Thursday, October 31, 2019

Marketing Techniques Essay Example | Topics and Well Written Essays - 750 words

Marketing Techniques - Essay Example Customers are attracted by luring with many free offers so that they will fall into the trap. By this the company can increase their market share and when they have considerably large customer base the company will remove the free offers given to the customer. This is a very common tactic used in business these days. The following are the Telephone services offered to customers. 2. Cell phones offered free with many months incoming free and hundreds of minutes free talk time with camera phone all the advanced features like blue tooth, wireless internet, giga bytes of storage, mega pixel camera and many more. Ice cream: No dought ice creams are the most sought after impulse buying eatable since invention and it continues to be. Ice creams are liked by people of all ages and irrespective of gender, cast creed nationality and. Customers are attracted to buy ice creams by offering many flavors and with large varieties of making. Though all ice creams sweet the way there are made and with what ingredients it is made makes it the most desirable delicacy. The latest way of attracting the customers is by offering diet ice cream, which has low calories and which can be eaten by even sugar patients. Tennis Shoes: It is well known that sports shoes need to be of high precision so that players can rely on them. What makes shoes differ is that for which sport they are used. For every sport the making of the shoes differ. Tennis shoes are made in a manner so that they can glide on the grass court giving the player the extra mile to access the ball from a far distance and at the same time it should hold the ground firmly giving the player that extra confidence. It is this feature, which is used to attract the customers by the company and at the same time pricing them with exorbitant rates. Global players like Adidas and Nike use high end engineering to manufacture sports shoes. Hair Saloons: The most interesting part about hair saloons is that it needs the minimum investment and the returns are very high. Hair Saloons offer the latest fashion and trends set by the fashion houses. They offer wide varieties of hair color, manicure, massage, facial, grooming required for even bridal make up and etc. It not only women who are now interested but also more men are showing interest in their personal grooming. This attention is being cashed by the boutiques and hair saloons. Hair saloons offer the costumers with the latest technologies in personal grooming. The astonishing part is that hair saloons charge exorbitantly for the services offered. Frozen Pizza: The segmentation used in frozen pizza is in four categories. Regular pizza, premium pizza, Gourmet pizza and the general fill-im up pizzas. The pizza giants offer with delicious toppings on the pizza to the customer, which lures the customers to grab one at the same time getting so many categories to choose with. They offer with many toppings if selected for five persons like family packs at fewer prices. Apart from this frozen pizza are also available as break fast pizzas and bite size snacks

Tuesday, October 29, 2019

Factors Involved in the Tanker Contract Essay Example for Free

Factors Involved in the Tanker Contract Essay Issues that relate to security are of key concern to all nations (Meyer, 2007). The national security and internal defense are some of the sectors that are allocated lump sums of resources in the budgetary allocation (Meyer, 2007). Such allocations are in line with the perceived importance that the area of defense has. The united states as a country is no stranger to conflict and is one of the country that has been involved in external conflict for long periods of time both in the 20th and 21st century (Meyer, 2007). The politics involved in the security are some of the most interesting and widely covered happenings in the US press. Financial power is seen to go in line with military power in that countries that have the financial ability tend to develop their military capabilities and the same can be said of countries that have military abilities. National security is an area of key concern and therefore there is lots of secrecy involved in its dealings (Meyer, 2007). The nature of the deals often require utmost confidentiality from the parties involved and therefore many transactions happen in well defined and approved channels. The military association are developed with time and may be extended to association in other areas since its better to develop good relations with persons with security details that could be detrimental to the country if leaked (Meyer, 2007). The military world has been developing with technological improvements and the military equipments currently being used are characterized by more accuracy and considerable throughput (Verkuil, 2007). These two factors are but a few of the considerations in choosing a partner or a contractor that will help in developing certain aspects of the security system (Verkuil, 2007). It therefore does not come as a surprise that military procurement procedures and processes have considerable controversy since people have varied views on efficiency and security implications (Verkuil, 2007). This research paper analyses the issues involved in the airforce contract tender to build tankers between Boeing and Northrop Grumman with the aim of highlighting key issues involved in addressing security critical details. Background Boeing KC-767 is one of the military aerial refueling strategy that had been developed by Boeing 767-200 (CBS News, 2008). The tanker was designated KC-767 after it was selected by the US airforce to replace the KC-135s. However, in December of 2003, the contract was frozen after corruption allegation on the bidding process were forwarded. The development of the project is said to have cost Boeing over $ 1 Billion as the project was based on the assumption that the US airforce will be the chief consumer. Ever since the freezing of the project the Italian and the Chinese government have each ordered a number of these tankers. To address the KC-X competition the Boeing offered the 7627-200 Long range freighter which is based on the KC-767 (Online News Hour, 2008). However, the Department of defense selected KC-30 which was developed by Northrop Grumman (CBS News, 2008). The Boeing company on the 11th March 2008 submitted a protest on the decisions made by the airforce, the United States accountability office upheld their protests and in so doing the status of the KC-45A was placed in doubt and therefore the Boeing company was again in position to bid for the contract (CBS News, 2008). This was no to be since the US government in September 2008 terminated all bids on the KC-X (CBS News, 2008). In March 2002, the US airforce selected Boeings KC-767 on the grounds that it had clearly demonstrated the abilities to meet their requirements. The United States Airforce (USAF) in their acceptance statement brought out four points that they cited as being behind their decision (CBS News, 2008). The Boeings design was designated KC-767A and was included in DODs 2004 model designation report. Approximately 100 KC-767 tankers were leased from Boeing for the air refueling program. Even though the refueling program was in place in many countries in the US, many had questions about its effectiveness and cost implications especially the idea of leasing crafts which may never have any buyer once the lease period was over. This argument brought forward by senator McCain was however countered by the number of US allies who were more than willing to buy their used crafts (CBS News, 2008). The congressional budget office was next in line as they criticized the budget stressing on its fiscal irresponsibility (United States Government Accountability Office, 2008). This led to the striking of a deal where the state would buy 80 KC-767 and lease twenty (United States Government Accountability Office, 2008). However, in December of 2003, the pentagon announced that the project had to be frozen due to a corruption allegation brought against one of its former staffer (CBS News, 2008). Furthermore, documentations that proved that the A330 based tankers were more suited to the task specifications of the airforce were more cost effective relative to Boeing tankers were found (CBS News, 2008). The scandal led to the sentencing of the culprit who pleaded guilty to corruptions and led to the resignation of Boeings CEO. Donald Rumsfeld in 2006 announced the cancellation of the KC-767A leases as a measure aimed at cutting the costs and a redefinition of the USAF mission (United States Government Accountability Office, 2008). The defense secretary further stated that the move will not in any way affects the mission of the KC-767A as the upgrade of the KC-135s fleets will help in moving towards the goals (United States Government Accountability Office, 2008). However, the development did no affect the relationships between Boeing and its other customers. The development were however short lived and Boeing and Northrop were soon back in the ring fighting for a big defense contract. The basis of Boeings arguments was that the KC-30 was more versatile and had a large furl capacity than the KC-135 that were being used by the airforce. The KC-135 was developed by Boeing who were bidding for an airforce contract against their nemesis Northrop Grumman . The latter won this round of battle as the departments of defense announced that it has won the tender to procure 179 new KC-45A tankers (Online News Hour, 2008). The Boeing company almost immediately took to the Government Accountability Office and filed a protests claiming the evaluation of its KC-30 was unfair (Online News Hour, 2008). Boeing further claimed that its refueling tanker could easily be reconverted to a passenger plane compared to Northrops version as shown in the Air forces post decision briefing. According to Boeings vice president they had more strengths than their competitors was all he heard from the post decision briefing. Boeings protests led to a review of the selection process by the accountability office which forced Northrop to freeze the project which it had already allocated $ 35 billion (Online News Hour, 2008). Northrop Grumman executives are on the other hand highlighting the irresponsibility involved in freezing a critical project to the development of the military for expensive lobbying in the congress that will inevitably lead to a change of the decisions made by the airforce (Online News Hour, 2008). Northrop Grumman executives further claim the decision is ironic since they put their best efforts in ensuring that the airforce receives a products that they consider the best in consideration of the design (Online News Hour, 2008). They are pushing for the public knowledge of the facts of what they represents and what they are not. The congress was divided sharply on this issue and so was the general public. Boeing supporters claim that the Northrop Grumman design was a basic passenger airbus plane (Online News Hour, 2008). A Kansas congress man was cited claiming that the decisions made by the airforce was a bad one as the airforce as it has bend backwards to deal with a French company (Online News Hour, 2008). Boeings die hards near its main production facility claimed that it is the only true tanker manufacturers and a mistake had been made (Online News Hour, 2008). A Washington senator supported this point of view and claimed that offering a military contract to a foreign company was suicidal and would incapacitate Americas ability to develop their own fleet if they should ever pull out of the deal (Online News Hour, 2008). An Alabama state senators is of a different view and approached the subject from a resource allocations view point (Online News Hour, 2008). People near Northrop are bound to benefit more that those near the Boeing plants and therefore there senators have opinions that display their satisfaction or dissatisfaction with the resource allocations (Online News Hour, 2008). She further states that there have to be losers and winner either way (Online News Hour, 2008). The Boeing group further accuse the airforce of a change in parameter in order to accommodate the design put up by Northrop Grumman so as to ensure two bidders are present (Online News Hour, 2008). Even though many are of the view that the airforce was trying to lock out Boeing due to the scandals it previously had, Boeing executives were of the view that was not the case as the specifications that were asked by the airforce were changed considerably to ensure Northrop was in the race (Online News Hour, 2008). They further claim that the large sized tanker proposed by the Northrop was a liability and only countries not interested in their taxi ways would allow for such aircrafts. The Northrop group however counter this argument by stating that their design is more sophisticated and has advantages that are yet to be seen (Online News Hour, 2008). Issues Boeing is one of the worlds best known manufactures of aircrafts and so is Northrop Grumman who are the manufacturers of the airbus (Online News Hour, 2008). These are two top brands who are obviously competing in other areas of business and therefore any decision that involve them is bound to raise considerable heat. It should b noted that both are American companies though Northrop Grumman is partly owned by a French company. The nature of the contract which involves the security of America as a nation is a matter of national concern as it involves the development of structures that could ensure the growth of security systems. Boeing and Grumman being business structures, such a big contract will obviously attract the interest of stakeholders from both sides. There are a number of key issues that have been brought out by the airforce contracts which include: i. Politics Military contracts are a matter of public concern since it is in place to protect the public, the resources used in the military contracts are derived from taxpayers and therefore the failure of such projects will be a waste of taxpayers money (Meyer, 2007). When McCain questioned the cost effectiveness in leasing planes that would otherwise have no values when their lease period was over his motive as the senator of Alabama was to ensure that the taxpayers money is channeled to useful projects. Furthermore, it is quite clear that the politicians have the ability to shoot down potentially useful deals due to what Northrop Grumman executives refer to as expensive lobbying. Politics is not always objective for there are situations where the stakes involved are shielded from the public and though the politics and viewpoints will be developed to suit the public, the real reasons are often personal (Meyer, 2007). The inclusion of politics in such cases therefore has both advantages and disadvantages and should be weighed carefully. Military procurement just like any other public procurement scheme is prone to corruption, this was the case in the original contract that was brought to an end by Rumsfeld in 2006. Moreover, the big money involved in military procurement processes act as a natural catalysts for corruption, therefore there is need to come up with a robust self regulated systems that will ensure that such unethical practices are not in anyway included in the procurement process, the congress thus comes into the picture (Meyer, 2007). However, the political system is not known for its objectivity. In the cases, some of the reasons brought out against Northrop Grumman are flimsy and lack in objectivity. The fact that there will be lobbying is a clear sign that there will be loss in objectivity thus the decision will tend to favor groups that are be able to garner enough political support in the congress. Furthermore, the political system is one of the most corrupt system there is and the rationale in placing such a system to guard against corruption is questionable. ii. Security Military procurement is a security critical matter (Meyer, 2007). The military is in place to ensure that the US is protected against its external enemies (Meyer, 2007). The seriousness with which the equipment tendering process is treated and the keen eye that the media watches the unfolding of such events relay the importance placed on the military by the American people. The US is traditionally a fighting nation and the effectiveness of its military and equipments is one of the factors that has cemented its place as a world power. Military activities require high levels of secrecy (Meyer, 2007). There is need to come up with effective equipments that can be used in varied situations. It should be noted that the arguments brought forward by the executives from both sides are centered around the superiority of their products or the weaknesses of their opposite. The need for accuracy and well developed products that have the required reputation are some of the considerations that led to the two big companies making it to the final stage. The two companies are multinationals that have developed their brands all over the globe. It is noteworthy that when the US defense secretary cancels Boeings leases other nations still seek their products and are continues seeking the products that have been labeled cost ineffective due to the reputation associated with their brand name. The importance of the security system is seen in the number of avenues and legislative systems that have been put in place to ensure that the process is done in a just manner (Krishnan, 2008). When the airforce declares that Northrop Grumman had won the bid for the airforce tankers, Boeing seeks redress through a different avenue: Public accountability office. The office looks at their complaints and decides to freeze the process. It should be noted that it was the same office that had early in the decades frozen a billion dollar Boeing contract due to corruption charges. Even though there are systems put in place to ensure proper procedures in procurement of services and services, they can be outdone easily (Krishnan, 2008). The corruption allegations made in the initial Boeing contracts are a clear case where the protocols were overridden and it only came to realization a couple of months after the contracts had been signed. Furthermore, the fact that is was later found out that a different design could meet the specifications made by the airforce with reduced costs clearly show that even though the guidelines are put in place they are rarely followed thus the need for a system or authority that will follow up on the recommendations and processes to ensure that they conform to the laid out guidelines. Some politicians have argued that the French affiliation of the airbus manufacturer is in itself a security risk and therefore a purely American company should be contracted. However, such a contracting systems will obviously lock out other capable companies and therefore bring about questions on the integrity of the bidding process. America has prided itself as being a liberalized nation, putting up measures that will lock out other qualified members on the basis of the compositions of its investors is contrary to the spirit of liberalization. Furthermore, being involved with a company that has partnered with a success story in Europe shields the tanker project from American economic downtimes though it effectively ensures that the project is affected by the happening in Europe. It is unrealistic to lobby for Boeing on the basis of confidentiality; a company that has already shown traces of corruption cannot be trusted and neither can a company that is yet to prove its worth in the military sector. Therefore, system should be put in place to ensure that the projects are monitored and compared to some given standards if either is to be awarded the contract. iii. Stability The US is the father of capitalism and is therefore a country that is characterized by intense competition between industry players who will always be on the look for additional finances that will ensure their development into the future (Verkuil, 2007). On the day it was reported that Northrop Grumman had won the military contracts its share prices rose by over 20 cents and Boeings shares fell by a couple of cents (CBS News, 2008). Note, the development in the contract procurement were being watched by investors who will then make their decisions on which company to invest in. Even though the large money involved in the transactions may be enough to lure investors into channeling their resources to a particular company, the reputation involved in being a company contracted with one of the worlds best airforce to develop its aircraft tankers is enough to cause significant changes in the companys share index. Being a capitalistic economy where entities gain at the expense of others, Boeing is bound to feel the pinch. The situation is made worse by the consideration that Boeing has a well developed reputation and therefore failure to win a contract from a partner that it has associated with for a long time may be taken by the investors and its consumers in the wrong light. It may imply that the partner does not trust its capacity to develop superiors products or has doubts on its potential to remain productive. To bring the idea of reputation into perspective, many are of the notion that the corruptions charges brought against Boeing may have affected its chances of successfully bidding for the contract (Verkuil, 2007). This holds considerable weight in that the military is not all about facilities but also reputation. The American people and its enemies will always keep a keen eye on the military and any transactions conducted with a partner who is proved to be corrupt will dent on its integrity thus its reputation. Conclusion Awarding a contract to a company to deliver services that are of public interest is a complex process and will always involve the media and many other systems that have been put in place to ensure the safety of the public. Individual good and interest will always be central in the arguments brought forward by most people, this is more pronounced if the contract will significantly affect many people. It is therefore upon the government and the social systems to ensure that the systems put in place to ensure effectiveness of the bidding process are functioning properly and are robust enough to deal with the dynamism associated with such processes. If need be, changes must be instituted to ensure that the system are functioning. The products delivered must measure up to some predetermined standards to ensure quality and accountability. These measures and other quality management measures if well integrated into the bidding and implementation of contracts that are of public interest will ensure that the public benefits in the best possible way. Word Count: 3271 Reference List CBS News (2008). Boeing Spurned On Huge Air Force Contract. Retrieved 13 October 2008 from http://www. cbsnews. com/stories/2008/02/29/business/main3894669. shtml? source=RSSattr=Business_3894669 Krishnan, A. (2008). War as Business: Technological Change and Military Service Contracting. Aldershot: Ashgate Publishing, Ltd. Meyer, J. (2007). Working in a War Zone: Military Contractors. New York: The Rosen Publishing Group. Online News Hour (2008). Boeing, Northrop Grumman Clash Over Tanker Contract. Retrieved 13 October 2008 from http://www. pbs. org/newshour/bb/military/jan-june08/tanker_05-06. html. United States Government Accountability Office (2008). Statement Regarding the Bid Protest Decision Resolving the Aerial Refueling Tanker Protest by The Boeing Company. Retrieved 13 October 2008 from http://www. governmentexecutive. com/pdfs/061808cd1. pdf Verkuil, R. (2007). Outsourcing Sovereignty: Why Privatization of Government Functions Threatens Democracy and what We Can Do about it. New York: Cambridge University Press.

Sunday, October 27, 2019

Security Issues Associated With Mobile Commerce Information Technology Essay

Security Issues Associated With Mobile Commerce Information Technology Essay The report investigates the current state of the Mobile-commerce based on its security and examines the predicted future developments of the system. A brief background of the M-commerce and its applications is initially outlined. The discussion will then focus on the security issues and solutions based on the five security objectives (standards): Confidentiality, Authentication, Authorisation, Integrity and Non-repudiation. The applications of these security standards will then be applied on two M-commerce applications, both involving mobile transaction: Mobile-Payment and Mobile-Banking. It is concluded that further technological development in M-commerce system will be required, in order to improve the quality of service and ensure the user that such a system is safe to use. Nestor Mfuamba Introduction The term M-commerce (mobile-commerce) derives from E-commerce (e-commerce) which denotes business transactions over the internet. The transactions could be buying and selling goods/services by accessing the internet. Both M-commerce and E-commerce are part of two districts business markets: B2B (Business to Business) and B2C (Business to Consumer), the two distinct from dealing with business for the first and dealing end consumer for the last. From these business concepts, we can see that a B2B market, is more like E-commerce, where a business / user, accessing the internet for business transactions from an unstated devices. The technology used for this system could either be wireline (home PC, end user devices) or wireless (via mobile phones, PDAs, end user devices). In fact the term M-commerce, is all about a wireless E-commerce that is where a mobile device is used to access the internet for business transactions either in B2B or B2C markets. With the ubiquitous availability of mobile phones (other end user devices), M-commerce services have a promising future, especially in the B2C market. Future development applications include buying over the phone, purchase and redemption of tickets and reward schemes, travel and weather information, and writing contracts on the move. However, the success of M-commerce today, very much depends on the security of the underlying technologies. For example, credit card charges for transactions on the internet are 15%, versus 1% for POS (Point-of-Sales) credit card transactions. The chargeback rates grow to 30% digital product are sold. For M-commerce to take off, fraud rates have to be reduced to an acceptable level. As much security can be regarded as an enabling factor for the success of M-commerce applications. In this report, I discuss the security issues associated with M-commerce and their solutions based on two existing M-commerce applications, namely: Mobile Payment Systems: business transactions on the internet require the payments of either goods or services. M-payment systems have different requirements and characteristics than E-payment systems (electronic-payment). Mobile-Banking Systems: types of execution of financial services in the course of which within an electronic procedure the consumer uses mobile communication techniques in conjunction with mobile devices for banking transactions. M-commerce Definition The term m-commerce can be defined in many ways. From own experience and research, m-commerce is just an electronic commerce system that is accessed from mobile phones. Both e-commerce and m-commerce are B2C (Business to Consumer) systems. According to the OECD (Organisation for Economic Co-operation Development), e-commerce follows two criteria that are: Automation of transaction Spatial separation of transactions and delivery By definition m-commerce is a business commerce system using mobile device for business transactions performed over a mobile telecommunication network, possibly involving the transfer of money. Based on research done by Kalkota Ravi and Robinson Maria, they have actually divided m-commerce into five descriptive phases: Messaging m-commerce (SMS)-based m-commerce) Info connectivity m-commerce (web based m-commerce) Transactions m-commerce (strategy for organisations in order to evolve revenue generating mcommerce) Transformation m-commerce (m-commerce is interconnected and implemented into business processes within and between organisations) Infusion -m-commerce (and m-commerce is a normal way to do business this means a culture change from one, in which technology is occasionally handed over to the other one where technology is an accepted part) Technology and Applications The technology of M-commerce is built on several key technologies. They distinguish by their common uses. Mobile phones have developed gradually, making significant changes to their standards, starting from the first generation (analogue phones) to the third generation (3G): first-generation or analogue phones good for voice calls second-generation phones use digital technology and are typical of the average phone in use today 2.5G digital phones support the transmission of data using general packet radio service (GPRS) third generation (3G) digital phones support voice and data transmission at greatly increased speeds 3G supports services that were not possible with earlier technologies: video calls can be made and received from other 3G users video and other types of media can be downloaded to play on your phone 3G phones often have cameras, so you can take and transmit digital pictures location-based services can be accessed in order to see a map of where you are, or find out the nearest garage, restaurant, bank, etc M-commerce developments are focused very strongly on the use of 3G phone technology. Wireless application protocol (WAP) enables mobile devices to browse the internet because the web browsers built into these devices support hypertext markup language (HTML) and extensible markup language (XML) the key languages used for internet content. WAP-enabled devices run microbrowsers. These are applications that suit the: small screen and small memory size of handheld devices low bandwidths that are a feature of wireless networks for handheld devices Another important m-commerce technology is short message service (SMS), also known as texting. This popular service allows short text messages of up to 160 characters to be sent from and to mobile devices at a low cost. This has a wide application in m-commerce technology. Improvements to the service, such as T9 predictive text to help you type faster, have helped to improve the service, and a number of enhancements such as enhanced messaging (EMS) led to multimedia messaging service (MMS) messaging. With an MMS-enabled phone, you can: take digital photographs and store photographs on the internet send and receive full color pictures add a text message to your picture send and receive voice clips purchase pictures and sounds from the internet have enhanced polyphonic ringtones Mobile Application Types Communications: E-mail Clients IM Clients Mobile Web and Internet Browsers News/Information Clients On-Device Portals (Java Portals) Social Network Clients Games: Puzzle/Strategy (e.g., Tetris, Sudoku, Mah-jong, Chess, Board Games) Cards/Casino (e.g., Solitaire, Blackjack, Roulette, Poker) Action/Adventure (e.g., Doom, Pirates of the Caribbean, Role-Playing Games) Sports (e.g., Football, Soccer, Tennis, Basketball, Racing, Boxing, Skiing) Leisure Sports (e.g., Bowling, Pool, Darts, Fishing, Air Hockey) Multimedia: Graphics/Image Viewers Presentation Viewers Video Players Audio Players Streaming Players (Audio/Video) Productivity: Calendars Calculators Diary Notepad/Memo/Word Processors Spreadsheets Directory Services (e.g., yellow pages) Banking/Finance Travel: City Guides Currency Converters Translators GPS/Maps Itineraries/Schedules Weather Mobile System Architecture The figure bellow shows the architecture of an m-commerce system: from the design, we can clearly see that a user/client access the web via an xml server connected to a database. Figure1. Proposed M-commerce system architecture Mobile devices The applications of M-commerce can be implemented on different kinds of end user devices other than only mobile phones: Mobile phones PDA (Personal Digital Assistant) Smart phone the smart phone combines mobile phone and PDA technology into one device Laptop Earpiece device such as Bluetooth (as part of a Personal Area Network) The choice of devices in M-commerce is mainly based on the device features, and network technology used for transmission, the last allows the bandwidth capacity to vary and influence the kind of services the end user is able to receive. In mobile phones, the technology differs from other end user devices by their ability to have internal smart cards that determine their memory capacities. Nowadays, three solutions exist: Single SIM widely used around the world and confidential user information is stored one smart card. Dual Chip, means two smart cards in one mobile phone, as one used for user authentication to the network operator as the other, is used for value-added services such as m-payment or digital signature. Dual Slot, this type of mobile phones, has a SIM card and card slot for fully-sized external smart card. This solutions consists on using different cards one after the other. e.g. POS and ATM terminals. M-commerce vs. E-commerce This part of the report doesnt compare the two business systems. However, present advantages and disadvantages of M-commerce system over and E-commerce system. As defined in part 1.1., M-commerce is subset of the E-commerce but using end user devices as transaction platforms. The following list summarises, the advantages: Accessibility accessibility is related to ubiquity and means that the end user is accessible anywhere at any time. Accessibility is probably the major advantage by comparison with E-commerce applications involving a wired end user device. Ubiquity the end user device is mobile, that is, the user can access M-commerce applications in real time at any place. Security depending on the specific end user device, the device offers a certain level of inherent security. For example, the SIM card commonly employed in mobile phones is a smart card that stores confidential user information, such as the users secret authentication key. As such, the mobile phone can be regarded as a smart card reader with smart card. Localisation a network operator can localise registered users by using a positioning systems, such as GPS, or via GSM or UMTS network technology, and offer location- dependent services. Those services include local information services about hotels, restaurants, and amenities, travel information, emergency calls, and mobile office facilities. Personalisation mobile devices are usually not shared between users. This makes it possible to adjust a mobile device to the users needs and wishes (starting with the mobile phone housing and ringtones). On the other hand, a mobile operator can offer personalised services to its users, depending on specified user characteristics (e.g. a user may prefer Italian food) and the users location (see above). Convenience the size and weight of mobile devices and their ubiquity and accessibility makes them an ideal tool for performing personal tasks. Along with these advantages, we also have disadvantages, the following list summarises, the facts: Mobile devices offer limited capabilities between mobile devices these capabilities vary so much that end user services will need to be customised accordingly. The heterogeneity of devices, operating systems, and network technologies is a challenge for a uniform end user platform. For this reason, standardisation bodies consisting of telecommunication companies, device manufacturers, and value-added service providers integrate their work (see Section 4.5). For example, many current mobile devices implement an IP stack to provide standard network connectivity. At the application level, the Java 2 Micro Edition (J2ME) offers a standardized application platform for heterogeneous devices. Mobile devices are more prone to theft and destruction. According to a government report, more than 700000 mobile phones are stolen in the UK each year [12]. Since mobile phones are highly personalised and contain confidential user information, they need to be protected according to the highest security standards. The communication over the air interface between mobile device and network introduces additional security threats (e.g. eavesdropping, winds etc †¦). Security Concept and Challenges The concept of security in M-commerce is the most important aspect of a business that a mobile-system should respond to. There is no need to implement, such system without securing its environment, especially where transactions involve monetary value. Different views from participants in an M-commerce scenario, percept, security and privacy as major factors for markets breakthrough of the according system. Moving from participants point of views, I have defined five security objectives / standards that a system should respond to: Confidentiality: ensure privacy, the content of the transaction cannot be viewed by unauthorised persons and enables encryption. Authentication: ensure that the content of the transaction originates from the presumed sender/partner. Integrity: ensure that the content of transaction is not modified during the delivery and cannot be altered at any time. The technique used is called digital signatures. Authorisation: ensure that anyone involved in the transaction must be recognize and verified in order to authorize/allow the transaction to take place. It is more like digital certificates. Non-repudiation: no-one should be able to claim that any transaction on his/her behalf was made without their knowledge. The concept of digital signatures is applied. This standards dont just apply to end user devices, but to the whole systems involving device users, network (e.g. WAP, WEP), financial and administrative institutions (e.g. banks, governments etc.). I have identified, few security challenges related to the system: The mobile device confidential user data on the mobile device as well as the device itself should be protected from unauthorised use. The security mechanisms employed here include user authentication (e.g. PIN or password authentication), secure storage of confidential data (e.g. SIM card in mobile phones) and security of the operating system. The radio interface access to a telecommunication network requires the protection of transmitted data in terms of confidentiality, integrity, and authenticity. In particular, the users personal data should be protected from eavesdropping. Different security mechanisms for different mobile network technologies (i.e. in 2G, 3G, and other systems) were explained in part 2.2 The network operator infrastructure security mechanisms for the end user often terminate in the access network. This raises questions regarding the security of the users data within and beyond the access network. Moreover, the user receives certain services for which he/she has to pay. This often involves the network operator and he/she will want to be assured about correct charging and billing. The kind of M-commerce application m-commerce applications, especially those involving payment, need to be secured to assure customers, merchants, and network operators. For example, in a payment scenario both sides will want to authenticate each other before committing to a payment. Also, the customer will want assurance about the delivery of goods or services. In addition to the authenticity, confidentiality and integrity of sent payment information, non-repudiation is important. Threats scenarios In this part, I am going to present major threats to security based on the M-commerce security standards and address ideal scenarios, observed during each methods. The following list shows the threats: Money thefts: as long as, m-commerce involves transaction, driven by monetary values. The system will always attract hackers, crackers and anyone with the knowledge of exploiting and abusing the system. They often set fake websites, in order to extract customers personal data, credit card details etc. Threats to the system: mobile devices are not spared from those deceptive methods of stealing information. Viruses, Trojans, Worms are often planted by individuals for reasons known best to them alone, in order to compromise the credibility of all m-commerce system. Threats observed during authentication: Observation: An adversary can download the client on a laptop/desktop and use its insecurities for malicious purposes. An adversary can obtain the user credentials stored on the mobile phone by transferring the contents to pc/laptop from the phone or memory card. An adversary can register with valid details of a valid bank account holder and access his/her account details or make transactions. An adversary can access user credentials directly from the phones folders or from phones memory card. An adversary can obtain the new PIN for transacting using the weak forgot password feature or an adversary can change the password/PIN of a valid user without authentication/authorization. An adversary can use the auto-complete feature to access a valid users account. An adversary can guess weak passwords/PIN to retrieve customer information. Ideal scenario: An adversary can download the client on laptop/desktop and use its insecurities for malicious purposes. An adversary can use the auto-complete feature to access a valid users account. The customer has to first register with the bank. Customer details like full name, postal address, e-mail address, bank account details and mobile phone number should be provided. The bank would inform the vendor to push the mobile client application to the mobile number provided by the customer. This can be done through a system which communicates between the server at vendor end and bank end. The vendor enters the mobile number of the customer and the client application is pushed to it. This ensures that the client is not downloaded to a pc or laptop and misused. In case the push is not possible, the customer has to be informed and the client application installed by the vendor. The application has to ensure that during installation a few checks are done Transfer the banks and vendors public key for encryption purposes. There can be two keys generated for the vendor; one for storage and one for data transmission. The client files/folders are installed on the phone and not in the memory card. The files and folders should be restricted from being transferred to a memory card or pc/laptop. The access to these files should only be through the executable and not directly. The installer should be removed after installation. Application should not allow auto-complete feature. Threats observed during transactions Observation: Based on the services provided to the customer the following threats can be observed: An adversary can sniff the contents of transaction and obtain confidential information. An adversary can bypass authentication controls. An adversary can make bogus shopping or purchase transactions for another valid customer. An adversary can view the account details of another user. An adversary can modify the from account and amount field during a fund transfer process. An adversary can predict the session id and perform transactions as a valid user. An adversary can access a valid account using an active session which has not been terminated after a long time of inactivity. An adversary can login using his credentials and view/modify the details of another valid customer. Illegal/Invalid transactions can be performed without continuous authentication process for each transaction. Ideal scenario An adversary can sniff the contents of transaction and obtain confidential information. All transactions should be through a secured connection. Data transmitted between the client application and the vendor server should be through HTTPS or another secured channel and also encrypted through the vendors transport public key. The data flowing back from vendor sever to the client should be through HTTPS or a secured channel. The data flowing between the vendor server and bank server should be through HTTPS. Also the customer details, which are not required by the vendor, should be encrypted using the banks public key. The return should be through HTTPS. Any data flowing between bank/vendor to other third parties or merchants like for mobile shopping should be through a secured payment gateway. An adversary can bypass authentication controls, Illegal/Invalid transactions can be performed without continuous authentication process for each transaction and view the account details of another user. Each transaction or operation should be authenticated either using a single layer or a dual layer. The vendor side application should authenticate the customer using the PIN for non-critical operations. Validation checks should be in place to ensure that this authentication control is not bypassed. For critical transactions, there can be dual authentication mechanism, one using the PIN at the vendor and other using the Internet banking ID at the bank side. Validation checks should be in place to ensure that this authentication control is not bypassed. An adversary can make bogus shopping or purchase transactions for another valid customer. An adversary can modify the from account and amount field during a fund transfer process. For example, in a fund transfer operation the bank should ask for the Internet banking credentials from the customer for authentication and verification. Also checks need to be in place to ensure that the from account field cannot be modified or the amount field is not negative. An adversary can predict the session id and perform transactions as a valid user. For example, an adversary can access a valid account using an active session which has not been terminated after a long time of inactivity and login using his credentials and view/modify the details of another valid customer.In mobile shopping operation, the payment should be through a secured payment gateway. Ideally, the vendor should not store the details of the shopping done by the customer. In case the vendor performs the payment for the customer for his/her purchases, then only the details need to be stored at the vendor. Then the customer authorizes the bank to transfer the amount to the vendors account for making the payment to the merchant for his/her item. Having a good session management mechanism ensures that attackers dont use a valid session id for login purposes. Also the application should ensure that users are not able to change the data and view another customers details. Other possible threats: An adversary can upload malicious files to the server/application. Ideally, a mobile banking scenario would not require a customer to upload files to the server. Hence the same can be disabled for customers. An adversary can obtain the confidential customer data and source code from the server. All customer data and application source code at the vendor server should be protected not only from the outside attackers, but from internal users/developers also. Malicious activities are undetected. Audit trails and logging need to be maintained for the application which mentions the customer name, bank details and transaction performed with time and date for future reference. An adversary can obtain the details of the server or error messages provide information for the adversary to perform specific attacks. The application should ensure no messages are provided to the outside world which would reveal information about the system. An adversary can obtain the vendor private key from the server to perform man-in-the-middle attacks. The private keys should be stored securely and access should only be given to the application to use the keys during any kind of operations. Security Technology This part of my report focuses on the network technologies, which are relevant to a secure M-commerce system. The security itself focuses on three aspects, studied in the IST SHAMAN project: M-commerce network security, Transport layer security and Service security. The IST SHAMAN has studied the security architecture of current and potential future mobile systems. Here, they are discussed: M-commerce Network Security GSM (General System for Mobile Communication): established in the early 1990s, the GSM is the first generation mobile phones and major device for M-commerce. The devices presented strong limitations with respect to their capabilities other than telephony. In term of data service, the dial-in data sessions over circuit switched connections were possible but relatively slow, at 9, 6 Kbits/s and required a separate device such a computer, which reduced its mobility. As the GSM core network extended, a number of data services where established such as: The Short Message Service (SMS) The Wireless Application Protocol (WAP) allowing internet access The High Speed Circuit Switched Data (HSCSD) providing higher data rates The General Packet Radio Service (GPRS) extends GSM with packet oriented services The figure, below shows an architecture of GSM, including GPRS, IN (Intelligent Network) and SMS. Figure 2: GSM Architecture What is the scenario in this architecture and what does the GSM provides as security features? The mobile station communicates over the wireless interface with a base transceiver station (BTS) which is part of a base station subsystem (BSS). The base station controller (BSC) is connected with a MSC (Mobile Switching Centre) and a SGSN (Serving GPRS Support Node). The latter two are the central switching components for circuit and packet switched data. When a customer subscribes, the GSM home network assigns the mobile station a unique identifier, the international mobile subscriber identity (IMSI), and an authentication key Ki. The IMSI and the secret authentication key Ki of the mobile station (MS) are stored in the SIM (subscriber identity module), which is assumed to be tamper proof. On the network side, the IMSI, Ki and other information are stored in the HLR (Home Location Register) and AuC (Authentication Centre). GSM provides the following security features for the link between the mobile station and the network: †¢ IMSI confidentiality †¢ IMSI authentication †¢ User data confidentiality on physical connections †¢ Connectionless user data confidentiality †¢ Signaling information element confidentiality In general, the security architecture of GSM, presents basic security mechanisms for M-commerce systems. The authentication towards the network, from a mobile customer is based on a secret ki that will derive to a symmetric key, used to encrypt the link between the mobile station and the BTS. The secret key ki is never sent over the network. From there, we can say that GSM presents two weaknesses, Authentication and Encryption as it is optional. UMTS (Universal Mobile Telecommunication System): the security architecture of UMTS is designed to fix the security weaknesses of GMS. In UMTS, authentication is mutual, and encryption is mandatory unless the mobile station and the network agree on an unciphered connection. In addition, integrity protection is always mandatory and protects against replay or modification of signaling messages. UMTS introduces new cipher algorithms and longer encryption keys. Thus, UMTS doesnt seem to have any security weaknesses. The architecture of this technology is depicted below: Figure 3  : UTRAN system WLAN (Wireless Local Area Network): The IEEE standard 802.11 specifies families of WLANs which operate in the unlicensed 2.4 GHz and 5 GHz band. The standards specify the physical layer (PHY) and the medium access control layer (MAC). When operated in the infrastructure mode, the mobile station attaches to an AP which provides connectivity to fixed net IP networks (e.g. the internet) or to other mobile stations. While, in the default mode, WLAN is not secured, this means: there is a possibility of an eavesdrop attack. In order to provide a measure of security, the IEEE and IETF, have defined the WEP (Wireless Equivalent Privacy) and the VPN (Virtual Privacy Network). WEP was designed to provide: Authentication to protect the association to an AP Integrity protection on MAC frames Confidentiality on MAC frames In comparison to other network technologies, the WEP is insecure. Based on its secret key, that serves as input for the RC4 stream cipher, the authentication and integrity protection is completely insecure and encryption at least partly insecure. There is a possibility for an attacker to intercept a single successful authentication transaction between a mobile station and the AP and be able to authenticate without knowing the secret keys. Furthermore, since a CRC checksum is used for integrity protection, an attacker can modify the data and adapt the checksum accordingly. For example, if the position of commercially sensitive information (e.g. an amount) within a datagram is known, the corresponding bits can be ex-ored with any value. With a large number of intercepted frames, the WEP keys can even be recovered, breaking the encryption. Furthermore, since the WEP keys are network keys, preserving their secrecy is difficult for private networks and impossible for public WLAN hotspots. In recent work of the IEEE Task group on security (TgI), the new security standard IEEE 802.1X has been adopted. 802.1X is a framework for authentication and key management which employs the Extensible Authentication Protocol for a variety of authentication mechanisms, e.g. certificate based TLS. But the weaknesses of WEP cannot be remedied by the new authentication and key management schemes in 802.1X. The IEEE is currently working towards a new standard (WEP2), and a number of proposals are in circulation. VPN: the technology is employ to particular IPsec, in order to establish network layer security. The IPsec protocol (or more specifically the ESP Tunnel protocol) is an internet s

Friday, October 25, 2019

What Dreams May Come Essay -- Film Movies Review Life After Death Essa

What Dreams May Come The movie What Dreams May Come gives a rather positive view on the afterlife. I think most of the ideas and views shown in the film are related to many of society's main beliefs pertaining to death and the afterlife, but the views are left broad enough so they can relate to any specific religion. Personally, I have no concrete belief concerning the afterlife, or whether or not if there even is life after death, but I can see why many people would agree with many of the films perspectives. The movie is shown through Robin Williams's character, Chris Nielson who's first personal encounter with death is when his two children, Marie and Ian both die in a car accident. Four years later he dies himself after being hit by a car. After the accident, he sees himself on the ground from an outside perspective. The next thing he knows, he is able to see himself lying in a hospital bed, and at the same time there is a very gentle voice talking to him asking him if he understands the things happen ing to him, but at this point Chris is still very confused. In an instant, Chris is at his own funeral where he begins to see his physical body appearing around him. According to the voice means he is finally understanding that he has passed on. He then wanders his house, and is reluctant to leave his distraught wife Annie. Next, a blurry figure appears, speaking with the same gentle voice. The figure comforts him and tells him it is time to leave and basically helps him grasp his death and travel to the next world. Afterwards, Chris is willing to leave, and he suddenly finds himself running down a dark tunnel towards a light, and then he appears in a colorful world resembling one of his wife's paintings of where their dream house is supposed to be. Here, he is reunited with his dog who had died earlier in the movie. Also, the blurry figure becomes clear and turns out to be his old doctor friend Albert, who later turns out to be Chris?s son Ian just masking himself in the physical body of Albert. This form is chosen by his son because the doctor was one of the only people Chris had ever listened to while he was alive. Albert(Ian) basically helps him understand that he is dead and that people have a soul or an identity that lives on after the physical body has passed. He learns that there is a God, and he learns of this new realm, and how everyth... ...y of your significant life experiences is constantly detectable throughout the entire film. Mainly after Chris goes to his version of heaven, and also when he sees his daughter and she has her heaven based on a toy model she had in her physical life. Another example is when she tells him her new physical appearance is based on what he had said when they were both alive. Overall, I thought this movie was pretty entertaining, especially with all the special effects. I even think the ideas about the afterlife are pretty idealistic, but I see no solid reason to believe any of it. Any part of this movie could be possible, because I(like everyone else) do not know for sure what happens after we die. However, if there is one part I can find believable, it is the first half. The part when Robin Williams first dies up to when he travels through the tunnel, because it relates to so many peoples? near death experiences. I still think this movie left too many questions, but I would like the afterlife to be like what the movie portrayed, because I don?t plan on killing myself anytime soon, and it would be nice to know that I am going to still exist after I die and be reunited with my family.

Thursday, October 24, 2019

Employment Law Compensation Plan Essay

In response to your request to have an employment law compliance plan for our client, Bradley Stonefiled who plans on starting a limousine service called Landslide Limousine, I have developed an employment plan which covers both State and Federal employment laws. Being in compliance with the Texas state employment laws, as well as Federal employment laws will greatly help out client in avoiding and penalties. The employment plan is based on Texas employment laws, which is where our client’s base of operations will be. The employment plan will also include Federal employment laws which are relevant to our client’s needs in helping him start his limousine service. I have also included the consequences for not being compliant with State and Federal employment laws. Texas Employment Laws Texas is a right-to-work State. This means that a person cannot be denied employment based on the fact that they are or are not a member of a labor union or other labor organization. The Texas Labor Code has five titles: General Provisions, Protection of Laborers, Employer-Employee Relations, Employment Services and Unemployment, and Workers’ Compensation (Texas Statue, 2013). The Texas Labor Code covers all aspects of employment. Title II (Protection of Labors) covers wages and discrimination. Being noncompliant can result in a civil action being brought by the employee, which can result in a monetary award that is determined by the courts (Texas Statue, Chapter1). Title IV (Employment Services & Unemployment) covers unemployment benefits and insurance which our client will be responsible. Failing to make unemployment contribution can result in a class â€Å"A† misdemeanor (Texas Statue, Chapter2). Title V (Workers’ Compensation) covers workers’ compensat ion insurance coverage, workers’ health and safety, and workers’ compensation benefits. The penalty for noncompliance is sanction, criminal prosecution, fines and restitution (Texas Statue, Chapter 4). Texas Payday Law covers how employees are to be paid, either monthly or bi-weekly. The law also states that companies are not required to compensate  their employees for vacation time, breaks, and lunches. However, they are required to pay employees for attending company meetings. Failing to pay employees’ can result in administrative cost equal to the wages in the claim plus 25% per employee. In addition to the wages which have not been paid ((Texas Workforce Commission, 2014) Federal Employment Laws States have their own employment laws which strengthen Federal employment laws. However, the Federal employment laws set the standard by which the States follow and or strengthen by adding new protections. Since our client is only looking to hire 25 employees, this would be considered a small privately owned business. Our client should also be made aware of the federal laws that he must comply to. The Fair Standards Act (FLSA) which requires employers to pay overtime to employees working more than 40 hours per week, at a rate of one-and-a-half times their regular hourly rate. The FLSA also includes the Equal Pay Act, which is an amendment to FLSA, which establishes the same rate of pay for both women and men (Cascio, p.82, 2013). Since our client is going to start Landslide Limousine in Austin Texas, the Immigration Reform and Control Act (IRCA) should also be included in this employment plan. The IRCA explicitly states that employers’ cannot hire someone that is not legally authorized to work in this country. The employer must exercise his due diligence by verifying all documents supplied by a potential employee as verification of who they are. The penalties for noncompliance can vary from $100 to $1,000 per employee; furthermore criminal sanctions can be imposed if a pattern of hiring unauthorized employees (Cascio, p.88, 2013). The Civil Rights Act of 1964 and its amendments, which is the forerunner to the Texas Labor Code, protects employees from discrimination based on their race, color, religion, gender, and national origin as it pertains to employment and promotions. This law was expanded in 1972 to include public and private employers with 15 or more employees. The penalty for an employer who is in violation of the Civil Rights Act can be responsible for compensatory and punitive damages (Cascio, p.82, 2013). The compliance plan stated here is a necessary start to get our client, Landslide Limousine, in compliance with Texas employment laws, as well as Federal employment laws. The goal here is not only to educate our client but to ensure that he is aware and understands all employment laws  which pertain to him and his company. Reference Attorney General of Texas. (2013, February 20). Right-to-Work Laws in Texas. Retrieved from Texas Constitution and Statutes: https://www.texasattorneygeneral.gov/agency/righttowork.shtml Cascio, W. F. (2013). Managing Human Resources. New York.McGraw-Hill. Statutes. (2013). Retrieved from http://www.statutes.legis.state.tx.us/?link=LA Texas Workforce Commission. (2014, June 02). Texas Payday Law. Texas. Retrieved fromhttp://www.twc.state.tx.us/ui/lablaw/texas-payday-law.html#payPeriods

Wednesday, October 23, 2019

Imagery of Disgust Vulnerability and Separation

Imagery of Disgust, Vulnerability, and Separation Frederick Douglass once said, â€Å"If there is no struggle, there is no progress. † If there was any one person who experienced this first-hand, it would be Frederick Douglass. In his narrative, Douglass writes of many struggles faced by slaves during their confinement to slavery and the progress that came from them. When writing of these struggles, Douglass uses many rhetorical strategies in order to persuade the reader into thinking a particular way about slavery. A particular strategy which Douglass uses is imagery.Imagery, the use of vivid or figurative language to represent objects, actions, or ideas, is frequently used in Narrative of the Life of Frederick Douglass. In Narrative of the Life of Frederick Douglass, Frederick Douglass uses imagery order to persuade the reader to stop slavery. Frederick Douglass uses imagery in his narrative in order to cause the reader to develop disgust for actions taken upon slaves by the ir masters. Slaves were terribly treated by their slave masters during slavery. Many times, Slaves were whipped and punished for no reason.Slave whipping could have been done merely out of displeasure to the master or for taking too much food during the evening meal. In order to portray this message, Douglass uses imagery when writing about the beatings and whippings of his aunt. Mr. Plummer, the overseer of Captain Anthony’s plantation, is said to have taken great pleasure in whipping a slave. Frederick Douglass writes, in the beginning of the narrative, that he awoke many times by the â€Å"heart-rending shrieks† of his own aunt who Mr. Plummer would â€Å"tie up a joist, and whip upon [Frederick’s aunt’s] naked back till she was literally covered with blood. Douglass 3)† The reader is captured by the gruesome imagery which Douglass illustrates in portraying the scenes of a slave-whipping. Writing of these events paints a clearer picture in which the reader is able to learn the true and uncensored events which took place during slavery. This particular picture painted by Frederick Douglass creates a heart-wrenching scene that the reader is able to picture within the mind. This imagery allows the reader to picture the abhorring treatment which slave masters inflicted upon slaves.This causes the reader to think down upon slavery when this type of imagery is brought to the mind. The reader is then more likely to want to put a stop to such an image. Frederick Douglass uses imagery once again in order to depict the vulnerability faced by slaves during slavery. Vulnerability is the act of being susceptible or unprotected to physical or emotional injury. Vulnerability was one of the biggest difficulties faced by slaves during slavery. Frederick Douglass uses imagery in his narrative to depict vulnerability when writing of Master Andrew’s constant whipping of slaves.Douglass writes that Master Douglass â€Å"took [Frederick ’s] little brother by the throat, threw him on the ground, and with the heel of his boot stamped upon his head until the blood gushed from his nose and ears. (Douglass 28)† When describing this scene, Douglass causes the reader to paint an especially gory picture with the mind. This is a very bold picture in which the reader is able to form from the description given by Douglass. When the reader imagines a small boy, beaten and frail, with blood gushing from inside the body to the outside, it causes them to want to help the young boy and save him from his vulnerability to the slave master.Frederick Douglass also would have wanted to help his brother. However, Frederick Douglass watched as his vulnerable little brother was whipped and Frederick was able to do nothing about it. Vulnerability is able to be depicted from both the standpoint of Douglass and his little brother because both were confined by helplessness. This inclines the reader to help this situation of vulne rability and put an end to it. Imagery also is used by Douglass to depict the separation among slave family members. Slaves were bought out by masters during slavery.However, they were not often bought in ‘family packages’. This means that many marriages and siblings could be easily separated. Frederick Douglass uses imagery when writing his mother, Harriet Bailey. In the beginning of the narrative, Douglass writes that he and his mother were separated when he was an infant and scarcely saw her four or five times in the entirety of his life (Douglass 2). Douglass goes on to explain that when he heard of his mother’s death, it was if he had just heard that a stranger passed. He was calloused towards the hearing of her death.This imagery of separation between Frederick as a young child and his mother paints a dismal picture for the reader. When writing that he was separated from his mother as a infant, Frederick Douglass gives the reader a picture of a baby being t aken from its mother without consultation. Mothers are often seen as those who possess the skills and needs necessary to care for a young child. When stripped of these needs, the child suffers. Douglass uses this imagery in order to capture the reader’s sympathy for separation of the mother and child in hope to incline them to put a stop to it and slavery.Imagery was a key which Frederick Douglass used in order to persuade his readers to think down upon slavery. It is important for readers to picture these scenes so that they will know the true events which took place during slavery. The harsh actions of slave maters, the vulnerability of slaves, and the separation of slaves are only a few horrible events which happened during slavery. Certain events grip the mind and hearts of readers to capture what they believe is to be wrong. Frederick Douglass believed slavery to be wrong. Imagery helped Douglass to portray this message in a way that could help the readers relate to the story.