.

Saturday, August 31, 2019

Advantages of mass media Essay

Mass media refers collectively to all the media technologies that are intended to reach a large audience via mass communication. There are various forms of mass media such as radio, television, movies, magazines, newspapers and the World Wide Web. Mass Media enjoys a very prominent role in our lives and thus, it is believed to influence our society. There are positive and negative effects of mass media on our society. This essay will discuss the advantages and disadvantages of mass media and state if the advantage or disadvantage outweighs the other. The first advantage of mass media is that it promotes democracy. Talk shows and debates that are conducted on the radio gives people chance to voice out their opinions and express their views of ideas about a particular issue. This use of radios makes it a â€Å"free market place of ideas† where people get informed of the multiple ideas that can be learned about a topic. Also this advantage of mass media allows arguments to be otherwise of the discussed perspective of an issue to voice out the contrasting feelings of people without the fear of being pointed to by the authorities if opinions are subjective. Moreover, free press keeps the government under constant monitoring and checks. It helps the general public to question issues that highlight policy failures, maladministration, scandals and corruptions and this makes mass media the voice of the disadvantaged. A long tradition of liberal theorists claimed that a free and independent press within a nation can play a vital rol e in the process of democratization by contributing towards the right of expression, thought and conscience, strengthening the responsiveness of government to all citizens and providing a pluralist platform of political expression for a multiplicity of groups. Thus, radio being an example shows the positive relationship between mass media and democracy. Read more: Advantages and Disadvantages of Mass Media Furthermore, mass media promotes health education. A way in which societies can grow is through good health and studies assert that media has a responsibility to help people live a healthy life. In Uganda, for instance, FM radios conducted programs where medical doctors were invited to a program  to talk about general or specific diseases, their causes, symptoms and how to avoid these diseases or where to seek treatment. Namely, Radio-Wa conducted a program, Meet The Doctor, on which a doctor from Lira Hospital appeared every Sunday from 5.00 pm and discussed popular medical issues, such as, current health problems of reproductive health diseases and sexually transmitted diseases, for about an hour. Through another research, it was found that radio listeners took active part in these kinds of programs and they were able to learn about many diseases that they were suffering from unknowingly. Majority of the listeners were able to cure their diseases. Thus, mass media assists people to keep informed about medical and health issues. In addition, mass media plays a very vital role in accounting for agricultural trade. Radio, one of the fastest forms of mass communication, has been used in communicating farm information to farmers for a long time and since then radio has been used as a mass communication for agricultural development. Rural communities need information on supply of input, early warning systems for drought and diseases, new technologies and market price and information about their competitors. Such information through mass media contributes to the expansion of agriculture. After looking at factor such as the continuing expansion of market oriented agriculture and the increasing complexity of input requirements, studies suggested that there is a need for a continues education of farmers and extensions and thus concluded that radios and television would be a good way to disseminate information to them. Another research showed that 58 % of the respondents regarded radio as the most effective channel fo r dissemination of agricultural information. Thus information about trade from mass media would likely result in benefiting the whole economy along side with the entrepreneurs of such trading businesses. On the other hand, mass media broadcasts negative information to teen agers, especially females, about sex related topics. Movies and televisions are two examples of sources from where teens absorb information about sex and sexuality. These sources give unrealistic images of the portrayed topics. A study shows that an average teen ager is exposed to approximately 14000  references of sex of which less than a percent of the references imply information about abstinence, birth control, pregnancy risks, and sexually transmitted diseases. In addition, mass media uses females as sex objects. In most music videos, females are approximately half the time dressed in clothes that expose their breast and rear ends. The sexual attractiveness of music videos and similar imaged mass media encourages teens as well as adults to expose themselves in public, inviting them to become victims of unethical crimes, such as, rape. Moreover, mass media depicts non realistic body images. This disadvantage of mass media depiction leads majority of the viewers toward unhealthy eating habits. Young people are getting encouraged by skinny models on the TV to lose weight and get their body into a sexy image. Researchers are claiming that males are becoming more insecure about their physical appearance as advertisements are painting images of idealistic well built muscular body. A study found that girls as young as eight years old are weight conscious and are on strict diets. Many other females smoke to keep their weight off and through research, it is found out that there is approximately 400% increase in eating disorder since 1970.Like females, boys also tend to smoking to lose weight. A survey by Teens Magazine reported that 27% of the females felt that media pressured them to have a perfect body and 69% of girls state that magazine models influence their thought of being slim and slender. Media’s role in po rtraying unrealistic images of body figures can lead to serious health problems and deadly diseases as attendants to media are evidently being influenced by the false images. In addition, mass media promotes gender and racial unfairness in a society. Women, through media, are treated in disrespectful manners and are referred by the use of unethical words, such as, â€Å"a whore† or â€Å"a slut†. These kinds of words can be heard over the radio and seen in movies and televisions, for instance, the use of the word â€Å"bitch† in reference to women can be seen in wrestling programs exposed young children to witness it without supervision. Advertisements also promote gender biasness as they mostly include women in a sexual way to sell product. A study on advertisements showed that males are only seen in 25% of the advertisements on scantily wears, for example,  underwear advertisements. The same study quoted that roughly 62% of white women were noticed in the same kind of advisements and the figure for black women was 53% only. Also, black women were mostly shown in animal prints and in predatory poses to highlight their powerlessness . Thus, mass media is openly bias towards the sexes and races of different kinds of people. Besides its other disadvantages, mass media is known to lead young children to aggressive violence. Media violence is harmful to kids because of their inability to differentiate between reality and fantasy. A study showed that by the age of 18, an average teen ager has viewed approximately 200000 acts of violence on television, ignoring other sources of mass media. These violent clips increase aggressiveness and anti social behavior in children and it also increases their thirst for violence in the real life. Hence children are traumatized by the violent images and as a result they end up committing violent acts themselves. In conclusion, it is clearly argued that mass media has both advantages and disadvantages. The issues that are discussed in this essay evidently suggest that the disadvantage of mass media outweighs the advantages yet some of the disadvantages of mass media can be avoided.

Friday, August 30, 2019

Macbeth †The Central Themes of the Play Essay

The central themes of the play are highlighted by the sinister statement made by the witches at the very beginning of the play, â€Å"Fair is foul, and foul is fair: Hover through the fog and filthy air.† The whole tone for the play is set as it is a drama about contradictory forces and ideas: light and darkness; good and evil; holy and unholy; loyalty and disloyalty; trust and mistrust; what is natural and unnatural; honesty and deception. The witches mention of Macbeth is significant because he is immediately associated with evil. Duncan decides to appoint Macbeth as the next Thane of Cawdor as the previous one was a traitor, he says, † No more that Thane of Cawdor shall deceive Our bosom interest. Go pronounce his present death, And with his former title greet Macbeth.† This is ironic as Macbeth has inherited the title of a traitor and the title leads to Duncans killing and ultimately Macbeths downfall. This is also a link to the fair is foul statement as Macbeth seems fair, noble and a good servant for the king but in the end he kills Duncan and is evil. Macbeth has the capacity to kill for both good and evil. Duncan realises that he can’t judge people by their appearances and that they can be deceptive, † There’s no art To find the minds construction in the face:† This is ironic as he about to make the same mistake with the next Thane of Cawdor, the fact that people can be deceptive is reflected by ‘fair is foul’ as people aren’t always what they seem. When Macbeth realises that one of the witches’ prophesies has come true Banquo says, † What! Can the devil speak true?† This is saying that the witches are the devil and evil but they have spoken the truth which is not expected, this mixes good and evil referring back to ‘fair is foul’ and one of the themes this statement explores. Macbeth is also immediately liked with evil as he echoes the witches, † So foul and fair a day I have not seen.† The witches have established their deliberate evil and their powerful presence in the play, Macbeth has become their victim, we can see this where he says † Upon the blasted heath you stop our way With such prophetic greeting? Speak, I charge you.† This shows that Macbeth is drawn into what they are saying and also indicates the witches power over him as they just vanish. Macbeths echo links him with the themes that these words explore, he uses ironic lines such as, â€Å"Win us with honest trifles, to betray’s In deepest consequence.† Macbeth is now liked with the themes such as honesty, betrayal and loyalty all explored by the ‘fair is foul, and foul is fair’ statement, Macbeth is gradually being drawn more and more towards evil by his own weaknesses. Macbeth and Lady Macbeth share a very close relationship which is based around trust and honesty. Macbeth is ambitious and Lady Macbeth is trying to help him achieve his ambition, † All that impedes thee from the golden round, Which fate and metaphysical aid doth seem To have thee crown’d withal.† This is ironic as although the wealth and power seems very attractive to them once they get it the trust, honesty and closeness they had is lost, this once links back to the ‘fair is foul’ theme. Lady Macbeth also tells Macbeth to be deceitful and disguise the truth, † Look at the time, bear welcome in your eye, Your hand, your toungue: look like the innocent flower But be the serpent under’t.† This shows that Macbeth looks innocent and fair but inside he is evil and foul. Duncan ironically praises Macbeths castle as pleasant and welcoming, † This castle hath a pleasant seat; the air Nimbly and sweetly recommends itself Unto our gentle senses.† This shows that ‘fair is foul’ as the castle looks pleasant from the outside but is evil within and is where Duncan is to be murdered. Duncan also praises Lady Macbeth as the noble, welcoming hostess; she is deceptive and puts on the false face of goodness to Duncan when really she is planning his murder, she says, † Your majesty loads our house: for those of old, and the late dignities heap’d up to them,† Macbeths ambition overpowers his conscience and morality with the help of Lady Macbeth and he commits the murder. Once they find out that Duncan has been murdered Macbeth again plays innocent and is not genuine, for example, † You are, and do not know’t: The spring, the head, the fountain of your blood Is stopp’d; the very source of it is stopp’d.† Macbeth conceals what he knows and pretends to be horrified by the murder in contrast to Macduff who is genuine, Macbeths language is over elaborate. The theme of natural and unnatural is created throughout the play, for example when the Old Man says, † T is unnatural, Even like the deed that’s done. On Tuesday last, A falcon, towering in her pride of place, Was by a mousing owl hawked at, and killed.† This means that nature has changed and become strange and unnatural and reflects the murder and unnaturalness of Duncans death. Macbeth holds a Banquet at which Banquo is supposed to be present but Macbeth has murdered him, this shows that ‘fair is foul’ as everything seems normal but it is not and the ghost of Banquo turns up to haunt Macbeth. When Macbeth goes to visit the witches again they are cunning and employ equivocation, juggling with words to disguise the truth and lull Macbeth into a false sense of security. This is shown where they say, † The power of man, for none of woman born Shall harm Macbeth.† This is making Macbeth feel safe without them lying as Macduff was cut from his mother when she was dead, the witches are deceiving him showing that ‘foul is fair’. When Macduff goes to ask Malcom to raise an army to fight Macbeth and bring order back to Scotland Malcom accuses himself of being evil and foul. He is cautious to make sure Macduff is not trying to leur him back to Macbeth, he says, † To make me hunger more, that I should forge Quarrels unjust against the good and loyal, Destroying them for wealth.† Malcom is appearing foul but is fair in contrast to Macbeth, Malcom believes in Maduffs integrity and decided to help him. Malcom also says, † The night is long that never find the day.† This means that every black, evil night comes to a good day, ‘foul is fair’. The contrasts become moral contrasts and Macbeth has lost everything, eventually goodness overpowers evil.

Thursday, August 29, 2019

The Illinois Supreme Courts Health Care Ruling Assignment

The Illinois Supreme Courts Health Care Ruling - Assignment Example Many retirees, especially those with many dependants cannot afford high-quality healthcare after retiring. The new reform in the constitution will be helpful to them. By implementing the changes, the government claims that it is fulfilling its obligation of protecting its citizens. It is the government’s obligation to protect the health and safety of its people. The state government officials also claim that the implementation of the new reforms may increase the government spending. However, it is a long-term solution to the problems facing the pension systems (Plume 1). Some people claim that the new reform will have more harm than benefits to the economy of the state (Job 1). They claim that the new pension system will increase the cost of living for citizens in Illinois. This is because the pension plan will increase pressure on the government budget. As result, the government will respond by increasing taxation that will, in turn, increase inflation rate. Others also claim that the new reforms do not effectively address the pension problems previously experienced by state workers. For instance, in the year 2012 retires complain of delayed pension. According to critics of the new ruling, including free healthcare in the pension system will only make the problem worse (Job 1). This is because the pension problem was caused by underfunding of the Illinois retirement system. They think that instead of including free healthcare in the system, the government should focus on improving the funds of the existing retirement system. In addition, they claim that the new system will lead to the increase in the monthly premiums of state workers in order to compensate for the free healthcare after retirement. Instead of protecting workers, the critics claim that the ruling will make their lives more difficult. This will worsen the premium issue that was facing the government the previous year (Olsen 1). The new court ruling is an effective way of protecting and improving the lives of retirees in the state.  Ã‚  

Wednesday, August 28, 2019

PARAPHRASE chapter 13 Essay Example | Topics and Well Written Essays - 1000 words

PARAPHRASE chapter 13 - Essay Example ties better than competitors perform, a firm is potentially able to create more value than its competitors do.  Frequently, strategic positions in a firm can be classified into two broad categories, namely a cost advantage or a differentiation advantage. Should a firm beat others in activities that breed superior differentiation or in activities that create reduced expenses, its strategic standing should correspond to these activities. A firm can conveniently outsource its value-added activities to other firms that can do such activities at a relatively lower cost. However, a firm should refrain from outsourcing activities which though can be performed cheaply by other firms would lead it to subject itself to considerable transactions costs and hold. Chandler holds the view that capital-intensive industries enjoy economies of scale. Industries that can produce in large quantities can achieve considerable reductions in costs. A crucial ingredient of a few firms that will control the market and be successful is if they continue producing throughout. The marketing department is charged with identifying markets, securing distribution and determining the price at which the firm can sell its increased output. There exists few natural sources of economies of scale in labor-intensive industries hence big firms have no intrinsic cost advantage over small firms. Where there are many firms and absent product differentiation, the market will be dominated by few opportunities for profits. A key function of the marketing department is to distinguish the firm’s products in the mind of the consumer.  The department turns out to be a central origin of value in the firm. Successful differentiation on the other hand is capable of turning the market monopolistically competitive or oligopolistic where image differentiation is immensely successful. Marketing steers this progression of market structure. An experience good refers to a product whose quality is only assessable after

Tuesday, August 27, 2019

The co-chaperones of heat shock proteins and disease Literature review

The co-chaperones of heat shock proteins and disease - Literature review Example From the accidental discovery of the HSPs, they continue to display important roles in the cell integrity. Research shows that the dysfunction of Mitochondrial in the skeletal muscles has been said to be important in a manner of T2DM. They do this by either reducing the ability to oxidize the fatty acids that lead to the accumulation of deleterious lipid species in the surrounding tissues such as the liver and the skeletal muscles and also by altering the cellular state of Redox. This mini-review will focus on defining and analyzing the functionalities of the heat shock proteins. The presence of environmental stress in a cell stops or slows its ability to carry out most of its functions. These features include transport processes, RNA, DNA and protein synthesis. The model of the stress response by the HSPs is usually an abrupt rise in the external temperature known as the heat shock. Ferruccio Ritossa did the discovery of the heat shock response in 1962; he discovered them when he noticed an enlargement in some of the special sections of the heat shock puffs made after a heat treatment of the flies [1]. It later came clear that the segments contained particular forms of proteins known as the heat shock proteins. These types of proteins are induced by a massive variety of impulses apart from the thermal shock in the cells of an organism. HSPs usually play an important part in preventing various diseases with a fast rising role in the field of clinical practice. The functions of the HSPs in usually essential for the homeostasis of all the living cells, and often become vital in diseases when our bodily cells have to keep up with a stressful environment. The advancement of our knowledge of the functions and the biochemistry of HSPs enable us to acquire more tools to give a mark to the patients. The advancements also make us to have close observations and improvements in the

Monday, August 26, 2019

History Essay Example | Topics and Well Written Essays - 250 words - 5

History - Essay Example At the core of the issue was their original demand for representation but not independence. The American leaders knew that the nation is destined for greater things than just being a colony. The economic atmosphere was likewise that of a new beginning; for the country was on the verge of becoming a great economic power herself due to its vast natural resources. The former British colonizers were exploiting American resources for export to its own colonies. The primary domestic concern of the newly-independent Americans was to preserve the nation so it will not fragment into small independent states. There were some frictions with the slave-holding Southern states such as the 3/5 clause which gave these Southerners a big political clout for every slave owned (Amar 17). Hyper-inflation was a big issue (Trask 1). Throughout much of Europe, the people there were overthrowing their own monarchies and tried to give back power to the people. The French Revolution, for example, tried to do t his by toppling their own king because their political structure was based on feudalism. The American framers of the constitution tried to imagine every political possibility that could happen in the distant future by integrating flexibility such as that by way of amendments. It also ensured checks and balances by making the three branches of government co-equal.

Sunday, August 25, 2019

Awnser A, B or C Research Paper Example | Topics and Well Written Essays - 2000 words - 1

Awnser A, B or C - Research Paper Example However, the need for controlling the unknown, for creating parameters through alteration so that the odds of a good life are increased deletes the potential for challenges and obstacles that stimulate creativity and innovation. In trying to control the future, in creating a life in which all elements of natural creation are subjected to human manipulation, the nature of human existence is greatly altered, inextricably detached from the surprises that enrich the nature of life. In genetically engineering children, the natural order of life becomes something that is defined by hubris, eliminating the potential for greatness that is born of adversity and ending the true existence of humanity. Francis Fukuyama puts forth arguments against the use of genetic engineering as a way to improve the human condition. He suggests that to use these forms of science to change the outcomes of life would be an inroad to changing the nature of humanity (Fukuyama). This argument clearly expresses the basic nature of scientific meddling in human development. The concept that humanity is vulnerable to the ways in which science has the capacity to change elements of life provides for a cascade of effects that can ultimately change perceptions, shift ideological beliefs, and push cultural construction towards a world in which little is left that has the basic elements of human life still held within it. When applied to the question of genetic engineering babies, the acceleration of these problems has the potential of changing the nature o human existence to a point where life is essentially changed. In choosing the attributes of a child from a menu of options so that parents have the belief that they can create the exact child that they want, human interaction and existence will fundamentally change in ways that will represent irrecoverable losses. One of the most powerful arguments for human genetic

Saturday, August 24, 2019

The Dismantling of White Supremacy in the United States Essay - 1

The Dismantling of White Supremacy in the United States - Essay Example The awakening of the African-American community enhanced in the 1930s due to the economic crisis of 1929, which gave the opportunity for blacks to join whites inviting social reforms. During the 1930s, the NAACP organized a fierce legal battle against discrimination including segregation in public education. The Second World War was the occasion of major changes in the national and racial politics as whites were made ​​more aware of the danger of racist ideas. At the beginning of the war, the threat of a march in Washington by blacks, forced President Roosevelt to issue an executive order prohibiting racial discrimination in defense industries and government. The first step was taken against segregation in the northern states after the Second World War (considering the war effort of African Americans in the military).Racial segregation was fought by peace and non- peace activists for the civil rights of African Americans from the end of the Second World War until the passage of the Civil Rights Act and the Voting Rights Act. The initiation was done by a lady named â€Å"Rosa Parks†. She became famous when on 1 December 1955, in the city of Montgomery, Alabama, she refused to obey bus driver who asked her to leave her seat to a white and go sit in the back of the bus. She was arrested by the police, convicted but appealed the judgment (this is the famous case of the bus). She just gave a decisive impetus to the civil rights movement that will reveal a new leader. Martin Luther, while unknown, was launching a campaign of protest and boycott against the bus company would last more than one year. Federal courts finally declared segregation in transport as illegal: this victory was gained through non-violence activism and support of white liberals. Martin Luther King was one of the greatest orators and politicians and became the spokesman of the African-American community in the U.S. Martin Luther King Jr. was born in Atlanta, United

Social networks Essay Example | Topics and Well Written Essays - 500 words

Social networks - Essay Example In addition, nowadays almost all the people make use of the Internet daily for different purposes; some of the common uses of the internet are given below: No doubt, the Internet is one of the most well-liked and modern subjects among a variety of research and studies carried out to determine the effects of the Internet. Keeping in mind the organizations’ continuously increasing interest in the Internet, many studies regarding business to customers and Internet shopping have been conducted to discover the major aspects which can have influence over buying behaviors and decisions made by the customers on the Internet. Some of the useful aspects can include the psychographic and demographic attributes of consumers and the quality of products or services. As discussed above, the majority of business organizations are at the present extensively making use of the internet to reach global markets. In this scenario, they create a page on Facebook, twitter or any other similar web site (also known as the social network web site). Basically, a social network website (Such as Facebook, Twitter or LinkedIn etc.) allows its users to make a profile using the services and tools provided by the web site, In this way they provide their personal information and interests uphold a list of friends and relatives and express their preferences for items like music, movies or books. On the other hand, the Web-based structure of social networks makes it ideal for use in a variety of forms that can take advantage of the users social and personal data. At the moment, these social networking sites (SNSs) have a great impact on the social life of many people, even more than millions of people that make use of these web sites directly. An organization can cre ate a page on any social network site such as Facebook. Hence, when a customer of that organization

Friday, August 23, 2019

The Cold War and U.S. Diplomacy Assignment Example | Topics and Well Written Essays - 1000 words

The Cold War and U.S. Diplomacy - Assignment Example This era of panic is termed as the Cold War. This paper is all about the famous President Truman and the declaration he made at this point in time. A situation that required US diplomatic efforts during President Truman’s time was when he tried to formulate a forum instead of the futile League of Nations. The new venture, United Nations Organization, aimed at dissolving the differences between nations without allowing them to lead to devastating wars. As the legacy of the League of Nations was criticized, the formation of a powerful and unbiased agency was a herculean task. Undoubtedly, its main intention was to gain a significant role for Americans in the international life, and he succeeded in its making to a great extent. However, there were a number of roadblocks amidst. The major barrier to the formation of the UN came from the Soviet Union as they were reluctant to join it. At this juncture, ( ac cited in American president: A reference resource),Truman managed to ensure their participation in the founding conference of United Nations Organization in San Francisco by sending a special emissary Harry Hopkins to Moscow. However, the San Francisco Conference ended in June 1945 after most of its participating nations, including the Soviet Union, signed the founding U.N. Charter. If Truman had not intervened with his diplomacy, the formation of UN would have been delayed (American president: A reference resource). The diplomatic doctrine that Mr. President followed was that United States would provide political, economic, and military service to all democratic nations which were under the threat of external or internal authoritarian forces. Evidently, the president indirectly mentioned the threat of communist countries especially from the Soviet Union to the democratic and capitalist countries in the Eastern Europe. He made this doctrine lucid in a speech delivered before the joint session of Congress on March 12, 1947. The immediate reason for this spe ech was the declaration by the British government that it would no longer help the Greek government in its civil war against the Greek communist party by providing military and economic assistance. In his speech, Truman urged the Congress to support the Greek government against the communists. For, the US believed that Soviet Union had been supporting the Greek communist party, and unfortunately if the communist party won the war, the Soviet Union would ultimately influence the policies of the Greek. America never wanted the communist party to flourish posing a threat to capitalism and imperialism. Truman (as cited in The Truman doctrine 1947) believed that proliferation of communist party will be a serious threat to the US; and as the relationship between the US and Soviet Union had been worsening, America viewed the Soviet intervention in Greek and Turkish affairs with suspicion. The withdrawal of Britain from providing assistance to Greece made the declaration of Truman’s diplomatic doctrine imminent. To many, Truman’s doctrine may seem wise political manipulation to keep U.S. rivals far off. But to some extent, it could put forth some effects on the US and other countries as well. One of the major demerits of the communist form of government that the world witnessed was that the rulers went totalitarians once they got into power.

Thursday, August 22, 2019

Athletics In MacGregors Sporting Landscape Essay Example for Free

Athletics In MacGregors Sporting Landscape Essay However, using tactics which corroborate teamwork and competitive factors which in theory will motivate students to strive and increase their participation levels. 1. 0 Introduction This report will provide a detailed analysis of the participation of athletics in Macgregor’s microcosm as the societal norm believe that the status quo is â€Å"uncool†, it is known that the position of Australia’s porting landscape is very weak as there is a lack of participation within Australia as a whole This can be answered by a simple formula created to find the reason why some sports have a lack in participation in mainstream society today, Figueroa’s framework, this formula is divided into Levels listed in the following Cultural, Structural, Institutional, interpersonal and individual levels, nonetheless, it Is concluded that it is up to the individual of whether they decide to participate in Athletics or not. 2. 0 Figueroa’s Framework The social factors that influence an individual’s decision to participate in Athletics may indirectly or directly impact them by shaping their values, attitudes and beliefs. Knowing this the individual may find themselves being subjective to the people and also the certain factors they face in society ranging from cultural differences to peers to themselves. Sociologist, Peter Figueroa, develop a framework that analyses the equity of social resources that can also be implemented into the participation of athletics. . 1 Individual Level It can be argued that when it comes to equity and access issues, the individual level is the most important. This is because, while all levels of Figueroa’s Framework can identify how equity and sporting opportunities are presented to an individual, in the end it is the individual’s choice that will determine his or her access and level of participation in physical education. Kiss, 2012) This level is specific to Macgregor’s sporting landscape as it highlights the lack of participation in students; nonetheless, these decisions about sport and physical activity are ultimately made by the individuals Genes, values, attitudes and personalities which are specific to each individual. 3. 0 Action plan In Macgregor’s deteriorating athletics program, the lack of participation in the carnivals can link to many reasons why they don’t compete in such events. Study shows that the majority of students would prefer to sit and chat with their friends instead of competing in athletics, however, to allow students to participate, an action plan was developed to; in theory create a more fun and enjoyable carnival thus increasing participation levels, using successful methods utilized in Australian sports such as Cricket, NRL, AFL, etc. The ideologies used within these sports can be integrated within the society of Macgregor’s microcosm shaping the status quo of Macgregor’s Athletics program in a more positive, enjoyable way. . 1 Justification of Action plan Throughout sporting history there are various techniques to strive for in order to have a successful carnival, the majority of successful sports share many similar techniques to better improve the participation of athletes in Australia such as making it more interactive for the audience thus improving their participation rates; for example, in tennis they implement a board that measures the speed of the serve for each game as well as the Olympics which show the world record for each event. nowing this; a supposed board that lists all the records of each event is shown publically pre-athletics carnival and during for students to observe and in theory become more motivated and strive to train and compete in the events believing they are able to break that record thus improving participation rates. Secondly, the appearance of famous sporting athletes have known to improve the participation of sports for example, NBA players frequently appear in many occasions of street basketball games as it obviously creates publicity, however, also improves the participation due to the fact that this allows the ‘average basketball fanatic’ who normally would watch their idol from the comfort of their own television, but in fact they are able to play side by side with their idol increasing their moral and motivation to play. This can also be implemented in the athletics carnival by having the famous athlete participate and motivate the students to join in and also create a slight sense of competition. Finally, it is a fact that Australians love to play team based sports as listed, AFL, Cricket, Football, NRL, Soccer, Basketball, Rugby League are in the top 10 Australian sports; this is 7 of the 10 sports that are shown. With this in mind, Students would be required to form groups of 3 and compete in the athletics carnival, with a twist; each event would hold a certain amount of points varying on the position the student places, 10points for 1st, 7points for 2nd, 5point for 3rd and participation will be worth 2 points. The team that scores the highest points will be rewarded with a prize, such as vouchers, etc. 4. 2 Links to survey results The action plan created was based on a census of the whole school to observe whether they would participate in athletics and their reasons to not. To justify the particular choices created in the action plan by showing the statistics which have guided the development as the spikes in the statistics assist in improving the participation by surveying the trend. The reason a record chart was implemented as it adds a competitive flair and students receive social rewards within the athletics carnival as 19% of students feel that there is no reward for students if they win the events, this will help students strive for the record instead of just trying to win. A massive 27% of students feel that they are not good enough for the athletics carnival and believe there is no point to participate and simply just socialize with their peers, with the appearance of a famous athlete; students would be motivated to part take in the events as the special guest can provide moral support and advice to improve their technique, etc. during the carnival as they can join in with the students. By creating team based events the 80% of students that prefer team sports are able to participate and at the same time fill the social void according to the 25% as they strive to motivate fellow teammates and allow each other perform better overall, also considering the 66% that would participate in the carnival if their peers were to join in. (Buckley, et al, 2013) 4. Links to research material including the individual level of the framework The research gathered of Figueroa’s framework on the individual level, it is realised that students values and beliefs are to strive for competition and rewards, as these factors have been fulfilled it will allow students to participate in a more enjoyable way, due to the fact that an individual’s values and beliefs reflect directly upon their parents, siblings and peers, however, it is proven that the individual learns to behave through the experience they have accumulated from mainly their peers, also the fact that students view the sports society in a ‘boring’ manner, they often assume they cannot socialise with their peers which majorly affect their participation rates. 5. 0 Conclusion

Wednesday, August 21, 2019

Ipsec implementation

Ipsec implementation There are many methods to IP Security. In the Microsofts Windows 2003 the server version, there are many such techniques and tweaks which are useful to help provide a secure base to the system. The operating system is very good in protecting the system from attacks which may be active attacks or in some cases passive attacks. The procedures for IPSec are placed properly into the system which helps it tackle such attacks. This is possible by providing a secure packet filter for packet transport and also using cryptography. This technology is very in high use for communication types like host to host, router to router, gateway to gateway, site to site and also in virtual private networks. Some other places for successful implementation are secure servers. The IPSec comes as a basic Group Policy controlled by Dos Prompt commands and it also has user interface with custom programs installed. The implementation of IPSec involves these steps: Overview of IPSec Deployment Determining Our Internet Protocol Security targets Preparing a Internet Protocol Security Policy Implementation of the designed policies Overview of IPSec Deployment: There are many techniques such as usage of cryptography and authentication software to secure the communication in a network. The connection may be between two parties or between a group of users. Security is to make sure that the communication is not broken, the communication is not intervened and the data is not altered. The Internet Protocol Security has some features which help running a secure transmission. IPSec has set procedures which help achieve these ends. Today there are many companies and it is getting harder day by day to ensure the security of such humungous networks with a heavy workload on the networks. It is also very hard to track any attacks on the network in millions and millions of request. Using firewalls to protect a network did work for some days but it has proved to be impractical as it has no proper rules to detect intrusions or attacks. The advent of IPSec is a leap in computer and network security. This protocol has a wide spectrum of features which are strong enough to contain such high volume of network requests and also handle intrusions. The Internet Protocol for Security is not a versatile detection protocol. It is capable of managing most of the policies to grant or reject, block and negotiate the traffic in a network. This can also be permitted to a specific set of addresses or in some cases protocol and also a different policy to each port. It is recommended that we use ICF (Internet Connection Firewall) when we are in need of a firewall which is capable of providing a network interface for very big networks. This is because the internet protocol for Security has a very strict and a very stern strategy which is based on static filtering based on IP addresses. But this is it is totally different in the case of the Internet Connection Firewall. The ICF has policies which has a set of filter for all the addresses which are capable of being accessed. The Internet Protocol for Security can be used when the restriction is only to a particular set of addresses or the communication between a group of computers. There are many ways to use IPSec in a network but the best way is bye using a directory with all the domains and also a GP when needed. Some areas of interest when implementing IPSecurity: The decision of where we must secure computers and how on our network which can be done by running a group of systems in a directory which is also called as the Active Directory Organisational Units or OUs. The next step is to determine the strength of the policies we assign. Determining Our Internet Protocol Security targets: The first step in deploying IPSec on our server or the network can be done properly by deciding which set of systems are in dire need of security. There are surely some places on the network which are in a need of higher security than the other sections. It is for sure that IPSec is capable of providing optimal security but the problems starts when the network slows down due to the excessive data to be processed and also a large number of systems for IPSec to follow and maintain. In some cases, there are systems which are not upgraded to be able to support the IPSecurity. Determining Your IPsec Needs In beginning of the protocol design procedure, proper planning should be done to make sure that our current network environment available for use. It is always helpful to have a set of the network topology with all of its hardware and software components. This procedure is of high importance mainly in the designing procedure. IPSecurity is highly vulnerable to a network topology. There are many network topologies in which IPSec is not well suited. Preparing a Internet Protocol Security Policy: As said earlier, there are many network topologies which are not suitable to the default structure of the IPSec policies. There is a need to develop a custom IPSec set of policies well suited for the current network. Some organisations can run their network with a small set of policies. But in companies with a very huge network, there are many policies which are to be implemented properly and also a stringent structure is to be maintained. Steps below shows how IP Sec policies work. Designing IPsec Policies There might be some cases where the company or the organisation is interested in implementing a policy which sets a secure communication between two specified computers. This can be done by restricting all traffic and adding exceptions which relates to these two systems. This method can be done vice versa. A network can be setup with policies to allow all requests and block specific ports or computers. To implement such exceptions, a thorough analysis of the network is clearly needed. Computer roles: Security for Data Transmission: Security needs are different from each and every data packet transmitted. The security policies are also very different. There are many levels in this instance. When considering encryption, there are many types such as AES, DE5, RSA and many more. RSA is the best encryption software available presently. These programs can be used to secure files on transmission, on a network or even in the system. Operating System Computers: IPSecurity is a very unique technique used to implement security in a network. There are many operating systems which are not so advanced to implement IPSec. There is no support for IPSec. But there are many operating systems which are capable of running IPSec in transport mode. Some other cases, the policies are stored locally which makes it easier to decide as the implementation doesnt take long enough. In some cases, IPSec policies are implemented through the Group Policy. General IPSec Policy Settings General IPSec policy settings must be specified whether we want the policy to provide packet filtering or end-to-end networks. IPSec Rules IPSec rules determine which traffic is affected by an IPSec policy and which actions take place when that type of traffic is encountered. Table6.5 describes the contents of IPSec rules that two computers use to establish a secure, authenticated channel. Specifies a named list of filters. Each filter in the filter list specifies the types of traffic to which the filter action is applied. Filters can be defined to match specific IP protocols, source and destination TCP and UDP ports, and source and destination IP addresses. The filter list name might include the version number, the last update time, and the administrative owner. Each computer discards the filter list name during policy processing. Filter action Specifies whether a packet is permitted, blocked, or secured. If packets are to be secured, specifies how they are secured. A list of security methods specifies the security protocol, cryptographic algorithm, and session key regeneration frequency. Request Security Authentication methods One or more authentication methods, which are specified in order of preference. Available options are KerberosV5, certificate, or preshared key. Specifies whether to use tunnel mode and, if so, the tunnels endpoint. Specifies whether the rule applies to LAN connections, remote access connections, or both. Assigning IPSec Policies: As a domain administrator, we can configure IPSec policies to meet the security requirements of a user, group, application, domain, site, or global enterprise from a domain controller. IPSec policy can also be implemented in a non-Windows2000-based domain environment by using local IPSec policies. Deploying Our IPSec Solution: After scoping our needs, building IPSec policies, and determining our strategy for assigning the policies to specific OUs, test the IPSec policies in a lab environment and conduct a pilot project before rolling them out for production use. To ensure that IPSec policy functions as expected and provides the appropriate level of security, test specific IPSec policy configurations on clients and servers in a lab environment, and then conduct pilot or beta tests in a limited operational environment before conducting a full-scale deployment. A Cryptographic Evaluation of IPsec: Even with all the serious critisisms that we have on IPsec, it is probably the best IP security protocol available at the moment. We have looked at other, functionally similar, protocols in the past (including PPTP [SM98, SM99]) in much the same manner as we have looked at IPsec. None of these protocols come anywhere near their target, but the others manage to miss the mark by a wider margin than IPsec. This difference is less significant from a security point of view; there are no points for getting security nearly right. From a marketing point of view, this is important. IPsec is the current best practice, no matter how badly that reects on our ability to create a good security standard. Our main criticism of IPsec is its complexity. IPsec contains too many options and too much exibility; there are often several ways of doing the same or similar things. This is a typical committee efiect. Committees are notorious for adding features, options, and additional exibility to satisfy various factions within the committee. As we all know, this additional complexity and bloat is seriously detrimental to a normal (functional) standard. However, it has a devastating efiect on a security standard. It is instructive to compare this to the approach taken by NIST for the development of AES [NIST97a, NIST97b]. Instead of a committee, NIST organized a contest. Several small groups each created their own proposal, and the process is limited to picking one of them. At the time of writing there has been one stage of elimination, and any one of the five remaining candidates will make a much better standard than any committee could ever have made. The Complexity Trap: Securitys worst enemy is complexity. Complexity of IPsec In our opinion, IPsec is too complex to be secure. The design obviously tries to support many difierent situations with difierent options. We feel very strongly that the resulting system is well beyond the level of complexity that can be analysed or properly implemented with current methodologies. Thus, no IPsec system will achieve the goal of providing a high level of security. IPsec has two modes of operation: transport mode and tunnel mode. There are two protocols: AH and ESP. AH provides authentication, ESP provides authentication, encryption, or both. This creates a lot of extra complexity: two machines that wish to authenticate a packet can use a total of four difierent modes: transport/AH, tunnel/AH, transport/ESP with NULL encryption, and tunnel/ESP with NULL encryption. The difierences between these options, both in functionality and performance, are minor. The documentation also makes it clear that under some circumstances it is envisioned to use two protocols: AH for the authentication and ESP for the encryption. Modes As far as we can determine, the functionality of tunnel mode is a superset of the functionality of transport mode. (From a network point of view, one can view tunnel mode as a special case of transport mode, but from a security point of view this is not the case.) The only advantage that we can see to transport mode is that it results in a somewhat smaller bandwidth overhead. However, the tunnel mode could be extended in a straightforward way with a specialized header-compression scheme that we will explain shortly. This would achieve virtually the same performance as transport mode without introducing an entirely new mode. We therefore recommend that transport mode be eliminated. Recommendation 1 Eliminate transport mode. Without any documented rationale, we do not know why IPsec has two modes. In our opinion it would require a very compelling argument to introduce a second major mode of operation. The extra cost of a second mode (in terms of added complexity and resulting loss of security) is huge, and it certainly should not be introduced without clearly documented reasons. Eliminating transport mode also eliminates the need to separate the machines on the network into the two categories of hosts and security gateways. The main distinction seems to be that security gateways may not use transport mode; without transport mode the distinction is no longer necessary. Protocols The functionality provided by the two protocols overlaps somewhat. AH provides authentication of the payload and the packet header, while ESP provides authentication and confidentiality of the payload. In transport mode, AH provides a stronger authentication than ESP can provide, as it also authenticates the IP header fields. One of the standard modes of operation would seem to be to use both AH and ESP in transport mode. In tunnel mode, ESP provides the same level of authentication (as the payload includes the original IP header), and AH is typically not combined with ESP [KA98c, section 4.5]. (Implementations are not required to support nested tunnels that would allow ESP and AH to both be used in tunnel mode.) One can question why the IP header fields are being authenticated at all. The authentication of the payload proves that it came from someone who knows the proper authentication key. That by itself should provide adequate information. The IP header fields are only used to get the data to the recipient, and should not afiect the interpretation of the packet. There might be a very good reason why the IP header fields need to be authenticated, but until somebody provides that reason the rationale remains unclear to us. The AH protocol [KA98a] authenticates the IP headers of the loour layers. This is a clear violation of the modularization of the protocol stack. It creates all kind of problems, as some header fields change in transit. As a result, the AH protocol needs to be aware of all data formats used at loour layers so that these mutable fields can be avoided. This is a very ugly construction, and one that will create more problems when future extensions to the IP protocol are made that create new fields that the AH protocol is not aware of. Also, as some header fields are not authenticated, the receiving application still cannot rely on the entire packet. To fully understand the authentication provided by AH, an application needs to take into account the same complex IP header parsing rules that AH uses. The complex definition of the functionality that AH provides can easily lead to security-relevant errors. The tunnel/ESP authentication avoids this problem, but uses more bandwidth. The extra bandwidth requirement can be reduced by a simple specialized compression scheme: for some suitably chosen set of IP header fields X, a single bit in the ESP header indicates whether the X fields in the inner IP header are identical to the corresponding fields in the outer header.2 The fields in question are then removed to reduce the payload size. This compression should be applied after computing the authentication but before any encryption. The authentication is thus still computed on the entire original packet. The receiver reconstitutes the original packet using the outer header fields, and verifies the authentication. A suitable choice of the set of header fields X allows tunnel/ESP to achieve virtually the same low message expansion as transport/AH. We conclude that eliminating transport mode allows the elimination of the AH protocol as well, without loss of functionality. We therefore recommend that the AH protocol be eliminated. IPSEC methodology using different operating systems: IPSEC is a framework for security that operates at the Network Layer by extending the IP packet header. This gives it the ability to encrypt any higher layer protocol, including TCP and UDP sessions, so it offers the greatest flexibility of all the existing TCP/IP cryptosystems. While conceptually simple, setting up IPSEC is much more complex that installing SSH, for example. IPSEC also has the disadvantage of requiring operating system support, since most O/S kernels dont allow direct manipulation of IP headers. Linux IPSEC support (the FreeS/WAN project), for example, isnt included in the standard kernel distribution for this reason, and has to be applied as an add-on. Furthermore, putting the cryptography in the kernel isolates it from the application, making it more difficult to code crypto-aware software. Using SSL, for example, simply requires linking a library into the application and allows the application to easily query what certificates have been used to authenticate a client. IPSEC defines a Security Association (SA) as its primitive means of protecting IP packets. An SA is defined by the packets destination IP address and a 32-bit Security Parameter Index (SPI), that functions somewhat like a TCP or UDP port number. SAs can operate in transport mode, where the IPSEC data field begins with upper level packet headers (usually TCP, UDP, or ICMP), or in tunnel mode, where the IPSEC data field begins with an entirely new IP packet header, ala RFC 2003. Furthermore, SAs can be encapsulated within SAs, forming SA bundles, allowing layered IPSEC protection. For example, one SA might protect all traffic through a gateway, while another SA would protect all traffic to a particular host. The packets finally routed across the network would be encapsulated in an SA bundle consisting of both SAs. A common use of IPSEC is the construction of a Virtual Private Network (VPN), where multiple segments of a private network are linked over a public network using encrypted tunnels. This allows applications on the private network to communicate securely without any local cryptographic support, since the VPN routers perform the encryption and decryption. IPSEC is well suited for this environment, more so than tunneling PPP over SSL or SSH, since it operates directly on the IP packets and preserves a one-to-one correspondence between packets inside and outside the network. In the case of tunneling PPP over an encrypted TCP connection, any packet loss in the public network would trigger a TCP retransmission, stalling the link until the packet was delivered. In particular, running Voice Over IP (VoIP) traffic through a TCP/PPP tunnel would largely defeat the RTP protocol used for VoIP; IPSEC is better suited in this case. IPsec Development for Linux: In the Linux IPv4 IPsec world, a lot of people use FreeS/WAN projects implementation. It consists of an inkernel IPsec processing part, Key Exchange daemon Pluto and some utility commands/scripts. To run Pluto with small changes on our IPsec kernel implementation and reduce impact for user who use FreeS/WAN implementation, we have decided to keep compatibility with FreeS/WANs IPsec programming interface between kernel and userland. For this, we use the same PF KEY interface which FreeS/WAN project extended. In kernel IPsec packet processing part, we developed AH, ESP, SAD and SPD from scratch. PF KEY interface PF KEY(v2), which is described in RFC2367, is key management API mainly for IPsec. PF KEY is used for handling the IPsec Security Association Database. Additionally we have to handle the IPsec Security Policy Database, but there is no standard for the IPsec Security Policy management API. In FreeS/WAN implementation, PF KEY interface is extended to manage the IPsec Security Policy Database. Our kernel 2.4 IPsec implementation also uses the same PF KEY interface as FreeS/WANs one. It is important to be able to run the FreeS/WANs userland application (e.g., Pluto) with small changes. Encryption and Authentication algorithm We provide HMAC-SHA1 and HMAC-MD5 for authentication, NULL, DES-CBC, 3DES-CBS and AES for encryption. We thought encryption and authentication algorithm is not only used by IPsec and there are many algorithms so that we consider encryption and authentication algorithm and those interface should have good modularity. We adopted cipher modules which provided by CryptoAPI Project. Security Association and Security Policy SA and SP themselves dont depend substantially on the IP version. FreeS/WAN project architecture depends on their special virtual network interface for IPsec because it might focus on IPv4 tunnel mode (Their implementation also provides IPv4 transport mode). Their SA, SP, SAD and SPD also depend on their special virtual network interface. We considered and decided it was not suit to IPv6 because the IPv6 stack needed the neighbor discovery and the auto address configuration in its basic specification. If we had implemented IPv6 IPsec stack with their architecture, we had to implement those basic specification in their special virtual network interface. Therefore we implemented our own SAD and SPD in order to handle both IPv4 and IPv6. To improve the system performance, Each database will be locked by smallest granularity. And in many cases we use the read lock. SA and SP are managed by the reference counter to prevent used SA from removing by accident. IPsec Packet Processing Output There are various packet output paths from the IP(v4/6) layer to the network driver layer in Linux kernel networking stack (TCP, UDP/ICMP, and NDP[10] for IPv6). The packets which may be applied IPsec will go through these paths. We had to add IPsec functionality for these output paths, e.g, in IPv6 ip6 xmit() for TCP, ip6 build xmit() for UDP/ICMP and ndisc send ns()/ndisc send rs() for neighbor discovery packets. Output process is as follows): check IPsec SP lookup the IPsec SA by the IPsec SP apply IPsec processing to the packet output the packet to the network driver layer To reduce SA searhing time, we link the SP and the found SA after lookup from the first time. Input At input, there is only path for IP packets. We added IPsec processing part in ip6 input finish. Input process is as follows: receive the packet lookup the IPsec SA by SPI(which resides in AH/ESP header) check integrity and decrypt check IPsec Policy. IPsec Tunnel mode We are using IPv6-over-IPv6(and IPv4-over-IPv4) virtual tunnel device to implement IPsec tunnel mode. This implementation can avoid to duplication code of encapsulation/ decapsulation outer IP header compairing with having these code in the IPsec processing part itself. The virtual tunnel device is not different from the normal IP-over-IP virtual tunnel device in Linux. 4 IPsec implementation for kernel 2.6 The most important difference between ours and them is SAD/SPD part. They thought the whole SPD/SAD mechanic should be flow cache based lookup system shared by IPv4 and IPv6. One month later, they introduced the new network architecture called XFRM to Linux kernel 2.5. At first their developing code lacked IPv6 IPsec only for IPv4 IPsec. In order to suport IPv6 IPsec, we have implemented IPv6 IPsec code based on XFRM (and discarded our original code). PF KEY interface The PF KEY interface of Linux kernel 2.6(and 2.5) is compatible with KAME[3] PF KEY interface. We can use setkey command for configuring SA and SP and Racoon for IKE. Additionally we can add IPsec Policy each socket via Netlink3. They have suported only IPv4 in their first code, we have added IPv6 support. Security Association and Security Policy On the XFRM architecture, IPsec SP, which is represented as xfrm policy structure, will be bound to the routing flow cache (and IPsec policy will point IPsec SA bundle) and IPsec SA, which is represented as xfrm state structure, is included in destination cache, dst entry structure. The chaining destination cache means IPsec SA bundle. IPsec Packet Processing Output The output part of the XFRM architecture is placed between the IP layer and the network driver layer. In general, non IPsec packet will be passed to the network driver layer by a single destination output function, which is resolved routing lookup. But IPsec packet will be need to apply some IPsec processing (e.g., encryption, hash). XFRM functions make a chain of destination output functions (We call Stackable Destination, as shown in Figure3). Each function match each IPsec processing (AH, ESP and IPcomp[11]). To be more specific, in order to pass a packet to the network driver layer we have to do as follows. lookup routing table to decide output function by ip6 route output lookup IPsec Security Policy lookup IPsec Security Association(s) suitable for IPsec Security Policy and create destination chain to apply IPsec, pass a packet to the destination chain Input The input part of the XFRM architecture is simpler than output. The XFRM input function is handled as same as upper layer protocols like TCP, UDP, etc. In IPv6, IPsec headers are defined as IPv6 extension header but IPsec input functions are handled as an upper layer protocol handler. As the result of introducing IPv6 IPsec input processing in Linux. kernel, inconsistencies existed between IPsec headers and other IPv6 extension headers. In order to resolve this, we moved to the other IPv6 extension header handler functions to upper layer protocol handler. In detail, we registered IPsec header (both AH and ESP) handler functions with upper layer protocol handler array inet6 protos. Incoming IPsec packet processing flow is as follows: process IP packet from IP header in sequence process IPsec part (check integrity and decrypt) if founded check IPsec Security Policy pass IP packet next handler IPsec Tunnel mode Linux kernel 2.6 IPsec tunnel mode doesnt use the virtual tunnel device to create tunnel. The IPsec stack builds the outer IP header during IPsec processing by itself. IPSec Best practices Best practices IPSEC in transport mode has some serious advantages over other solutions. Compared to other technologies, IPSEC is built into to the Linux kernel. In other words there is nodaemonrunning in the background. Better yet, IPSEC does not require port-forwarding; some people elect to useSSH, stunnel, and other technologies that rely onport forwarding. With IPSEC, you simply have to run a program and its configuration file. After running it,encryptionbetween hosts is mandatory. Connections will be refused if the other connection does not have the appropriate keys. Groups of computers can share the same key, and it can even be done on a per-port setting (for example securing VNC, etc). Downsides? IPSEC in transport mode does have a couple draw backs. In transport mode you cannot have any dynamic setups where the IP addresses change from time to time. In other words, IPSEC is usually insufficient for workstation environments or dynamically assigned networks. Also, if you want to do a per-port setup the configuration becomes harder. Security Implications A very astute user can use IPSEC to bypass firewalls and other security measures. Since IPSEC uses cryptography, information is passed between machines in encrypted format. If the keys are not known, there is no practical way to decrypt the information (it is virtual impossible due to the sheer amount of time it would take). Machine-to-Machine IPSEC installations should be considered as Virtual Private Networks (VPNs) for security considerations. Please check with yoursystem administrator, business policies, and laws and regulations of your locality in order to establish whether or not to institute IPSEC. Requirements ipsec-tools package static IP addresses for each machine Configuration file The configuration file, /etc/setkey.conf, contains the information about the IPSECpolicy. Below is a sampleconfiguration policy(i.e. dont implement this policy because it is insecure). These lines are the actual keys and the encryption that will be used. The first block has the keys that will be used for authentication. In this case, it is the hmac-md5algorithm. The second block contains the keys that will be used for privacy, and the method of encryption. In the example, AES-CBC will be used, which is probably stronger than should be required; the key that we will be using is 194bits, meaning that it is good enough for US Government Secret and below classifications. The final block includes the actual policy. This is where you can put port numbers and even define whether it will be TCP orUDP. Generating the keys The more random the key, the better. Obviously, the example above is insufficient to secure a network. The following command will generate a random key. While running this command, youll need to wiggle the mouse to make it run faster. Or, if you are using a terminal use/dev/urandom instead. dd if=/dev/random count=16 bs=1| xxd -ps Depending on the size of the key that you want, adjust the count (16 will produce a 128 bit key, 24 will produce a 196 bit key, and 32 will produce a 512 bit key) The size of the key is important. If you really paranoid or just haveCPUcycles to

Tuesday, August 20, 2019

Reimbursement Issues For Nurse Practitioner Health And Social Care Essay

Reimbursement Issues For Nurse Practitioner Health And Social Care Essay The Balanced Budget Act of 1997 was unquestionably a frontward step for advanced practice nurses (APNs).   Payment is remarkably allowed for all settings as long as no other provider fee or other facility fee was being paid in relationship to the assistance supplied by the APN.   The various constraints on settings for services provided by the advanced practice nurse were totally removed from the guidelines (Bardach, 2006). The regulations for reimbursement of APN services typically changes based on the category of setting. Within the office setting, the permissible reimbursement to nurse practitioners is only 85% of that of a physician. This same reimbursement is acceptable only if billed straight under the nurses name and provider number (Fishman, 2002). The decrease in conversion factor for Medicare for reimbursement has affected rural clinics. This paper will discuss some pressing issues regarding reimbursement for nurse practitioners. I. Crucial Areas for Reimbursement that Nursing Practitioners Should Know 1. An advance practice nurse (APN) should be responsible and aware of the reimbursement process. APN must have read the participation contracts involved. They must determine the following: Does the plan credentials the APN and assigned a provider number. What are the claim submission requirements?   It could be direct billing or billing which is conducted by a supervising physician. And what are the time frames for submission. Can appeal mechanisms for claims denial be conducted? What are the covered services? Is it reimbursement methodology capitation or fee for service, etc? 2. An APN must familiarize documentation requirements in order to support the Certified Performance Technologist or CPT. Last 2001, the Office of Inspector General had conducted reviews on nurse practitioner, clinical nurse specialist and assistants of physicians. This is to comply with the Health Care Financing Administration or HCFA rules and regulations. (Cooper, 2000) II. Understanding the Reimbursement Procedure In order to better understand the underlying reimbursement issues in nursing practitioner, we must first have a clear grasp on the reimbursement process itself. In 1965, two methods, the Medicare and Medicaid of Social Security Act were amended by the Congress. These two will be discussed thoroughly in the next sections of the paper. With the first method, Medicaid, 100% of the physician rate is reimbursed. This will only apply if the incident to criteria are met. The phrase incident to refers to the services provided by nursing practitioners where a physician is actually present, or available for consultation. In order to verify the presence of the attending physician, the patients contact, appointment schedule or a documentation of the medical records can be used. The local Medicare will give the nursing practitioner a unique identification number (UPIN) for his or her bills. For a direct reimbursement, a practitioner must undergo an application process conducted by the payer. With the second method, Medicare, the nursing practitioner receives 80% of the fee that is set by the practice. Or they also have the chance to receive 85% of the Medicare physician fee schedule. One disadvantage of this method is that it reimburses the lowest charge possible. Citing an example, a practitioners bill for his or her services is $120 and Medicare only allows $100, the practitioner will only reimburse $85, which is 85% of the Medicare allowable. (Rapsilver, 2000) II. General Issues There are various notable issues connected to the reimbursement for services provided by the APNs. They are expected to take possession and responsibility of the procedure on the reimbursement. The APNs should first begin with comprehending their involvement contracts with health care plans to ascertain the following items (Fishman, 2002): if the said health care plan will give credit to the nurse practitioner involved and will consequently assign a provider number, if there are any appeals procedures for denials of claims, if it is possible to review the comparison of fee for service versus the plans reimbursement methodology capitation, etc., if claims such as billing under the administering physicians name or direct billing ask for requirements to be submitted within a specific timeframe; and, if all specific services are covered On the secondary topic, nurse practitioners should become familiar with various requirements when it comes to documentation to sustain appropriate CPT coding. APNs should refer themselves to the HCFA rules and the Federal register for guidelines (Bardach, 2006).   The nurse practitioner should actively participate on internal audit of documentation to find out if their documentations support the CPT code billed. APNs should responsibly scrutinize an illustration of their assortments against their monthly charges. This guarantees that reimbursements are properly made according to contract and that no charges are being denied. (Kansas Nurse, 2008). III. Medicaid Reimbursement Process Issue The lack of consistent progress in the Medicaid hospital reimbursement processes has left the nurse practitioners confused and disappointed over the past few years. Progress towards simplifying the Medicaid reimbursement process has been slowed by the absence of relevant policies in hospital reimbursement, memberships, and the level of access for the members (Fishman, 2002). The lack of priority and actions from the leaders of healthcare to implement the policies for the Medicaid hospital reimbursement processes resulted to the decline in the productivity of the program and posed major setbacks for nurses. With the necessary improvements not being achieved, the government is left with nothing to use in integrating the needed reforms in the Medicaid hospital reimbursement processes. Suspended reforms for Medicaid hospital reimbursement processes reveal incoordination among various health departments which significantly affected Medicaid members. The adverse effects of the current economic crisis put local governments in a state of uncertainty whether to pursue plans of implementing the new Medicaid hospital reimbursement processes to handle the health needs of their residents (Farley, 2000). Over the past few years, the local governments have been limited with their actions to completely adopt the new Medicaid hospital reimbursement processes. In New York alone, residents that are not yet affiliated with Medicaid have reached a number of almost 4 million. New York, however, is still way ahead in terms of progress as compared to other states in America. Still, according to Bardach (2006), the majority of New York residents are completely dependent to the Medicaid program because: (1) Medicaid assists them in the access of health benefits; (2) Medicaid assists them by means of health insurance. Yet these Medicaid policies also led to New Yorks health issues due to the lack of coordination by the leaders. IV. Medicare Reimbursement Process Issue Many advanced practice nurses inaccurately presuppose that receiving an APN license eliminates all obstructions to getting reimbursements for all their services by the insurance companies.   The primary goal obviously is to achieve direct reimbursement, which basically means being able to bill in the APNs exact name and not that of the or under the physician.   This is because being billed under a doctors name austerely propagates the invisibility of the nurse practitioners (Fishman, 2002).    To accomplish this goal of straightforward reimbursement, advanced practice nurses have to be empanelled by a reimburse-er or have to get a provider status.   The methodology for Medicare had primarily implicated achieving a PIN or a Provider Identification Number, which has now transformed into the new NPI or the National Provider Identifier (NPI).   Ã‚   In reality, as an example, Medicare already was issuing PINs to advanced practice nurses in Illinois two years before the APN regulations for practice were written.   Comparatively, Medicaid in Illinois was also agreeable to directly reimburse advanced practice nurses even before Medicare (Bardach, 2006). The frequent misconception of many advanced practice nurses about Medicare is that if a contributor gets a Medicare number, he or she will be reimbursed mechanically by every other insurance corporation, including PPOs and HMOs.   That is very wrong since insurance companies create or develop their own precise policies.   It can then be said that what one company permits, another one might not (Fishman, 2002).    V. Private Insurance In the United States, there are many private insurance plans that exists. Due to this, the guidelines for advance practice nurses are highly variable. There are times that the plans include the nurse provider in the preferred provider network. But there are also times that the nurse provider is considered outside the preferred provider network. So in general, less coverage is then afforded for the services rendered by nurses. These phenomenal places burden on those who have minimal resources. The number of networks that seeks to include practitioners among their credential providers is increasing. When discussing about the reimbursement issues, the fact that advance practice nurses always receives less payment that physicians arises. Advance practice nurses have been taught how to provide high quality care which is equal to the care provided by physicians. Because of this, they should be paid an equitable fee for the services they have rendered. Efforts are now exerted in order to fix these inequities. (Lundy) VI. Why APNs Do Not Receive Equal Reimbursement The Medicare Payment Advisory Commission or MedPAC examined the payments differencials between the clinicians and physicians. Why does this two groups do not get equal reimbursements? The MedPAC conjured that there is actually no analytical foundation that can support this. So in order to answer this question, the Commission investigated if these two groups, physicians and non-physician providers produces the same products or different products. According to the Commission, the Medicare must set the service payment equal to the cost incurred in efficiently rendering the service. Whenever the physicians and clinicians have provided the same service, then the payment for the low cost provider must be applied for all service providers. In many cases, there are many distinguishable differences between the services rendered by physicians and clinicians. Citing an example, according to reimbursement data, clinicians who are not physicians demonstrates a less complex evaluation and management services than physicians. Other specializations and surgical services are not included in the scope of practice of certain clinicians. Adjustments and changes for these types of billing codes include differences in resource costs. Since the nature of billing codes is imprecise, the Center for Medicare and Medicaid Services were not able to distinguish the different categories of clinician who provide similar services. They have this assumption that physicians are much prepared to diagnose and treat patients that have severe illnesses. But, contrary to this, anecdotal reports stated that other clinician sometimes spend more times in checking and treating patients with severe illnesses or who are in critical conditions, which made the physicians to care for a greater number of patients with lower acuity. Whenever a physician and other clinician bill for the same service, it is very difficult to tell of the physician saw a more complex patient. Due to these uncertainties in comparing their services, the Commission is reluctant in altering the payment differential. And certain policies even on the same company might be allowed in one state but not in another state.   As point of the matter, if one company has three product lines such as HMO, fee-for-service or indemnity, and PPO, then it may also have three dissimilar guiding principles for nurse practitioners (Bardach, 2006).    Consecutively, to ultimately become a credentialed contributor for each insurance plan that patients are secured with, a nurse practitioner must then submit an application for provider category with each and every insurance company, including Medicare and Medicaid. From that discussion, every provider must be familiar with some fundamentals about Medicare. First and foremost, there is Medicare Part A, which actually covers skilled nursing home, hospital, and home health charges; and then there is Medicare Part B, which then envelops most outpatient services, the care patients in particular obtain from doctors offices (Fishman, 2002). When it comes to the incident to billing, the Commission decided to consider that services rendered by clinicians who are not physicians but billed as incident to must be paid 100% of the physician fee schedule. The Commission have stated that the incident care fee is predicated upon the care or service provided by the team, with the non-physician giving the direct patient care services and the physician taking responsibility to the over-all welfare of the patient. They concluded that the team approach to care provides value which warrants payment at the full rate. (Edmunds, 2002) V. Conclusion Reimbursement issues have become challenge to nursing practitioners. Among the critical areas that NP should know are the following: the reimbursement process, contracts and the documents required. They are expected to take possession and responsibility of the procedure on the reimbursement. The APNs should first begin with comprehending their involvement contracts with health care plans. Secondly, nurse practitioners should become familiar with various requirements when it comes to documentation to sustain appropriate CPT coding. APNs should responsibly scrutinize an illustration of their assortments against their monthly charges. VI. Preparing for Future APN Reimbursement Being part of the healthcare system, Advance Practice Nurses (APNs) continue to search for greater quality, effectiveness and effeciency in delivering care. Many organizations and institutions like Center for Medicare and Medicaid Services (CMS) are taking the lead in identifying and validating indicators of high quality health care aiming to streamline delivery of care and to reduce convulated health care costs. à ¢Ã¢â€š ¬Ã‚ ¢ Composite Measures a reimbursement coding category that is currently being validated to deliver quality measures which can lead to desired patient results for chosen chronic diseases or conditions. (Kennerly, 2007) Establishing these new standards are based on the assumptions that by using them will cause a consistent high quality of outcome for the majority of patients and there will a great decrease in health care cost. The CMS is currently focusing on reforming quality reimbursement sytems which can save money while rewarding those care providers for their quality performance. à ¢Ã¢â€š ¬Ã‚ ¢ Pay-for-Performance led to determining the importance of implementing a common set of clinical standards for medical care. This means a providers performance and reimbursement is now and in the future will depend on and be judge against a national standard for care rather that past provider;s performances. (Kennerly, 2007)

Monday, August 19, 2019

Using the Biological Approach to Explain Lottery Addiction in Children :: essays research papers fc

Using the Biological Approach to Explain Lottery Addiction in Children Britain is producing a generation of child gamblers hooked on the Lottery and fruit machines. Disturbing research by two eminent academics shows that hundreds of thousands of children-some as young as 11- are now addicted despite the supposed legal restrictions. The findings will fuel warnings from lottery critics that the country is storing up social problems and is likely to trigger pressure for a uniform age limit of 18 on all gambling." (Reproduced from AQA A specimen material.) In the A level examination you will be required to explain a target behaviour using any approach. The aim of this activity is to offer you, the candidate, the opportunity to express your true understanding of the approach by your ability to use it in a novel situation. How would you explain lottery addiction in terms of the biological approach? The currency of the biological explanation is brain activity or brain anatomy, nervous impulses and neurotransmitters, hormones, and various organs in the body. A possible explanation could be as follows: (a) Why are young people hooked on the lottery and fruit machines? A psychologist might use the biological approach to explain this behaviour. Such a psychologist would explain the behaviour in terms of brain activity and the action of the central and autonomic nervous systems. The psychologist might also mention hormones. An answer like this would attract relatively few marks as it does little more than sketch out the possible elements of a biological explanation and has not demonstrated a true understanding of the approach. In order to do this you really need to try to put together an explanation of the target behaviour. (a) An explanation of lottery addiction using the biological approach would focus on how biological systems can be used to explain and understand this behaviour. When an individual stands in front of a fruit machine the flashing lights are physiologically arousing, creating a sense of excitement and probably pleasure. Physiological arousal causes the body to produce certain hormones that prepare the person for fight or flight. We can also understand the individual's behaviour in terms of nervous impulses. The eyes watch the pictures on the fruit machine go round and send impulses to the brain where they are interpreted and further messages sent to the hands to press a button at an appropriate moment to stop the machine. In the A level examination you will be given an opportunity to evaluate one of your explanations so you can take the opportunity, as below, to indicate in what way the explanation offered in the first part of the question is lacking.

Sunday, August 18, 2019

Active Aggression in Boys and Passive Aggression in Girls Essay

Introduction In understanding moral and ethical development of individuals, we have been exposed to a vast amount of information enlightening us of the complex ways in which both males and females cognitively develop their moral and ethical values. Through this we have learned about the many gender differences in these values, which has raised the question of why males and females branch apart in this development, when the separation occurs, and if it is a result biological differences, or socialization. In studying violence, in particular, the two directions seem to lead further and further apart as most research shows that boys act more physically aggressive than girls. In fact, most books available on youth violence, and even studies done in the past, focus on the male population because that is where it seems to be most prevalent. "†¦Teenage girls are arrested far less frequently for serious violent crime than boys (a ratio of one to eight)" (Siegal & Senna, 1991, 56). Why does this dras tic form of aggression occur to an extreme in young males, and can the same epidemic be forming in young females? To answer this question information has been gathered and a questionnaire formed to assess peoples’ views on gender differences in aggression and what factors contribute to it. Gilligan and Garbarino: Opinions on Violence in Boys The first research that I encountered was James Gilligan’s M.D. book (1996) titled, "VIOLENCE." Gilligan separates the "epidemic" of violence into three areas; "The Pathology of Violence," "The ‘Germ Theory’ of Violence," and "The Epidemology of Violence." His research shows that people act violently as a means to attain, what to them is, justice. Gilligan found that most violent males, on an individua... ...intage Books. Magnarelli, M. (2001, August). Savior vs. snitch. Seventeen Magazine, (219-223). Music Olympus Home (2000). Eminem lyrics: I’m back. Retrieved November 17, 2001 from World Wide Web: http://www.musicolympus.com/eminem/marshall-mathers-lyrics.htm#i Paucke, B. (2001, August). Put the gun down. Seventeen Magazine, (138-141). Siegal, L. J., & Senna, J. J. (1991). Juvenile delinquency: Theory, practice, & law (4th ed.). St. Paul: West Publishing. Weiler, J. (1999). An overview of research on girls and violence. Choices Briefs. Retrieved November 17, 2001 from the Institute for Urban and Minority Education, Teachers College: http://iume.tc.Columbia.edu/choices/briefs/choices01.html Weiler, J. (1999). Girls and violence. Eric digest number 143. Retrieved November 17, 2001 from the World Wide Web: http://www.ed.gov/databases/ERIC_Digests/ed430069.html

Testosterones Effects on Biology and Behavior Essay -- Hormones Sexua

Testosterone's Effects on Biology and Behavior Introduction The study of the interaction between hormones and behavior is truly a complex one. It would be simple if it were true that hormones directly cause a behavior. We know the relationship between hormones and behaviors is reciprocal. Higher levels of hormones increase the probability of certain behaviors, and certain behaviors increase the probability of change in hormones. The Biosocial Model was developed to encompass the influences and relationships the social environment, biology, and behavior have with one another, and how they interact to influence one another. Biology affects the type of behavioral response that a person has to the social environment. At the same time, that behavioral response is influencing the physiological reaction the body has to that stimulus. That environmental stimulus induces those behaviors that cause our body’s internal biology to react. Therefore, anyone of the three variables, social environment, behavior, or biology, can cause a change in the others. When applying this model to behavioral endocrinology, the relationship between hormones, behavior, and the social environment is examined. It is important to study these relationships to try and determine to what extent each factor affects the other. How much does testosterone influence aggression, or risk behaviors such as smoking, sexual promiscuity, or alcohol abuse? As researchers become closer to finding these answers, they become closer to finding out how to treat and council people on these types of activities. In this study, several hypotheses are made about the hormone testosterone, and it’s relationships to biology, health and social behaviors. On average, te... ... Also testosterone collections would need to be done in both genders when subjects are not sexually stimulated, while sexually stimulated, such as while watching a sexual video, and after stimulation. In this way the relationship between testosterone and sexual behavior might better be understood. For a study of aggression/antisocial behavior subjects (male and female) should be given a questionnaire pertaining specifically to hostile and rebellious behaviors. Collection of testosterone samples should be taken when subjects are at a baseline (not exposed to stimulation), when faced with a situation that might warrant aggression, such as an argument, and collected after the situation has ended. These types of studies could better equip researchers with an understanding of these relationships, as well as the relationships testosterone has with other behaviors.

Saturday, August 17, 2019

Nursing Care Plan Essay

Client name: Mrs. Chan Age/ sex: 48/F Medical diagnosis: Fluid overload, decreased TK output and decreased Hb Assessment date: 25-11-2012 Diagnostic statement (PES): Excess fluid volume related to compromised regulatory mechanism secondary to end-stage renal failure as evidence by peripheral edema and patient’s weight gained from 69.8kg to 73.6kg within 4 days. Assessment Nursing Diagnosis Goals & Expected Outcomes Nursing Interventions Rationales Methods of Evaluation Subjective data: 1. The client claimed her weight started to gain quickly 2 weeks before admission. 2. The client reported of taut and shiny skin appeared on the limbs and face. 3. The client complained on decreasing urinary output 2 weeks before admission. 4. The client complained of increasing SOB and orthopnoea Objective data: 1. Pressing thumb for 5s into the limbs’ skin and removed quickly resulted in pitting and graded at +1. 2. The client’s weight gained from 69.8kg to 73.6kg from 25/11/2012 to 29/11/2012. 3. Reduced CAPD output was noted. 4. Shifting dullness on abdomen was noted. Dysfunctional health pattern: Nutrition and Metabolism Problem: Excess fluid volume Etiology:  related to compromised regulatory mechanism secondary to end-stage renal failure Defining characteristics/ Signs & symptoms : 1. Client’s weight gained from 69.8kg to 73.6kg within 4 days. 2. Peripheral edema graded at +1. Goals: The client will exhibit decreased edema on peripheral. Expected outcomes: 1. The client can regain fluid balance as evidenced by weight loss accessed by3/12/2012 2. The client will be able to verbalize the restricted amount of necessary dietary like sodium and fluid as prescribed by 3/12/2012. 3. The client will be able to demonstrate 1 method to access edema by 3/12/2012 4. The client will demonstrate 2 method to help reduce edema by 3/12/2012 1. Ongoing assessments a) Record 24hrs intake and output balance. b) Weigh at 0600 and 1800 daily 2. Therapeutic interventions a) Introduce the needs for low sodium diet and the lower the fluid intake less than 800ml b) Apply stockings while lying down and check extremities  frequently for adequate circulation. c) Advise the client to elevate her feet when sitting 3. Education for client and caregivers a) Plan ROM exercise for all extremities every 4h b) Teach pressing thumb for 5s into the skin and grading if appear in pitting. c) Educate the sign and syndromes of edema. d) Teach to avoid canned and frozen food and cook without salt and use spices to add flavour. 1a) Weight client daily can monitor trends to evaluate interventions.( Lewis& Sharon Mantik., 2011) b) Monitor IO chat can determine effect of treatment on kidney function( Lewis& Sharon Mantik., 2011) 2a) High-sodium intake leads to increase water retention(Carpenito, L. J., 2010) b) Compression stockings increase venous return and reduce venous pooling. (Carpenito, L. J., 2010) c) This prevent fluid accumulation in the lower extremities. (Gulamick & Myers, 2007) 3a) Contracting skeletal muscles increase lymph flow and reduce edema. (Carpenito, L. J., 2010) b&c) Client and caregiver can help monitor and control fluid overload ( Lewis& Sharon Mantik., 2011) d) Restrict the sodium intake can decrease the feeling of thirst to drink water. ( Gulamick & Myers, 2007) 1. Keep checking on the change of client’s weight. 2. Assess the client’s edema condition every day by pressing. 3. Ask the client to demonstrate the method for accessing and reducing edema. 4. Ask the client to record the menu eaten for checking the eating habits. 5. Ask the client to verbalize syndromes of edema.

Friday, August 16, 2019

Face Painting

Androgynous – a mixture of masculine and feminine traits. I believe that face paintings is an fun and androgynous activity. Until, a boy gets a face painting that’s generally associated with a girl. Maybe there’s a reason for it like: an older sibling of the opposite sex had one or he’s forever fascinated with the subject and that’s his way of expressing it. On the other hand, it is okay for a little girl to have a masculine face painting in society is understanding of that. I am understanding and knowledgeable f what negative things this portrays for young boys, but face paintings are just that, face paintings. One Friday evening, I took my daughter whose(5) and son (3) years old to her school carnival. The second activity they wanted to go to was face painting. My daughter chose a purple butterfly to be painted on her face and my son copied her. I permitted this, with androgyny. I figured his only copying his sister you that’s all. Well, wh en we walked to the another activity I noticed people (especially of my culture) looking at my son and then me. As I was standing in the line I started thinking about what my son’s dad would do. I could hear him saying, â€Å" You need to tell them to take that off , I don’t know why you let them put it on him. He’s not a girl. † Because he is the most important peer in my kids life other than me. I decided to do just that. Peer – a person who influences us by providing us with feedback, whether its positive or negative. Modeling – demonstrating or showing your same sex the behaviors that you want them to adopt. I never thought of my husband teaching our son to imitate his very own ways as odeling. Because I didn’t know the correct term for it. I knew what he was doing, duh. Any how, he would demonstrate how to go potty with our son, when I went to the store he would keep my son at home with him, and he also encourages him to come outside with him while he’s fixing on our cars or other things in the house. Back in the line for a face pain ting re-do. I channeled my son thoughts with the words of my husband. By letting him know that boys should get a spider man face painting instead of a butterfly. Channeling – directing your kids attention to what you think is appropriate for their sex. I realized more than ever before that my husband are using manipulative methods to raise our children. I am not upset with this at all because I understand his reasoning behind it all in that he has nothing but good intentions for them. My husband also allows my son to bob his head and fold his arms across his chest while my little girls tries to twist her hips when walking he tells her to stop! And says you don’t do that. Manipulative – having a different set of rules for boys verses girls.