Thursday, October 31, 2019

Mobile Marketing Research Paper Example | Topics and Well Written Essays - 2250 words

Mobile Marketing - Research Paper Example The paper aims at deciphering the future of digital marketing along with the advantages and disadvantages. It gives emphasis on mobile marketing as it gained prominence over the past few years. Digital marketing has already made a huge progress in the present situation and in the years to come, this will proceed and benefit everyone in the world. This needs to be adopted by every marketer for enhancing the communication with its potential customers.Digital marketing refers to the process of marketing where information about products is delivered to the target customers with the help of technologies. Taking the help of this brand awareness increases among people and all this leads to increase in sales thereby generating profit in the long run. It enables the audience to access information about any company they want through digital media and this is possible at any place and any time.This medium is used not only by the customers but also by the companies in order to know about the pre ferences of customers. The knowledge about the choices of customers is not enough; there is a greater need for communicating with them. This is done through social media sites, emails, and mobile phones. The companies by taking the help of these mediums know about the experiences of the customers, record them and through this, the expectations about the products of them are known. The strategies adopted by rival companies can also be extracted from digital media and this can be incorporated in their own companies for improving.

Tuesday, October 29, 2019

Organizational Responsibility and Ethics Paper Essay

Organizational Responsibility and Ethics Paper - Essay Example This could happen due to many reasons like, lack of vision, lack of cooperation among the different agencies involved in health care, or due to the lack of sincerity and honesty within such agencies. The health care system in the United States is no different in the sense that it is one with many paradoxes. The country is a leader in the development of medical research and has a national health care policy on which government spending is the highest in the world. But the health care system is considered to be quite inefficient because of fragmentation, lack of uniformity, and the existence of a large number of people who are not covered by health insurance. The system is also overburdened due to an ageing population and lack of qualified personnel. Any organization, whether it is formed for the purpose of social care or for profit has a responsibility towards the society and individuals in which it operates. This is true for a health care system also. This paper is an attempt to stud y the concept of organizational responsibility issues that exists within the health care system in the United States. In the process, it will look into issues like the ageing population of the country, the unhealthy habits of its citizens, absence of health insurance, increasing number of illegal immigrants and the ethical dilemmas that may exist in the overstretched health system. As mentioned earlier, the health care system in the country is full of paradoxes and contradictions. â€Å"At one extreme are those who argue that Americans have the â€Å"best health care system in the world†, pointing to the freely available medical technology and state-of-the-art facilities that have become so highly symbolic of the system.† (Chua, 2006, p.1). At the other extreme, the system is accused of massive lack of health insurance, fragmentation, difference in health policies of individual states, waste of resources,

Sunday, October 27, 2019

Antivirus Software The Advantages Computer Science Essay

Antivirus Software The Advantages Computer Science Essay Antivirus is defending software designed for guarding your computers system smart cell phones against Virus, Trojans Hijackers etc. These all Viruses, Trojans Win32 etc. are called Malicious Software in computer world. All Antivirus software run in the background at all times to protect defense your computers system smart cell phones some antivirus are automatically updated through internet some antivirus are needs manual updated through internet to protect your systems against Malicious software. [1] Introduction: Antivirus software provides many critical layers to protect from Virus, win32, Trojans worm etc. The first document removal of the computer viruses was written by Bernd Fix. There are two types antivirus application in the computer world so that the time of the Atari ST platform designed in 1987 the first one was G Data second was UVK 2000 made by Bernd Fix in 1987.The word Antivirus is come from the word Antibiotic which means implies combat with an invading force of the programs. Fred Cohen designed the strategies relative to an Antivirus software program in 1988 to solve the virus problems. [2] The old previews years Antivirus software are not so good because those software only detected the Virus Spyware etc. remove it from your computers system damage your some operating system files inside your computers now AntiVirus software much better than old ones because it detected the virus remove it without deleting your operating system files inside your computers it also fight against new malicious software which come from internet network. Well in the preview years Antivirus software are not completely free downloadable on the internet means you could only find some antivirus software with trial version now Antivirus software are completely free download without trial version . New Antivirus also checked the incoming outgoing mail, email attachments etc. It also has internet security for internet threats. [2] Advantages and Disadvantages: Antivirus software is very useful in the preventing, controlling, virus many more viruses program, which can damage the computers components from inside operating system files to. [2] Antivirus software are used the methods for searching killing Viruses some of the well knows patterns of computer data programs. [2] Antivirus programs are very effective against the viruses program, whose is the biggest threat for your computer systems. [2] Antivirus program has some limitations drawbacks on the other hand, which effect on the computer system performance. [2] In the computer world, inexperienced users can have many problems with the antivirus programs or software such as inabilities to understand, threats of the software success of the antivirus programs software are dependent on the ability of the user to understand Or knowing the right kind of balance between the positives negatives things in the computer world. [2] Antivirus software or programs can cause problems during the installation window in the computer system or upgrade the Windows Service packs in the computer system. [2] Antivirus software can be hampered some few software programs because it used its own firewall to block application to store in the computer system. E.g. True Crypt. [2] Some Antivirus program will not knowing by the policy assessment before make its own policy when it install in the computer system. [2] There are three major types of detection which is used to identify the potential threats in the computer system such as: Signature based, Heuristic based File emulation method. [3] Signature based detection: In this method, you can identify the viruses malware virus software. Antivirus software can also compare the content files of the computer system to dictionary files of virus signatures because viruses are embed into themselves in the files shape or in pieces shape to infect the computers. [3] Heuristic based detection: In this method, you can only detect malicious activity relative to viruses identify unknown viruses in the computer system. [3] File emulation: In this method, it has using the heuristic type approach which it executing the program in a virtual environment which effect the action of the program performs it also carries out the disinfection actions relative to the programs which run in the computer. [3] What is a Virus? Viruses are the category of malicious program code software, viruses are used for attempted to breach security value break them damage data of the computer system display unwanted messages on the display screen when the antivirus program for gabbing user passwords on a networks are called LOGIN.exe. These real LOGIN.exe programs which have intruder or infect the user programs are called Trojan Horses when viruses program fall into the Trojans category than these viruses program have the ability to reproduce themselves again again until users computer systems slow down performance processing to any application it infected the your operating system. [4] Why Do Viruses Exist? Now-a-days every computer virus programs are written by someone who wanted it to infect damage other peoples computer systems smart cell phones our world. So these Viruses program coding pass from computer to other computers system these viruses may be not have direct effect on the some computers but it effects on the other resources like(Disk space Memory) thats why these viruses are harmful it coding are very complex it also contain some serious bugs which damages the computer system pretty badly. [4] How do we will know if we have a virus want to protect our computer systems? If the someone computer systems are very running slower, freezing it displaying error messages again again than you should have the viruses in yours computers or operating system than u must install Antivirus software scan your computer system with latest internet updated of the Antivirus programs security to clear your computer with viruses. [4] How do we get these viruses on our computer system or operating system? Computer systems can be infected by viruses because: User using the Internet without having the latest updates of the Antivirus programs security installed into your operating system. [4] User using the Internet without having a working firewall on the operating system or Antivirus software. [4] User who opening the email attachments without knowing that whos will send him or her. [4] User visiting unreliable website pages than viruses automatically stored into your computer because these website pages contains the infected viruses programs. [4] How do we get rid of the malware software? To get rid of the Viruses you should use latest Antivirus software or latest Antivirus program security updates now-a-days much new Antivirus software are able on the Internet free cost with one years updates free e.g. Norton Antivirus, McAfee Antivirus Kaspersky Antivirus etc. [4] What are types of Virus in the computer world? There are several types of viruses in the world which your computers your operating systems for examples: Worms, Trojan horses, Logic bombs, Mutated viruses, Polymorphic viruses, Bounty hunters, Boot sector viruses Macro viruses etc. [4] Worms: Worms Viruses are used to spread over a network of the internet hacks the computer system or operating system which connects with internet networks. [4] Trojan horses: Trojans viruses are used to create a security hole in the computer programs or operating system infected the system files inside. [4] Logic bombs: Logic bombs viruses are used to trigger the specific event means computer systems date programs of remote activation etc. [4] Mutated viruses: Mutated viruses are used to rewritten by hacker users to change the behavior or signature of the programs made the multiple versions of the same viruses that infected the computer programs or operating system. So these viruses are also called variants. [4] Polymorphic viruses: Viruses which are used to automatically change according their appearance, like as a chameleon by giving the viruss signature of the programs in encrypt-decrypt function so virus can only be recognize its own signature of the program. This kind of virus is called Polymorphic viruses. [4] Bounty hunters: Bounty hunters viruses are used to modify signature program stored by Antivirus program in the order to render them an inoperable in the operating system. [4] Boot sector viruses: A boot sector virus is used to infecting the boot sector of a hard drive of the computer system. (Just like MBR Master boot record) it also has infected the speed of the processer. [4] Macro viruses: Viruses which came from email, email attachments etc. to damage the operating system or hack the computer system [4] BackDoor.exe Viruses: These viruses are highly dangerous because it can give the complete shell of the victims computers to the attacker. These exe are made by many encryption techniques, so anti-virus hardly detects these types of viruses. [4] What is Firewall Spyware? Firewall: Firewall is software or program which have security tool to help limit internet network traffic with hackers or viruses to getting in your computer system. Firewall helped protects your computer from future hackers new incoming viruses. [4] Spyware: Spyware are used to a multitude of malicious software programs which access your computer system. When Spyware viruses infect your computer system or operating system than it will slow down your operating system speed performance your computer system going to hang again again. [4] Issues relative with the Antivirus software: Unexpected renewal costs: Some of the commercial antivirus software which includes end-user license agreements which effect on the subscription automatically renewed it, cost so much which you not expected. [5] False positives: Antivirus software can used to identify non-malicious files which having the viruses so that it will be cause serious problems for the computer system because false positive make operating system files very unstable because of the viruses. [5] System interoperability related issues: When the multiple antivirus programs running on the computer or operating system than it will degrade the performance of the operating system create conflicts in every programs running on the operating system. So this concept is called Multiscanning If the functionality of the few software programs can be hampered by the active antivirus software on the operating system. [5] Effectiveness: The effectiveness of antivirus programs have been decreased in the previews year because of new good Antivirus software launch on the markets computer threat going dropped from 40-50% to 20-30% in this preview year. [5] Rootkits: Rootkits are major challenge for antivirus programs on the operating system it had admin area access to the system to control, invisible hidden the EXE from the running processes of the task manager on the computer system. [5] What is Cloud antivirus method? Cloud antivirus method is a technology that used the lightweight agent software to protect the computer system or operating system it also used for analysis the data with providers infrastructure. To implement this Cloud antivirus method we used the multiple antivirus engines which scanning suspicious files from the operating system this concept is called Cloud AV. Cloud AV was designed to send programs on the internet network where detection programs are used to improve the detection rates with multiple antivirus behavioral on the internet network. [5] Online Scanning: Some of the Antivirus provides maintain of websites with free online scanning on the internet with the entire computer such as like local disks, critical area files relative to the computer systems. Well as you know that internet becomes the vehicle for communication in this world people using digital communication on the internet with very fast speed scope so that new kinds of viruses are increasing spread all over the world of the internet network. If someone will not want to install antivirus on his or her computer than he or she can easily scan his or her computer online this is quickly possible solution. [5] What do u means by the birth rate death rate of the viruses? The Birth rate of the viruses: The birth rate of the viruses depends upon the one infected computer system or operating system which can spread this infection to other computer system or operating system. [5] The Death rate of the viruses: The death rates of the viruses depend upon the infection found on the computer system or operating system destroy that computer system. [5] Antivirus products: There many products of antivirus. Some of them are discuss below: Avast Free AntiVirus: Avast is an antivirus computer program made by AVAST Software a.s. Avast is the freeware version of the Avast company. Avast can be installed on Microsoft Windows, Macintosh Operating System X and Linux. It also has command line scanner system and different dangerous script blocker. It has many new features e.g. file system shield, Real time protection form worms and threats. Mail shield protect from dangerous mails and attachments In it. Web shield protects form malicious URL or virus containing sites. Network shield protect from attacking ports and known network worms. Boot time scan, scans the infections that are loading during windows startup and remove them. If any virus is found, antivirus displays the notification to the user, and asks for action to take. [6] AVG AntiVirus: AVG is another antivirus program made by AVG Technologies. It can be installed on multiple platforms and FreeBSD computing platforms. It also has a free version of antivirus. There are many components in avg antivirus. Anti-Spyware protects you from different spyware which are in your computers. Link Scanner scans the web links, whether they are affected or not. Web Shield protects you from viruses which come into your computer through internet. It has own firewall system to protect the system. It also has servers version to protect the web/file servers, mail servers and dns severs. [6] Avira AntiVirus: Avira is considered as the 6th largest antivirus software worldwide. And it has 100 million customers. It can be installed on Android and other operating systems. It runs as a background process which checks every file opened or downloads form the internet. It has different components in the antivirus. Email scanning which supports POP3 and SMTP protocols. Web Guard to block the access of malicious sites. It has personal firewall and anti-spam system. Backup module to protect and secure the important data. Keep an eye on different Botnets, and prevent them. It offers tools including a Rescue System utility used to write a bootable CD and DVD. Some main features of Avira windows versions are: [6] Anti-Phishing Mail Guard Game Mode AnitBot Parental Controls Bitdefender Antivirus: The Bitdefender products include antivirus and antispyware, personal firewall, privacy control, user control, backup for company and home users. PC Tuneup and Performance Optimizer. It can be used in Symbian Operating System, Windows Mobile, and Solaris. A free basic online scan is offered by the Bitdefender via the bit defender website. Bitdefender introduces the new technology B-HAVE. Through which it can detect the unknown threats.[6] ESET NOD32 Antivirus: ESET first ever product was NOD, an antivirus program for computers running MS-DOS. Then after some time period it introduces the NOD32 for Windows XP. In September 2010 ESET released NOD32 antivirus for Macintosh OS. It also supports BSD, Linux, Novell NetWare and Sun Solaris. ESET NOD32 includes an enhanced media control that automatically scans all USB, CD/DVD and external hard drives. [6] F-Secure Antivirus: F-secure is first antivirus to establish an existence on the World Wide Web. F-secure first introduced the anti-rootkit technology. It can be installed on Mobile security; it has also the facility of online Backup and anti-theft for Mobile. Also available for Linux, servers, Policy Manager, protect the message security gateway. F-secure developed the new technology through which new or unknown malware, which causes the changes in windows files and windows registry. F-secure teach the one semester course in university about new viruses and other technology. F-secure antivirus can also detect the backdoor.exe virus. F-secure also helping the authorities to catch the mafia or terrorist organization through their antivirus. [6] K7 Antivirus: K7 is the first antivirus to build their own NST (Nano Secure Technology), has ability to protect the system at multiple layers. Which can detect and remove the existing threats and as well as future threats. It provides support browsing against attacks by the attackers, to steal the passwords or even your money. It also produces the various applications and antivirus for DOS. The basic feature are firewall, Anti-spam, Anti-Spyware tools, K7 mail security, security tools to detect the key loggers, Tracking Cookie detection, usb scanning, safe cloud base scanning.[6] Kaspersky Antivirus: Kaspersky product designed to protect the users from malicious malware and other threats. It runs on different platforms and Linux version available only for business users. Its features include real-time protection, removal and detection of viruses, Trojans, worms, spyware, key loggers, backdoors, sql injection and many others. It also has the online helping facility to help and guide the user about their new products. Rescue disk facility is also available in Kaspersky. This scans the computer at boot time. The features which are not implemented in the antivirus program are personal firewall, AntiSpam and parental controls. Kaspersky uses the highly graphics to display the interface, so their system requirements are high. At early stages of Kaspersky, it has very crucial flaws in it, through which attackers can attack and run the piece of code to compromise the users pc. [6] McAfee Antivirus: McAfee Antivirus is very powerful antivirus it is light weight. This Antivirus is the leading antivirus software in the security industry markets. This Antivirus have two features one is ScriptStopper second is WormStopper it automatically updater it virus definitions updates on the regular basis from internet network. [7] Panda Antivirus: Panda Antivirus have Ultrafast new feature scanning engine as compared to other antivirus applications. This Antivirus have the Anti-Phishing filter Anti-Banking Trojans engines in the Identity protection area it have advanced heuristic scanning with personal firewall. [7] ZoneAlarm Antivirus: ZoneAlarm Antivirus have very strong removal ability to destroy the dangerous viruses also having multilayered security. This Antivirus used less processer power of performance it used very low computer system resources. [7] TrendMicro Antivirus: TrendMicro Antivirus is very popular antivirus, which mostly used for Spyware protection Adware protection from viruses. This Antivirus has some new features like Remote file locking sharing registry files. [7] Sophos Antivirus: Sophos Antivirus includes the network access control, Anti-spyware etc this types of Antivirus are used for watching on the data supplying through monitoring tracking software means like upload videos. [7] Rising Antivirus: Rising Antivirus is the Chinese Antivirus software it is used for UTM, spam-blocking firewall etc. This Antivirus basic function is BIOS rootkit checks. [7] Vba32 Antivirus: Vba32 Antivirus programs are used in the personal systems it neutralizes viruses which infected or attack the computer systems on the real time. Linux Shield: Linux Shield is the Antivirus product used in the Linux operating systems to clean the viruses from Linux operating system. [7] Technology Highlights: There are many technology highlights such as : First Generation (Antivirus): The first generation of Antivirus software are based on the signature detection polymorphic engines. [8] Second Generation (Antimalware): In the preview few years, new types of malware software are emerge file-less network worm etc are on the spotlight of the massive damage viruses are on the internet network. These problems can be solving by personal firewalls clear the signatures packet from viruses used smart clean Browser which will not infect the operating system with the spyware Trojans viruses. [8] Third Generation (Proactive Technology): TruPrevent: This behavioral technology is used for research development of the technologies. It has two main function technologies: Behavioral of analysis blocking known computer system. [8] (i). Behavioral Analysis: This Act as last line of defenses against new viruses which executing in the computer system it give real time results used behavioral category alone. [8] (ii). Behavioral Blocking: This is the Second main component of the TruPrevent. It knew hacker viruses behavioral to attack system application by injecting with program codes into the computer system. [8] Genetic Heuristic Engine: These technologies are inspired by the biology work as an organisms which individually identified by the other organisms. It based on the digital genes. This carries out new viruses harm things which going to infect or damage the computer system or operating system. [9] Collective Intelligence (The Next Generation): Collective Intelligence used the approach which collect the objective of this technology in which after clean the computer system or operating system it automatically generated full report cleaning viruses report it much faster lightweight in the future. It protected your computer system 95% up to 98% it also give your infecting computer system percentage according to the report. It is also collect the data from the communities which can tell us about the behavioral patterns of the any programs files. It also have the information about higher visibility threats against viruses or active on the internet network it can be automatically do data processing on the computer system analyzes thousands of new samples which received every day from internet network it will not expired the data which infect by the new malware viruses. It automatically saved the data files from new old malware it also release the knowledge extracted from delivering to user on the web services updates i t. In this platform we can do collective intelligence technology or platform for online services designed to perform of the machines against malware viruses solve the security solution. It also gives corporate requirements information performance of the malware thats why we created a specific managed service called Malware Radar. [10] Proof Point Virus Protection key capabilities: Viruses Protection key depend up on the efficient message analysis, Continuous business enterprise virus-detection updates, Integrated Administration reporting flexible policy management message disposition. Viruses protection key have the enterprise antivirus engine which gives good efficiently of the scanning messages attachments for new malicious codes which give fully proof point platform find new viruses definition which created the cloud-based Dynamic system which secure channel guarantees with proof point protection is already up to date than it will gives business enterprise with maximum detection against all viruses for IT administrators gives very importance to all antivirus enterprise of the proof point of the protection. It also used dynamic update service make for organizations. In this proof points virus protection are also used an integrated administration reporting in the enterprise protection suite with complete control on it. In the virus protection it used u nified interface on the enterprise antivirus technology which allows business configure with all aspects of the viruses protection. Virus protection includes virus filtering activity which detect cleaning processes. Proof point virus protections also have the flexible policy management message disposition which defines enforce virus-related security policies of any company organization. Virus protection has viruss analysis with message in which it can be quarantine for administrative rights. Proof point virus protection is also used for targeted Attack protection with new approach big data analysis techniques. Cloud-based solution is used to clean your email attacks full lifecycle approach. It can use proof point anomalytics techniques for email threats identified on the real time which includes message properties. It is protect URL with click time defense service which ensures the dynamically rewritten to the suspicious URL based on the analysis of proof point Anomalytics, pr oof point malware analysis service it respond on the threat insight service which performances security professionals on the real time for specific threats on the web-based dashboard. [11] System Shield from Viruses: System shield approach is used to ensure real time threat protection advanced seek destroy methods. It increases computer system performance reliability create seals off intelligently from future threat viruses programs. System shield active boots your defense technology which are virtually invisible when the virus comes into the system than it will protect it uses less memory for protection used few CPU resources to recover it from viruses antispyware software. Some user turn off security programs when the playing games for high-performance revolution on the game thats why system shield are used on the system to run in the background while antivirus security programs is turn off. System shield are used overloaded layers for security protection. [12] System shield do multiple detection techniques for maximum protection flexible architecture that allows for faster processes against on malware software. To avoid computer viruses recent threats do not open email attachments avoid the download files from unknown website. [12] Antivirus software is the important tool for protection of the computer system from viruses worms. This antivirus technology gives benefits to users for clean computer system from viruses. Many of viruses spread to the computer system or operating system through internet network now-a-days 50,000 viruses are online on the internet network which infects 20,000 computer system or operating system on daily based. These viruses infect user personal information private files in the computer system. One of the main problems of the antivirus technology is that most of antivirus software or programs slow down computer system processes memory or corrupt the operating system. This antivirus technology used computer support representation (CSR) in the IT security. Some antivirus technologies have scan engine for carrier-grade protection some organization need best of the best antivirus technology to clean from viruses, spyware other malware software. Some antivirus technologies have dual p rotection used server space leading antivirus competitor. [14] The last generation antivirus software has lineup detection for file-reputation analysis which used for incorporate cloud-security increases the safety. This antivirus used side by side computer security. Advanced Antivirus technologies are used for developed proactive protection of the viruses annoying security clean with the web-link scanners. All security software used scope of the protection in which solution multi-layered protection has traditional protection. Antivirus software has effectiveness on the computer system operating system. Some Antivirus software very complex stuff to understand it. All antivirus software features will have security solution which boots the usability, security, maintains performance. Security software must be upgrade to detect latest viruses. Now-a-days antivirus technologies are used in the cell phones, emails, live chatting other resources. It also gives online offline services support easy to use in the real life all these modern technol ogies. [15]

Friday, October 25, 2019

Cleopatra the Great - VII Essay --

The Great Man Theory was extremely prominent in the 19th century, originating from historian Thomas Carlyle, who stated that â€Å"The history of the world is but the biography of great men.† This mirrors his belief that heros shape history through their personal attributes and divine inspiration. According to this Great Man theory, history is written around the ‘Great Men’ or heroes who, due to their exceptional characteristics of charisma, intelligence, and wisdom utilize their power status to embark on a decisive historic imprint. This theory specifies on these heros’ historical events, being compared to their individual orders and decisions as rulers. In order to fit this title, individuals must use their power of leadership to protect and lead their country, seize given opportunities, possess machiavellianism characteristics, and be influential and captivated by their people. Cleopatra VII, an Egyptian Queen, had exquisite leadership skills which are a rgued to be better than any man’s, and she was honored and influenced by not only her people, but the world, through the hardships of war, famine, and the expansion of the Roman Empire. Her ideas, guiding principles, and public values influenced why she made the decisions she did. Thus, Cleopatra is the epitome of a ‘Great Man’, according to the criteria of the Great Man Theory. Cleopatra is a substantial leader because she was one of the first influential female leaders throughout her time on the throne, obtaining more power than any other female leader could achieve. Her leaderships were much different from other leaders which made her shine. Almost every Egyptian queen was named Cleopatra, however, the most famous of which was Cleopatra VII. She was born in Alexandria in 69 BCE... ...event makes her a ‘Great Man’ because she turned Egypt from a famished state, into a strong nation once again. She was able to use her intelligence to make allies to save her nation, and this is a very erioc stunt. She knew she was exiled from the throne, yet she went to a place where she was still considered of high authorities, and was able to organize an army to wage civil war on her brother. This is a remarkable event which allowed her to be remembered; she saved Egypt's’ state. This shows how she always acted to further her vision of a strong nation, equal in respect and stature to Rome. Lastly, it shows her determination to reign the throne, and became a mature leader in making Egypt great again. Thus, Cleopatra is applicable to the Great Man Theory. Cleopatra fits every little aspect of a ‘Great Man’. according to the criteria of the Great Man Theory.

Thursday, October 24, 2019

Alcohol and Energy Drinks

In recent years, researchers have begun to focus attention on an emerging trend of consuming energy drink mixed with alcohol AmED. Consumption of AmED is thought to have a correlation with high-risk behavior and negative effects on the consumer. Several research articles have examined the various facets of this practice. Some of the points of consideration that have been researched include the motivations behind consuming AmED, the effects of consuming AmED on alcohol consumption and the likelihood of engaging in risk taking behaviors after consuming AmED compared to alcohol alone.This literature review will examine the following four articles in an attempt to explore this area of research. Energy drinks are beverages that boast the ability to provide the consumer with an increase in energy. Energy drinks frequently contain large amounts of caffeine. The upper daily recommended limits for an adult in regards to caffeine is XXX. Levels of caffeine can be up to 300mg per serving. A 6oz coffee contains 100mg. The caffeine from energy drinks is known to have a stimulating effect on the nervous system. Many brands of energy drinks contain additional chemicals including plant-based stimulants (guarana and yerba mate).The effect of these on the body is not well understood as there has been little research. Simple sugars such as glucose and fructose are also found in some energy drinks. Other potential ingredients include glucronolacteone (a naturally occurring metabolite), amino acids (taurine, carnitine and creatine), herbs (Ginko Biloba and ginseng) and vitamins. In a research paper by Peacock and Bruno (2012a), patterns of use and motivations behind the consumption of AmED were examined. The focus of this investigation was to examine the motivation of participants to consume AmED through self-reporting techniques in the form of an online questionnaire.The sample of 400 participants aged 18-35 years who had reportedly consumed AmED in the past 6 months. The results of the study indicated that 75% of participants used AmED for energetic purposes, 50% reporting use to extend their stay at a public venue, 60% claimed they were motivated by situational circumstances, such as mixed drinks containing ED, 40% reported sharing AmED with a companion, 20% used AmED to mask the flavor of alcohol, 50% of the sample reported using AmED to have more fun and only 33% reported consumingAmED to get more drunk Peacock al et (2012a). In addition to taste and situational reasons, the participants in this study appeared to be motivated by functional and hedonistic outcomes. Only a small number of participants being motivated by the desire to increase the level of drunkenness or experience similar effects to elicit drugs. A study conducted by O’Brian, McCoy, Rohdes, Wagoner and Wolfson (2008), where by responses from 4,271were recorded via a web based survey.Participants who consumed AmED in the past 30 days reported consuming significantly more alcohol in a typical drinking session as well as reporting more drinking sessions than those who did not consume AmED O’Brian et al. (2008). AmEd consumers also reported episodes of weekly drunkenness and among the sample who reported consuming AmED a single drinking session consumed 36% more than students who didn’t not report consumption of AmEd.The results of Peacock et al.  (2012b) indicate that although risk taking behaviors occurred during sessions of consumption of both alcohol and risk taking behavior that occurred with AmED was statistically less than the risk taking behaviors that occurred in alcohol alone sessions. However consumption of AmEd did result in higher negative physiological and psychological outcomes than those reported from consuming alcohol. Verster, Aufricht and Alford (2012), conducted a review of articles of articles relating to the consumption of AmED.It was revealed through a critique of multiple correlational studies that there are currently insuff icient properly controlled studies to draw any firm conclusions regarding the effects of AmED. Conclusions reached in their report were that only a minority of the student population occasionally consumes AmED Vester (2012). Research also suggested some evidence that AmED may result in an increase in some aspects of alcohol- induced performance impairment.There is no consistent evidence that alcohol alters perceived levels of intoxication, no evidence that consumption of ED causes an increase in alcohol consumption, no direct evidence exists to suggest that ED is linked to drug and alcohol dependence or abuse. A personality predisposed to higher levels of risk taking behavior may be the primary reason for increasing alcohol and drug abuse and that AmED may be a component of that lifestyle. The literature available relating to AmED consumption is insufficient.Presently there is an insufficient amount of evidence to link the consumption of AmED to an increase in risk taking behavior, increase in consumption of alcohol or negative effects on health. To understand the true effects of AmED further research is required. To draw more concrete conclusions about the effect of AmED there is a need for more complex and properly controlled clinical studies need to be undertaken. Research design needs to explore relationships with a within subject design whereby the relationship between the ingestion of AmED and the consumption of alcohol is further explored and documented.

Wednesday, October 23, 2019

Roles Of Botanical Garden In Plant Conservation Environmental Sciences Essay

The subject for this essay is the functions of botanical garden in works preservation. The essay will be divided into four chief parts. The first portion discuss about the botanical garden. This portion will include the debut, history and development, web and map of botanical garden. Second portion will explicate the importance of works preservation and the planetary scheme for works preservation. The 3rd portion is the function of botanical garden in works preservation. The 4th portion will be the illustration of botanical garden in Malaysia and its functions in works preservation. The last portion will be the decision of the essay. 2.0 Botanic Gardens 2.1 Introduction Botanic gardens or botanic gardens are by and large well-tended Parkss exposing a broad scope of workss labelled with their botanical names. They may incorporate specializer works aggregations such as cacti and succulent workss, herb gardens, workss from peculiar parts of the universe, and so on ; there may be nurseries, once more with particular aggregations such as tropical workss, alpine workss or other alien workss. Botanic gardens are frequently run by universities or other scientific research organisations and frequently have associated herbaria and research programmes in works taxonomy or some other facet of botanical scientific discipline. In rule their function is to keep documented aggregations of life workss for the intents of scientific research, preservation, show and instruction, although this will depend on the resources available and the particular involvements pursued at each peculiar garden.2.2 History and DevelopmentThe beginning of modern botanical gardens can be traced to European mediaeval medicative gardens known as physic gardens, the first of these being founded during the Italian Renaissance in the sixteenth century. This early concern with medicative workss changed in the seventeenth century to an involvement in the new works imports from geographic expeditions outdoors Europe as vegetation bit by bit established its independency from medical specialty. In the eighteenth c entury systems of terminology and categorization were devised by phytologists working in the herbaria and universities associated with the gardens, these systems frequently being displayed in the gardens as educational â€Å" order beds † . With the rapid rise of European imperialism in the late eighteenth century botanic gardens were established in the Torrid Zones and economic vegetation became a focal point with the hub at the Royal Botanic Gardens, Kew, near London. Over the old ages botanical gardens, as cultural and scientific administrations, have responded to the involvements of vegetation and gardening. Nowadays most botanical gardens display a mix of the subjects mentioned and more: holding a strong connexion with the general populace there is the chance to supply visitants with information associating to the environmental issues being faced at the start of the twenty-first century, particularly those associating to works preservation and sustainability.2.3 NetworkWorldwide there are now about 1800 botanical gardens and botanical garden in approximately 150 states ( largely in temperate parts ) of which about 400 are in Europe, 200 in North America, 150 in Russia and an increasing figure in East Asia. These gardens attract about 150 million visitants a twelvemonth so it is barely surprising that many people gained their first exciting debut to the admirations of the works universe in a botanical garden. Historically, botanical gardens exchanged workss through the publication of seed lists. This was a agency of reassigning both workss and information between botanical gardens. This system continues today although the possibility of familial buccaneering and the transmittal of invasive species have received greater attending in recent times. The International Association of Botanic Gardens was formed in 1954 as a world-wide administration affiliated to the International Union of Biological Sciences. More late coordination has besides been provided by Botanic Gardens Conservation International ( BGCI ) which has the mission â€Å" To call up botanic gardens and engage spouses in procuring works diverseness for the wellbeing of people and the planet † . BGCI has over 700 membersA – largely botanic gardensA – in 118 states and strongly supports the Global scheme for works preservation by bring forthing a scope resources and publications, and by forming international conferences and preservation plans. Communication besides happens regionally. In the United States there is the American Public Gardens Association and in Australasia there is the Botanic Gardens of Australia and New Zealand ( BGANZ ) .2.4 Role and FunctionBotanic gardens have had a altering function throughout history, get downing frequently as medicative gardens for the survey and cultivation of workss with mending belongingss and traveling through many stages including of class as pleasance gardens. But the fact that their aggregations are more or less scientific means they are continually accommodating and functioning the demands of their societies in germinating ways as new challenges face those societies. In current times, they are going cardinal participants in both the preservation of workss and in the instruction of the people who come to see them.A They are besides get downing to play a function in the extenuation of the effects of clime alteration, and could be perfectly critical to the endurance of the planet as they are absolutely placed to assist travel species around and assist ecosystems to accommodate to new climes in different parts.3.0 Plant preservation3.1 ImportancePlants are universally recognized as a critical portion of the universe ‘s biological diverseness and an indispensable resource for the planet. In add-on to the little figure of harvest workss used for basic nutrient and fibers, many 1000s of wild workss have great economic and cultural importance and potency, supplying nutrient, medical specialty, fuel, vesture and shelter for huge Numberss of people throughout the universe. Plants besides play a cardinal function in keeping the planet ‘s basic e nvironmental balance and ecosystem stableness, and supply an of import constituent to the home grounds for the universe ‘s carnal life. At present we do non hold a complete stock list of the workss of the universe, but it is estimated that the entire figure may be in the order of 300,000 species. Many of these species are in danger of extinction, threatened by habitat transmutation, over-exploitation, foreign invasive species, pollution and clime alteration. The disappearing of such critical and big sums of biodiversity poses one of the greatest challenges for the universe community: to hold the devastation of the works diverseness that is so indispensable to run into the present and future demands of world. Plant preservation, long the hapless relation of the preservation universe, has started to come into its ain since the rise of preservation biological science as a recognized subject in the 1980s. Plant preservation, and the heritage value of exceeding historic landscapes, was treated with a turning sense of urgency. Specialist gardens were sometimes given a separate or bordering site, to expose native and autochthonal workss.3.2 Off-site works preservationOff-site preservation is the preservation of workss off from their countries of natural happening. The term ex situ is often used to depict the off-site preservation. Off-site preservation non merely include turning the workss in botanic gardens, the construct extends every bit good to field cistron Bankss, clonal aggregations, and source plasma Bankss where propagating tissues and seeds are preserved for turning in the hereafter. Off-site preservation can affect a scope of works parts-the whole works, seed, other tissues, or famil ial stuff in civilization. Whole, populating workss have peculiar value for preservation and will go on to be a major concern of off-site preservation. But conserving whole workss is non simple. To capture the scope of familial fluctuation, such aggregations require big figure of workss ; these are expensive to set up and keep. If the workss are annuals, they will necessitate seasonal reproduction. Outside their natural habitat some workss may necessitate manus pollenation and particular intervention of fruit and seeds to guarantee sprouting. It is fortunate that bettering engineering is doing storage as seeds, seedlings, rootstocks, tissues in civilization, and even DNA an option for many workss.3.3 Global Strategy for Plant ConservationThe entry point for the scheme is works preservation ; other facets such as sustainable usage, benefit-sharing and capacity edifice are besides included. The Strategy provides an advanced model for actions at planetary, regional, national and local degrees. The scheme is suppo rted by a broad scope of organisations and establishments – authoritiess, intergovernmental organisations, preservation and research organisations ( such as protected-area direction boards, botanic gardens, and cistron Bankss ) , universities, research institutes, nongovernmental organisations and their webs, and the private sector. The most advanced component of the Strategy is the inclusion of 16 outcome-orientated marks, aimed at accomplishing a series of mensurable ends by 2010.3.3.1 AimsThe ultimate and long-run aim of the Global Strategy for Plant Conservation is to hold the current and continuing loss of works diverseness. The Strategy will supply model to ease harmoniousness between bing enterprises aimed at works preservation, to place spreads where new enterprises are required, and to advance mobilisation of the necessary resources. The Strategy will be a tool to heighten the ecosystem attack to the preservation and sustainable usage of biodiversity and concentrate on the critical function of workss in the construction and operation of ecological system and assure proviso of the goods and services such systems provide.4.0 Role of Botanical Gardens in Plant ConservationBotanic gardens have jointly accumulated centuries of resources and expertness that now means they play a cardinal function in works preservation. Many of these activities contribute to ex situHYPERLINK â€Å" hypertext transfer protocol: //www.bgci.org/ourwork/ex_situ/ † preservation, but botanic gardens besides play an of import function in in situHYPERLINK â€Å" hypertext transfer protocol: //www.bgci.org/ourwork/Ecosystems/ † preservation Gardening and cultivation accomplishments allow us to turn workss that might be lost in nature, which means their workss ‘ diverseness can be conserved in the gardens, but besides allows us to see Restoration and rehabilitation of debauched home grounds. Populating aggregations of workss cod species under assorted groupings, to keep a life shop of familial diverseness that can back up many activities in preservation and research. Seed Bankss and aggregations of life workss allow species to be safeguarded. Plants must be carefully collected stored to guarantee maximal familial diverseness is retained, and much research is required to find the best manner of hive awaying each species. This is the preservation of works diverseness in situ, and botanic gardens are cardinal to this scheme ‘s capacity and success.. Research and development into works taxonomy and genetic sciences, phytochemistry, utile belongingss, informing choice of workss that can defy degraded and altering environments ( particularly of import in face of the menaces posed by clime alteration ) . Education is a strength of botanic gardens that allows them to pass on the importance of conserving workss, making out to diverse audiences, and besides to pass on how this may be achieved. Associating workss with the wellbeing of people, and besides assisting conserve autochthonal and local cognition, to promote the sustainable usage of works resources for the benefit of all, as portion of sustainable development. The preservation of works diverseness is critical for sustainable development and botanic gardens are playing a cardinal function as Centres of preservation action. Gardens maintain a broad scope of species as life workss, in seed Bankss and tissue civilization ; harmonizing to appraisal of BGCI, there are likely over 80,000 species in cultivation in botanic gardens of the current estimation of 270,000 known works species in the universe. Botanic gardens contain aggregations of workss for instruction, scientific intents and show ; they can be: Taxonomically-based – aggregations of a peculiar household, genus or group of cultivars ; Collections of native workss ; Plants which portion a common geographical or ecological beginning such as Mediterranean, desert or alpine ; Wild relations or cultivars of utile species such as medicative, aromatic or textile workss ; Shared wont or life signifier such as an grove, botanical garden or lush aggregation. Botanic gardens besides have of import preservation aggregations peculiarly of rare and threatened workss. Harmonizing to the IUCN Red List of threatened workss 34,000 taxa are considered globally threatened with extinction. Presently, over 10,000 threatened species, about a 3rd, are in botanic garden cultivation. These workss contribute to species recovery programmes and supply long-run backup aggregations. Botanic gardens undertake research – from works taxonomy, ecology to engendering systems. With their expertness in gardening, botanic gardens develop extension and cultivation methods for workss which have ne'er been in cultivation. All these countries are indispensable for species recovery programmes and reintroduction of workss into the wild, such as developing techniques to re-introduce the Dragon Trees into the natural state. A major cause of biodiversity loss is the over-collection of wild workss for gardening, medical specialty and nutrient. Bringing workss into cultivation can take the force per unit area off the wild populations, and besides back up supports by bring forthing income and promote trade Botanic gardens besides manage protected countries within and outside their garden to advance biodiversity. These ecosystems such as woods, shrub land, catchment countries, and coastal countries provide indispensable services from the coevals of H2O, cycling of foods and refilling of dirt birthrate and bar of eroding which are critical to the supports of all people. One of the major causes of species decline is invasive foreigner species which threaten workss, works communities and ecosystems. Botanic gardens with their accomplishments in designation and gardening proctor invasive species and work locally and nationally to reconstruct home grounds that are of import for diverseness. Botanic gardens work with their local communities and visitants on instruction and environmental preservation programmes which promote environmental consciousness and sustainable life. Globally, botanic gardens receive more than 200 million visitants a twelvemonth. Further, botanic gardens are cardinal establishments working with their authoritiess and other administrations on cardinal policies, national biodiversity schemes and action programs.5.0 Botanic Garden in Malaysia – Rimba Ilmu5.1 IntroductionRimba Ilmu is a tropical botanical garden, set up in the University of Malaya campus in Kuala Lumpur, Malaysia. It is modelled after a rain forest garden construct instead than a formal flower garden. It emphasises the vegetation of the Malaysian and Indonesian part. Together with the life aggregations of over 1,600 species, the Rimba Ilmu besides houses the University of Malaya herbarium ( acronym KLU ) and has its ain Environmental Education Programme. The Rimba Ilmu is a member of the Botanic Gardens Conservation International ( BGCI ) and the South East Asia Botanic Gardens Network.A Rimba Ilmu means â€Å" The Forest of Knowledge † in the Malay linguistic communication. The garden, established in 1974, occupies an country of 80 hectares. It is partially buffered by old gum elastic plantings and the life aggregations, largely from Malaysia, are one of the most of import biological conservatories in Malaysia. There are besides works species from other parts of tropical Asia, the Pacific islands, Australia, South America, Africa and Madagascar.A Rimba Ilmu ‘s mission is to bring forth and advance consciousness and cognition of tropical works life and its environment, ecology and preservation through the development and direction of installations and activities appropriate to its map in a university located within Malaysia ‘s most developed and populated landscape. The Herbarium ( a mention library of preserved works specimens ) is Malaysia ‘s largest university aggregation incorporating some 63,000 accessions. In the Garden, there are several chief show aggregations, including medicative workss, thenars, and the citrous fruit and citroid aggregation. The Conservatory of Rare Plants and Orchids, opened in 2000, and the Fernery, with seting constitutions made over several old ages and commissioned in 2003, are accessible merely to particular group visits and research contacts, and a new bambusetum ( populating aggregation of bamboos ) was completed at the terminal of 2003 and by and large accessible to the populace. There is besides a little research aggregation of bananas. A high spot in the development of the Rimba Ilmu is the constitution of a particular botanical garden ( populating aggregation of trees ) get downing in 2001 as the ground tackle for our â€Å" Millenium Forest † undertaking, which seeks to prosecute friends and concerned parties in set uping biologically diverse forest plantings in doing a new wood within the metropolis of Kuala Lumpur.A Besides holding a general aggregation of species from a assortment of works households selected for instruction, Rimba Ilmu is besides developing assorted particular aggregations runing from those of medicative workss, wild orchids, thenars, pandan, tropical fruit trees, gingers, aquatic workss, wild citrous fruit relations to rare and endangered workss in demand of preservation.5.2 Role in Plant ConservationRimba Ilmu is an of import depository for many types of workss, including preservation aggregations of rare and endangered workss, and particular aggregations of the utile workss ( such as citrous fruits and starch thenar ) and their wild relations. In 2001, two other particular aggregations, bamboos ( sponsored by the International Plant Genetic Resources Institute ) and bananas ( anchored by one of the university ‘s research groups in banana cytology ) , were besides begun. Over 2004-5, with the aid of DHL and affecting their employees, a particular aggregation of Malayan wood trees has besides been established. Outside of the Rimba Ilmu, it may be really hard to detect so many different species of some groups, and the home grounds of some of these workss may hold already been altered or damaged. Conservation besides involves public consciousness, and visitants are foremost treated to a lasting exhibition on Rain Forests when they start to acquire familiar with the Garden.A6.0 DecisionBotanic gardens maintain a broad scope of species as life workss, in seed Bankss and tissue civilization. Therefore, botanic gardens contain aggregations of workss for instruction, scientific intents and show. In decision, the botanical garden drama an of import function as the ex situ preservation for works and besides in situ preservation site. The preservation of works diverseness is critical for sustainable development and botanic gardens are playing a cardinal function as Centres of preservation action.