Saturday, December 28, 2019

William Lyon Mackenzie King, Canadian Prime Minister

William Lyon Mackenzie King (December 17, 1874–July 22, 1950) was prime minister of Canada on and off for a total of 22 years. A compromiser and conciliator, Mackenzie King—as he was more simply known—was mild-mannered and had a bland public personality. The private personality of Mackenzie King was more exotic, as his diaries show. A devout Christian, he believed in an afterlife, and consulted fortune tellers, communicated with his dead relatives in seances, and pursued psychical research. Mackenzie King was also extremely superstitious. Mackenzie King followed the political path set by Prime Minister Wilfrid Laurier in emphasizing national unity. He also started a Canadian Liberal tradition of his own by setting Canada on the road toward social welfare. Fast Facts: Mackenzie King Known For: Longest-serving prime minister of CanadaBorn: December 17, 1874 in Kitchener, Ontario, CanadaParents: John King and Isabel Grace Mackenzie.Died: July 22, 1950  in Chelsea, Quebec, CanadaEducation: University College, Toronto, Osgoode Hall Law School, University of Chicago, Harvard University  Published Works:  Industry and Humanity, extensive diariesAwards and Honors:  MacKenzie received many honorary degrees and national and international honors. He is also the namesake for numerous roads, schools, and other public institutions.Notable Quote: Where there is little or no public opinion, there is likely to be bad government, which sooner or later becomes autocratic government. Early Life Mackenzie King was born into a struggling middle-class family. His maternal grandfather, whose name he bore, had been a leader of the Canadian Rebellion of 1837, which aimed to establish self-government in Upper Canada. As a boy, the younger Mackenzie was encouraged to follow in his grandfathers footsteps. King was an outstanding student; he attended the University of Toronto and then went on to earn advanced degrees there and at the University of Chicago, Harvard University, and the London School of Economics. Early Career King was offered an academic position at Harvard but turned it down. Instead, he accepted the position of deputy minister of labor in Ottawa, where he developed a talent for mediating labor disputes. In 1908, King resigned from his position to run as the liberal candidate for Parliament, representing North Waterloo (his birthplace). He was elected in 1908 and was quickly given the position of minister of labor by Prime Minister Wilfrid Laurier. Laurier, however, was defeated in 1909, after which King took a post with the Rockefeller Foundation in the United States. Kings work involved investigation of industrial relations in the U.S. and it resulted in the publication of his 1918 book, Industry and Humanity. Elected Prime Minister of Canada In 1919, Lauriers death left an opening for King to be named the leader of the Liberal Party. In 1921, he became prime minister—although his government was made up largely of conservatives. A master mediator, King was able to muster a vote of confidence. Despite this success, however, a scandal led to Kings resignation in 1926. Just a few months later, after the new Conservative government failed, King once again became prime minister. He quickly took a leading role in securing the equality of self-governing nations of the British Empire (the Commonwealth). Second Stint as Prime Minister In 1930, King once again lost the election and, instead of leading Canada as its prime minister, he led the opposition throughout the Great Depression. In 1935, he was once again elected prime minister in a landslide victory and continued in that role until his 1948 retirement. He led his nation through World War II and, following his resignation, continued to sit as a member of Parliament. Louis St. Laurent took over as leader of the Liberal Party and Prime Minister of Canada in 1948. Some of Kings accomplishments included: Development of social programs such as unemployment insurance, old age pensions, welfare, and the family allowance.Leading Canada through World War II, surviving a conscription crisis that split Canada along English French lines.Introducing the British Commonwealth Air Training Plan (BCATP), which trained more than 130,000 aircrew members in Canada for the Allied war effort. King continues to hold the record for the most elections to the position of prime minister of Canada: he was elected six times. Kings Published Diaries While King was seen as a rather dull but competent bachelor and statesman throughout his life, in the 1970s his personal diaries began to appear in print. These provided a very different view of the man. Specifically, they revealed that Kings personal life was quite different from his public persona. In fact, he was a spiritualist who believed it was possible to talk with the dead through a medium. According to his diaries, King frequently worked with mediums to contact his dead friends and relatives. According to the Canadian Broadcasting Company, Thousands of pages of diaries, spanning half a century, exposed him as an oddball and eccentric—a lifelong bachelor who was extremely close to his mother, adored his dog, availed himself of hookers, and communed with the spiritual world. Death King died of pneumonia at the age of 75 on July 22, 1950, at Kingsmere. He was in the process of writing his memoirs. He is buried near his mother at Mount Pleasant Cemetery in Toronto.   Legacy King was a consummate politician and deal maker with the ability to mediate agreements between disparate groups over the course of decades. While not the nations most exciting leader, his longevity and consistency helped mold Canada into the nation it is today. Sources Pickersgill, John Whitney. â€Å"W.L. Mackenzie King.†Ã‚  Encyclopà ¦dia Britannica, 13 Dec. 2018.â€Å"Unbuttoned: A History of Mackenzie Kings Secret Life. CBC.ca, 24 Aug. 2018.â€Å"William Lyon Mackenzie King.†Ã‚  The Canadian Encyclopedia.

Friday, December 20, 2019

Post Traumatic Stress Disorder ( Ptsd ) - 1692 Words

Post Traumatic Stress Disorder (PTSD) is a condition that causes anxiety and distress due to an extremely terrifying event. PTSD occurs in people who have experienced an event that is life-threatening, terrifying to include seeing someone they personally know or don’t know endure death (Kalat, 2013, p. 383). Recently the Veterans Affairs Administration (VA) has seen significant rises in diagnosing and treating PTSD sufferers in returning combat soldier from Iraq and Afghanistan. According to the National Center for PTSD out of 100 veterans 20 are likely to return with PTSD symptoms (Veterans Affairs Administration, 2010). This is out of the roughly two million soldiers that have fought in the Iraq and Afghanistan war. It is noteworthy that†¦show more content†¦PTSD has an array of sub symptoms but in battle fatigue soldiers there are four main symptoms. These are avoiding situations that remind an individual of the event, changes in emotions and beliefs, reliving the event time and time again, and being hyper vigilant at home or social places (Olatunji, Armstrong, Fan, Zhao, 2014, p. 51-53). Avoiding situations for a soldier manifests in several ways. They may have reluctant emotions to go to crowded places, or loud places, avoiding celebrations that honor previous wars and avoiding those who were with them during the event. Negative changes in beliefs and feelings also have several triggers and factors. There are changes in their beliefs in war, morals and overall negative outlook on life altogether. This change is also a symptom of depression and is a co morbid disorder to PTSD. According to recent research not only are combat veterans dealing with symptoms but are highly susceptible to alcohol related problems and increase aggression. 36% of returning veterans from Afghanistan and Iraq had alcohol related issues, along with PTSD symptoms and physical aggression (Stappenbeck, Hellmuth, Simpson, Jakupcak, 2014, p. 65-66). With soldiers returning from excessive combat tours research shows they turn to alcohol as a coping mechanism (Stappenbeck, Hellmuth, Simpson, Jakupcak, 2014, p. 66). With consuming large amounts of alcohol to cope,

Thursday, December 12, 2019

Security and Privacy Issues of VOIP and Skype

Question: Describe about the Security and Privacy Issues of VOIP and Skype. Answer: Introduction Voice over Internet Protocol commonly known as VOIP is a collection of methods and technologies to exchange voice and multimedia over the network which is the Internet. It allows communication to take place in the form of various services such as fax, SMS, video conferencing and many others (Vaishnav, 2016). Skype is a popular application that makes use of VOIP and has been developed by Microsoft. Skype allows instant messaging, file sharing, audio and video conferencing and a lot more and is widely used by the home and business users to connect with each other irrespective of their geographical locations. There are a number of security and privacy issues that are present in case of Skype and VOIP applications. Literature Review VOIP, Skype and the other applications and services that make use of VOIP make use of Internet Protocol for their activities. For the communications to take place over VOIP there is no dedicated telephone line or system necessary and the same brings down the cost that is associated with the services. The voice and data transfer capacity that comes with VOIP based applications is also massive. Ease of access, non-stop availability and lower costs are some of the features that come handy with Skype and other VOIP applications. However, with numerous advantages and benefits, there are a few risk areas that are also present with these applications. There are increased scenarios of data collision and congestions along with exposure to multiple security risks which may prove to be dangerous for the data and information being exchanged (Fontanini, 2016). Research Questions Following are the research questions that have been addressed and answered with the aid of the analysis and research done on the topic. What is the meaning of VOIP and Skype and what are the services that are provided by each? What are the confidentiality attacks that have an adverse impact on the security and privacy of the information exchanged over VOIP and Skype? What are the integrity attacks that have an adverse impact on the security and privacy of the information exchanged over VOIP and Skype? What are the availability attacks that have an adverse impact on the security and privacy of the information exchanged over VOIP and Skype? What are the measures that can be executed and installed to keep the security and privacy of the information unaltered at all times? Security and Privacy Issues There are three properties of information that must be kept safe and secure at all times and these three properties are confidentiality, integrity and availability. There are attacks that are executed that hamper these properties of data and information which in turn results in compromise on the security and privacy of the same. Confidentiality Threats Eavesdropping of phone conversation Skype and other VOIP applications work on the nodes that are present in this category of communication medium. Due to the presence of a huge number of nodes, an attacker gains access to any one of them and gets a chance to eavesdrop in the conversation or exchange taking place (Xin, 2016). Call Pattern Tracking There is often a pattern associated with the calls that take place over Skype or VOIP services in terms of time, frequency, participants and other factors. These patterns are studied by the attackers and valuable information in retrieved from the same. Data Mining Attacks Attackers acquire the phone numbers or credentials through intercepted message and then execute attacks such as spam calls, fraud messages and likewise (Park, 2016). Reconstruction Attacks A piece of information is acquired by the attacker through unauthorized measures and the same is reconstructed to give it a misleading shape. Integrity Attacks Integrity Attacks Message Alteration The messages that are exchanged over Skype or VOIP are often altered to provide them a different shape and the activity is done in an unauthorized manner. There are a number of entities that are involved in a particular call and these entities are added, deleted or modified by the attacker without the permission to do the same (Obidinnu and Ibor, 2016). Media Alteration The other form of the integrity attack is the alteration of the media. The media being exchanged over the VOIP channels is degraded, upgraded or modified without the required permissions to perform the same. Quality of the media is also hampered in this form of integrity attack (Lazzez, 2016). Availability Attacks Call Flooding The attacker introduces a lot of unwanted traffic on the communication channel which results in breaking down of the services (Sonkar, 2016). Media Session Hijacking Hijacking of the media sessions is often done in which there are unauthorized re-routing and alterations involved. These activities hamper the availability of the services. Server Impersonating The attacker in this form of the attack impersonates as the media server and acquires the trust of the clients. The request and response cycle that is followed by this activity results in disruptions in the availability of the information and services. QoS Abuse Bandwidth of the connections is often exhausted in these attacks and the same cause jitters and slippages which are considered to be a negative point as far as the quality of a particular service is concerned (Shaidani, 2016). Summary of Discussions Review 1 A blended technique has been received in the exploration by gathering the quantitative and also subjective strategy. Various elements have been utilized to ask about the data that is important to actualize the VOIP and Skype procedures in the association. The way of assaults can likewise be resolved with the assistance of gathering the data that is obtained from the different substances. Review 2 VOIP has picked up ubiquity among the clients in the previous couple of years and a great deal of work has been accomplished for the advancement of the administrations that are made accessible by the same. Likewise, there are various dangers that are additionally created by the pernicious elements to hamper the working of the same. There are assaults that are propelled in the expression of VOIP taking a gander at the enormous trade that happens over the medium. The achievement of these assaults permits the aggressors to get hold of the essential and imperative data that is connected with a specific association. These assaults are finished with the utilization of the system and the data security measures and are essentially executed to influence the classification, trustworthiness and accessibility of the data. Flooding, sniffing, dissent of administrations, message adjustment, media modification, listening stealthily and so forth are various such assaults that incur significant damage on the data security over VOIP. The countermeasures to these assaults are additionally grown at the same time to think of the system to moderate and control the effect of these assaults on the data. These measures are created on the premise of the assault and data classification. Issues that were not addressed and its Impact The research on the topic has been done well and the research questions have also been answered accurately. There could have been a little more explanation on the services and the procedure of the operations that are covered under Skype and the various VOIP applications that are present. These would have provided a better understanding of the topic and would have allowed the reader to be engaged in a better manner. Skype is the application that is used by a huge number of users and the functioning details of its services would have added to the knowledge and clarity of the reader about the topic. Lessons Learned There are a number of security and privacy issues that are present with VOIP and Skype. However, the same can be prevented by making use of the measures to avoid and prevent the same. There are various hostile to forswearing of administration measures that can be adjusted by the associations to stay safe from such assaults. The groups can make utilization of constraining of SYN rate or entrance separating also to stay away from the forswearing in the administration and keep up the accessibility of the data and correspondence at all times. There are also many stronger measures associated with the authentication methods such as use of multi layer authentication also know as two steps or three step authentications. Networks need to be monitored on a regular and constant basis by using measures such as network scans, network monitoring, intrusion detection and prevention. Encryption is a powerful technique that will stay significant even if the attacker succeeds in acquiring information from the communication channel as the attacker will not be able to break in to the encrypted information. The same will be of no use in this case. There are a number of legal and regulatory measures that can be adopted to prevent these attacks. A strong legal architecture will automatically minimize the rate and frequency of such attacks (Kulkarni, 2016). The first and foremost measures must never be ignored such as physical security, anti-viruses, installation of firewalls and likewise (Hung, 2016). Security reviews and audits must be a typical movement in the associations to have a check of the security systems that are taken after furthermore to comprehend the regions of change. VOIP and Skype are not dependent upon a particular device or an operating system to be accessed and can be used on desktop as well as mobile devices. These operating systems must be updated on a regular basis to make sure that the risks that are introduced specific to a particular operating system or to a particular version are prevented. It is also necessary to secure the wireless networks over which these applications and services are accessed. It is because these networks act as the prime source of the entry point for the attacker. Conclusion VOIP and Skype are the measures that provide the users an ability to interact easily with each other and perform other activities as well such as transfer of files from one system to another over the Internet. These mediums allow communications to take place in a cost effective manner and with non-stop availability and accessibility as well. However, there are a number of security and privacy issues that are associated with VOIP and Skype in the form of confidentiality threats, integrity threats and availability threats. These can be controlled and treats with the aid of a number of countermeasures that are now made available for the home as well as the business users. References Fontanini, P. (2016). VoIP Security. Brage.bibsys.no. Retrieved 11 September 2016, from https://brage.bibsys.no/xmlui/bitstream/handle/11250/143809/Fontanini_VOIP_Security.pdf?sequence=1 Hung, P. (2016). Through the looking glass: Security issues in VOIP applications. Retrieved 11 September 2016, from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.84.7089rep=rep1type=pdf Kulkarni, S. (2016). VoIP Cell Phones : Security concerns and Countermeasures. Retrieved 11 September 2016, from https://www.ijser.org/researchpaper%5CVoIP-Cell-Phones-Security-concerns-and-Countermeasures.pdf Lazzez, A. (2016). VoIP Technology: Security Issues Analysis. Retrieved 11 September 2016, from https://arxiv.org/ftp/arxiv/papers/1312/1312.2225.pdf Obidinnu, J. Ibor, A. (2016). A survey of Attacks on VoIP networks and Countermeasures. Ajol.info. Retrieved 11 September 2016, from https://www.ajol.info/index.php/wajiar/article/viewFile/128074/117625 Park, P. (2016). Threats Against Confidentiality VoIP Threat Taxonomy. Ciscopress.com. Retrieved 11 September 2016, from https://www.ciscopress.com/articles/article.asp?p=1245881seqNum=2 Shaidani, S. (2016). Attacks and Defenses Against Voice over IP (VoIP). Retrieved 11 September 2016, from https://www.cs.tufts.edu/comp/116/archive/fall2015/sshaidani.pdf Sonkar, S. (2016). A Review Paper: Security on Voice over Internet Protocol from Spoofing attacks. Retrieved 11 September 2016, from https://www.ijarcce.com/upload/may/A%20Review%20Paper%20Security%20on%20Voice%20over%20Internet%20Protocol%20from%20Spoofing%20attacks.pdf Vaishnav, C. (2016). Voice over Internet Protocol (VoIP): The Dynamics of Technology and Regulation. Retrieved 11 September 2016, from https://web.mit.edu/chintanv/www/Publications/MIT_TPP_Thesis_Chintan_Vaishnav_Final.pdf Xin, J. (2016). Security Issues and countermeasure for VoIP. Sans.org. Retrieved 11 September 2016, from https://www.sans.org/reading-room/whitepapers/voip/security-issues-countermeasure-voip-1701

Wednesday, December 4, 2019

Personal Journey Use of Social Media and a Memoir

Question: Dsicuss about thePersonal Journeyfor Use of Social Media and a Memoir. Answer: Introduction A memoir is a written statement of the memories or someones personal experience or story of life. Earlier a memoir was segmented as a part of autobiography or biography. It is also regarded as inexpensive digital publication of someones thoughts and stories. Here there has been analyzed an article written by Dani Shapiro, titled, A memoir is not a Status Update. The article focuses on the happening of any non-happening event and because of the increase social media usage the event is just taking as a memoir and people start commenting on the same instead of having an emotional touch or a conversation (Shapiro, 2014). Increased Use of Social Media and a Memoir An article has been published by Dan Shapiro which has been analyzed and evaluated thoroughly. In present time there are number of social media which are rising apparently as the present generation is highly connected to these social sites which connect people from different corners of the world. These include social sites such as Facebook, online dating sites, Snapchat, Pinterest etc. these social sites or pages are widely recognized in developing social connections across the world. Facebook is one such social media which is well recognized for sharing the general news, updates, photos and videos. People can explore the events, like and share the stuff. It is widely used as a business platform too (Kaplan and Haenlein, 2010). Snapchat is another social media which is used for sharing images basically. Its other uses are video sharing, calling, texting but presently it is not from the business point of view. Pinterest is one more innovative form of social media marketing. It is basically for sharing photos with a small caption. It is majorly for ecommerce purpose and worldwide connection through images. There are various other social media sites and pages which connect people such as twitter, Google+ etc (Tuten and Solomon, 2014). People post their personal incidents, life stories, events over these sites and the individuals reply to those updates. But as per Shapiro and the views mentioned in article, states that as per him these memoirs should not be take as social updates. As per the author the greetings and condolence should not be restricted to the replies given over the updates whereas people should have sense of belonging and try to maintain the sagacity of the associations. The increasing usage of social media has turned the small issues, tragedies or sorrows of some people into art as these sides propagates the issue or the story and take it as a purpose of increasing publicity rather than showing concern and condolence. Thus Shapiro does not believe the comments or likes or reactions on these sites as genuine responses and emotional connections. There are few points and arguments provided by the author that can be supported and considered as agreed points such as the responses should not be restrained to the social media pages rather people should have equal association beside these sites and must try to maintain them and should not kept theses social media sites as the only connecting point. As well as the author is also very much correct that the small sorrows converts into a social issue or art which must not take place just to have public attention. There are also few arguments of the author which cannot be supported fully such as the memoirs are not completely a social update instead it can be said that in present scenario the memoir is regarded as a social update in the scenario where the writer itself has mentioned it in the form of a social information and must be analyzed depending upon the situation and the circumstance (Baym, 2013). Conclusion The essay concludes that today is the digital age where people are more likely to connect with each other through the social media sites rather than the substantial meetings and engagements. With the increased technology and digitalization the people are more concerned in showing their responses over these sites and social pages. But while analyzing the article of Shapiro it is very well understands that every memoir should not be considered as a social update and people must maintain their emotional bonds and connections other than theses sites. As well as these social media are a good source of marketing, performing business and maintaining associations worldwide and also has various positive outcomes but people should not limit them to these social media so that the significance of the emotional and substantial bonds do not get deteriorate and side-lined (Berthon, et al., 2012). References Baym, N. K. (2013). Data not seen: The uses and shortcomings of social media metrics.First Monday,18(10). Berthon, P. R., Pitt, L. F., Plangger, K., Shapiro, D. (2012). Marketing meets Web 2.0, social media, and creative consumers: Implications for international marketing strategy.Business horizons,55(3), 261-271. Egan, K. (2016). The Difference Between Facebook, Twitter, Linkedin, Google+, YouTube, Pinterest. Retrieved on: 18th October, 2016. Retrieved from: https://www.impactbnd.com/blog/the-difference-between-facebook-twitter-linkedin-google-youtube-pinterest Kaplan, A. M., Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media.Business horizons,53(1), 59-68. Shapiro, D. (2014). A memoir is not a status update. Retrieved on: 18th October, 2016. Retrieved from: https://www.newyorker.com/culture/cultural-comment/memoir-status-update Tuten, T. L., Solomon, M. R. (2014).Social media marketing. Sage.