Monday, September 30, 2019

Memories of my childhood Essay

Thinking back when I was ten brings up a lot of memories of my childhood. I was a tom boy and a big eater because of my high metabolism and extremely high energy level. I look back at my favorite foods and there are many that come to mind. I loved Chef Boyardee Ravioli and Spaghetti O’s. I also loved my mom’s homemade chicken and dumplings and bisquits, peanut butter and banana sandwiches, and mom’s cookies. These have been my favorites throughout the years with the exception of the Chef Boyardee Ravioli and Spaghetti O’s. My mom has taught me how to prepare some of her recipes so that I may pass them on to my children and them to theirs. I think I will continue to eat these dishes until my body can no longer handle the ingredients that make these dishes so scrumptious. My mother is 52yrs old and still enjoys these foods she is in very good health with the exception of her osteoporosis so if I continue taking care of myself and my body and nothing bad happens besides what already has happened, I think I should be able to eat these dishes for a very long time. There are several reasons why dietary modifications need to be changed throughout the different stages of life. From birth the old age are metabolism is constantly changing, we go from a high energy intake to a slowed metabolism. Healthful diets help promote the growth of infancy into your older adulthood, and it helps with the productivity to help prevent obesity, high blood pressure and cholesterol, certain diseases, strokes, heart attacks, and osteoporosis.

Sunday, September 29, 2019

Deadly Beauty Essay

Descriptions of beauty are thrown at us everyday in various and opposing views. While many people stay with the belief that beauty is internal, society’s view of beauty is propelled at us from every angle. Just turn on the television, open a magazine, or surf the web and you will find yourself bombarded by the idea that being sexy and being beautiful are synonyms. Critics argue that this view of beauty is causing our women and even some men to alter their bodies in damaging ways. While I agree that the way today’s society views is damaging and unrealistic, but I also do not believe this is a new occurrence. Throughout history various societies have caused their subjects to do damaging and dangerous things all for the sake of what they called beauty. Beauty has become superficial and a term that is dangerous and used as a weapon to control the mindsets of others. The word beauty is described in the dictionary as â€Å"the quality or aggregate of qualities in a person or thing that gives pleasure to the senses or pleasurably exalts the mind or spirit.† (Merriam-Webster 2012). So why throughout history has the human race associated beauty with physical appearance? The ancient Mayans went to vast lengths to change their physical appearances. Mayan mothers flattened their children’s heads with boards and hung objects in front of their newborn’s eyes to make the baby’s eyes crossed (Frater 2009) Both of these things were highly desirable forms of Mayan beauty but caused serious physical damage to the body. Corsets in the Victorian era were used to mold a women’s body into the curvaceous form they desired. The sacrifice they paid for this look were broken ribs, fainting spells, and in extreme cases, kidney problems from having a corset to tight. Today across the world people still become ensnared in the trap of so cietal beauty. The Padang women in Burma stretch their necks with long brass coils to attain the long necks that their culture desires (Tao, 2012). The spirals are started when a girl is around five or six and by the time they are adults they have around twenty brass rings that adorn their neck. The brass rings cause their collarbone to cave down and crush the vertebrae in their spines and their collarbones but the women refuse to take off the rings because it is what their culture views as beautiful. In American society numerous women and even men go under the knife to achieve the look they want through plastic surgery. For a substantial fee, one can change the shape of their nose, increase or decrease breast size, reshape a jawline, or even remove fat from unwanted areas. Less dramatic alterations are made on a daily bases through applying makeup, waxing away unwanted hair, and straightening or curling hair. It’s easy to fall into the trap of trying to live up to the beauty standards of society. Although I know that all the pictures of beautiful women the media throws at me are highly photo-shopped, it still hasn’t prevented me from trying to achieve the perfect body and stunning looks that I gaze upon. In ninth grade I became anorexic. As a slightly over weight kid I became self-conscious about how skinny all the â€Å"beautiful† girls were. Even though I witnessed the ones who had zero personality and others who were downright evil, I felt that personality was worthless because being beautiful was what really mattered. I read countless articles on how to lose weight and how many calories each item of food contained. The more weight I would lose, the more compliments I would get on how beautiful I had become. Fortunately I was able to get help before it caused too much damage in my life. It still has repercussions on my life though, even now I find myself thinking a bout how I could get my body to look like those that are featured in the magazines and television. Instead of starving myself I have taken to makeup to contour my average face to look more alluring. I don’t necessarily enjoy putting on makeup. It causes me to question if I’m actually beautiful or if I’m just putting on a mask trying to fit in to the masquerade. This doesn’t stop me from applying it to my face in an almost every morning ritual. The false hope that I’ll live up to those photo shopped beauties keeps me adding new products to my collection. I want to be that Cover girl I see on the commercials. If I put on my L’Oreal Paris mascara, maybe more people will notice my eyes and appreciate them. I forget to practice what I preach and forget that my beauty is found within my personality and how I treat others. Instead I let myself worth be defined on how my physical features compare to models I see. There will never be unified description of beauty and the opposing arguments will bicker between each other until the world ends. Media will be blamed for the destructiveness of beauty through their highly edited photos and almost anorexic models. We as people must not forget that it is not just the media to blame for the way beauty is morphed but also ourselves. We have a choice if we are going to follow blindly along or challenge our societies descriptions on beauty. Past societies had to have had brief thoughts about the pain they were putting their bodies through, but still chose to accept it instead of challenging the view. We allow our cultures to use beauty as a weapon against us if we keep following blindly after descriptions our society throws at us we will never be able to find the true beauty that lays just beneath the surface of our skin. Works Cited Merriam-Webster. (2012) Retrieved from http://www.merriam-webster.com/dictionary/beauty?show=0&t=1354774384 J Frater. (2009, September 09). 10 facts about the Mayans. Retrieved from http://listverse.com/top-10-fascinating-facts-about-the-mayans/ Marky, C.N., & Markey, P.M. (2012). Emerging Adults’ responses to a media presentation of idealized female beauty: An examination of cosmetic surgery in reality television. Psychology Of Popular Media Culture,. 209-219 doi:10.1037/a0027869 Tao, Huai Sua. (2012, May 22). Long Neck Villages. Retrieved from http://www.ascensionatsea.net/Thailand/Thai_longnecks.htm

Saturday, September 28, 2019

ATM systems

ATM systems One of the most important part to designing the ATM usage is to make it as use r-centred as possible. According to Benyon, 2005, the PACT which is stand for People, Activities, Contexts, and Technologies as a useful framework for thinking about a design situation in relation to an interactive system. Performing a PACT analysis would be useful for both analysis and design activities, understanding the current situations, seeing where possible improvements can be made and envisioning future situations. The results of the PACT analysis are presented below. People The users groups for this technology include all people with bank accounts, especially UMS students, staff and lecturers. In the established user group, age and sex are not a factor. The technology does assume some previous knowledge and its functions could prove difficult for first time users. Most ATMs translate all signs and button into braille, making it usable by those without eyesight. This specific machine could create difficulties for those with disabilities because of the height of the keypad and its relatively flat orientation on the machine. People with children could also find the placement of the machine inconvenient, as its location is directly next to a main entrance. In addition, the machine have many language options, it is easier for users to use the machine. Activities Based on the study, the verification of banking details and the removal of money from ones account. The sub activities include inserting a credit card, entering ones pin number, selecting the amount desired, checking account balances and retrieving receipts. We observed the machine being used often, with one person using it every five minutes. It is important to this system works quickly, as it is meant to be a quick stop and there are often a line of people waiting to use the machine. Besides that, for security purposes, it is unsafe for a user s account information to stay up too long, as it could be target for theft. The machine is used by individuals, who must be aware of their surroundings, protect their pin number as they enter it. The ATM itself is designed so that important account information that might be printed on a receipt or shown on screen is obscured or not written out in full. If someone wrongfully inputs their pin number, for example, the transaction will be cancell ed and they will receive their card back. In some cases, a user could forget their card in the machine, which could result in theft if the card is taken immediately after the user leaves. Otherwise, the machine will retract the card and store it. Also, if a user somehow forgets to take their money, it could be stolen. The current machine performs the basic activities and sub activities well. It works quickly and efficiently to dispense users money. The functions, however, are very basic and only the simplest functions can be performed. The location and design of the machine do pose some security risks. The machine is also in a high-traffic area and is open on all sides. Contexts An ATM machine location could prove to be a significant factor in the ease of its use. If a machine is located outside, there is the potential for distraction if there is heavy rain, posing security risks. Also, bright sunlight could obscure the display, making it more difficult to use. ATM use tends to be in an open, public area, which goes against the general context and use of banking; it is generally considered to be a private activity. It could include a more private space for the machine. It should also be installed indoors if possible to reduce the potential for distraction and thus reduce security risks. The current system does not take privacy into account; the machine is located directly next to a main entrance. There are also bright lights that cause glare on the display, making it more difficult to read. Technologies The input mechanism in the form of a key pad and either a touch screen or buttons adjacent to options on screen are the easiest ways for users to input information, and is the setup of most ATMs. Banking options should be easily visible to users once their identity is verified by the machine. The key pad should be more obscured so that when users input information, privacy is not compromised. ATMs in general, are used by those standing up. However, this poses issues for those in wheelchairs and thus a design idea is to place an additional screen and keypad down lower for those with disabilities. In terms of output, we cannot see any flaws with the current use of a screen to display information. However, one innovation that could be helpful to users is to have receipts e-mailed to them instead of receiving paper receipts that tend to be discarded immediately. Communication is a big factor for ATMs, which need to be able to connect with banks to verify users, account balances, and so o n. The content central to this function is the account information being traded between user and machine, as well as between the machine and the banks. Based on the observation, the ATM does not have ideal key pad placement, possibly creating security concerns. Besides that, instructions about card insertion are unclear, the sign above the card slot says to insert the card with the numbers up, while the computer screen asks the user to insert the card with the magnetic strip up. The screen performs the necessary functions, and is convenient for most users, who use the machine standing up. It is not ideal, though, for those with disabilities as the key pad and card slot are a bit too high. The machine communicates with the banks quickly and easily, making money retrieval from this machine a rapid and simple task. As conclusion, in implementing a new ATM system, the current system employed by most machines is functional and effective. However, there are some concerns with its ease of use when it comes to those with disabilities; many are meant for users standing up, while those in wheelchairs would struggle with the horizontal orientation of the key pad and its height. Additionally, the placement of ATMs should be a key factor when implementing the system. Their ideal location is indoors where distractions like sunlight, weather and noise are mitigated. It is also important for users to have a sense of privacy or enclosure while they conduct their banking. The language a machine employs is also vital to its successful use; limited language capabilities make it difficult for a wide swath of the population to use the system.

Friday, September 27, 2019

United Monarchy Essay Example | Topics and Well Written Essays - 1250 words

United Monarchy - Essay Example In contradiction, their neighbours were polytheists and worshipped idols of God, and this was a constant temptation for Israelites. There was God’s law which guided Israelites to live righteously but Israelites constantly failed and there was a pattern to this which was recorded by the judges. This pattern was observed prior and during the period of United Monarchy, and can be seen as an explanation of the events: A leader is given by Yahweh to guide Israelites in the righteous path and observe Torah People do not follow and comply by this as they indulge in social injustice or idolatry, or sometimes both. That is, they act against the will of God People are punished for above by God in order to get them back to the righteous path and faithfulness. Punishment is mainly in the form of an attack by the neighbouring people As a result, people turn to God to save them and repent for what they had done A new leader is given by God who saves them from the enemy and the faith in god is restored. The cycle starts again and continues the same way It was established from the above that loyalty to Yahweh would mean prosperity while non-compliance to God’s Torah would result inevitably in disaster. This ideology of one god and the pattern discussed above play an important role in beginning and end of United Monarchy. ... All the tribes of Israelites were led by judges while most of their neighbours where led by kings and threats of attacks and invasions loomed large. This is when the people started demanding a centralised form of government with a single king leading all the tribes. The idea of having a king made great sense to tackle the situation and streamline all their resources and energies to fighting the outside invaders. On the other hand, the idea of having a king was in many ways contradicting the religious beliefs of Israelites. Israelites believed that God was their king and having a human king would be in all sense rejecting the leadership of God. Also Israel was supposed to be a â€Å"holy nation† unlike other nations. There was opposition to having a human king but the pressure was strong to have a permanent human king like other nations at the time. Samuel, the judge, is asked to identify the king to lead the nation but he warns that there would be many negative consequences of having centralised government and there is no guarantee of good leadership. Also he points out that: â€Å"Israelites suffered military defeat because of their infidelity to God not for the lack of king (1Sm 12:9-11). Not even a king will be able to save Israel from the consequences of a disobeying God. In this respect, the institution of monarchy will change nothing.† This cautionary warning is in accordance with the beliefs of Israelites that non-compliance with God’s Torah will lead to dire consequences. Therefore, irrespective of having a king or not if people do not follow the path of God, they will be punished until they vow to walk in the right path again. This ideology sounds right and to go by this, there is no need for the Israelites to have a king as long as

Thursday, September 26, 2019

Designing a training course Essay Example | Topics and Well Written Essays - 1250 words

Designing a training course - Essay Example The above sections would be combination of discussion as well as an interactive lecture on the continuum of the employee involvement. The participants would be asked to write/inform the current structure of the organization along with level of decisions they can take (empowerment), roles and responsibilities of the training session’s participants. Participants would present the graphical representation of their organizational model and employee involvement model. Projected Goal: The goal of the lesson is to find out the prevailing models in the organization and suggest/recommend on how to develop a model based on the issues in the existing organizational and employee involvement model. Note: After adding the miscellaneous and contingencies cost, the total cost for the first day training would be $20,000. Moreover, the participants and the instructors would not be given either travelling or daily allowance, because the employees would be trained in the auditorium of their office and the instructors would be hired locally. However, the cost of equipment, printing etc. would be catered from the allocated cost of the miscellaneous and the contingencies. After the first day it would be expected from the participants that they would have knowledge of modern concepts of the management, familiarities with numerous terminologies taught in the first day training. Moreover, they can somehow develop diverse models (organizational and employee involvement) to get quality work within time and less cost as compared to the existing models of the Delta Airline. As there are two modules, therefore, in order to assess the impact of training program, I have selected two different strategies include: the self assessment for module one of the training course and impact assessment for module two of the training course. For the self-assessment, the participants would be provided a number of documents for their self

The Impact of Information Technology in the Vodafone Group Research Paper

The Impact of Information Technology in the Vodafone Group Organization - Research Paper Example This paper discusses and describes the Vodafone Group business Organization structure with a focus on the role of IT in its business Organization structure. Vodafone Group is a multinational British telecommunication company, whose main office is in London, with a registered office in Newburry Berkshire. Vodafone company started as a joint venture between Hambros Technology Trust , Millicom and the subsidiary of Racal Electronics PLC’s strategic Radio Ltd in 1982 with its name being derived from a company’s goal of establishing data services and voice services over mobile telephone networks. Hence its network was called Racal Vodafone. The company was renamed Recal Telecom in 1988. In 1991, Racal Telecom became demerged from the Racal Electronics there is when the mobile telephony giant came into existence. In 1996, the company bought people phone and acquired 80% of the Astec Communication, a move that so it increase its shares of UK mobile customers. According to the report findings since 9th December 2010, the key elements of the Vodafone Organizational structure are as described. The operating companies for the group are under two operating regions reflecting the different geographies or different nature of assets, as well as to reflect the differences in development of the sector considering various economies. These included Europe which comprise all existing controlled business located in Europe, in addition to Turkey, Hungary, Czech Republic, and Hungary. At the helm, as the regional CEO, Michel Combel is in charge of the Europe Region.

Wednesday, September 25, 2019

Literature - I stand here ironing & Teenage Wasteland Essay

Literature - I stand here ironing & Teenage Wasteland - Essay Example The ultimate expression of those conflicting emotions are expressed in â€Å"Daddy† in an outburst of vitriol and pained condemnation of male abandonment. Although the poem seems most obvious on its literal level to be directed toward Plath’s own father, a close examination reveals that much of the venom is directed not toward her own daddy, but to the daddy of her children, her husband Ted Hughes, whom Plath confused as a reincarnated version of her father in vampire form. The Electra Complex is at the center of the poem as Plath works to intertwine the figures of her own father and her husband. The Electra Complex is a psychological term to describe what is most easily explained as the female equivalent of the Oedipus Complex in which a daughter comes to view her father as the first sexual attraction in her life and then proceeds to repress those feelings only to have them subconsciously bubble to the surface in the form of falling in love with a man who reminds her of her father. The poet herself stated that the poem is about a woman (presumably herself) who seems to have an Electra Complex regarding her father that she cannot entirely admit to. Further blurring the line between father and husband is that both men would abandon her; startlingly, Plath’s relationship with both men lasted almost the exact same length of time. Plath’s father died when she was just eight year old and her suicide came roughly the same amount of time after f irst meeting Hughes. The primary difference, of course, is that as an eight year old child, Sylvia barely had time to know and understand her father. For that reason, the real focus of the vehemence in the poem must certainly be her husband, who acts as a substitute for the father she never knew. The first half of the poem sets the stage for her look back toward a literal representation of her father that will shortly transform into the symbolic representation of Ted

Tuesday, September 24, 2019

Smart Perimeter Mapping Assignment Example | Topics and Well Written Essays - 1000 words

Smart Perimeter Mapping - Assignment Example Some of the technologies in use include the use of smart perimeters that help in automating supervisionand monitoring of prisoner movements (South University, 2012). Introduction Smart perimeter mapping basically utilizes a combination of electronic equipment and technology such as closed circuit TV, biometric identification, and sensors to keep track of movement of inmates in and around the entire prison area (Bulman, 2008). With some of the systems, the prisoners have their biometric identification including their fingerprints, the electronic identification of their eyes and other unique identification features to monitor the movement of inmates. The tracking can also be done via bracelets or Radio Frequency Identification that the inmates wear or have and which are then monitored electronically to generate real time maps of where each inmate or prison officer is at at any given time. This sort of monitoring is useful in not only ensuing inmates do no get to unauthorized areas but also to guard against any prison breaks and detect any criminal or violent behavior (Bulman, 2008). 1. Smart perimeter mapping is a form of electronic monitoring of inmates in a prison that uses electronic sensors to produce real-time maps of movements and location of all inmates and prison wardens at the prison. The mapping is also used to check for any metallic or other objects that the prisoners may have on their person that may be used to harm others (Federal Bureau of Prisons, n.d.). This is done through monitoring their movement through metal and other detectors. In addition the monitors are also used to detect any other contraband items such as drugs that the inmates may be in possession of. The movement of the inmates is also monitored via monitoring stations where real-time maps of the position and location of everyone within the prison can be looked at. 2. This type of mapping will be used to monitor the movement of everyone within the prison area be they inmates, correcti onal officers or visitors. The mapping will be used to account for all the prisoners that are in the prison at any given time instead of relying on a person manually doing a count of the persons who are in the prison (Federal Bureau of Prisons, n.d.). The mapping will also be used to restrict access to certain parts of the prison for those who are not authorized to be in those areas. In addition the mapping will also be used to monitor the provision of services such as delivery of meals to the inmates, as well as the movement of the inmates to recreational or other areas of the prison. The type of mapping is essentially used to ensure that every one is accounted for and to monitor service delivery at the prisons (Federal Bureau of Prisons, n.d.). 2. A. The smart perimeter mapping will increase the security in the prison in that it will be used to detect any prisoners who may have weapons and other objects that may be harmful to themselves and others. By constantly monitoring the mov ement of prisoners through all doorways for example the system will ensure that one does not leave the dining are with a concealed knife for example and thus reduce or eliminate the possibility of the inmates carrying harmful objects on their person (Stowell, n.d.). The system by providing real time imaging of where

Monday, September 23, 2019

Interim assessment For PhD research Paper Example | Topics and Well Written Essays - 4250 words

Interim assessment For PhD - Research Paper Example However, the cultures which are being followed in construction industry is associated with the ineffective communication and coordination among members of project team, sexual harassment, poor mentality and lack of trust among project team members. These features results in negatively affecting the overall performance of the industry (Ankrah, 2007). This research study is being conducted in order to investigate the impact of organisational culture on safety of the project with reference to the construction industry. The study also seeks to explore the impact of culture and safety on project performance. The study is based on the construction industry located in Kingdom of Saudi Arabia. The researcher in this study also interested in finding the current health and safety policies being adopted by construction industry in Saudi Arabia, the accidental rates in construction sites, and the factors influence in implementing safety culture in construction companies. The research would be he lpful in determining the degree to which culture influence safety and performance of the project. 1.2. Justification: Choudhry, R., Fang, D., and Lingard, H. (2009) conducted research study regarding the safety climate of the construction industry and concluded that the safety is highly important for improving the overall performance of the construction organizations and thus provided a framework for measuring the safety climate of a construction company. Fang, Chen, and Wong (2006) conducted research study on the safety climate of the construction industry in Hong Kong and presented important insights for the organisations operating in the construction industry of Hong Kong. Larsson, Pousette, and Torner (2008) and O’Toole (2002), worked on the relationship of the safety climate with the employees’ behaviour and performance. There have been few or no research studies conducted in order to explore the impact of the different cultural practices in the construction indus try on the safety and eventually the impact of the organisational culture and safety on the project performance with reference to the Saudi Arabia. Therefore this research study would be significant for researchers who would conduct research related to the topic in future. Furthermore, there are some studies conducted in this topic but they did not focus on significance of culture related to safety and performance. This study would be helpful for owners and contactors of the construction company. The study will highlight the factors influencing project performance of the construction companies. The research study will also suggest the safety techniques which should be adopted by construction companies in order to create safety environment during different projects. It will also highlight the weaknesses of the policies being adopted by construction companies in accomplishing a project. The study would also be beneficial for government of KSA in making the safety policies for construc tion industry. 2. Background 2.1. Construction Industry in Saudi Arabia: The progress of construction industry in a country shows the future progress of the country. The construction industry of Saudi Arabia is one of the largest and fast growing markets which encountered the business of $36.5 billion in 2011 and is expected to reach $43.8

Sunday, September 22, 2019

Internet Security Essay Example for Free

Internet Security Essay The key techniques to the most affordable website security would be the casual features of the website for the purpose of safeguarding the website content and the transactions that are to be made for fulfilling the ecommerce objectives of the website. The following can be credited to the diverse ways to secure the website and customer information for the â€Å"Grandmas Treats† website: Web content security: It forms the greater part of the security as they are aimed at non-representation or illegal presentation of false content that a user is not expected to see. The term cross site scripting (or XSS) is often used in conjunction with the web content and links that are to be secured for a website. Acunetix (2007) own product Acunetix Web Vulnerability Scanner is easily downloadable and comes free. Using that one could scan their website for any such flaws. Directory traversal attacks: The directory traversal attacks are quite common where the links are traversed to a very different path where the information flows to the hackers. It is due to the malfunction of the codes at the client and server sides. The code efficiency and link path requires to be checked periodically so that one is able to redesign and test the system for any malfunction. SQL injection: It is another method where intruders are capable to draw information from one website using SQL languages to illegally fetch customer’s data for obtaining their financial information or to manipulate information for wrong use. The website must be checked periodically for such incidents and must also make sure that customer records are encrypted using 128 bit security layers at the database side. The database security must be checked for getting sure that no such activity is evident. The customer’s financial information would be encrypted to hide it from easy access from hackers. E-commerce transactions security: The use of SSL 3. 0 makes sure that all vulnerabilities regarding the tapping of information so that ones purchases are safe in all respects. The use of this protocol makes sure that a secured channel is followed for communication between the client communicating clients. The use of Transport Layer Security (TLS) is important and can be enabled for any website for securing the communication to the communicating clients. IETF (2007) explains that TLS composes of point to point authentication techniques and communications privacy over the internet strengthening the encryption. 1. Web server checks and database security checks: The periodic checks are done to put a check on performance of the website and database usage. All the relevant links and database security is checked for overall assurance. 2. Database backup: The database backup plans must be devised accordingly for keeping the records safe to protect against unforeseen disasters (Navathe, 2002). These simple tips would be helpful for the website to take care of the affordable needs for security and customer data protection so that one is able to safely carry out transactions over the internet. References Acunetix (2007). Web Site Security Center: Check Implement Web Site Security. Retrieved 16, December 2007 from http://www.acunetix.com/websitesecurity/

Friday, September 20, 2019

Data Protection And Freedom

Data Protection And Freedom Data protection is an important concept of data maintenance. This data protection is achieved by implementing data protection methods and strategies. Data protection is done to protect the data from unauthorised users. Authorisation depends on the type of data and the rights to access it. An organisation protects its data from the intervention of unauthorised people by implementing the corresponding software. To accomplish this, the organisation requires specially trained people. Though data protection is an individual task, it cannot be accomplished in a stretch. Data protection includes data security, storage, recovery and back up. These functions are not performed by a standalone application; instead data protection is achieved by implementing various components and applications of the system. Data protection and the restriction of data are implemented by the government. The government of many countries has imposed data protection acts. These acts define the limit of access and the restriction as to who can access the particular data (Sizer, 1984). The purpose of passing such acts are to ensure that the data is which is personal or data that belong to a particular organisation are not accessed without the permission from the concerned person. A person can access or process another persons personal if and only if the person gives permission or access rights to him. This access rights are specified at the time of implementing the data protection measures. These data protection measure guards not only the data but also the hardware and softwar e components pertaining to the specified data. This is done to ensure that not even a small form of that data is accessed by an unauthorised person. Generally an organisation will protect its data by implementing encryption techniques. These encryption techniques protect the data as they are encrypted using a certain algorithm. Then the data is decrypted using a similar procedure and this protects the data from unauthorised users. Data Protection Acts Data protection acts differ from one country to another. The laws are imposed based on the countrys situation and the organisations status. Thus the organisation must abide by these laws to protect the data. The selection of laws depends on the companys situation and the prevailing problems (Smith, 1996). The problems can be resolved by implementing the standard strategies and procedures. The data protection acts cover every form of data and each law is specific for the type of data. Each and every law is an improved version of the act that was imposed earlier. This gives the organisation a wide range of options to choose from. The data protection acts were passed at regular intervals and the various acts are as outlined below. The data protection act 1998 deals with the personal data of each and every person. This act protects the personal data and even the processing of personal data. This act included various features which the earlier act did include. This was evident from the changes and modifications that were made to the act that was passed in the year 1984. These changes improved the act and it comprises of factors that influence the personal data and its manipulations. The factors and the inclusions of this act were made available in the website of the information commissioner. The information commissioners website had the complete information regarding this act and the website provided the details about the use and advantages of the act. The people were given the authority to access this website to retrieve the details pertaining to this act. This act specifies that the users are solely responsible for implementing the features of this act. The description and implication, working steps and the ways to make use of this act was clearly specified in the website. It also included the information regarding data processing. This was included as it would help the organisation or an individual to decide about the act and to check whether it can be applied to their data. This act comprised of the operations for data processing and storing. Any individual who revolts against the law will be punished according to the act. If an individual tries to access the data of another person without his permission, he will be sued under this act. Here personal data refers to the information of a living individual. The concerned person can protect the data using the data processor or the data controller (Sizer, 1984). This data controller may be processed by the user himself or can be maintained by professionals. The 1998 act includes certain unique features that protect the data stored in a machine and data that are in the form of hard copy. The hard copy data may be any photographs, audio or video recordings, and information from data readers. This act covers the intrusion and unauthenticated access to these types of data. Another inclusion in this act is the protection of sensitive data. Sensitive data includes data about politics, medical records and the caste related data. Data Protection Principles The data protection act 1998 imposes certain data principles that have to be followed in the process of data protection. The process of data protection comprises of data collection, storage, retrieval and the usage of sensitive data. There are seven data protection principles emphasised in the data protection act. Personal data shall be processed fairly and lawfully. (OPSI, 1998). This principle specifies that personal data must be processed only after an indication or permission is received from the concerned owner of data. Data controllers must get the consent from the owner before processing the personal data. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. (OPSI, 1998). Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. (OPSI, 1998). Personal data shall be accurate and, where necessary, kept up to date. (OPSI, 1998). Personal data processed for any purpose or purposes shall not be kept longer than is necessary for that purpose or purposes. (OPSI, 1998). Personal Data shall be processed in accordance with the rights of data subjects under the Act. (OPSI, 1998). Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. (OPSI, 1998). Freedom of Information Freedom of information act is imposed to access the information of the government and its related public sector authorities. This act allows an individual to access the information regarding the government which has not been released to the public. Generally only certain level of the information pertaining to a countrys government is available for the publics use. If an individual needs to access any other information, he is not allowed to access it without prior permission. This can be achieved using the freedom of information act. This act provides the public the rights and freedom to access the information that belongs to the government or any public sector company (Henry, 2003). This act covers every form of information and this act permits the user to access information of every medium. Thus a user can send a request to the concerned government for which the government will respond within duration of 20 days. Once the government receives a request, it has to decide whether this information can be provided to the user. Then the corresponding information is sent as a response to the respective request. This user need not necessarily belong to the same government. Instead a person residing in any part of the world can request the government. If an individual requests for information if he does not receive any response from the concerned organisation, the government will take action against the particular organisation. Hence it is the responsibility of the government authorities to provide the public with relevant information. Initially several freedom of information acts were passed in the government. This freedom of information act came into practice in the year 2005. The act was the result of publics interference with the governments affairs and information. This act includes the government bodies, government agencies, public sector companies and its related agencies. Since the rights and freedom of the public became stronger, the government had to provide them with the information they require. Though this act allows the public to know about the governmental information, sensitive data cannot be accessed by the public. The freedom act 2005 covers the universities also so that the aspiring students can get the information from the corresponding universities. The university provides these information to the students based on the universities norms. Though universities are covered under this act, certain information is protected from the users to avoid unnecessary problems. From the time this act has been implemented, the universities have received dozens of information requests. These requests are mostly regarding the fee waivers and other grievances. In most of the cases the request will be regarding the application forms and other visa information. Certain students may even request for the strategies followed in the university and this information is regularly viewed by distance learners (Sherick, 1978). Students who do not have a direct access to the university make use of these facilities. The freedom of information act 2008 included certain features and was certainly an improved version of the previous acts. In this act the government has included the provisions for the universities to provide the details regarding the standards of the courses provided by them. This included the maintenance of the university and the facilities provided in the university. Even the marks, grades and pass percentage for each course must be available for the public reference. Since the public have the rights to know about the academic standards and procedures the due information should be made available to them. Benefits of Freedom of Information Act The freedom of information act provides various benefits to the public as well as the government. This is beneficial to the government since the required information is known to the public. This reduces the burden of explaining each and every law and procedures that exist in the government. Hence this acts as an advantage to the government. Another benefit of this act is it ensures that no secret laws and amendments are passed in the government. This is possible since the public are in constant touch with the governments policies and the updates (Henry, 2003). This will help the public to find out the flaws in the existing and proposed laws and acts. The freedom of information act will keep the public informed about the happenings in the government. Thus they can easily monitor the activities and can be sure that the government works in favour of them. The freedom of information act increases the publics right to review and access the information. This in turn increases the individuals right to privacy and the public can expect a good response in return. Due to the publics intervention in the governments laws and acts, the government works better to serve the public and provide them with better benefits. Since the public stay in constant touch with the governments policies and regulations, it becomes difficult for the government and public sector bodies to change or modify the existing policies (Sherick, 1978). Though it may seem to be difficult to implement freedom of information act in developing countries, it would definitely serve the intended purpose. Conclusion Freedom of information act was a result of the publics interest and intervention in the day to day happenings in the government. As people have the right to express their opinion and to request the government for any of their grievances. The freedom of information act is definitely an advantage to the public as they can have the complete information regarding any of the governments rules and regulations. This eases the work of the government since people become aware of the prevailing situation and the facilities provided by the government. If the freedom of act is followed, it will help the government and public sector bodies to maintain a cordial relationship with the public. This in turn improves the level of communication between the public and the government.