Tuesday, January 21, 2020
The Situation In Ireland :: European Europe History
The Situation In Ireland "But who are we that we should hesitate to die for Ireland. Are not the claims of Ireland greater on us than any personal ones? Is it fear that deters us from such an enterprise? Away with such fears. Cowards die many times, the brave only die once." Padraic Pearse (rebellion leader), 1916 (The New Republic, 34) Pearse's words, spoken just before the Easter rebellion, summarizes many Irish feelings toward rebellion for independence. In order to gain freedom from the British, revolutionaries were willing to sacrifice anything, even their lives. For centuries, the Irish had been part of the vast British empire and for most of that time, they struggled to obtain their sovereignty. Numerous events sparked this discontent in Ireland in the early 20th century. At the top of their list of grievances was the political treatment of the Irish. The Irish parliament was highly inadequate and inefficient with no real power to represent the people (The Outlook, pg 116). Additionally, Britain governed Ireland in the same manner that it governed all of its territories; it ruled according to what would best serve Great Britain, not the territory. For example, Ireland's commerce was discouraged and their manufacturing was paralyzed by British legislation (The Outlook, pg 116). Religious treatment of Roman Cat holics also angered the Irish. A large number of Irish were (and still are) Catholic and were repressed in many ways by English legislature. They were expected to pay taxes to support the Established Church of England, which gave Catholics no services. Furthermore, Britain forbade Catholics from providing education for their own children. Catholics could not be teachers and parents could not send their children abroad for education without forfeiture of their property and citizenship (The Outlook, pg 117). Although these actions by the British government infuriated the Irish, the new wave of rebellion actually began again in 1914 with the British government's repeal of the recently enacted Home Rule Bill, which gave the Irish some measure of political autonomy. These feelings came to a peak on Easter Monday, April 24, 1916 in the Irish capital of Dublin when approximately 1500 men, led by Pearse, seized the post office and other strategic points. These men were members of the Citizen Army, an illegal force of Dublin citizens organized by labor leader Jim Larkin and socialist James Connolly. From here, they established themselves in military fashion by erecting barricades of sandbags and closing off the streets with barbed wire.
Monday, January 13, 2020
What Did It Mean to Be Modern in Early 20th Century East Asia?
What did it mean to be modern in early twentieth century East Asia? In the early 20th century, East Asia went through a process of modernisation to cope with the challenges brought by the Western powers. This process of modernisation was characterised by numerous features, ranging from military, political, economic, industrial and technological reforms to changes in the legal, administration, diplomatic as well as education and women. There were long term socio-political and cultural impacts which shaped the modern East Asia in the early 20th century.While modernisation was in no way equivalent to Westernisation, many in the early 20th century saw the West as a model for modernisation. Modernisation in East Asia was thus more often than not taken as a process of learning from or even imitating the West. This essay will argue that Japan, Korea and China shared similar themes in the path towards modernity even though they developed in different ways. One of the most important steps tow ards modernisation for all 3 regions of East Asia was the reform (increasing levels of freedom) for women.In the early 20th century Japan, Korea and China underwent economic and industrial development taking the first steps towards modernisation. However, the significant difference lay in the fact that Korea underwent this process of industrial and economic modernisation under Japanese colonial rule therefore one may argue that the significance of their development was much greater. Japanese corporations took advantage of international technological and managerial innovations often called the ââ¬Å"second industrial revolutionâ⬠. Japanââ¬â¢s electrical technology became second to none.Electric street cars appeared in Tokyo in 1904, several years after they had appeared in Seoul. Of Japanese households, 85% had electricity in 1935, compared to 68% in the United States. Techniques of mass production required both standardised equipment and scientific management or Taylorism, an American theory of rational labour practice that Japan adapted to make the work force more efficient. A dual structure characterised Japanââ¬â¢s modern economy. Therefore, for Japan modernisation meant a rise in industrial advances and production thus a booming economy.Scholarsââ¬â¢ views of Koreaââ¬â¢s colonial period generally divide into two broad categories. The first takes a negative view of Japan but the second fits the colonial experience into major trends that lasted to the end of the 20th century. This included abolishing inherited social status as a barrier to advancement; liberating women from male domination; introducing modern mass media and popular culture; creating a modern economy through heavy investment in railroads, bridges and harbours; establishing a modern financial sector in the 1920s; and industrialising the peninsula in the 1930s.A small middle class of businessmen and shopkeepers arose and half million farmers were converted to factory workers a nd miners. In retrospect, the most important economic contribution was Japanââ¬â¢s use of state-led industrialisation involving planning and controls of all kinds in the process of late industrialisation to catch up to the advanced economies of western imperialists. Colonial economic policy aimed at expanding agricultural production by investment in reclamation, irrigation, chemical fertiliser and the introduction of new seeds to grow rice for export to Japan.Some people benefited more than others out of the economic boom in Korea from 1910-1925. This economic boom saw a rise in the price of rice. Korean landlords most of whom were Yangban (landed or unlanded aristocracy), fared far better than sharecroppers and Japan succeeded in winning tangban landlords compliance to colonial rule by granting them noble titles and guaranteeing their private property rights. As a result landlords took little part in the development of active nationalist resistance to Japanese rule.Taking this i nto consideration it is not unreasonable to suggests that while Japanese colonial rule brought about tyranny, exploitation of the Korean economy, its reduction of the mass of the population to bare subsistence and its attempt to obliterate Korean culture without granting equal citizenship rights it also encouraged developmentalism thus a profound increase in economic development. World War One gave Chinaââ¬â¢s businesses and industries a chance to flourish.Britain, France, Germany and Russia were preoccupied with what was happening in Europe and no longer had spare goods to export. Imports from the West thus dropped dramatically, giving Chinese manufacturers a chance to sell more profitably. At the same time, the demand for products from China increased dramatically, giving Chinese manufacturers a chance to sell more profitably. At the same time, the demand for products from china increased helping chinaââ¬â¢s export industries. The number of Chinese textile mills increased fr om 22 in 1911 to 109 in 1921.Tonnage of coal produced grew from 13 to 20 million tons between 1913 and 1919. Modern banking took off: between 1912 and 1923, the number of modern banks increased from 7 to 31. Telephone and electric companies were formed not only in major cities but also in county seats and even in market towns. New fortunes were made. For instance, the Rong brothers from a family of merchants in Wuxi built a flour mill in 1901 and another in 1913. As opportunities opened up, they built eight new factories between 1914 and 1920 expanding into textiles.Therefore, like Japan and Korea, modernisation for China also meant an increase in industrialisation and economic production which brought the first steps towards modernity in the early 20th century. In Japan the path towards modernisation also meant the adoption of constitutional government and an imperial democracy. After the Meiji restoration in 1868, it provided for a form of constitutional monarchy, in which the emp eror of Japan was an active ruler and wielded considerable political power over foreign policy and diplomacy which was shared with an elected Diet.The Diet primarily dictated domestic policy matters. After the Meiji restoration, which restored direct political power to the emperor, Japan underwent a period of political and social reform and modernisation aimed at strengthening Japan to the level of the nations of the Western world. The immediate consequence of the constitution was the opening of the first parliamentary government in Asia. In the early 20th century the struggle for democracy engaged academic theorists, journalists, feminists, outcasts and working men and women who expressed themselves in riots and in efforts to organised unions.For Japanese intellectuals liberalism meant representative government, constitutionalism, and rule by law. It meant individual rights and freedom from undue governmental interference in the individualââ¬â¢s life. It distinguished between th e naturalness of society and the artifice of the state. Intellectuals who professed liberal views jeopardised their careers. For example, Yoshino Sakuzo had to resign his position at Tokyo University because he had argued that people are the basis of the state and the aim of the state is to promote their well-being.The public interest had to in their view, supersede private, partial interests of oligarchs, bureaucrats, politicians and businessmen. Minobe Tatsukichi argued that according to the constitution, the Diet, in particular the lower house was the organ that represented the people. Therefore, it is clear that in Japan modernisation not only meant an improvement in industrial production and economic strength, but more significantly it meant the expression by the people for democracy and new liberal ideas imported from the West.A new modern culture was emerging in East Asia along with education which was emphasised significantly in Korea in the early 20th century. Radio broadca sting began in 1927 under the Japanese Korean broadcasting company and Korean language programs expanded from a third to half of airtime and in 1933 the first all Korean station was allowed. It devoted many programs to Korean history, science, the arts, international affairs, translations of western plays, popular songs with a distinct Korean flavour and standardisation of Korean grammar. In Japan the great Kanto earthquake of 1923 ushered in modern Japanese culture.Modern culture incorporated a second wave of westernisation driven not by national goals but by individual inclinations. After the earthquake, there emerged theatres, galleries, exhibition halls, and rooftop arcades and in 1927 the first subway in Asia connected corporate headquarters in Ginza with movie houses and cafes in Asakysa. The new middle class consumed a modern culture removed from politics. Mass literacy spurred the development of mass media. Self-help books and magazines taught the rudiments of popular scienc e, how to be modern, how to succeed in business and how to create the perfect home environment.Cinemas showed films from abroad alongside domestically produced animated cartoons and historical dramas. This modern mass culture promoted a privatising world of leisure and self-expression. In China the new culture movement took the lead in rejecting traditional values. For example, articles were written that promoted the importance of rejection of Confucianism so that China could attain equality and human rights. Leaders of the movement proposed ending use of the classical literary language because it was a ââ¬Å"dead languageâ⬠according to Hu Shi.By 1919 New youth written entirely in vernacular Chinese was joined by many other periodicals aimed at young people aspiring for new china. Magazines were filled with articles on western ideas including socialism anarchism, democracy, liberalism Darwinism pragmatism and science. All the major political and intellectual revolutionaries o f the early 20th century spoke out on the need to change the ways of thinking about women and their social roles. Early in the century the key issues were foot binding and womenââ¬â¢s education. Anti-foot binding campaigns depicted the ustom as standing in the way of modernisation by crippling a large part of the population. As women gained access to modern education they began to participate in politics. Schools for women were becoming more common in this period. In 1907 the Qing government mandated the opening of schools for girls. By 1910 there were over 40000 girlsââ¬â¢ schools in the country, with 1. 6 million students and by 1919 this had increased. Schools offered much more than literacy; they offered a respectable way for girls to interact with unrelated people.After 1920 opportunities for higher education also rapidly expanded leading to a growing number of women working as teachers, nurses and civil servants in the larger cities. At the end of World War One the treat y of Versailles ceded former German holdings in China to Japan instead of returning the territories to China even though China had sent troops to fight with the Allies in Europe. Such unfair treatment sparked a widespread intellectual uprising known as the May 4th movement. Focussing on the need for national strength and modernisation this movement also encompassed widespread cultural and literary innovation.These cultural products also saw new representations of women as two distinct archetypes: the New Woman and the Modern Girl. The new emphasis on women in the early 20th century and the public movements taking place (May 4th) show that to China modernisation meant a more Western liberal approach than ever before. To conclude one may argue that to be modern in East Asia in the early 20th century meant different things to Japan, Korea and China. However, similarities were greatly emphasised. For Japan there developed a robust parliamentary democracy supported by an electorate that encompassed the entire male population.The industrialised economy and modern bureaucracy fostered the growth of a well-educated middle class. Overall modern Japan contained conflicting visions of what it meant to be Japanese. For Korea Japanese colonial rule had both positive and negative effects. It established models for successful enterprises and by breaking down hereditary status barriers it opened opportunities to people previously blocked from upward mobility. By introducing modern education it introduced some Koreans to science, foreign languages and social science and enabled the birth of modern mass culture.In short Japanese colonialism produced wealth and poverty, acceptance and animosity, revolutionary potential and conservative reaction. For China modernisation meant the end of the two thousand years of monarchical government, the importance of nationalism and the emergence of political parties. Through the spread of modern schools and new publications a large proportion of the population knew of western countries and ideas. Radically new ideas such as individualism and democracy were being widely discussed and advocated. However, overall of most importance to the whole of East Asia was the similar way in which women were revolutionised.In Japan, Korea and China one may argue that the process of modernisation had the greatest impact on women and that one of the biggest aspects of adopting a more modern western culture in early 20th century East Asia, was the freedom for women to play more public roles in society. Bibliography 1. Edwin Arnold, Asiaââ¬â¢s first parliament: Sir Edwin Arnold describes the step in Japan, New York Times 26 January 1891 2. Ebrey, Walthall and Palais, East Asia: a cultural, social and political history second edition 2009 3. Sarah E Stevens, Figuring modernity: the new woman and the modern girl in republican China volume 15 number 3 2003
Sunday, January 5, 2020
Essay about Rwandan Genocide - 2279 Words
Rwanda has almost always been somewhat of a melting pot, much like other African nations. People of various ethnicities, occupations, and social classes lived in the country without much more trouble than the surrounding nations. Even so, much like other nations, Rwanda still had underlying issues beneath the surface that still had to be faced. Beginning on April 9th, 1994, the genocide had begun, leading to a systematic killing of over 800,000 Rwandans. For what reason were these people killed to begin with? Each of these people were killed for being either Tutsi, an upper-classed ethnic group in the nation, or for refusing to partake in the barbaric bloodletting. After the confrontations between the ââ¬Å"upper classâ⬠Tutsi and theâ⬠¦show more contentâ⬠¦However, a Hutu could still become a ââ¬Å"Tutsiâ⬠if he went up high enough on the social ladder, so if anything the separation was just a general statistic at best. By the time the late 19th century and early 20th century came along, after colonialists came into the area, a new policy was instilled which proclaimed that Tutsi were superior to Hutu, giving the Tutsi more privileges and better education than their Hutu counterparts (Twagilimana 22). After Belgium took control of Rwanda in 1918, it was decided that rather than allow Hutu to improve their living situation, they would be forced into a social class - ââ¬Å"upper-classedâ⬠Tutsis or ââ¬Å"lower-classedâ⬠Hutu ââ¬â depending on their ethnicity (ââ¬Å"Frontline: Rwanda Chronologyâ⬠; Twagilimana 22). In addition, the Hutu were no longer allowed to rise in class, and were stuck in their position for life. Further exacerbating the already strained relationship of Hutu and Tutsi masses, between the 1920ââ¬â¢s and 1930ââ¬â¢s, Belgian officials decided that ethnicity cards, or ââ¬Å"books,â⬠as described by some individuals, would be issued to every citizen of Rwanda, identifying them as Hutu, Tutsi, or of another race (ââ¬Å"Frontline: Rwanda Chronologyâ⬠; Rusesabagina 23). This suppression of Hutu continued on until the 1950ââ¬â¢s, when Hutus rebelled against a suppressing ruling-class that had oppressed them for so long. By the year 1962, the Hutu had finally taken control of the nation, causing thousandsShow MoreRelatedThe Genocide Of The Rwandan Genocide Essay1711 Words à |à 7 PagesThe Rwandan Genocide took place in 1994 and involved members of the Hutu mass killing Tutsi and Tutsi sympathizers who were Hutu. The genocide resulted in the deaths of around 800,000 people, majority Tutsi. The separation of classes came from Belgian internationals creating the two ethnic classes and giving power to the Tutsi who were taller and had lighter skin, and generally appeared more European. In response to this, after the country gained independence from Belgium, Hutu extremists gatheredRead MoreThe Rwandan Genocide And The Genocide1654 Words à |à 7 PagesMira nda Shearer Mrs. Sohal/ Mrs. Love Period 3 17 October 2014 The Rwandan Genocide A genocide is defined as the deliberate killing of a group of people, especially of a certain ethnicity. By that definition and almost any other a dictionary could define, the killing of the Tutsis was certainly a genocide.The Rwandan Genocide occurred in 1994, in an African country called Rwanda. A long history of building friction between the Hutus and the Tutsis undeniably caused the mass murder of over 800,000Read MoreThe Genocide Of The Rwandan Genocide1421 Words à |à 6 PagesThe Rwanda Genocide was an unfortunate case where thousands of deaths could have been prevented, but because of irresponsibility and selfishness of global governmentsââ¬â¢ innocent lives were lost. The Genocide began on April 6, 1994 and was, ââ¬Å"initiated by the Hutu political elite and extremists and its military support, their prime targets were the Tutsi, as well as Hutu moderates.â⬠(Hain 2) The Hutu made up majority of the population and government officials and enforced a government-ass isted militaryRead MoreThe Rwandan Genocide Essay959 Words à |à 4 PagesThe problems of today can often be traced in the beginnings of yesterday. The Rwandan Genocide was a divisive division of two groups that culminated in the mass murder of nearly 500,000 Rwandans, three-fourths of the population. The tactful subterfuge by the ruling party fueled the separation of two ethnic groups that reminisce the events in Europe 55 years earlier. Naturally, the question becomes, how? Simply speaking it was the indifference of global elites and political demagoguery that incitedRead MoreThe Rwandan Genocide And The Genocide866 Words à |à 4 PagesThe Rwandan genocide occurred during the period of April to July of 1994. This genocide was as a result of the Hutu ethnic majority slaughtering the Tutsi minority. During this period as much as 800,000 Tutsis were killed. The genocide was started by Hutu extremists in the capital of Kigali and the genocide soon spread across the country. Despi te all of this there were several survivors of the genocide. Immaculee Ilibagiza is one of those people. Immaculee Ilibagiza was born in 1972. She is theRead MoreThe Rwandan Genocide1335 Words à |à 5 PagesRwanda is a country made up of a population with three ethnic communities, the two main communities, the Hutu and Tutsi and an additional community of Twa (or pygmies) who all spoke the same language, Kinyarwanda or Rwandan (Clapham, 1998). There is a stereotype of appearance attributed to these two main communities, with Tutsi being seen as tall and having an aquiline shaped nose, and the Hutu as being short and flat-nosed (Clapham, 1998). In the pre-colonial state of Rwanda, it was the TutsisRead MoreThe Genocide Of The Rwandan Genocide2458 Words à |à 10 PagesGenocide has been plaguing the world for hundreds of years. Millions of innocent lives have been taken all for the sake of prejudice. One of the most atrocious aspects of genocide is that a large percentage of them are sponsored by the state in which they are taking place. Over the years scholars have studied just wha t motivates a state to engage in such awful behavior. What motivates them? Why would they do such horrendous things to their own citizens? Is it solely for some economic incentive, orRead MoreThe Genocide Of The Rwandan Genocide Essay2042 Words à |à 9 Pagespeople that commit genocide; we are all capable of it. Itââ¬â¢s our evolutionary historyâ⬠(James Lovelock). According to the Oxford dictionary, genocide is defined as ââ¬Å"the deliberate killing of a large group of people, especially those of a particular nation or ethnic group.â⬠Although it may be hard to believe, genocides have occurred all over the world and all throughout time. There have been well documented genocides such as the Holocaust. Additionally, there have also been genocides that have barelyRead MoreThe Rwandan Genocide1188 Words à |à 5 PagesRwandan Genocide The Rwandan Genocide began on April 6, 1994 and lasted for about 100 days (History). The two groups involved, the Hutus and Tutsis, were in a massive conflict after their president was killed. The Hutus brutally killed about 800,000 Tutsis and supporters. This tragic genocide was not stopped by other countries during its peak, leaving the world wondering why. As we commemorate the 20th anniversary of the Rwandan Genocide, it is important to be informed about the tragedy. The wayRead MoreThe Rwandan Genocide And The Genocide1637 Words à |à 7 PagesWith over eight hundred thousand to one million deaths, the Rwandan genocide is undoubtedly one of the most sad and shocking examples of the lack of intervention by not only the US and the UN, but by other countries as well. The ongoing tensions between the Hutu, the largest population in Rwanda, and the Tutsi, the smaller and more elite population is what eventually lead to the Rwandan genocide. The killings began quickly after President Habyarimana s plane was shot down. After hundreds of thousands
Saturday, December 28, 2019
The Scarlet Letter By Nathaniel Hawthorne - 2288 Words
The Scarlet Letter Analysis, ââ¬Å"On the breast of her gown, in fine red cloth, surrounded with an elaborate embroidery and fantastic flourishes of gold-thread, appeared the letter A.â⬠(40) Every aspect of the story of Nathaniel Hawthorneââ¬â¢s, The Scarlet Letter, whether it be major or minor, stems from this line. From beginning to end, the scarlet letter has a major bearing on the unfolding of the plot. Hester Prynne, an adulteress, is spared death for her sin, but she must wear a scarlet letter ââ¬Å"Aâ⬠for the rest of her life. Her husband, who has been living with Native Americans for the past two years, arrives in town just in time to see her holding a baby and being publicly humiliated for the crime of adultery and vows to get revenge. Asâ⬠¦show more contentâ⬠¦Through development of the two characters, Hester Prynne and Arthur Dimmesdale, Hawthorne melds a vision of a world in which adversity and freedom enhance the life of the soul. To begin with, Hawthorne presents a tale of persevering though it feels as if everything is crumbling, which is revealed in the metamorphosis of Hester and Dimmesdale, a transformation from hopelessness to hope in both of their cases. In the case of Hester, she cannot give up, even though her future seems terrifyingly dim. She has Pearl to live and make a life for, so she must force herself to push forward through the pain. ââ¬Å"But she named the infant ââ¬ËPearl,ââ¬â¢ as being of great price,-purchased with all she had,-her motherââ¬â¢s only treasure! How strange, indeed! Man had marked this womanââ¬â¢s sin by a scarlet letter which had such potent and disastrous efficacy that no human sympathy could reach her, save it were sinful like herself. God, as a direct consequence of the sin which man thus punished, had given her a lovely child, whose place was on that same dishonored bosom, to connect her parent for ever with the race and descent of mortals, and to be finally a blessed soul in heaven!â⬠(67) God has given Hester this wonderful, lovely baby girl, her one and only treasure, as a result of what the townspeople think is one of the worst acts a woman can commit. Even though her punishment is harsh and results in the alienation of her from the community, Hawthorne makes sure to include
Thursday, December 19, 2019
Organizational Culture Inventory of LOccitane - 1645 Words
Introduction The organization being discussed is Lââ¬â¢Occitane, the French company, which is one of the most successful businesses in the world. Lââ¬â¢Occitane means ââ¬Å"Women from Occitana.â⬠The company was found in 1976 by Oliver Baussan in Provence, France. Lââ¬â¢Occitane is well-known for natural beauty products that never tested on animals. Overall, most of the products in Lââ¬â¢Occitane are made out of 86% natural ingredients. However, some of the new products are made out of 96% natural ingredients and were certified by Ecocert. Ecocert is an organic certification organization in France that certifies food products, beauty care, and perfumeâ⬠¦etc. The brand value of Lââ¬â¢Occitane are ââ¬Å"Authenticity and Naturalness,â⬠ââ¬Å"Effectiveness and Pleasure,â⬠â⬠¦show more contentâ⬠¦Even though, they know they have made the mistakes. I always be the one who stood up and held the customers and ease their anger. I would call the store man ager or district manager and help solve the problems for the customers if any problems that are beyond my ability because we have to follow the company policies at all times. The company did not want the sales associates to take care any serious problems because it may cause troubles for the superiors and affect the companyââ¬â¢s reputation. Targets for Cultural Change TARGETS FOR CULTURAL CHANGE GRID OCI Norms Ideal Score Your Current Score Gap* Achievement 78% 94% 0 Self Actualizing 82% 97% 0 Humanistic 85% 96% 0 Affiliative 71% 90% 0 Approval 27% 98% -71% Conventional 18% 95% -77% Dependent 24% 98% -74% Avoidance 27% 89% -62% Oppositional 45% 93% -48% Power 30% 96% -66% Competitive 42% 98% -56% Perfectionistic 25% 98% -73% The greatest gap between Lââ¬â¢Occitane and the Ideal score is conventional. The company have made those policies for the employees to follow is to avoid any serious situation between the employees and the customers, and the loss from returns. Based on the US, Lââ¬â¢Occitane must have the return policies because it is a high-end brand and they want the customers aware that it is important to have their receipts if they want to return or exchange, no cash refund, and no refund on any sale items. If it
Wednesday, December 11, 2019
Implementation of IOT in Health Care System-Samples for Students
Question: Discuss about the Implementation Of IoT In Health Care System. Answer: Introduction Internet of things has evolved over the years, thanks to the advancement of various interconnected technologies like IPv6, wireless network and microcontroller and sensor electronics. The evolution of the IoT has heavily influenced various sectors like business, sports, health and many more. IoT in healthcare is an important research topic as the technology has lot of potentials for the sector in terms of bringing more automation and transparency in healthcare administrations (Gope Hwang, 2016 ). However the threats that the technology poses along with the benefits needs careful attentions. The task to control the systems and integrate it with the IoT technology is indeed challenging. Researchers are particularly concern about this, even more than the benefits that the system will provide following the implementation . Different methods have been provided by different researchers to control IoT devices and the topic has managed to get widespread attentions and provides an excellent opportunity to conduct further research in the field to come up with even better solutions (Wu et al., 2017). Data protection is one of the critical issues that need to be considered when dealing with the network devices. Security plays a vital role in the context of IoT technology (Tyagi , Agarwal Maheswari , 2016). In case there is a malicious attack or interference takes place and the attacker becomes successful in hacking the network of the system then they will be able to steal important data that is intended to be kept safe and private for the data is highly sensitive in nature. In order to protect the devices from outside access that is intended for illegal purpose, it is important to have the correct security measure in practise. Authentication has an important role to play to ensure security of the IoT devices. Different researchers have provided different mechanism for authentication for the IoT devices and network (Bhatt, Dey Ashour, 2017). However the mechanisms have certain drawbacks. The mechanisms have not considered the limitations of IoT devices which have often very limit ed resources in terms of memory and processing power. In order to design effective authentication techniques it is important to combine the characteristics of the end devices and a proper balance should be maintained between the available resources so that efficient, secure and suitable authentication mechanism can be designed that suits the need of the IoT environment (Laplante Laplante , 2016). Here the overall introduction of the topic is given. Factors like importance of the topic, justification for the topic selections and the need for the research on the topic have been discussed. The process to ensure the data security in IoT is challenging task. The report will discuss the methods to ensure the data security and how it can be implemented using the ECC authentication algorithm. Background/Literature Review Li et al.,( 2018) have talked about the importance of RFID technology for the device authentication in the IOT environment. RFID or the radio frequency identification technology helps to identify a device remotely with the RFID tag. The authors points out that RFID technology is highly efficient I recognizing devices. The authors further add that in the IOT environment, millions of devices are connected to the internet and with each other as well. Hence it is important to implement techniques that can help to identify the devices amongst the polls of connected devices. RFID technology has lot of potential in this context. RFID tags has the ability to store information and send this information remotely, thus enabling the wireless communication between the devices and the database that store information about this devices. This information can be then used for the identification of the devices. However the authors suggest that there should be proper data monitoring technology in order to derive useful information from the data sent by the devices connected over IP network. Once the data is sent by the smart and RFID enabled devices over the IP network, the data is then processed in the central data base and converted into human readable format. One of the most important features that make RFID tags more efficient than the standard barcode technology is the ability of the RFID tag to support more advanced communication style. In order to read information from the RFID tag it is not mandatory for the device to be in the line of sight which means that the device can be tracked from anywhere. In the IOT environment, wireless communication plays an important role and technology like this, according to the authors, only increase the efficiency of the communication with ease in device identification. Lopes Hilgert (2017) have proposed for two phase algorithm for group authentication: pre authentication phase and group authentication phase In the pre authentication phase the GA of the group who is responsible for creating the group generates a public key and associated private keys. This keys are then used for authenticate the devices in the group. The keys are generated using the threshold cryptosystem. In the group authentication phase the authenticity of every devices in the group is checked using the private and public keys that were generated in the pre authentication phase. The GA in this phase creates another random secret key that is shared among all the devices in the group and the devices need to address the random key to complete the authentication process in the group authentication phase. Jan et al., (2016) have provided a mutual authentication schema for the IoT implementation in health care. This schema helps to validate the identities of the IoT devices. The schema first identifies the devices in the IoT environment before the devices are actually integrated in the real network. In order to perform the authentication in the IoT environment before integrating with the network the authors have proposed for decreased communication overhead. The schema is based on the. Constrained Application Protocol or CoAP. The authentication is performed using the 128-bit Advanced Encryption Standard or AES. The authors suggest claims that due to such high level of encryption value the devices are highly secured in the IoT environment where the security playsa major role for successful implementation of the technology. In the CoAP technique, the identity of the server and the client is first is verified. Based on the identity the system then allows the client to access the server b ased on the conditions that was determined by the protocol in the request made by the client. Thus it is not easy for the user to access the server without performing proper authentication and the verification of the request is also necessary to get access to the server. Hofheinz Jager (2016) have proposed for public key algorithm for the authentication purpose. Data that is collected by the IoT devices is stored in the cloud servers and secured database. However it is important to note that in order to protect the data it is very much important to protect the authenticity and the integrity of the data. The integrity of the data can be maintained by the mechanism called message digest which is a secured hash algorithm. The algorithm produces predefined hash value to secure the digital content. It is not easy to access a digital content and modify it without the proper authentication if the content is secured with a predefined hash value. The authenticity of the data can be maintained by the public key based key based digital signature technique. In the public key based cryptography algorithm two keys are generated known as public and private key. The private key belongs to the owner of the data which needs to be used to prove the claim of the user t hat the user really owns the data. The public key is for the use of other users who wants to access the content. The public key is accessible to anyone who wants to verify the signature of a digital content or data. Stallings (2016) has proposed for hashing algorithm for digital content cryptography. The signature for the data is produced by hashing the digital content and a hash value is produced in this process. The value is attached to the content as the form of digital signature. In order to the read the content the digital content needs to be hashed again and in the second step the hashed value which is reconstructed in the hashing of the content has to matched with the public key along with the signature that is attached with the content. Su, Wong, Chen (2016, May) have proposed for a group authentication technique. The technique is based on the Threshold Cryptography. The scheme is used for the authenticate devices in a group. The authors describe that in the IoT environment lot of devices are connected together. Hence the task of securing those devices is a challenging option. However with the use of the group authentication technique it is possible to authenticate devices in a group. The authors have used the method of releasing the token to perform the authentication. The method is based on the Shamirs secret sharing scheme. The algorithm is implemented in the Wi-Fi environment. Each group in the network constitutes a set of devices and the devices communicate with each other by sharing secret key. There may be any number of groups and the range of the connectivity is decided based on the Wi-Fi standard. The groups can even overlap with each other and one device may belong to more than one group. However there is a primary device in every group which is responsible for monitoring the communication in the group. Each time a new device is added to the group, a new key pairs is generated which is distributed by the primary device within the group to keep the existing devices in the group updated about the inclusion of the new devices in the group. The TCGA algorithm constitutes of five key modules 1. Distribution of key. 2. Updating of key. 3. Generation Group Credits. 4. Authentication of Listener. 5. Message Decryption Moosavi et al., (2015) have proposed for SEA architecture for IoT based healthcare system. The architecture consist of smart health gate-ways. The health related information is captured from the sensors that are either body-worn or implanted. The sensors collect data of the patient and send it to the database for monitoring purpose. The architecture consists of medical sensor network, smart heath gateway and back end system. The medical sensor networks helps in sensing, identifying and communicating the medical related data. Sensors are attached with the patient. The sensors are highly advanced and help to collect necessary information about the patient condition. The sensors measure body temperature and collect data about the bio-medical and context signal. This data are useful to monitor the condition of the patient. The sensors can also supplement the data with the context information like date, time and location which helps toget precise information about the medical condition of the patient. The bio medical and the context signal that is captured by the sensors are transmitted to the gateway. The data is sent to the gateway with the help of wired and wireless communication protocol. the communication protocols include standard communication standards like serial , SPI , Bluetooth technology. Signal can also be sent using the Wi-Fi or IEEE 802.15.4 wireless communication standard. Rahman et al., (2015, January) have proposed for smart health gateway. Smart health gateway which supports the communication protocol serves as a connecting point between the MSN and the local switch or network. Data generated from different sub -networks are received by this gateway. The protocol conversion is also performed by the gateway. The gateway also aggregates the collected data and is also capable in data filtering. The gate way even provides some higher level service like dimensionality reduction of the collected data. The back end system constitutes the remaining part of the architecture. It includes a cloud platform where the data is stored for processing. The system also includes data warehouse and big data analytic servers where data are analyzed to extract the meaningful information from the collected data that helps to find the relevant information about the patient. The back end system also consists of local data base of the hospital where the data is stored tempora rily before it is sent to the cloud server and big data analytics server. The system also consists of web clients which provides the interface for the data visualization and data apprehensions. Porambage et al., (2014) have proposed for two phase authentication protocol to authenticate and secure the IoT devices. According to the authors the protocol is highly efficient for authentication purpose. In the wireless sensors networks that follows centralised architecture consists of a central entity. the sensor nodes in the network collects information from the sensors and send it to the central entity that is responsible tom maintain the centralised network, the fadta is themn proceesed by the central entity and the information is provided over the network. However IOT follows distributed network architecture. There is no central unit that collects and process the information. The mechanism is completely different from the centralised network. Here the sensor nodes are responsible for sensing the data. The data is then processed by the sensor nodes itself and then the information is exchanged with other nodes in the network. However there are certain security concern that need s to be addressed while following such distributive network architecture. There are serious threats of the devices to be hacked and once a node is hacked it is possible to exploit other nodes in the network as well. once the nodes are hacked it is possible to obtain sensitive information from the nodes and based on the field of application the sensitivity of the data varies. When implementing IoT in the context of healthcare it is much more important to secure the information with proper authentication technique. The authors have proposed two phase authentication technique. In this proposed technique the authors describes the mechanism to authenticate the sensor nodes and the devices that are used for end to end communication. In the first phase the nodes generates a authentication key to be used by the communicating devices. In the next phase the communicating devices will generate another key. The key will then be verified by the communicating node and if matches only then the com munication will takes place. The mechanism, as per the authors will enhance the security of the devices and also help to authenticate the devices more securely. Lee, Alasaarela Lee (2014, February) have suggested for a authentication scheme for securing the IoT servers. The scheme is based on Elliptic Curve Cryptography (ECC) based algorithms. The authentication protocol proposed by the authors is applicable for the embedded devices that follow the HTTP protocol. The protocol makes use of the cookies generated by the HTTP protocol for authenticate the devices. The devices need the TCP/IP configuration to be connected with the protocol. The embedded devices are often limited in size and processing power. That is why the algorithm designed for the embedded system has to be efficient and it has to address the constraint that the embedded devices bring in the IoT environment. The architecture that has been proposed by the authors uses HTTP cookies which, according to the author have been optimized so that it fit in the constrained environment of embedded devices. The protocol consists of three phases namely Registration phase, Pre-computed and login phase and authentication phase. In the registration phase the devices register with the cloud servers and upon successful registration the server send back a cookie which is stored by the device. In the next phase or the Pre-computed and login phase, the device has to send a login request to login. Once the login request is accepted the device enters into authentication phase. In the authentication phase the device needs to send the cookie provided by the server during the registration phase. The server then checks if the cookie matches with the cookie provided by the server during the registration phase. The device is authenticated only if the cookies matches, otherwise error message are generated by the server. The authors claim that the mechanism is quite useful and advanced in managing authentication related issues. Solutions Based on the literature review the project finds out the following requirements: Review of the authentication issues in the IoT enabled healthcare system Design of proper authentication algorithm Review of the algorithm Comparison of the algorithms proposed by previous works Suggest the most appropriate algorithm based on the assessment of the strength and weakness of other proposed techniques by previous researchers. Future Research One of the major challenges that make the IOT environment venerable to security threats is the lack of proper security measure for the device authentication. There are lot of security issues in the IOT environment. However the prevent resource exhausting is the most concerning fact that the developers must address in order to maintain the device security intact in the IOT environment. In order to propose the effective security algorithm for the IOT devices the resource constrains must be taken care of. IOT devices are often resources limited. The devices have very limited resources in terms of processing power and storage memory. Hence the algorithm must be optimized in such a way it supports the limited processing power and storage of the IOT devices. The mechanism that has been proposed in the report has been optimized according to the resources available. The mechanism is based on the Constrained Application Protocol (CoAP) [31] and Elliptic Curve Cryptography [32]. The application protocol or is designed in accordance with the IETF working group. It provides overview about the Constrained Restful Environment (CoRE). The knowledge about the CoRE helps to define the implementation architecture that is suitable for the the sensor nodes implemented in the highly constrained environment like IOT. The CoAP protocol is highly efficient to create communication between these constrained nodes. The protocol defines the web interfaces that help to make communication between the nodes to make device communication over the connected network. In the figure 1, different protocol stack has been shown. These protocols are commonly used in the IOT environment. In order to understand the effectiveness of the CoAP protocol for the IOT environment, it is important to have in-depth knowledge about the most widely used protocol that has almost made dominance on the internet communication technology. It is known as The Hypertext Transfer Protocol or HTTP. In order to understand the reason why the HTTP protocol is not chosen for the IOT implementation, despite it being so popular and widely used for the internet communication, the drawbacks of the protocol must be clearly defined and also needs to be carefully analyzed. HTTP is basically a structured text that finds the logical link or the hyper link between the nodes that contains the text. This links are used by the protocol to facilitate communication between the nodes. With the introduction of the Internet of the things or IOT, the definition of the internet has been completely redefined. The internet is not all about the human interaction anymore. With the IOT, machines and the devices are g etting connected to the internet in a rapid rate. With the context of the internet getting redefined, the requirements for the communication are also changing. The IOT communication has some special needs which the HTTP protocol is not efficient to address. In IOT communication, the information generated by one node needs to mapped to all the nodes that participates in the communication. small packets of information must be shared in high volume due to vast amount of data generated by the devices or the communication nodes. HTTP protocol is not efficient in addressing these requirements of IOT communication. the important feature that makes the CoAP appropriate for the IOT communication is that it allow machine to take the roles of both client and server and also allows to switch between these roles whenever it is necessary. It also supports asynchronous message transfer over the protocol which follows datagram orientation. One popular example of such protocol is the UDP protocol. A n optional request or response layer is also included with the CoAP messaging for providing connection that is reliable like the Transmission control protocol or TCP. The CoAp layer has been shown in the figure 2.The operational layer is useful for the dealing with the UDP protocol as well as dealing with the asynchronous interactions between the communicating needs. A 4 byte header file is generated for minimizing the traffic due to traffic overhead. CoAP includes methods like GET, POST, PUT and DELETE which provides codes for the device to response to the communication request. The code is also necessary for reflecting the execution status for the client request. CoAP provides four different types of messages: CON Message: It means Confirmable request. When a CON message is sent by a source node, then it is the responsibility of the recipient to send the response message using the ACK or the Acknowledge message. The message is of high importance and must be treated with importance . NON Message: It refers to the message that is Non-Confirmable. Whenever a NON request is sent by the sending node, the is no need for the recipient to respond to the message. The message is not of much importance ACK Message: It refers to Acknowledgement messages. Once the sending node sends the CON message, it should be acknowledged by the recipient. However it is not sufficient to acknowledge the message by the recipient the sending node must be made aware of the fact that the recipient has received the message and it should be forwarded to the sending node. The recipient must sent the ACK message to the response of the CON message. The ACK message may also contain information about the details about the message processing. RST Message: It refers to the RESET message. Now it might be possible that during the communication there occur errors due to reason like network traffic, internet speed. Now in order to make the communicating node aware of this, the recipient of the message must send RST message. It will help the sending node to understand that error has been occurred in the communication process. in case the recipient does not make the sending node of this communication error, it will continuously send message to the recipient, it will not only increase traffic over the network, a lot of data packet will remain on the network without processing which will affect the communication between other communicating nodes connected to the same network. The RST message will help the sending node to understand that the recipient is not able to understand the message or the recipient is no longer interested in receiving the message which will help to avoid network traffic due to sharing of message without any particular pu rpose. In order to achieve security restrictions of similar level, ECC considers key of smaller sizes. Although there are several other asymmetric cryptographic keys, but the security level provided by the ECC algorithm is much better and improved. Those features provided by the other algorithms considers larger key sizes, for instance a 256-bit symmetric key must be secluded by at least 15,000-bit RSA, on the other hand, ECC uses an asymmetric key size of only 512 bits to ensure equivalent security level. This decrease in the key size makes it possible for significant cost saving and more compacted design execution. Chips that are smaller are able to run cryptographic process in a much faster rate. It also minimizes the power consumption thus increase the efficiency .these features are especially appropriate for environments where there are resource constrain issues. A comparison of key size with equivalent security levels between ECC and RSA has been provided in the subsequent section. Key size ( ECC) Key size ( RSA) Reduction ratio (approximate) 162 1024 1:16 256 3074 1:12 383 7684 1:20 512 15365 1:30 The authentication mechanism proposed here will help to implement ECC authentication mechanism over CoAP connection. These two approaches when combined will help to optimize overhead to the IOT network. It will further help in minimizing the communication as well as the pocessing power that is required to make authentication of the IoT devices. It is also effective in achieving powerful and efficient security for the IoT devices. Authentication mechanism can be passing through multiple stages. Stage1: It is the initialization phase. Here the Control system generates a private key that is used for communication with the ECC. Stage2: It is the device registration phase. It includes the pre authentication process over CoAP where IoT devices are checked if it is already authenticated or not. Control station will then checks the device ID that will help to find out whether there is a corresponding entry for it. If there is no entry of device then an ID will be generated with the help of control private key. Along with it an encrypted password will be generated which will be stored back in the IoT device. Stage3: Mutual authentication stage, IoT device use this password to generate authentication key and send it back to the control system when it is try to connect it. Control system check these key using corresponding IoT entries stored at the control system. Stage4: All traffic pass between IoT devices and control station then will be encrypted and secured against different types of attack. Figure 5 proposed authentication mechanism shows the detailed steps of proposed authentication method between IoT device and control station. Advantages/ Disadvantages (5 marks) Constrained Application Protocol can be referred to as the web transfer protocol that is specially designed in order to make it compatible with constrained devices as well as constrained networks CoAP are specially appropriate for designing protocol that implements a request/response based interaction that is implemented for communication between the endpoints of communicating nodes or the networks CoAP contains some key concepts of the Web including URIs and Internet media types CoAP happens to be very common and at the same highly reliable. It is an effective choice for the application of data transferring, especially for the IoT environment. Elliptic Curve Cryptography refers to asymmetric cryptographic algorithm. It is applied for providing security and that too with the same level as provided by RSA. However the special feature of ECC is the key size as it works with much smaller key sizes. ECC works with much smaller key sizes while providing security of higher level . Due to smaller devices and lower processing power the IOT environment is highly constrained. However ECC works finely with the constraint environment of IOT ECC has the ability to provide encryption that is highly reliable. It also helps to minimize the overhead of the IOT network. Conclusion In this paper, a thorough review has been conducted on the use of IoT in healthcare. Security issues are highly critical when dealing with the healthcare system. In order to overcome the issues authentication mechanism has been proposed. The mechanism is highly reliable. While proposing the mechanism it had been made sure that the mechanism is compatible with the IOT devices. The IOT devices have limited memory and also have limitation in terms of processing power. Hence it has been made sure that the proposed mechanism address the constrains of The proposed reliable authentication mechanism mainly depends on CoAP with ECC algorithms. Proposed method fit the requirements of IoT constrained devices. Small ECC key has reduced the calculation requirements while providing a powerful encryption better than other types of cryptography. References: Bhatt, C., Dey, N., Ashour, A. S. (Eds.). (2017). Internet of things and big data technologies for next generation healthcare. Gope, P., Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network.IEEE Sensors Journal,16(5), 1368-1376. Laplante, P. A., Laplante, N. (2016). The internet of things in healthcare: Potential applications and challenges.IT Professional,18(3), 2-4. Tyagi, S., Agarwal, A., Maheshwari, P. (2016, January). A conceptual framework for IoT-based healthcare system using cloud computing. InCloud System and Big Data Engineering (Confluence), 2016 6th International Conference(pp. 503-507). IEEE. Wu, T., Wu, F., Redout, J. M., Yuce, M. R. (2017). An autonomous wireless body area network implementation towards IoT connected healthcare applications.IEEE Access,5, 11413-11422. Hofheinz, D., Jager, T. (2016). Tightly secure signatures and public-key encryption.Designs, Codes and Cryptography,80(1), 29-61. Jan, S. R., Khan, F., Ullah, F., Azim, N., Tahir, M. (2016). Using CoAP Protocol for Resource Observation in IoT.International Journal of Emerging Technology in Computer Science Electronics, ISSN, 0976-1353. Lee, Y. S., Alasaarela, E., Lee, H. (2014, February). Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. InInformation Networking (ICOIN), 2014 International Conference on(pp. 453-457). IEEE. Li, C. T., Lee, C. C., Weng, C. Y., Chen, C. M. (2018). Towards secure authenticating of cache in the reader for RFID-based IoT systems.Peer-to-Peer Networking and Applications,11(1), 198-208. Lopes, A.P.G. and Hilgert, L.D.O., 2017. Group authentication protocols for Internet of Things (IoT)QoS and Security Properties Evaluation. Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J., Tenhunen, H. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways.Procedia Computer Science,52, 452-459.Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M. (2014, April). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. InWireless Communications and Networking Conference (WCNC), 2014 IEEE(pp. 2728-2733). IEEE. Rahmani, A. M., Thanigaivelan, N. K., Gia, T. N., Granados, J., Negash, B., Liljeberg, P., Tenhunen, H. (2015, January). Smart e-health gateway: Bringing intelligence to internet-of-things based ubiquitous healthcare systems. InConsumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE(pp. 826-834). IEEE. Stallings, W. (2016).Cryptography and network security: Principles and practice. Pearson. Su, W. T., Wong, W. M., Chen, W. C. (2016, May). A survey of performance improvement by group-based authentication in IoT. InApplied System Innovation (ICASI), 2016 International Conference on(pp. 1-4). IE
Wednesday, December 4, 2019
Ryanair Macro Environment Essay Example
Ryanair Macro Environment Essay This report studies one of the largest low cost airlines in Great Britain and Europe ââ¬â Ryanair. This company is a 20-year-old international air carrier based in Dublin (Ireland), with 36 bases and 950+ low fare routes across 26 countries, connecting 151 destinations. The organisation was founded in 1985 as a conventional airline but re-launched itself in 1990/1991 as a low-cost carrier, replicating American Southwest Airlines business model. From the very beginning its strategy was to offer simple, low-cost fares and excellent customer service, which they can be proud of these days. REFERENCES The purpose of this report is to evaluate the market environment of the company by using PESTLE Analysis, which gives Ryanair the opportunity to identify the main factors affecting the industry. Moreover, it also analyses the impact on the business from the competitors and competitive environment. 2. Macro Environment ââ¬â PESTLE Analysis 2. 1 Political forces * The increased Trade-Union pressure in Europe; The European Union expansion (the EU may be a big factor affecting the strategy planning for Ryanair, as the number of countries joining EU increases the number of countries for which they will need to supply their services); * Increased terroristic activities have leaded airline industry to tighten security measures. * Since the political situation in most major oil producing countries will stay unstable for the unpredicted future- the oil prices will stay a major problem for airlines. The fuel cost issue is getting worse by unpredictable currency exchange rate instability since aircraft fuel prices are denominate in US dollars. We will write a custom essay sample on Ryanair Macro Environment specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Ryanair Macro Environment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Ryanair Macro Environment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer However, the weak dollar compared to pound sterling has had a positive impact for Ryanair. 2. 2 Economic forces In this factor business may be affected by: * Recession, which surprisingly is good for Ryanair traffic growth because competitors have traffic falls, and are increasing their prices. As recession forces millions of passengers to focus on price, more and more passengers are attracted to Ryanairââ¬â¢s low cost fares model, and switching their ââ¬Å"brand loyalityâ⬠to more affordable Ryanair. More customer means profitability, which lets to keep the prices low and continue to grow. Fuel price increases; at the moment, the oil prices are at their highest level for 22 years, which can affect the prices of aircraft fares. However, Ryanair chief executive Michael Oââ¬â¢Leary states that they will be still offering all passengers on all routes the lowest prices guarantee and avoid fuel surcharges. 2. 3 Social forces For the social forces, the increasing travelling lif estyles are the factor that may affect the business of Ryanair. In this section the most important are the customers, thus company needs to provide even better: * Customer service The best punctuality ( Ryanair improved it by 88% in the last 12 months); * The fewest cancellations (see appendice 2). * The least lost bags (see appendice 2). * Protection of the passengers * CCTV cameras * metal detectors for passengers * x-ray machines for baggage * Trace detectors, etc. Moreover, there is reliable software in Ryanair website, which let the customer to feel safe when buying the flight tickets, car hire, hotel accommodation, travel insurance and rail services, etc. http://www. ryanair. com/site/about/invest/docs/2008/Annual%20report%202008%20web. df 2. 4 Technological forces * In the past few years ? 23 million has been spent on IT programme to protect airlines against crime, cyber terrorism and vandalism. After 11th September 2001, the newest technologies are required in the airports, which cost loads of money for business and stress for the customers. Additionally, it is one of the reasons for delays, as baggage and passengers must be checked very carefully. However, without technologies such as body scanner, metal detector, x-ray machine, it would not be possible to ensure the sec urity. SSL (Secure Socket Layer) technology is used to protect personal information and credit card details, then booking the tickets online. * Ryanair is investing in the latest aircraft and engine technologies in order to improve their impact on environment. They trying to reduce fuel emissions and noise. * All of Ryanairs older Boeing 737-200 aircraft have now been replaced with brand new Boeing 737-800 Next Generation aircraft. * Technology called Mobile OnAir, provided by Swiss, allows passengers to use mobile access to voice and text communications on all of Ryanair flights. This new technology has been launched in February, 2009. Passengers will be charged to make and receive voice calls and SMS messages via satellite broadband links. The connection between the plane and ground is carried by satellite operator Inmarsat. http://www. dailymail. co. uk/news/article-1149921/Ryanair-launches-Europes-flight-mobile-phone-service. html * Ryanair offers self-service payment terminals equipped with chip-and-PIN readers to allow the customers to purchase optional services before they fly. In addition, it is expected to speed up the check-in processes. http://www. computing. co. uk/computing/news/2246111/ryanair-presses-ahead-payment 2. 5 Legal forces The tragedy of September 11th, 2001 marks the day that air travel permanently changed. After this date, the tighten security measure is affecting the business. Government had set up restricted rules for passengers in the airport, which includes: * Hand baggage restrictions; * Travelling with liquids ââ¬â 100ml rule; * Prohibited items (Scissors, Lighters, Knives, etc. ) All passengers are strictly checked on metal detectors and new security body scanner equipments, which reveal any potential threatening items that passenger, may be carrying. Their bags are screened with x-ray machines, and approximately 50% of them are checked by security dogs. Moreover, some passengerââ¬â¢s rights take the pace in legal sector: * Disabled people are protected from discrimination and can rely on right help to assist their journey through any EU airport; * Passengers may be entitled to compensation (from â⠬ 125 to â⠬ 600) if denied boarding, long delays, or cancellations occurs. They also may be entitled to receive assistance (catering, communications, and an overnight stay if necessary). http://ec. europa. eu/transport/air_portal/passenger_rights/doc/2008_apr_leaflet/apr_leaflet_en. pdf 2. 6 Environmental forces According to White Paper (2003), more must be done to decrease the environmental effects of aviation and to limit the number of people significantly affected by aircraft noise and waste. The worldââ¬â¢s 16,000 commercial jet aircraft generate more than 60 million tonnes of carbon dioxide a year. At the moment there is no value-added tax (VAT) for airline industry on jet fuel. Environmental campaigners in the UK are pushing the Government for changes in their policy and tax aircraft fuel. (key note, 2006, p13) However, Ryanair have been trying to be the most environmentally friendly and reduced fuel burn and CO2 emissions by 45% over the past 10 years. (see appendix) This has been achieved as follow: * Fuel emission: * By numerous fuel saving measures (including the use of the latest aircraft and engine technology, e. . , winglets); * Commercial measures aimed at maximising passenger numbers per flight in order to spread the fuel use and CO2 emissions over the greatest number of passengers (efficient seat configuration and high load factors). * Noise: * The function of modern technology (reduce the noise affected area at airports by 6. 5%); * The remote location of the majority of airports Ryanair operates from; * The absence of night operations; * Agreement with all local no ise restrictions. * Waste: Ryanair does not offer free meals, drinks or newspapers to passengers, what should reduce large amounts of waste from food, packaging and newspapers as a result. These days Ryanair is the industry leader in terms of environmental competence and it is regularly working towards further improvements in this field. It thinks that taxing air transport will not have any effect on reducing greenhouse gas emissions. (http://www. ryanair. com/site/EN/about. php? page=Aboutamp;sec=environment) 3. Competitive Environment Ryanairââ¬â¢s growth is driven by the widening gap between the guaranteed lowest fares, and the rising fares of most of their competitors, who have frequently increased fuel surcharges over the last year. 3. 1 The main competitors are: * Aer Lingus Group PIc (AL);They fly about 7 million passengers per year to 50 destinations in Ireland, the UK, the US and Europe. Following the financial crisis related to the September 11, 2001 terrorist attacks, AL applied a ââ¬Å"survival planâ⬠, which included a staff cut of over 2,000 employees, and sales of non-essential assets. The airline also adopted a new lower fare strategy which has resulted in significant increases in revenue and profits. This step increased competitiveness for Ryanair, as low cost fares is its main strategic factor. * British Airways Plc (BA) is a very large, full-service airline based in Hammondsworth, England. Today, BA flies to 154 destinations in 75 countries with a fleet of 300 aircraft. Interestingly, the market cap of BA is slightly less than the market cap of Ryanair, a much smaller airline. British Airways provides high prices, what
Subscribe to:
Posts (Atom)