Saturday, December 28, 2019

The Scarlet Letter By Nathaniel Hawthorne - 2288 Words

The Scarlet Letter Analysis, â€Å"On the breast of her gown, in fine red cloth, surrounded with an elaborate embroidery and fantastic flourishes of gold-thread, appeared the letter A.† (40) Every aspect of the story of Nathaniel Hawthorne’s, The Scarlet Letter, whether it be major or minor, stems from this line. From beginning to end, the scarlet letter has a major bearing on the unfolding of the plot. Hester Prynne, an adulteress, is spared death for her sin, but she must wear a scarlet letter â€Å"A† for the rest of her life. Her husband, who has been living with Native Americans for the past two years, arrives in town just in time to see her holding a baby and being publicly humiliated for the crime of adultery and vows to get revenge. As†¦show more content†¦Through development of the two characters, Hester Prynne and Arthur Dimmesdale, Hawthorne melds a vision of a world in which adversity and freedom enhance the life of the soul. To begin with, Hawthorne presents a tale of persevering though it feels as if everything is crumbling, which is revealed in the metamorphosis of Hester and Dimmesdale, a transformation from hopelessness to hope in both of their cases. In the case of Hester, she cannot give up, even though her future seems terrifyingly dim. She has Pearl to live and make a life for, so she must force herself to push forward through the pain. â€Å"But she named the infant ‘Pearl,’ as being of great price,-purchased with all she had,-her mother’s only treasure! How strange, indeed! Man had marked this woman’s sin by a scarlet letter which had such potent and disastrous efficacy that no human sympathy could reach her, save it were sinful like herself. God, as a direct consequence of the sin which man thus punished, had given her a lovely child, whose place was on that same dishonored bosom, to connect her parent for ever with the race and descent of mortals, and to be finally a blessed soul in heaven!† (67) God has given Hester this wonderful, lovely baby girl, her one and only treasure, as a result of what the townspeople think is one of the worst acts a woman can commit. Even though her punishment is harsh and results in the alienation of her from the community, Hawthorne makes sure to include

Thursday, December 19, 2019

Organizational Culture Inventory of LOccitane - 1645 Words

Introduction The organization being discussed is L’Occitane, the French company, which is one of the most successful businesses in the world. L’Occitane means â€Å"Women from Occitana.† The company was found in 1976 by Oliver Baussan in Provence, France. L’Occitane is well-known for natural beauty products that never tested on animals. Overall, most of the products in L’Occitane are made out of 86% natural ingredients. However, some of the new products are made out of 96% natural ingredients and were certified by Ecocert. Ecocert is an organic certification organization in France that certifies food products, beauty care, and perfume†¦etc. The brand value of L’Occitane are â€Å"Authenticity and Naturalness,† â€Å"Effectiveness and Pleasure,†Ã¢â‚¬ ¦show more content†¦Even though, they know they have made the mistakes. I always be the one who stood up and held the customers and ease their anger. I would call the store man ager or district manager and help solve the problems for the customers if any problems that are beyond my ability because we have to follow the company policies at all times. The company did not want the sales associates to take care any serious problems because it may cause troubles for the superiors and affect the company’s reputation. Targets for Cultural Change TARGETS FOR CULTURAL CHANGE GRID OCI Norms Ideal Score Your Current Score Gap* Achievement 78% 94% 0 Self Actualizing 82% 97% 0 Humanistic 85% 96% 0 Affiliative 71% 90% 0 Approval 27% 98% -71% Conventional 18% 95% -77% Dependent 24% 98% -74% Avoidance 27% 89% -62% Oppositional 45% 93% -48% Power 30% 96% -66% Competitive 42% 98% -56% Perfectionistic 25% 98% -73% The greatest gap between L’Occitane and the Ideal score is conventional. The company have made those policies for the employees to follow is to avoid any serious situation between the employees and the customers, and the loss from returns. Based on the US, L’Occitane must have the return policies because it is a high-end brand and they want the customers aware that it is important to have their receipts if they want to return or exchange, no cash refund, and no refund on any sale items. If it

Wednesday, December 11, 2019

Implementation of IOT in Health Care System-Samples for Students

Question: Discuss about the Implementation Of IoT In Health Care System. Answer: Introduction Internet of things has evolved over the years, thanks to the advancement of various interconnected technologies like IPv6, wireless network and microcontroller and sensor electronics. The evolution of the IoT has heavily influenced various sectors like business, sports, health and many more. IoT in healthcare is an important research topic as the technology has lot of potentials for the sector in terms of bringing more automation and transparency in healthcare administrations (Gope Hwang, 2016 ). However the threats that the technology poses along with the benefits needs careful attentions. The task to control the systems and integrate it with the IoT technology is indeed challenging. Researchers are particularly concern about this, even more than the benefits that the system will provide following the implementation . Different methods have been provided by different researchers to control IoT devices and the topic has managed to get widespread attentions and provides an excellent opportunity to conduct further research in the field to come up with even better solutions (Wu et al., 2017). Data protection is one of the critical issues that need to be considered when dealing with the network devices. Security plays a vital role in the context of IoT technology (Tyagi , Agarwal Maheswari , 2016). In case there is a malicious attack or interference takes place and the attacker becomes successful in hacking the network of the system then they will be able to steal important data that is intended to be kept safe and private for the data is highly sensitive in nature. In order to protect the devices from outside access that is intended for illegal purpose, it is important to have the correct security measure in practise. Authentication has an important role to play to ensure security of the IoT devices. Different researchers have provided different mechanism for authentication for the IoT devices and network (Bhatt, Dey Ashour, 2017). However the mechanisms have certain drawbacks. The mechanisms have not considered the limitations of IoT devices which have often very limit ed resources in terms of memory and processing power. In order to design effective authentication techniques it is important to combine the characteristics of the end devices and a proper balance should be maintained between the available resources so that efficient, secure and suitable authentication mechanism can be designed that suits the need of the IoT environment (Laplante Laplante , 2016). Here the overall introduction of the topic is given. Factors like importance of the topic, justification for the topic selections and the need for the research on the topic have been discussed. The process to ensure the data security in IoT is challenging task. The report will discuss the methods to ensure the data security and how it can be implemented using the ECC authentication algorithm. Background/Literature Review Li et al.,( 2018) have talked about the importance of RFID technology for the device authentication in the IOT environment. RFID or the radio frequency identification technology helps to identify a device remotely with the RFID tag. The authors points out that RFID technology is highly efficient I recognizing devices. The authors further add that in the IOT environment, millions of devices are connected to the internet and with each other as well. Hence it is important to implement techniques that can help to identify the devices amongst the polls of connected devices. RFID technology has lot of potential in this context. RFID tags has the ability to store information and send this information remotely, thus enabling the wireless communication between the devices and the database that store information about this devices. This information can be then used for the identification of the devices. However the authors suggest that there should be proper data monitoring technology in order to derive useful information from the data sent by the devices connected over IP network. Once the data is sent by the smart and RFID enabled devices over the IP network, the data is then processed in the central data base and converted into human readable format. One of the most important features that make RFID tags more efficient than the standard barcode technology is the ability of the RFID tag to support more advanced communication style. In order to read information from the RFID tag it is not mandatory for the device to be in the line of sight which means that the device can be tracked from anywhere. In the IOT environment, wireless communication plays an important role and technology like this, according to the authors, only increase the efficiency of the communication with ease in device identification. Lopes Hilgert (2017) have proposed for two phase algorithm for group authentication: pre authentication phase and group authentication phase In the pre authentication phase the GA of the group who is responsible for creating the group generates a public key and associated private keys. This keys are then used for authenticate the devices in the group. The keys are generated using the threshold cryptosystem. In the group authentication phase the authenticity of every devices in the group is checked using the private and public keys that were generated in the pre authentication phase. The GA in this phase creates another random secret key that is shared among all the devices in the group and the devices need to address the random key to complete the authentication process in the group authentication phase. Jan et al., (2016) have provided a mutual authentication schema for the IoT implementation in health care. This schema helps to validate the identities of the IoT devices. The schema first identifies the devices in the IoT environment before the devices are actually integrated in the real network. In order to perform the authentication in the IoT environment before integrating with the network the authors have proposed for decreased communication overhead. The schema is based on the. Constrained Application Protocol or CoAP. The authentication is performed using the 128-bit Advanced Encryption Standard or AES. The authors suggest claims that due to such high level of encryption value the devices are highly secured in the IoT environment where the security playsa major role for successful implementation of the technology. In the CoAP technique, the identity of the server and the client is first is verified. Based on the identity the system then allows the client to access the server b ased on the conditions that was determined by the protocol in the request made by the client. Thus it is not easy for the user to access the server without performing proper authentication and the verification of the request is also necessary to get access to the server. Hofheinz Jager (2016) have proposed for public key algorithm for the authentication purpose. Data that is collected by the IoT devices is stored in the cloud servers and secured database. However it is important to note that in order to protect the data it is very much important to protect the authenticity and the integrity of the data. The integrity of the data can be maintained by the mechanism called message digest which is a secured hash algorithm. The algorithm produces predefined hash value to secure the digital content. It is not easy to access a digital content and modify it without the proper authentication if the content is secured with a predefined hash value. The authenticity of the data can be maintained by the public key based key based digital signature technique. In the public key based cryptography algorithm two keys are generated known as public and private key. The private key belongs to the owner of the data which needs to be used to prove the claim of the user t hat the user really owns the data. The public key is for the use of other users who wants to access the content. The public key is accessible to anyone who wants to verify the signature of a digital content or data. Stallings (2016) has proposed for hashing algorithm for digital content cryptography. The signature for the data is produced by hashing the digital content and a hash value is produced in this process. The value is attached to the content as the form of digital signature. In order to the read the content the digital content needs to be hashed again and in the second step the hashed value which is reconstructed in the hashing of the content has to matched with the public key along with the signature that is attached with the content. Su, Wong, Chen (2016, May) have proposed for a group authentication technique. The technique is based on the Threshold Cryptography. The scheme is used for the authenticate devices in a group. The authors describe that in the IoT environment lot of devices are connected together. Hence the task of securing those devices is a challenging option. However with the use of the group authentication technique it is possible to authenticate devices in a group. The authors have used the method of releasing the token to perform the authentication. The method is based on the Shamirs secret sharing scheme. The algorithm is implemented in the Wi-Fi environment. Each group in the network constitutes a set of devices and the devices communicate with each other by sharing secret key. There may be any number of groups and the range of the connectivity is decided based on the Wi-Fi standard. The groups can even overlap with each other and one device may belong to more than one group. However there is a primary device in every group which is responsible for monitoring the communication in the group. Each time a new device is added to the group, a new key pairs is generated which is distributed by the primary device within the group to keep the existing devices in the group updated about the inclusion of the new devices in the group. The TCGA algorithm constitutes of five key modules 1. Distribution of key. 2. Updating of key. 3. Generation Group Credits. 4. Authentication of Listener. 5. Message Decryption Moosavi et al., (2015) have proposed for SEA architecture for IoT based healthcare system. The architecture consist of smart health gate-ways. The health related information is captured from the sensors that are either body-worn or implanted. The sensors collect data of the patient and send it to the database for monitoring purpose. The architecture consists of medical sensor network, smart heath gateway and back end system. The medical sensor networks helps in sensing, identifying and communicating the medical related data. Sensors are attached with the patient. The sensors are highly advanced and help to collect necessary information about the patient condition. The sensors measure body temperature and collect data about the bio-medical and context signal. This data are useful to monitor the condition of the patient. The sensors can also supplement the data with the context information like date, time and location which helps toget precise information about the medical condition of the patient. The bio medical and the context signal that is captured by the sensors are transmitted to the gateway. The data is sent to the gateway with the help of wired and wireless communication protocol. the communication protocols include standard communication standards like serial , SPI , Bluetooth technology. Signal can also be sent using the Wi-Fi or IEEE 802.15.4 wireless communication standard. Rahman et al., (2015, January) have proposed for smart health gateway. Smart health gateway which supports the communication protocol serves as a connecting point between the MSN and the local switch or network. Data generated from different sub -networks are received by this gateway. The protocol conversion is also performed by the gateway. The gateway also aggregates the collected data and is also capable in data filtering. The gate way even provides some higher level service like dimensionality reduction of the collected data. The back end system constitutes the remaining part of the architecture. It includes a cloud platform where the data is stored for processing. The system also includes data warehouse and big data analytic servers where data are analyzed to extract the meaningful information from the collected data that helps to find the relevant information about the patient. The back end system also consists of local data base of the hospital where the data is stored tempora rily before it is sent to the cloud server and big data analytics server. The system also consists of web clients which provides the interface for the data visualization and data apprehensions. Porambage et al., (2014) have proposed for two phase authentication protocol to authenticate and secure the IoT devices. According to the authors the protocol is highly efficient for authentication purpose. In the wireless sensors networks that follows centralised architecture consists of a central entity. the sensor nodes in the network collects information from the sensors and send it to the central entity that is responsible tom maintain the centralised network, the fadta is themn proceesed by the central entity and the information is provided over the network. However IOT follows distributed network architecture. There is no central unit that collects and process the information. The mechanism is completely different from the centralised network. Here the sensor nodes are responsible for sensing the data. The data is then processed by the sensor nodes itself and then the information is exchanged with other nodes in the network. However there are certain security concern that need s to be addressed while following such distributive network architecture. There are serious threats of the devices to be hacked and once a node is hacked it is possible to exploit other nodes in the network as well. once the nodes are hacked it is possible to obtain sensitive information from the nodes and based on the field of application the sensitivity of the data varies. When implementing IoT in the context of healthcare it is much more important to secure the information with proper authentication technique. The authors have proposed two phase authentication technique. In this proposed technique the authors describes the mechanism to authenticate the sensor nodes and the devices that are used for end to end communication. In the first phase the nodes generates a authentication key to be used by the communicating devices. In the next phase the communicating devices will generate another key. The key will then be verified by the communicating node and if matches only then the com munication will takes place. The mechanism, as per the authors will enhance the security of the devices and also help to authenticate the devices more securely. Lee, Alasaarela Lee (2014, February) have suggested for a authentication scheme for securing the IoT servers. The scheme is based on Elliptic Curve Cryptography (ECC) based algorithms. The authentication protocol proposed by the authors is applicable for the embedded devices that follow the HTTP protocol. The protocol makes use of the cookies generated by the HTTP protocol for authenticate the devices. The devices need the TCP/IP configuration to be connected with the protocol. The embedded devices are often limited in size and processing power. That is why the algorithm designed for the embedded system has to be efficient and it has to address the constraint that the embedded devices bring in the IoT environment. The architecture that has been proposed by the authors uses HTTP cookies which, according to the author have been optimized so that it fit in the constrained environment of embedded devices. The protocol consists of three phases namely Registration phase, Pre-computed and login phase and authentication phase. In the registration phase the devices register with the cloud servers and upon successful registration the server send back a cookie which is stored by the device. In the next phase or the Pre-computed and login phase, the device has to send a login request to login. Once the login request is accepted the device enters into authentication phase. In the authentication phase the device needs to send the cookie provided by the server during the registration phase. The server then checks if the cookie matches with the cookie provided by the server during the registration phase. The device is authenticated only if the cookies matches, otherwise error message are generated by the server. The authors claim that the mechanism is quite useful and advanced in managing authentication related issues. Solutions Based on the literature review the project finds out the following requirements: Review of the authentication issues in the IoT enabled healthcare system Design of proper authentication algorithm Review of the algorithm Comparison of the algorithms proposed by previous works Suggest the most appropriate algorithm based on the assessment of the strength and weakness of other proposed techniques by previous researchers. Future Research One of the major challenges that make the IOT environment venerable to security threats is the lack of proper security measure for the device authentication. There are lot of security issues in the IOT environment. However the prevent resource exhausting is the most concerning fact that the developers must address in order to maintain the device security intact in the IOT environment. In order to propose the effective security algorithm for the IOT devices the resource constrains must be taken care of. IOT devices are often resources limited. The devices have very limited resources in terms of processing power and storage memory. Hence the algorithm must be optimized in such a way it supports the limited processing power and storage of the IOT devices. The mechanism that has been proposed in the report has been optimized according to the resources available. The mechanism is based on the Constrained Application Protocol (CoAP) [31] and Elliptic Curve Cryptography [32]. The application protocol or is designed in accordance with the IETF working group. It provides overview about the Constrained Restful Environment (CoRE). The knowledge about the CoRE helps to define the implementation architecture that is suitable for the the sensor nodes implemented in the highly constrained environment like IOT. The CoAP protocol is highly efficient to create communication between these constrained nodes. The protocol defines the web interfaces that help to make communication between the nodes to make device communication over the connected network. In the figure 1, different protocol stack has been shown. These protocols are commonly used in the IOT environment. In order to understand the effectiveness of the CoAP protocol for the IOT environment, it is important to have in-depth knowledge about the most widely used protocol that has almost made dominance on the internet communication technology. It is known as The Hypertext Transfer Protocol or HTTP. In order to understand the reason why the HTTP protocol is not chosen for the IOT implementation, despite it being so popular and widely used for the internet communication, the drawbacks of the protocol must be clearly defined and also needs to be carefully analyzed. HTTP is basically a structured text that finds the logical link or the hyper link between the nodes that contains the text. This links are used by the protocol to facilitate communication between the nodes. With the introduction of the Internet of the things or IOT, the definition of the internet has been completely redefined. The internet is not all about the human interaction anymore. With the IOT, machines and the devices are g etting connected to the internet in a rapid rate. With the context of the internet getting redefined, the requirements for the communication are also changing. The IOT communication has some special needs which the HTTP protocol is not efficient to address. In IOT communication, the information generated by one node needs to mapped to all the nodes that participates in the communication. small packets of information must be shared in high volume due to vast amount of data generated by the devices or the communication nodes. HTTP protocol is not efficient in addressing these requirements of IOT communication. the important feature that makes the CoAP appropriate for the IOT communication is that it allow machine to take the roles of both client and server and also allows to switch between these roles whenever it is necessary. It also supports asynchronous message transfer over the protocol which follows datagram orientation. One popular example of such protocol is the UDP protocol. A n optional request or response layer is also included with the CoAP messaging for providing connection that is reliable like the Transmission control protocol or TCP. The CoAp layer has been shown in the figure 2.The operational layer is useful for the dealing with the UDP protocol as well as dealing with the asynchronous interactions between the communicating needs. A 4 byte header file is generated for minimizing the traffic due to traffic overhead. CoAP includes methods like GET, POST, PUT and DELETE which provides codes for the device to response to the communication request. The code is also necessary for reflecting the execution status for the client request. CoAP provides four different types of messages: CON Message: It means Confirmable request. When a CON message is sent by a source node, then it is the responsibility of the recipient to send the response message using the ACK or the Acknowledge message. The message is of high importance and must be treated with importance . NON Message: It refers to the message that is Non-Confirmable. Whenever a NON request is sent by the sending node, the is no need for the recipient to respond to the message. The message is not of much importance ACK Message: It refers to Acknowledgement messages. Once the sending node sends the CON message, it should be acknowledged by the recipient. However it is not sufficient to acknowledge the message by the recipient the sending node must be made aware of the fact that the recipient has received the message and it should be forwarded to the sending node. The recipient must sent the ACK message to the response of the CON message. The ACK message may also contain information about the details about the message processing. RST Message: It refers to the RESET message. Now it might be possible that during the communication there occur errors due to reason like network traffic, internet speed. Now in order to make the communicating node aware of this, the recipient of the message must send RST message. It will help the sending node to understand that error has been occurred in the communication process. in case the recipient does not make the sending node of this communication error, it will continuously send message to the recipient, it will not only increase traffic over the network, a lot of data packet will remain on the network without processing which will affect the communication between other communicating nodes connected to the same network. The RST message will help the sending node to understand that the recipient is not able to understand the message or the recipient is no longer interested in receiving the message which will help to avoid network traffic due to sharing of message without any particular pu rpose. In order to achieve security restrictions of similar level, ECC considers key of smaller sizes. Although there are several other asymmetric cryptographic keys, but the security level provided by the ECC algorithm is much better and improved. Those features provided by the other algorithms considers larger key sizes, for instance a 256-bit symmetric key must be secluded by at least 15,000-bit RSA, on the other hand, ECC uses an asymmetric key size of only 512 bits to ensure equivalent security level. This decrease in the key size makes it possible for significant cost saving and more compacted design execution. Chips that are smaller are able to run cryptographic process in a much faster rate. It also minimizes the power consumption thus increase the efficiency .these features are especially appropriate for environments where there are resource constrain issues. A comparison of key size with equivalent security levels between ECC and RSA has been provided in the subsequent section. Key size ( ECC) Key size ( RSA) Reduction ratio (approximate) 162 1024 1:16 256 3074 1:12 383 7684 1:20 512 15365 1:30 The authentication mechanism proposed here will help to implement ECC authentication mechanism over CoAP connection. These two approaches when combined will help to optimize overhead to the IOT network. It will further help in minimizing the communication as well as the pocessing power that is required to make authentication of the IoT devices. It is also effective in achieving powerful and efficient security for the IoT devices. Authentication mechanism can be passing through multiple stages. Stage1: It is the initialization phase. Here the Control system generates a private key that is used for communication with the ECC. Stage2: It is the device registration phase. It includes the pre authentication process over CoAP where IoT devices are checked if it is already authenticated or not. Control station will then checks the device ID that will help to find out whether there is a corresponding entry for it. If there is no entry of device then an ID will be generated with the help of control private key. Along with it an encrypted password will be generated which will be stored back in the IoT device. Stage3: Mutual authentication stage, IoT device use this password to generate authentication key and send it back to the control system when it is try to connect it. Control system check these key using corresponding IoT entries stored at the control system. Stage4: All traffic pass between IoT devices and control station then will be encrypted and secured against different types of attack. Figure 5 proposed authentication mechanism shows the detailed steps of proposed authentication method between IoT device and control station. Advantages/ Disadvantages (5 marks) Constrained Application Protocol can be referred to as the web transfer protocol that is specially designed in order to make it compatible with constrained devices as well as constrained networks CoAP are specially appropriate for designing protocol that implements a request/response based interaction that is implemented for communication between the endpoints of communicating nodes or the networks CoAP contains some key concepts of the Web including URIs and Internet media types CoAP happens to be very common and at the same highly reliable. It is an effective choice for the application of data transferring, especially for the IoT environment. Elliptic Curve Cryptography refers to asymmetric cryptographic algorithm. It is applied for providing security and that too with the same level as provided by RSA. However the special feature of ECC is the key size as it works with much smaller key sizes. ECC works with much smaller key sizes while providing security of higher level . Due to smaller devices and lower processing power the IOT environment is highly constrained. However ECC works finely with the constraint environment of IOT ECC has the ability to provide encryption that is highly reliable. It also helps to minimize the overhead of the IOT network. Conclusion In this paper, a thorough review has been conducted on the use of IoT in healthcare. Security issues are highly critical when dealing with the healthcare system. In order to overcome the issues authentication mechanism has been proposed. The mechanism is highly reliable. While proposing the mechanism it had been made sure that the mechanism is compatible with the IOT devices. The IOT devices have limited memory and also have limitation in terms of processing power. Hence it has been made sure that the proposed mechanism address the constrains of The proposed reliable authentication mechanism mainly depends on CoAP with ECC algorithms. Proposed method fit the requirements of IoT constrained devices. Small ECC key has reduced the calculation requirements while providing a powerful encryption better than other types of cryptography. References: Bhatt, C., Dey, N., Ashour, A. S. (Eds.). (2017). Internet of things and big data technologies for next generation healthcare. Gope, P., Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network.IEEE Sensors Journal,16(5), 1368-1376. Laplante, P. A., Laplante, N. (2016). The internet of things in healthcare: Potential applications and challenges.IT Professional,18(3), 2-4. Tyagi, S., Agarwal, A., Maheshwari, P. (2016, January). A conceptual framework for IoT-based healthcare system using cloud computing. InCloud System and Big Data Engineering (Confluence), 2016 6th International Conference(pp. 503-507). IEEE. Wu, T., Wu, F., Redout, J. M., Yuce, M. R. (2017). An autonomous wireless body area network implementation towards IoT connected healthcare applications.IEEE Access,5, 11413-11422. Hofheinz, D., Jager, T. (2016). Tightly secure signatures and public-key encryption.Designs, Codes and Cryptography,80(1), 29-61. Jan, S. R., Khan, F., Ullah, F., Azim, N., Tahir, M. (2016). Using CoAP Protocol for Resource Observation in IoT.International Journal of Emerging Technology in Computer Science Electronics, ISSN, 0976-1353. Lee, Y. S., Alasaarela, E., Lee, H. (2014, February). Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. InInformation Networking (ICOIN), 2014 International Conference on(pp. 453-457). IEEE. Li, C. T., Lee, C. C., Weng, C. Y., Chen, C. M. (2018). Towards secure authenticating of cache in the reader for RFID-based IoT systems.Peer-to-Peer Networking and Applications,11(1), 198-208. Lopes, A.P.G. and Hilgert, L.D.O., 2017. Group authentication protocols for Internet of Things (IoT)QoS and Security Properties Evaluation. Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J., Tenhunen, H. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways.Procedia Computer Science,52, 452-459.Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M. (2014, April). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. InWireless Communications and Networking Conference (WCNC), 2014 IEEE(pp. 2728-2733). IEEE. Rahmani, A. M., Thanigaivelan, N. K., Gia, T. N., Granados, J., Negash, B., Liljeberg, P., Tenhunen, H. (2015, January). Smart e-health gateway: Bringing intelligence to internet-of-things based ubiquitous healthcare systems. InConsumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE(pp. 826-834). IEEE. Stallings, W. (2016).Cryptography and network security: Principles and practice. Pearson. Su, W. T., Wong, W. M., Chen, W. C. (2016, May). A survey of performance improvement by group-based authentication in IoT. InApplied System Innovation (ICASI), 2016 International Conference on(pp. 1-4). IE

Wednesday, December 4, 2019

Ryanair Macro Environment Essay Example

Ryanair Macro Environment Essay This report studies one of the largest low cost airlines in Great Britain and Europe – Ryanair. This company is a 20-year-old international air carrier based in Dublin (Ireland), with 36 bases and 950+ low fare routes across 26 countries, connecting 151 destinations. The organisation was founded in 1985 as a conventional airline but re-launched itself in 1990/1991 as a low-cost carrier, replicating American Southwest Airlines business model. From the very beginning its strategy was to offer simple, low-cost fares and excellent customer service, which they can be proud of these days. REFERENCES The purpose of this report is to evaluate the market environment of the company by using PESTLE Analysis, which gives Ryanair the opportunity to identify the main factors affecting the industry. Moreover, it also analyses the impact on the business from the competitors and competitive environment. 2. Macro Environment – PESTLE Analysis 2. 1 Political forces * The increased Trade-Union pressure in Europe; The European Union expansion (the EU may be a big factor affecting the strategy planning for Ryanair, as the number of countries joining EU increases the number of countries for which they will need to supply their services); * Increased terroristic activities have leaded airline industry to tighten security measures. * Since the political situation in most major oil producing countries will stay unstable for the unpredicted future- the oil prices will stay a major problem for airlines. The fuel cost issue is getting worse by unpredictable currency exchange rate instability since aircraft fuel prices are denominate in US dollars. We will write a custom essay sample on Ryanair Macro Environment specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Ryanair Macro Environment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Ryanair Macro Environment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer However, the weak dollar compared to pound sterling has had a positive impact for Ryanair. 2. 2 Economic forces In this factor business may be affected by: * Recession, which surprisingly is good for Ryanair traffic growth because competitors have traffic falls, and are increasing their prices. As recession forces millions of passengers to focus on price, more and more passengers are attracted to Ryanair’s low cost fares model, and switching their â€Å"brand loyality† to more affordable Ryanair. More customer means profitability, which lets to keep the prices low and continue to grow. Fuel price increases; at the moment, the oil prices are at their highest level for 22 years, which can affect the prices of aircraft fares. However, Ryanair chief executive Michael O’Leary states that they will be still offering all passengers on all routes the lowest prices guarantee and avoid fuel surcharges. 2. 3 Social forces For the social forces, the increasing travelling lif estyles are the factor that may affect the business of Ryanair. In this section the most important are the customers, thus company needs to provide even better: * Customer service The best punctuality ( Ryanair improved it by 88% in the last 12 months); * The fewest cancellations (see appendice 2). * The least lost bags (see appendice 2). * Protection of the passengers * CCTV cameras * metal detectors for passengers * x-ray machines for baggage * Trace detectors, etc. Moreover, there is reliable software in Ryanair website, which let the customer to feel safe when buying the flight tickets, car hire, hotel accommodation, travel insurance and rail services, etc. http://www. ryanair. com/site/about/invest/docs/2008/Annual%20report%202008%20web. df 2. 4 Technological forces * In the past few years ? 23 million has been spent on IT programme to protect airlines against crime, cyber terrorism and vandalism. After 11th September 2001, the newest technologies are required in the airports, which cost loads of money for business and stress for the customers. Additionally, it is one of the reasons for delays, as baggage and passengers must be checked very carefully. However, without technologies such as body scanner, metal detector, x-ray machine, it would not be possible to ensure the sec urity. SSL (Secure Socket Layer) technology is used to protect personal information and credit card details, then booking the tickets online. * Ryanair is investing in the latest aircraft and engine technologies in order to improve their impact on environment. They trying to reduce fuel emissions and noise. * All of Ryanairs older Boeing 737-200 aircraft have now been replaced with brand new Boeing 737-800 Next Generation aircraft. * Technology called Mobile OnAir, provided by Swiss, allows passengers to use mobile access to voice and text communications on all of Ryanair flights. This new technology has been launched in February, 2009. Passengers will be charged to make and receive voice calls and SMS messages via satellite broadband links. The connection between the plane and ground is carried by satellite operator Inmarsat. http://www. dailymail. co. uk/news/article-1149921/Ryanair-launches-Europes-flight-mobile-phone-service. html * Ryanair offers self-service payment terminals equipped with chip-and-PIN readers to allow the customers to purchase optional services before they fly. In addition, it is expected to speed up the check-in processes. http://www. computing. co. uk/computing/news/2246111/ryanair-presses-ahead-payment 2. 5 Legal forces The tragedy of September 11th, 2001 marks the day that air travel permanently changed. After this date, the tighten security measure is affecting the business. Government had set up restricted rules for passengers in the airport, which includes: * Hand baggage restrictions; * Travelling with liquids – 100ml rule; * Prohibited items (Scissors, Lighters, Knives, etc. ) All passengers are strictly checked on metal detectors and new security body scanner equipments, which reveal any potential threatening items that passenger, may be carrying. Their bags are screened with x-ray machines, and approximately 50% of them are checked by security dogs. Moreover, some passenger’s rights take the pace in legal sector: * Disabled people are protected from discrimination and can rely on right help to assist their journey through any EU airport; * Passengers may be entitled to compensation (from â‚ ¬ 125 to â‚ ¬ 600) if denied boarding, long delays, or cancellations occurs. They also may be entitled to receive assistance (catering, communications, and an overnight stay if necessary). http://ec. europa. eu/transport/air_portal/passenger_rights/doc/2008_apr_leaflet/apr_leaflet_en. pdf 2. 6 Environmental forces According to White Paper (2003), more must be done to decrease the environmental effects of aviation and to limit the number of people significantly affected by aircraft noise and waste. The world’s 16,000 commercial jet aircraft generate more than 60 million tonnes of carbon dioxide a year. At the moment there is no value-added tax (VAT) for airline industry on jet fuel. Environmental campaigners in the UK are pushing the Government for changes in their policy and tax aircraft fuel. (key note, 2006, p13) However, Ryanair have been trying to be the most environmentally friendly and reduced fuel burn and CO2 emissions by 45% over the past 10 years. (see appendix) This has been achieved as follow: * Fuel emission: * By numerous fuel saving measures (including the use of the latest aircraft and engine technology, e. . , winglets); * Commercial measures aimed at maximising passenger numbers per flight in order to spread the fuel use and CO2 emissions over the greatest number of passengers (efficient seat configuration and high load factors). * Noise: * The function of modern technology (reduce the noise affected area at airports by 6. 5%); * The remote location of the majority of airports Ryanair operates from; * The absence of night operations; * Agreement with all local no ise restrictions. * Waste: Ryanair does not offer free meals, drinks or newspapers to passengers, what should reduce large amounts of waste from food, packaging and newspapers as a result. These days Ryanair is the industry leader in terms of environmental competence and it is regularly working towards further improvements in this field. It thinks that taxing air transport will not have any effect on reducing greenhouse gas emissions. (http://www. ryanair. com/site/EN/about. php? page=Aboutamp;sec=environment) 3. Competitive Environment Ryanair’s growth is driven by the widening gap between the guaranteed lowest fares, and the rising fares of most of their competitors, who have frequently increased fuel surcharges over the last year. 3. 1 The main competitors are: * Aer Lingus Group PIc (AL);They fly about 7 million passengers per year to 50 destinations in Ireland, the UK, the US and Europe. Following the financial crisis related to the September 11, 2001 terrorist attacks, AL applied a â€Å"survival plan†, which included a staff cut of over 2,000 employees, and sales of non-essential assets. The airline also adopted a new lower fare strategy which has resulted in significant increases in revenue and profits. This step increased competitiveness for Ryanair, as low cost fares is its main strategic factor. * British Airways Plc (BA) is a very large, full-service airline based in Hammondsworth, England. Today, BA flies to 154 destinations in 75 countries with a fleet of 300 aircraft. Interestingly, the market cap of BA is slightly less than the market cap of Ryanair, a much smaller airline. British Airways provides high prices, what