-Ethics.pdf Reidl, C., Wagner, I., Rauhala, M. (2005). Examining ethical issues of IT in healthcare. Retrieved from http://www.sfu.ca/act4hlth/pub/working/Ethical-Issues.pdf

Sunday, January 19, 2020

Computer Fraud – an Analysis on Oracle Corp vs. Sap Ag

Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAP’s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of company’s information system will be addressed with some reflections of the Case. It has been reported that the world’s software giant SAP AG was sued by its largest competitor, Oracle Corporation, for computer fraud and data theft in March 2007 (Anon, 2010). In the Complaint, Oracle Corporation (2007) stated that in November 2006, unusual heavy download activities were spotted on Customer Connection, a website Oracle used to serve its customers. The uncovered access originated from an IP address in one of SAP’s braches with log-in IDs of PeopleSoft and J. D. Edwards customers. It is discovered later that TomorrowNow and SAP TN, two SAP subsidiaries, committed a series of unauthorized access to Oracle’s customer service system and more than 10,000 illegal download activities. Mass of important materials, including copyrighted software codes and confidential documents was theft. In this way, SAP was capable of establishing a service library for PeopleSoft and J. D. Edwards products, and launched a marketing campaign to snatch Oracle’s customers. The fraud resulted in Oracle’s 120 copyrights infringed and posed the threats of losing 358 customers (Kawamoto, 2007). On 24 November 2010, the U. S. Federal District Court for Northern California announced that Oracle won the Case with SAP liable for $1. 3 billion compensation. As Slappendel (2010) points out, this is the largest amount ever awarded in copyright infringement cases. The core reason may lies that the verdict is based upon the fair market value of the licenses for utilizing those resources instead of Oracle’s profit loss. After the verdict, SAP’s stock price has been falling significantly and TomorrowNow had to be shut down (Anon, 2011; Team, 2010). Although SAP accepted the liability and apologized for its inappropriate behavior, the company has been arguing that the penalty was contrary to the reality of the damage caused by the fraud (Margan, 2011). It is also reported that SAP has filed motions to the Court and therefore SAP’s computer fraud case does not seem to end at present. The action of data theft has brought unnecessary troubles to both SAP and Oracle. In order to prevent computer fraud effectively, it is essential to fully examine the reason of SAP’s behavior. Fraud Triangle will be used as an analysis tool. It is estimated by Romney and Steinbart (2009) that Fraud Triangle consists of the three normal conditions for fraud to occur: pressures, opportunities and rationalizations. Figure 1 shown below is a brief summary of Fraud Triangle in the Case. 5. Homely meals in software industry FIGURE 1 FRAUD TRIANGLE OF SAP Pressure Opportunity Rationalization 2. Oracle’s insufficient security management 4. Theft by other companies (i. e. Siebel Systems) before 1. Financial – fierce competition in the market 3. Few evidence – may not be spotted Firstly, SAP is probably under the severe pressure of maintaining the top one throne in the software market. During the last decade, competition between Oracle and SAP has greatly increased and the rivalry has developed into a feud. Particularly in 2004, Oracle began a series of acquisitions, aiming at increasing the share of enterprise applications market, where SAP owned the leadership (PeopleSoft, 2011). After realizing the seriousness, SAP fighted back by offering special discounts to woo customers, and thus a cruel price battle initiated. However, the strategy did not seem to rescue much, SAP’s market share remains downward sloping (Team, 2010). Currently, Oracle and SAP are vying for the third-party enterprise software support and maintenance market. The enormous pressure of winning may contribute to the commitment of computer fraud, especially for spying the business secrets of the largest competitor. The following two external conditions may possibly be linked to SAP’s unwise actions: Oracle’s insufficient security management and an opportunity to conceal the fraud. Oracle has provided the Customer Connection as a supplementary of its service to the customers. However, the semi-open system, which stores countless precious information, does not appear to be equipped with superior security management techniques. A huge defect exists that allows easy access to resources supposed to be protected from outsiders. In terms of the flaw, Oracle may be partially liable of its loss. Even though Oracle’s detection of abnormal access is relatively sensitive, it could not take a step ahead of the crime. Besides, Oracle’s dependence on service website offers the probability to conceal fraud, since comparably less evidence would be left for detection. With technology improvement, computer fraud may become far more difficult to spot in the future (The National Fraud Center, Inc. , 2000). Moreover, the experience of being a casualty of computer crimes might have lifted SAP’s rationalization of being a perpetrator. It is recorded that in 1999, SAP filed a lawsuit against Siebel Systems and claimed of being a victim of the so-called White Collar Crime (Kawamoto, 2007). Additionally, it may be reasonable to recognize the fact that most people in software industries regard the occurrence of computer fraud as homely meals, because almost all businesses in this market have grabbed some most advanced computer techniques, together with some abuse techniques obviously. As a result, SAP’s fraud behavior may not be that severe in the eyes of the decision makers. Hence, accelerate the germination of computer crimes. After fully assessment of why SAP may err, suggestions on how to improve the security of enterprise’s information system will be addressed with reflections of the Case. In the perspective of prevention, several control methods could be considered to raise the security capability of the enterprise’s information systems. First of all, persuade or enforce all employees, even the customers, to use strong password to access to company’s database or service websites (Standler, 2007). Requirement of password changes at regular time intervals would be necessary to prevent some former employees of customers’ company from entering the system, which may exactly Oracle needs. Secondly, restrict physical and remote access to system resources unless the both the log-in ID and IP address are authorized (Backhouse and Dhillon, 1995). Thirdly, safeguard and double encrypt all data and programs. For example, materials on the Customer Connection could be double encrypted so that without further encoding, the downloaded materials would remain useless for non-employees or non-customers. Besides, techniques such as anti-virus software and firewall could to some extent protect the system from worms and viruses attack. Although using the above prevention method could avoid some dispensable loss, perpetrators penetrate everywhere (Romney and Steinbart, 2009). Therefore, an efficient detection system should be ready for any possible incidences. The establishment of a fraud hotline is recommended, which contains the employment of computer security officers, consultants and forensic specialists. The control system will be engaged in monitoring all malicious actions and reporting back as soon as possible. In the Case, Oracle took advantage of its superior detection system and made SAP’s fraud evidence traceable and suppressible (Oracle Corporation, 2007). Despite prevention and detection, there are other preparations could be made ahead of the arrival of any disasters with the intention of reducing the loss caused by computer fraud (Kunz and Wilson, 2004). These routines mainly concern insurance application, recovery plans constitution, material back-up within the whole information system. Furthermore, timely crime reporting to the government crime center and effectively legislative tool using might be helpful for retrieving fairly compensations from perpetrators, as it has been done by Oracle Corporation in the Case. Some ERP market analysts even suspect that the Lawsuit could be a sort of Oracle’s strategy to decrease the competition in the third-party enterprise software maintenance and support market. Whatever the original purpose is, Oracle has achieved benefit from winning the Lawsuit for the current period. To conclude, SAP’s situation has satisfied all of the three conditions presented in Fraud Triangle, some of which heavily depend on industrial environment as well as the design of Oracle’s information system. Thus, objectively, SAP may not liable for all the censure, though it really has been occupied in illicit competition using computer fraud. Oracle could be considered partially responsible for its loss and the sentenced $1. 3 billion seems somewhat too cruel for SAP to bear. Although some experts may argue that the breach of intellectual property is unforgivable culpable negligence, it looks possible for the Court to adjust the amount of penalty towards a more realistic number. Since the next round hearings will not start until July 2011, all the outcomes remain unpredictable (Margan, 2011). It is undeniable that, however, computer fraud could bring about huge losses for the entire society, especially when it is used in economic espionage. In the speeding advancing information century, nearly all of the impossible could be made possible. Consequently, it seems that only the creation of a healthy competition environment, emphasis on business ethics and proper education may aid in bringing down the upward climbing computer crime rate. REFERENCE Anon. (2007) SAP-We Will Aggressively Defend Against Oracle‘s Claims [online]. Ziff Davis Media, United Press International. Available at: [30 April 2011] Anon. (2010) Oracle Awarded $1. 3bn In SAP Data Theft Case [online] 24 November. BBC News. Available at: [28 April 2011] Anon. (2011) SAP Posts Sharp Profit Drop Due To Oracle Lawsuit [online] 26 January. Available at: [29 April 2011] Backhouse,J. and Dhillon,G. (1995) Managing Computer Crime – A Research Outlook [online]. Computer and Security: 14(1995) 645-651. A vailable at: [29 April 2011] Granick,J. S. (n. d. ) Faking It: Calculating Loss In Computer Crime Sentencing [online]. Available at: [1 May 2011] Kawamoto,D. (2007) Oracle Sues SAP On Spying Charges [online] 22 March. CNET News. Available at: [28 April 2011] Kunz,M and Wilson,P. (2004) Computer Crime And Computer Fraud [online]. Available at: [1 May 2011] Margan,T. P. (2011) Oracle, SAP Still Going At It Over TomorrowNow [online] 28 February. Available at: [29 April 2011] Niccolai,J. (2010) SAP: Court Lops $500M Off Oracle’s Potential Damages [online] November. IDG News. Available at: [1 May 2011] Oracle Corporation (2007) Oracle Vs. SAP Lawsuit Complaint [online]. Available at: [28 April 2011] Panorama Consulting Group. (2010) Clash Of The Titans: An Independent Comparison Of SAP Vs. Oracle [online]. Available at: [10 April 2011] PeopleSoft (2011) Oracle vs. SAP [online] 1 May. Available at: [1 May 2011] Romney,M. B. and Steinbart,P. J. 2009) Accounting Information Systems, 11th Ed. Pearson Prentice Hall. Shaw,E. et al. (n. d. ) The Insider Threat To Information Systems: The Psychology Of The Dangerous Insider [online]. Security Awareness Bulletin: No. 2-98. Available at: [29 April 2011] Slappendel,S. (2010) Oracle v. SAP: Highest Damages Awarded For A Copyright Infringement Lawsuit [online]. Available at: [28 April 2011] Standler,R. B. (2007) Tips For Avoiding Computer Crime [online] 25 November. Available at: [29 April 2011] Team,T. (2010) SAP-Oracle Lawsuit Could Weigh On SAP Market Share, Stock Price [online] 14 December. Available at: [29 April 2011] The National Fraud Center, Inc. (2000) The Growing Global Threat Of Economic And Cyber Crime [online] December. Available at: [1 May 2011] APPENDIX: A COPY OF THE NEWS REPORT Oracle awarded $1. 3bn in SAP data theft case 24 November 2010 Last updated at 07:32 GMT Oracle chief executive Larry Ellison testified during the case European software giant SAP has been ordered by a Californian court to pay US rival Oracle $1. 3bn (? 820m) after losing a data theft case. The case revolved around customer-support documents and software stolen by SAP's subsidiary TomorrowNow. Oracle alleged that the German company intended to use the data to poach the 358 customers involved, and demanded $1. 65bn compensation. SAP had claimed it owed only $40m, but the jury decided in Oracle's favour. SAP said it was disappointed with the jury's decision and would look to challenge the verdict. [We will] pursue all available options, including post-trial motions and appeal if necessary,† it said in a statement. It did, however, reiterate that it had made a mistake: â€Å"We regret the actions of TomorrowNow, we have accepted liability, and have been willing to fairly compensate Oracle†. ‘Big dreams' Oracle co-president Safra Catz expressed her satisfa ction with the verdict: â€Å"For more than three years, SAP stole thousands of copies of Oracle software and then resold that software and related services to Oracle's own customers. â€Å"The trial made it clear that SAP's most senior executives

Saturday, January 11, 2020

Benefits of Oil of Oregano Essay

Benefits of Oil of Oregano Introduction                   Oregano oil is a natural substance extracted from wild oregano plant, which is very useful for human health as they help in killing harmful microorganisms responsible for causing illness in human body. The oregano oil is linked to its properties since it can be used as an antifungal anti-inflammatory. The oil is through steam distillation of the leaves. The herb is used to treat respiratory disorders, menstrual crumbs and some urinary disorders. The oil is also for some skin conditions like acnes. The aromatic flavors found in oregano oil are very essential for cooling. It can be used in meat since it helps reduce the toxic components present in the meat, which are created during the cooking process.                   The oil can be used for fighting off infections in homes since it fights off multi drug resistance bacteria. It can also be beneficial to animals to prevent occasional diarrhea supplemented with probiotics. Although the oils can be beneficial for dietary supplement, it is not advisable to use on children in large quantities on children under the age of six years. The oil is useful for regulating menstruation and delaying menopauses. Women can use this oil for improving their mood balance and oncoming menopause. These oils are very important for our daily health benefits and should be used regularly (Bowden, J. 2007  the 150 healthiest foods on earth).                   Another major benefits of Oil of Oregano is the fact that an individual can directly apply it on the skin. However, there is need to dilute it first. Another healthy benefit of oil of oregano is that it plays significant role during digestion (Bowden, 2007). This is because it persuades the flow of bile in the entire digestive organs. With this perspective, one can argue that it helps in improving the digestion procedure. Oil of Oregano can also be used when one has a sore throat. An individual is advised to take 3 drops of oil of oregano each. For a couple of five days, the symptoms fade away. Thus, oil of oregano plays critical role in our body. Why coconut water should be included in your daily diet                   Coconut water has proven to be good for our health. However, it is crucial to understand some of the drinks that one should substitute with coconut water. For instance, one should not substitute clean or filtered water with coconut water. This entails that they should never refrain from taking clean water. Some of the drinks such as tea, coffee and colas can be substituted with coconut water. In addition, one should also drink coconut water immediately it has been cut. This is because when one takes it immediately it is cut; he or she will be in a position to get nutritional benefits as it fresh and rich in nutrients. Furthermore, pure coconut water is claimed to be fresh and has no additives. In relation to this, it is said to have no cholesterol and thus, it can play significant role in our body.                   Many studies argue that drinking coconut water makes our body health. This entails that it is crucial to include coconut water in every meal. There are many benefits associated with coconut water. For example, some studies argue that coconut water helps to prevent dehydration in our body. This means that every individual should include coconut water in his or her diet. Another major benefit that coconut water plays in our body is that it helps to reduce fatigue or tiredness that people feel lazy. For instance, it replenish the lost of natural salt that people looses during sweating. Thus, it helps to replace the water lost through sweating (Wilson & Wilson, 2002). With this regard, one can argue that it helps to make an individual look more energetic.                   Other studies argue that coconut water also plays some critical role in our body. For example, they help in building up the entire immunity. This is a case where it improves the functions of kidney. It also helps in preventing some of the urinary tract infections that has become prone to people (Wilson & Wilson, 2002). For a couple of years, coconut water has been used as one way of lowering high rate of blood pressure. Thus, it is quit advisable to include coconut water in our daily diet.                   Researchers have found several benefits of coconut water on pregnant women. For instance, it helps in reducing some of the morning complications that they suffer. They also help to reduce some of the common symptoms in pregnant women such as constipation that many of them suffer from. They also reduce the level of acidity in pregnant mother. Due to these benefits one gets from drinking coconut water, it is clear to argue that they should include them in their daily diet. References Wilson, R., & Wilson, R. (2002). Aromatherapy: Essential oils for vibrant health and beauty. New York: Avery. Bowden, J. (2007). The 150 healthiest foods on earth: The surprising, unbiased truth about what you should eat and why. Gloucester, Mass: Fair Winds Press. Source document

Friday, January 3, 2020

Essay about Slavery in Africa, Europe, and Jamaica

Slavery in Africa, Europe, and Jamaica Traders, businessmen, African slavers and slaves each had a unique experience and involvement in the business of the transatlantic slave trade. This lucrative process, that lasted between 1500 to 1870 AD included three different hemispheres: Europe, Africa, and the Americas, specifically Jamaica. In Africa slavery existed long before European exposure, however, over time the motivation for slavery changed. Originally slavery existed because of the expanding of African territories or the need to pay off debts. Europeans, during their attempts to make a shorter trade route to India and Asia, encountered the African custom and adopted it. Therefore, the Europeans filled their pockets with goods†¦show more content†¦The first reason for slavery was the prisoner of war. War between rival communities over land or for other fractions left people who were captured. These people were mainly adopted into the new culture, in order to increase the power of the dominant society; they were not only used for labor purposes. War between communities was not the only means of fighting that caused slavery. The second principle concerns fighting between family members. If a household becomes too upset by a certain member of the family, the remaining members have the option to sell the troublemaker into slavery. This in turn would solve the familial problem, as well as enable profit for the family and the individual. The family gains wealth and goods, as the individual is able to learn how to control oneself as well as gain a sense of responsibility. Debt proved to be another main resource for the buying and selling of people in Africa, which is the third principle. In Africa, where coin is not known, the slave is made a substitute for this commodity, and in each district a positive value is given him which is passed for currency and legal tender. There are cases of parents having to sell their kin because they were in such debt, as well as people selling themselves into slavery for a certain amount of time. TheseShow MoreRelatedCultural Retention During The Middle Passage1319 Words   |  6 PagesDelano Codner Professor Andrew Sachs Communication 300 18 October 2015 Cultural Retention in Jamaica Transport through the Middle Passage was a time of immense misery, suffering, and death for the millions of Africans who experienced it between the 1600s and 1800s. After arriving to Africa from Europe, slave traders violently kidnapped or bought African men, women, and children, for iron, cloths, and firearms. The Africans, most of whom were taken from Upper Guinea, Sierra Leone, Angola, theRead MoreEuropeans in Jamaica1509 Words   |  7 PagesWhen did they come? Jamaica was first colonized by a native group of South American origin who, in the early history of Jamaica, called their home a paradise of wood and water. The Arawak were there to greet Christopher Columbus when he arrived in Jamaica in 1494, beginning a long period of European colonization there. The history of Jamaica as a European outpost saw the island under Spanish rule for 150 years, during which the city now known as Spanish Town was established and flourished as theRead MorePast Paper1602 Words   |  7 PagesExplain what wa Columbus’s plan. (4 marks) b) What arguments did Columbus use to get support for his plan from I. The Church? II. The Merchants III. Queen Isabella and King Ferdinand? ( 9 marks) c) Explain the impact of Columbus’s voyage on Europe and on the ‘New World’. (12 marks) 5. What were the leaders of (a) the Taino and (b) the Kalinago peoples called? (2 marks) a. How was the Kalinago leader chosen? (2marks) b. Describe THREE functions of the Kalinago leader (9marks) c. DescribeRead MoreReggae Music : A Musical Genre That Influenced Jamaican Music1268 Words   |  6 Pages Reggae is a musical genre that has revolutionized Jamaican music. Reggae originated in Jamaica in the late sixties, early seventies. It’s slow jerky rhythm and spiritual lyrics have influenced many artists, genres, cultures, and societies throughout the world. This had contributed to the advancement of new counterculture movements, especially in the United States of America, as well as Europe and Africa. In the late seventies, it had impacted western punk and rock/pop cultures, which had resultedRead MoreSummary Of The Rodney Riots By Walter Rodney1712 Words   |  7 Pagesrevolutionary activist who fought for the rights of the poor and neglected people was a man named Walter Rodney. He was a Pan-Africanist and spread his message of Black Empowerment, Black Liberation, and African consciousness to the multitude in Jamaica and throughout Africa. His message was well received especially by Rastafarians, a shunned faction in Jamaican society. The Jamaican government strongly monitored Rodney’s movement and decided to ban him from re-entering the country while he was attendingRead MoreSlavery And The Middle Passage930 Words   |  4 PagesConclusion Slavery developed in the Americas because of exploration and need or labor. Europeans captured Africans and transported them across the deadly Middle Passage, to the Americas, where they would be forced to poor under harsh conditions. Slavery had many lasting effects. Africa was depopulated, and Africans in America lost their cultures and identity while Europeans made money from the resources being exported in the Americas at the expense of Africans’ lives and culture. Intro: AtlanticRead MoreEssay on genocide and revolution central themes in the caribbean1169 Words   |  5 PagesEuropeans who came to the Caribbean region in their quest for God, Gold and Glory. Upon contact these Europeans (the Spanish), enslaved the Amerindians in their search for gold and other minerals. Coupled with the many diseases which were brought from Europe the intensity of the labour led to a complete decimation of these aboriginal peoples. Which had prior to Columbus’ invasion been nearly 8 million. By the time Columbus departed the indigenous population had dwindled down to around 100,000. His policiesRead MoreThe Discovery Of The New World1128 Words   |  5 Pagescomplete disregard to human morality. The result would be millions of slaves traveling all the way from Africa across the Atlantic Ocean into different parts of the New World. We must ask ourselves what led to this dreadful institution? Why was it Africans that were enslaved? Slavery was not anything new. In fact human slavery had excited for thousands of years, but the most recent form of slavery by the masses has been that of the Africans. Unlike popular belief, Africans were not the first groupRead MoreDehumanization of Enslaved Africans in Jamaica 2035 Words   |  9 PagesThe importation of slaves from Africa to Jamaica was the largest and most complex international business of the eighteenth century. This controversial exchange of enslaved persons provided economic stability within the Americas. Upon their arrival to Jamaica, the process of dehumanization initiated. Supporters of slavery proposed the institution served a two-fold purpose: one, in order to achieve complete dominance the institution a legacy of subjugation and legislation hampered rights to any slavesRead MoreBeing a Slave in Todays World1221 Words   |  5 Pagesare in slavery to day; of these there is still 60,000 Americans in some type of slavery. A slave is a person held in a state of subjection to an owner or master. Because slavery is abolished in all but a few countries many people believe it is no longer a problem, but slavery is still a big issue that people need to more proactive about. Slavery has a long history dating back to sometime around 3500 BC.In Mesopatamia they were the lowest class of civilization formed by Sumerians. Slavery also existed