Monday, September 30, 2019

Ben and Jerry’s Entering into the Japanese Market

Ben and Jerry's Entering into the Japanese Market sy Ihart2dance19 Ben ; Jerrys Homemade, Inc. produces super premium ice cream, frozen yogurt, and ice cream novelties in rich and original flavors. The company sells its unique offerings In grocery stores, restaurants, and franchised Ice cream shops, and it holds about one-third of the market for its products. This global company began with only a $12,000 Investment to open Ben ; Jerrys Homemade Ice cream scoop shop In a renovated gas station in downtown Burlington, Vermont, on May 5th, 1978.From one mall shop In downtown Burlington, the company had grown to Include a chain of nearly 100 franchised shops, and a line of products sold in stores across the country. As one of the leading superpremium ice cream (greater richness and density than other kinds of Ice-cream and Is therefore sold at a relatively high price) manufactures, Ben ; Jerrys has to continually expand and develop to compete with other leading brands. The united States I s one of the largest exporting nations as well.The united States sells products to other countries because no country can roduce all of the products the people want. In 1994, den ;Jerrys starting considering advancing into the Japan ice cream market, the second largest ice cream market in the world with sales of approximately $4,5 billion. According to the survey conducted by â€Å"What Japan Thinks,† nearly 2 out of 5 Japanese eat ice cream every week. However, Japan is a great distance from the united States and it would be complicated to distribute the Items to Japan.Japan's barriers to Imports from foreign countries were high and Ben ; Jerrys were entering the Japanese ice cream market 0years atter Its competitors, such as Haagen-Dazs. According to the survey by â€Å"What Japan Thinks,† the biggest factor in ice cream purchase is by flavor and taste. The Japanese consumers demand high-quality products with different flavors. The demands of the Japanese coincide di rectly with the product mission statement of Ben ; Jerrys which is â€Å"to make, distribute and sell the finest quality all natural ice cream and euphoric concoctions with a continued commitment to Incorporating wholesome, natural ingredients. So based on the quality and flavors of Ben & Jerrys, the ompany doesn't have to change their recipes or ingredients to be popular In the Japanese ice cream market. However, In Japan ice cream is considered a snack more so than a dessert, so to be user- friendly to the Japanese, Ben ; Jerrys should package their Ice cream In personal cups as well as their point sized package. Additionally, the Japanese are very clean and conscience of sanitation, so having Individual serving would be more appealing to the Japanese people.According to â€Å"What Japan Thinks,† the most popular purchase of ice cream is a single-serving cup ot ice cream. When It comes to perishable goods, supermarkets seem to be much stricter In Japan than In the west abo ut moving on stock before it gets old. It Is very important for a product to have a good reputation, especially in Japan, and if a product Isnt good quality no one will buy the product. Ben ; Jerrys should make sure that their product's are being monitored, and if the ice cream is close to perishing, they should make sure It gets thrown out, or then their reputation can be ruined In a 1 Ofa minute. nen Ben & Jerrys aec10e now tney wlll Introduce tnelr product to Japan, hey have to take into account the sociocultural forces and cultural differences between America and Japan. Although shipping to Japan is not the easiest task, Ben & Jerrys is an established corporate company who has been shipping ice cream to the West Coast and to Europe in freezer containers. Ben & Jerrys needs to create an efficient supply chain, the sequence of linked activities that must be performed by various organizations to move goods from the sources of raw materials to ultimate consumers, so the company can then ship out their products smoothly.The company hen has to find the best approach to their physical distribution, or logistics. Bringing their products to Japan would require detailed and structured outbound logistics involving managing the flow of finished products and information to business buyers and ultimate consumers. Ben & Jerrys then has to choose the right transportation mode. Because Japan is over seas from their Vermont factory, the only 2 options would be water transportation, which is inexpensive but slow (about 3 weeks) or by air, which is fast but expensive.Although Japan has barriers to foreign imports, in 948 the General Agreement of Tariffs and Trade (GATT) was formed, which was an international forum for negotiating reductions in trade restrictions. The World Trade Organization (WTO) was also established to assume the task of mediating trade disputes among nations. Japan is part of the WTO, Joining on September 10th, 1955. This will make it easier for Ben & Jerr ys to advance in Japan's foreign market because there is a global mediation center. Also, there are expectations of falling tariffs on dairy products, which would be a desirable feature in selling in Japan.Even though Haagen-Dazs had already been selling their superpremium ice cream in Japan's market, now Ben & Jerrys doesn't have to educate the Japanese market about superpremium ice cream. Haagen-Dazs's sales in Japan were about $300 million, proving there is a large Japanese ice cream market and superpremium ice cream is desirable in the country. There are many advantages and disadvantages for Ben & Jerrys to penetrate the Japanese market by relying on 7-Eleven, an international chain of convenience stores, to distribute their superpremium ice cream.If Ben & Jerrys sold directly to 7-Eleven creating a Joint venture or a strategic alliance, they would create a long-term partnership between two companies to undertake a major project and help each company build competitive market adv antage. Because Ben & Jerrys have expanded all over the world it is a multinational corporation. If Ben & Jerrys could sell directly to 7-Eleven, it would eliminate the distribution costs. However, there would be a power struggle between the 2 major companies.If Ben & jerry's agrees to an exclusive agreement with the massive convenience store chain, 7- Eleven would have the upper hand. Another advantage of entering the market through 7-Eleven is the immediate placement of Ben ; Jerrys in over 7000 convenience stores in Japan, giving Ben ; Jerrys an instant access to the market on a large scale. Yet, by doing this, Ben ; Jerrys might not be able to build their own brand name and an issue with 7-Eleven would leave Ben ; Jerrys without their own position in the Japanese market.Also, 7-Eleven insisted that Ben ; Jerrys ice cream be packaged in personal cups as opposed to the pint size, due to the cultural view of ice cream in Japan. This would require $2 million in equipment and differe nt methods in packaging the ice cream, because Ben ; Jerrys would have to comply wltn tnese cnanges. I ne ‘-Eleven approacn to Just-ln-tlme Inventory procedures would make delivery reliability key and costs would have to be minimized. Because the Japanese production is unique, Ben & Jerrys would have to be careful to not mix up the Japanese label with the regular label.A disadvantage of relying on 7-Eleven is the asset specific investment in production equipment. Due to these changes, there would be complex logistics and production planning. Also, the pricing and profit distributions are unclear. The only clear thing was that Ben & Jerrys would be shipping from their Vermont factory. Entering the market with 7-Eleven would allow Ben & Jerrys to have control of their brand, although 7-Eleven would have a dominant position. Ben & Jerrys would have to rely on 7-Eleven promoting the brand, which 7- Eleven wasn't promising.A major advantage is that 7-Eleven is an established corpor ation, so 7-Eleven has high-level executive involvement and an efficient supply chain. Ben ; Jerrys would increase sales through convenience stores and would ccess the market on a large scale easily. Ken Yamada was also interested in acting as a licensee for Ben ; Jerrys in Japan, overseeing marketing and distribution of its products there. Yamada would be the marketing intermediary for Ben ; Jerrys, being the independent firm which will assist in the flow of goods and services from producers to end-users.Yamada would be a good candidate because he was a well- recommended third-generation Japanese-American, so he knew the culture and how to integrate American and Japanese cultures. He also was already running the Domino's Pizza franchise in Japan. The Domino's franchise in Japan was very successful, and Domino's already delivered ice cream cups, so they had the resources to deliver Ben & Jerrys. However, part of Yamada's agreement was that he would have exclusive rights to the entir e Japanese market.This would mean that Yamada would have full control of branding and marketing efforts, making Ben ; Jerrys fully dependent on the efforts of Yamada. He would have full control of the marketing and sales in Japan. Yamada would introduce Ben ; Jerrys to the Japanese market from he initial steps to the large picture; starting with positioning the brand, formulating and strategically orchestrating the initial launch, and concentrating on the best marketing and distribution strategy for the long-term positioning of Ben ; Jerrys in Japan.By using Yamada to introduce Ben ; Jerrys in the Japanese market, Yamada would earn royalty on all sales, but he would have full control of the Japanese market. This would give Ben ; Jerrys instant expertise in a foreign market and because Yamada was already running Domino's, there was a simple entry strategy and an ongoing marketing management. Yamada was very valuable to the ice cream company. He knew frozen foods, he had an entreprene urial spirit and marketing sa'. n. y.However, because Yamada would be investing his time in a marketing campaign only after reaching an agreement with Ben ; Jerrys, there was no specific plan available for consideration, and Yamada would have full control and the right to change any plan. Yamada has good market knowledge and the managerial requirements, making it less demanding for Ben ; Jerrys. However, he has no specific business plan and no brand control. Although Ben ; Jerrys managers believe the ompany should delay entering the Japanese market because of economic problems, I think Ben ; Jerrys should enter the Japanese market.Japan is the second largest ice cream market globally, with sweet growth rates. Japan has high profit margins. Japan nas a nlgn aemana Tor super premium Ice cream. Inere Is also a aecllnlng aomestlc growth rates and market shares in Japan. Also, Ben ; Jerrys has excess capacity in the United States factory. Japan has the second largest ice cream market in the world with sales of approximately $4. 5 billion, proving that Ben ; Jerrys would be very successful entering the Japanese market.

Sunday, September 29, 2019

Autonomous Learning Essay

2.1 A General Review on Learner Autonomy Two classic definitions of autonomy influenced my study a lot when I set up my research programme.The first was put forward by Henri Holec in 1981, and the second by David Little in 1991. 2.1.1 Definitions of Autonomy â€Å"Learner autonomy is when the learner is willing and capable of taking charge of his/her own learning. The learner should be capable of determining the objectives;defining the contents and the progressions; selecting methods and techniques to be used; monitoring the procedure of acquisition, evaluating what has been acquired.†(Henri Holec,1981). â€Å"Autonomy is a capacity for detachment, critical reflection, decision making and independent action. It presupposes, but also entails, that the learner will develop a particular kind of psychological relation to the process and content of his learning†.(Little,1991). It is clear from this that autonomy is not a method of language learning – it is a capacity: the capacity to take control one’s own learning.(Benson, 2001:2)This seems to distinguish it from some other types of learning with which it is sometimes associated, such as: â€Å"self-study†, â€Å"distance learning† and â€Å"indepen dent learning†. The main point here is that most of these can be seen as ways of organizing learning, as methods. They may be more or less teacher-led and the degree of teacher control is not clear. Holec use the term â€Å"autonomy† to refer to a â€Å"capacity† and not a â€Å"method† It is a capacity that usually needs to be acquired, hence our emphasis is on â€Å"learning how to learn†. On a general note, the term autonomy has come to be used in at least five ways: the first is for situations in which learners study entirely on their own; the second is for a set of skills which can be learned and applied in self-directed learning; the third is for an inborn capacity which is suppressed by institutional education; the fourth is for the exercise of learners’ responsibility for their own learning; and the last is for the right of learners to determine the direction of their own learning. (Benson & Voller, 1997: 2) It is noteworthy that autonomy can be thought of in terms of a departure from education as a social process, as well as in terms of redistribution of power attending the construction of knowledge and the roles of the participants in the learning process. Autonomous language learning requires the learners to be responsible for their learning, including deciding their learning objective, choosing their learning materials, monitoring and adjusting their learning process and evaluating their learning results. There is broad agreement in the theoretical literature that learner autonomy grows out of the individual learner’s acceptance of responsibility for his or her own learning (e.g., Holec, 1981;Little, 1991). This means that learner autonomy is a matter of explicit or conscious intention:we cannot accept responsibility for our own learning unless we have some idea of what, why,and how we are trying to learn. The learner must take at least some of the initiatives that give shape and direction to the learning process, and must share in monitoring progress and evaluating the extent to which learning targets are achieved. The pedagogical justification for wanting to foster the development of learner autonomy rests on the claim that in formal educational contexts, reflectivity and self-awareness produce better learning. The autonomous learner shows initiative regarding learning, and shares in monitoring progress and evaluating the extent to which learning is achieved (Schunk, 2005).The ideas that cluster around the concept of learner autonomy have also been promoted under banners such as, â€Å"humanistic language teaching,† â€Å"collaborative learning,† â€Å"experiential learning,† and â€Å"the learning-centered classroom.† We prefer the term â€Å"Learner autonomy† because it implies a holistic view of the learner as an individual. This seems to us important for two reasons. First, it reminds us that learners bring to the classroom a personal history and personal needs that may have little in common with the assumed background and implied needs on which the curri culum is based. Second, it reminds us that the ultimate measure of success in second or foreign language learning is the extent to which the target language becomes a fully integrated part of the learner’s identity. In conlusion,some of the most well known definitions in present literature are: â€Å"Autonomy is the ability to take charge of one’s own learning† (Henri Holec,1981); â€Å"Autonomy is essentially a matter of the learner’s psychological relation to the process and content of learning† (David Little,1991); â€Å"Autonomy is a situation in which the learner is totally responsible for all the decisions concerned with his [or her] learning and the implementation of those decisions†. (Leslie Dickinson,1987); â€Å"Autonomy is a recognition of the rights of learners within educational systems†. (Benson,2001) 2.1.2 Theoretical Background of Learner Autonomy Autonomy is not developed by single, clearly defined theories or methods, its evolution has reflected a more general trend in language teaching; however, its independence from specific theories does not mean that theory is not relevant. In fact, many researchers in the literature seek justifications of learner autonomy from a wide variety of philosophical, psychological, and political sources. And some approaches to educational psychology— humanism, constructivism— had a profound impact on the advocacy of autonomous learning. A review of the two approaches to language education, especially to second language learning and teaching will be offered. 2.1.2.1 Constructivism Constructivism is one of the hottest topics in educational psychology. Constructivism is a new educational psychology school which is influenced by Piaget’s cognitive developmental psychology and Vygotsky’s social interactionism. Constructivism is described as a learning theory based on authentic and real-world situations. Students internalize and construct new knowledge based on past experiences. The constructivism theory is student-centered and encourages higher level processing skills to apply their working knowledge. In other words, â€Å"everyone makes their own sense of the world and the experiences that surround them. In this way the learner is brought into central focus in learning theory†(Williams M.&Burden R.L., 1997:2). The educational impact of constructivism is positive, in that instruction is based on student’s prior knowledge, allowing them to make significant connections and solve complex problems. Vygotsky’s point of view was that acquisition and participation were synergistic strategies in learning situations. Aspects of participation involved teaching in contexts that could be meaningful to students based on their personal and social history, negotiating, class discussions, small group collaborative learning with projects and tasks, and valuing meaningful activity over correct answers. Social Constructivism emphasizes that learning takes place through interactions with other students, teachers, and the world-at-large. (Vygotsky,1978) In terms of process of learning, acquiring and constructing new knowledge, the student plays an active role. The student brings past experiences and prior knowledge to the classroom and uses these to actively connect with new ideas or problems that are presented. ‘Knowing’ is being able to internalize the material, connecting it with things you already know. Students use higher level processing skills, such as evaluating, analyzing and synthesis to apply newly constructed knowledge to problems or situations. According to the theory of constructivism, student responsibility is greater, as they discover how new knowledge connects with prior knowledge. The learner continuously asks questions and guides their own learning process. Students learn that there is not just one way to solve problems, but rather multiple ways to finding answers. Typical classroom instruction, consistent with the constructivist learning theory may include: problem-based approach to teaching, hands-on activities, including the use of manipulatives, experimentation, and simulations. The constructivist theory allows teachers to be creative and innovative with teaching. In brief, constructivism believes that learning is a process in which learners construct new ideas or concepts based on their past knowledge. Constructivist learning theory advocates that learning is student-centered and instructed by teachers, which puts great emphasis on learners. Students are not passive receiver. Instead, they are active constructors. The learners select and transform information, construct hypotheses and make decisions relying on a cognitive structure. Cognitive structure (i.e. schema, mental models) provides meaning and organization to experiences and allows the individual to go beyond the information given. 2.1.2.2 Humanism Humanism is a school of thought that believes human beings are different from other species and possess capacities that cannot be found in animals. Humanists, therefore, give primacy to the study of human needs and interests. In humanistic view, the basic concern is the human potential growth and education is to enhance actualization and give free harness to one’s potential. â€Å"Humanistic approaches emphasize the importance of the inner world of the learner and place the individual’s thoughts, feelings, and emotions at the forefront of all human development†(Williams,M.&Burden, R.L. 1997:4). These aspects of the learning process are often unjustly neglected, yet they are vitally important if we are to understand human learning in its totality. There are five basic objectives of the humanistic view of education: the first is to promote positive self-direction and independence (development of the regulatory system);the second is to develop the ability to take responsibility for what is learned (regulatory and affective systems);the third is to develop creativity (divergent thinking aspect of cognition);the fourth is to arouse curiosity (exploratory behavior, a function of imbalance or dissonance in any of the systems);the last is to cultivate an interest in the arts (primarily to develop the affective/emotional system). 2.1.3 Teachers’ Role in Autonomous Learning In literature works there are many detailed descriptions of the teachers’ role in developing learner autonomy. According to Huttunen (1986), teachers should guide the learners in the process of their logical, psychological and ethical development towards autonomy. Their task is to enrich, balance, and clarify the learners’ experience and to help them to seek new experiences to structure and simplify experiences they need, and to find ways of associating the learners’ experiences with the various aspects of life in their culture, including its heritage; Higgs (1988) stated that in the process of learners’ autonomous learning teachers should act as a manager who is available as a resource, will create learners a supportive and nonthreatening learning environment, can motivate learners to achieve their potential and can help learners to be aware of institutional requirements and expectations associated with the discipline in which they are learning; according to Nunan (1993), teachers are readjusting their traditional roles and to the new ones. They become active participants, monitors, consultants and guides in the process of students’ language learning and help students to develop better learning strategies; Hill (1994) suggested that â€Å"since the decision to promote autonomy comes usually from the teacher, and the success of attempts to empower learners to become actively involved in their learning depends to a large extent on the teacher’s ability to redefine roles†; to Little (1999), he believes that teachers should be responsible for â€Å"deciding whether and to what extent it is possible for learners to determine their own learning objectiveness, select their own learning materials and evaluate their own learning process†; HuaWeifen (2001)believes that language teachers should enable students to set learning objectives, choose learning materials, develop the effective learning strategies, monitor their learning process and evaluate the learning results. She further proposes three roles of teachers in developing students’ independent learning: a counselor who helps learners to develop their own learning ability instead of making decisions for them, a facilitator who provides psychological, social support and technical support, and an information resource; Xiao Fei (2002) feels that teachers must adjust their counselors, roles from the â€Å"purveyors of language information’ to the organizers and managers of learning activities, and resource learning providing necessary help. Teacher serves as one of many resources for students, not necessarily the primary source of information. The teacher engages students in experiences that challenge previous conceptions of their existing knowledge. The teacher uses student responses in the planning of next lessons and seeks elaboration of students’ initial responses. The teacher encourages questions and discussion among students by asking open-ended questions. The teacher assists students to understand their own cognitive processes (metacognition) by using cognitive terminology such as classify, analyze, create, organize, hierarchy, etc. when framing tasks. The teacher encourages and accepts student autonomy and initiative by being willing to let go of classroom control The teacher makes available raw data and primary resources, along with manipulative and interactive physical materials. The teacher does not separate knowing from the process of finding out. Nouns and verbs. The teacher facilitates clear communication from students in writing and verbal responses, from the point of view that communication comes from ones deep structural understanding of the concepts being communicated. When they can communicate clearly and meaningfully, they have truly integrated the new learning. The teacher’s role is to anticipate and address student misconceptions while presenting authentic questions and real-world problems or situations. The teacher does not provide clear answers on how to solve these problems or questions, but guides students to make sense of how things work according to what their past experiences are and how it applies to the new knowledge they are constructing. 2.2 Input Theory 2.2.1 Krashen’s theory of language acquisition During the late 1970s Krashen put forward an account of SLA first known as the Monitor Model after its main claim about the role of monitoring in language learning (Krashen, 1979). In the early 1980s this was expanded into a broader-based model, described in Krashen (1981;1982), which consisted of five linked hypotheses: acquisition/learning, monitor, natural order, input, and affective filter. The aspect of the model that became most developed was termed the Input Hypothesis, the title of Krashen’s last major theoretical book (Krashen, 1985). In order to better understand the Input Hypothesis, it is necessary to have a general idea about the five hypotheses as they are closely related to each other. They are:The Acquisition-Learning Hypothesis;The Monitor Hypothesis ;The Natural Order Hypothesis; The Input Hypothesis ;The Affective Filter Hypothesis. Krashen summarizes the five hypotheses with a single claim: â€Å"People acquire second languages only if they obtain comprehensible input and if their affective filters are low enough to allow the input `in’ †¦In other words, comprehensible input is the essential ingredient for second language acquisition. All other factors thought to encourage or cause second-language acquisition work only when they contribute to comprehensible input and/or a low affective filter.† [pic] 2.2.2 Input hypothesis in second language learning The Input Hypothesis is Krashen’s attempt to explain how the learner acquires a second language. In other words, this hypothesis is Krashen’s explanation of how second language acquisition takes place. So, the Input Hypothesis is only concerned with â€Å"acquisition†, not â€Å"learning†. According to this hypothesis, the learner improves and progresses along the â€Å"natural order† when he/she receives second language â€Å"input† that is one step beyond his/her current stage of linguistic competence. For example, if a learner is at stage â€Å"i†, then acquisition takes place when he/she is exposed to â€Å"comprehensible input† that belongs to level â€Å"i+1†. Since not all of the learners can be at the same level of linguistic competence at the same time, Krashen suggests that natural communicative input is the key to designing a syllabus, ensuring in this way that each learner will receive some â€Å"i+1†in put that is appropriate for his /her current stage of linguistic competence. The Input Hypothesis is simply stated: â€Å"Humans acquire language in only one wayä ¸â‚¬by understanding messages or by receiving `comprehensible input†Ã¢â‚¬Ëœ (Krashen, 1985ï ¼Å'2). That is to say, language acquisition depends upon trying to comprehend what other people are saying. Provided that the learner hears meaningful speech and endeavors to understand it, acquisition will occur (cited in Cook, 1993). The theory (Krashen 1981;1985; 1989) also makes the following claims, as Ellis (1994) has summarized:Learners progress along the natural order by understanding input that contains structures a little bit beyond their current level of competence. Although comprehensible input is necessary for acquisition to take place, it is not sufficient, as learners also need to be affectively disposed to `let in’ the input they comprehend. Input becomes comprehensible as a result of simplification and with the help of contextual and extralinguistic clues; â€Å"fine-tuning† (i.e. ensuring that learners receive input rich in the specific linguistic property they are due to acquire next) is not necessary. Speaking is the result of acquisition, not its cause; learner production does not contribute directly to acquisition. It is understood that to be useful to the learner, the input must be neither too difficult to understand nor too easy. This is conceptualized by Krashen in terms of the learner’s current level, called â€Å"i†, and the level that the learner will get to next, called â€Å"i+1†.For the learner to progress rather than remain static, the input has always to be slightly beyond the level at which he or she is completely at home; the gap between the learner’s â€Å"i† and the â€Å"i+1†that he or she needs is bridged by information drawn from the situation and from the learner’s previous experience. â€Å"We also use context, our knowledge of the world, our extra-linguistic competence to help us understand† (Krashen, 1982, 21).Krashen emphasizes that input does not need to be â€Å"finely tuned† in the sense that it is linguistically adjusted to contain â€Å"i+1†.It requires only rough tuning, which is automatic if the focus is on successful communication. 2.2.3 The web-based meltimedia language input for autonomous learning Students need accessible materialsï ¼Å¡comprehensible input, the underlying assumption is that the learner needs help identifying the critical features in â€Å"the wealth of the linguistic and nonlinguistic information they receive† (Plass & Jones, 2005, p. 470). This means that the supports embedded in a multimedia instructional approach should guide what students notice in a word, sentence, passage, or image. The autonomous leaners need to be provided with more and up-to-date language input in as many ways as possible, such as vedio and audio materials downloaded from the internet. This strategy can also be accomplished through immediate and focused teacher feedback. When a teacher highlights portions of an assignment that require revisions, the student’s ability to evaluate and revise her work increases. These strategies help the learner understand task directions and focus on pertinent informati on to comprehend or revise. 2.3 Web-Based Language Teaching and Learning 2.3.1.The development of web-based language teaching and learning Web-based language learning is developed from Computer-Assisted Language Learning. It may be defined as â€Å"the search for and study of applications of the computer in language teaching and learning† (Levy, 1997:1).As for teaching, the lecturer presents a language teaching plan in a logical order and learns whether the students’ responses are correct or not correct by computers. As for learning, the language learners use computers to monitor their own progress, and provide themselves with proper lessons, materials, etc. Richards. J.C.(1998) also points out that CALL refers to the use of computer in the teaching and learning of second or foreign language. The CALL in the academic literature has been existed for about forty years. The subject is interdisciplinary by nature, and it has evolved out of previous efforts to find ways of using computer for teaching or for instructional purpose across a wide var iety of subjects areas, with the weight of knowledge and breadth of application in language learning ultimately resulting in a more specialized field of study (Levy, 1997). According to Warschauer and Healey (1998), CALL has experienced three stages in the last forty years: behavioristic, communicative and integrative. Each stage will be featured by its important projects and development despite the fact that there is in fact no clear-cut line among stages (Hu&Jiang, 2002:5 34-538). The first stage of CALL, Behavioristic Call, started from the 1950s and applied in 1960s and 1970s, was on the basis of the then dominant behaviorist theories of learning. Programs of this stage were repetitive language drills and can be concluded as â€Å"drill and practice†. One of the most complicated projects of this period is the PLATO (Programmed Logic/Learning for Automated Teaching Operations) system, which operates on its own special PLATO hard ware, including central computers and terminals. The vocabulary drills, brief grammar explanations drills, and translation tests at various intervals (Ahmad, Corbett, Rogers&Sussex, 1985)were included. In the late 1970s and early 1980s, behavioristic CALL was replaced because of two important factors. First, behavioristic approaches to language learning had been out of stage at both the theoretical and the pedagogical level. Secondly, the application of microcomputer provided a whole new range of chances. The stage was set for a new era of CALL-Communicative CALL. One of the main advocates of this new approach was John Underwood, who in 1984 proposed a series of â€Å"premises for `Communicative’ CALL† (Underwood, 1984:52). According to him, the Communicative CALL focuses more on using forms. The teacher uses the computer to teach grammar implicitly rather than explicitly; allow and encourage students to utter naturally rather than just manipulate prefabricated language; it does not assess everything the students do nor give them congratulatory message, lights, or bells; avoids telling students that they are incorrect and is flexible to a variety of student responses; it uses the target language exclusively and creates an environment in which using the target language feels natural, both on and off the screen; and will never try to do anything that a book can do just as well. Many types of CALL programs were developed and applied during this period. Integrative computer assisted language learning covers the more recent development of 1990s, and even the multimedia computers and the Internet. This period was greatly influenced by the growth of constructivist approach, which believes that knowledge is not obtained through the transmission of teachers, but the meaning construction of learners themselves in a certain social and cultural context with the others, including their teachers and their peers, and also the use of resources. Furthermore, this approach emphasizes that learners are the necessary component of learning main body in the cognitive process and the active constructor of knowledge meanings, and teachers take the roles as organizers, guiders and facilitators. Also, the importance of authentic learning environment and social interaction is emphasized. This phase is featured by the use of multimedia, hypermedia and interactive technologies to enhance comprehensive skills. 2.3.2 web-based language learning context and input thoery Compared with the traditional language teaching and learning context, web-based language learning would expose college students to greater amount of language information input. On the one hand, the colorful, multi-facet, and limitless information provided by the internet and computer programs attracts the learners’ attention. It could also make their English study much easier. It is obvious that, the multimedia, hypermedia and Internet enrich the information input and to a large extent promote the students’ curiosity, interest and motivation in English learning. On the other hand, the multi-facet or multi-channel information input may be in some way distract learners’ attention and make learners feel at a loss in their autonomous learning after class, thus weaken the learners’ productivity of English language. Therefore, to help learners to wisely choose the useful information to develop their own autonomous language learning models become the teachersâ₠¬â„¢ focuses. 2.4 Assessment in autonomou learning In a recent report, Dam and Legenhausen (1999: 90) claim that learners’ ability to reflect critically on their learning is a measure of the effectiveness of the learning environment. They use the term ‘evaluation’ to refer to the metacognitive activity of reviewing past and future learning experiences in order to enhance learning, and claim that: In an autonomous classroom . . . [evaluation] is viewed as the pivot of a good learning/teaching cycle . . . Evaluation has a retrospective and prospective function, in which the learning experiences of the past are reflected upon and transformed into plans for future action. The potential for learner autonomy increases as an individual’s learning awareness grows. Therefore activities which prompt learners to reflect on their learning aim to enhance learners’ insight into their learning processes. Assessments for autonomous learners may cover a wide area of knowledge,for example, reading an authentic languag e text or a small, tightly focused area ,for example, questions at the end of a worksheet on a specific grammar point. Assessments may serve one or more of a number of purposes, such as confidence building, demonstrating learning gain, or motivation, and they may be constructed in a number of ways, for example, by the teacher, by the learner, collaboratively or as a portfolio (Gardner and Miller, 1999). Assessments with any combination of the above criteria can be self-assessments because this term refers simply to the mode of administration, i.e., assessments which are self-administered. It is reasonable to assume that autonomous learners would benefit from feedback on chievements in their learning through engaging in some kind of assessment procedure. The individualised nature of autonomous learning makes large-scale, institutionalised assessments problematic although an autonomous learner may make the decision to include these as part of a personalised assessment regime. Self-assessment seems to accommodate itself much more easily to the diverse and flexible requirements of an autonomous learner. Indeed, it has been argued that self-assessment is an integral part of autonomous learning (Holec, 1981; Tudor, 1996; Thomson, 1996; Gardner and Miller, 1999) and that all learners engage in it (Holec, 1985) although not necessarily knowingly (Thomson, 1996). Dickinson (1987) argues that self-evaluation of performance is an important skill for all language learners but of particular importance to autonomous language learners. Thomson (1996) implemented a self-assessment project as a way of getting learners involved in self-directed learning. The effectiveness of self-assessment is detailed by Nunan (1996: 21), who states that, â€Å"Autonomy is enhanced when learners are encouraged to self-monitor and self-assess.† An important aspect of the monitoring process for learners is simply knowing how they are doing in their learning. They want to know if they are becoming more proficient as users of the target language. Brindley (1989: 60) says that self-assessment has five purposes. Firstly, learners have greater responsibility for assessment of their proficiency and progress; secondly it lets them diagnose their strong and weak areas; thirdly it lets them compare their present level with the level they wish to obtain; fourthly it helps them become more motivated; and lastly it helps them to develop their own criteria for monitoring their progress.However, Brindley (1989: 61) also points out that there are objections to self-assessment. â€Å"The idea that learners can be reliable judges of their own performance is by no means universally accepted.† Therefore self-assessment is a skill, that has to be learned. Brindley (1989: 83) divides this learning into technical training, and psychological training. Technical training is to help the students judge their own performance, and consists of self-monitoring of language use, development of criteria, definition of objectives, and knowledge about language learning. Self-assessments help learners monitor their level of success in specific learning tasks. A series of self-assessments will contribute to monitoring progress towards specific learning objectives. They can also have a motivational effect. Success breeds confidence. Self-assessment does not always demonstrate success but where it does, even on a small scale, learners’ motivation will be enhanced. Teachers also need to know how well learners are doing. They have a professional responsibility to help learners learn. Gardner and Miller (1999: 210) suggest the assessment should contain the following pieces of information: the purpose of the assessment, the benefit to the learner, the procedure for conducting the assessment, the procedure for marking the assessment, a suggested marking scale, a choice of follow up actions based on the score achieved.

Saturday, September 28, 2019

The Statute of Fraud Essay Example | Topics and Well Written Essays - 1500 words

The Statute of Fraud - Essay Example The Wikipedia definition further explains that traditionally a Statue of Fraud has been required in circumstances where the contract relates to Marriage, or cannot be performed within one year, or where it concerns transfer of interests in land, or where it relates to a contract by the executor of a will to pay a debt of an estate with their own money, contracts for the sale of goods above a certain value and finally in contracts where one party becomes a surety or acts as a guarantor. In the Free Dictionary by Farlex, the Statue of Fraud is described as a type of state law that was modeled after an old English Law. This further goes on to add the Statue of Fraud has been adopted by the US from English Law dating back to the year 1677. This US Law acts as a defense in a breach of contract lawsuit. "This has been designed to prevent the possibility of a nonexistent agreement between two parties being proved by perjury or fraud". Therefore, under this law, it is necessary that a writte n note or memorandum of agreement be drawn up if a particular contract is to be enforced. Simply said, that Statue of Fraud ensures that a written agreement exists between two parties in certain types of contracts described previously in this paragraph. Larson (2003) has described that the Statue of Fraud requires that certain contracts be in writing and that they are to be signed by all parties to be bound by the contract. Contracts involving the sale or transfer of land, contract to answer for the debt or duty of another and contract by its term which cannot be completed within a year and the contract for the sale of goods under the uniform commercial code fall under the category of the Statue of Fraud. The origins of the Statue of Fraud can be traced back to 1677 and to the English Statutory law passed during the said period. The Statue of Fraud was established with intentions to prevent injury from fraudulent conduct. Stuckey (2003) has related the statute of fraud to the presen t era of the information age and said "It is important to note at the outset that the Statute of Frauds is one of the most important legal issues for electronic contracting. The Statute of Frauds designates which types of contracts are not enforceable unless memorialized in a signed writing. Most states have enacted some version of the Statute of Frauds, either in its common law or Uniform Commercial Code (UCC) forms". This highlights the importance of the Statute of Frauds and its relevance to the modern day where a bulk of the contracting may be done using the electronic media. According to Raysman, Pisacreta, Adler, and Seth (1999), "Both the UCC and UCITA require a signed writing or in UCITA's terms, an authenticated, record in connection with agreements beyond those specified by the common law. For instance, the UCC imposes the requirement on contracts for the sale of goods of a price of $500 or more of for lease contracts whose total payments are $1,000 or more while UCITA requires an authenticated record of contracts requiring payment of a contract fee of $5,000 or more".  

Friday, September 27, 2019

The Relationship between Painting, Photography, and Motion Picture Essay

The Relationship between Painting, Photography, and Motion Picture - Essay Example They concurrently advance heroic mythology. The moral virtue in grand styles is also not left out. However, an inflexible objectivity never ceases to be an overly important feature of these Narratives. 1870, that’s when the first painting was discovered, this was in a town called Altimira, in Spain (Whitley 29). The cave paintings were discovered by Don Marceline and his daughter. These painting were done by the Magdalenian people before Christ. These painting were majorly boison. In that, the painting are drawn and painted using the boulders of animal’s shoulders. This literally gave them a three dimension look. In France that’s where the Lascaux cave art were discovered, this was by four boys searching for a lost dog. The Lascaux contains seven sections. The hall of the bulls is the most fascinating of all. This is because it contains horses, bull, and stags drawing. They have been painted over bring the notion that other groups of people might have resided in the same caves. The theory behind cave painting is that, individual not in a position to communicate with each other, opted to express their views using the drawings. Thus they could communicate using the drawings easily. Most of the paintings were of animals nonetheless they exist some exemption like the Lascaux painting (Poh 1). It contained dead man paint. The paint has a human body but has a birds face. There exists some explanation as to why human paintings were few. They believed that if they painted the human he would poses their soul. Contrary to that they assumed the animal cave painting would assist them in their hunting expedition. They also viewed it as magic to assist the hunters and a decoration to their caves. Ancient people used natural objects. This includes tools such as spears, and rocks. They used those items to paint their walls. The color they used was obtained from: berries, clay, soot, or charcoal. Surprisingly they might have used hollow bones, or reeds to spray the color. T his just shows how inventive they were or may be the driven by the passion to communicate (Whitley 29). Al Fresco Painting Fresco painting is an art portrayed worldwide. These paintings are normally done on walls of buildings. However, ancient time this took place on caves and rocks. Work or painting done on walls is called Mural. Al fresco paintings can be categorized in two ways. The Buon fresco art painting are on wet plaster. The secco paintings are completed ion dried plaster. In Indian continent that’s where most of this type of painting originated. These painting are from the Buddhist period. They are located in Ajanta caves present day Madhya in India. They expressed Buddha’s tale. Buddhist tales are of moral perspective and good conduct. Fresco is painted mostly in temples, palaces and private residences. The technique used in these painting can last for ages. The painting is painted on wet surface (Alfred 1). This also enhances its survival. The paint is made from natural occurring resources. These are stones, plants and earth. They are crushed after drying them and then powdered. This makes the pigment. It is mandatory to first make the drawing on paper. It is then traced on butter paper. On the outline of the drawing holes are made using pin holes. Finally the drawing is transferred to the wall by dusting fine coal powder through the pinholes. This application is called Suzen Kari. A two point perspective is drawing objects in three dimensions. This advancement has made paintings to come close to reality. This kind of art came about when renaissance were obsessed with the notion of creating an illusion of three dimensions on a flat surface. Brunelleschi is attributed with the introduction of one point perspective

Thursday, September 26, 2019

The US Presidential Electoral System Essay Example | Topics and Well Written Essays - 1500 words - 1

The US Presidential Electoral System - Essay Example This research will begin with the statement that the United States Electoral College system is the method that is used to translate the individual votes for a candidate into votes for the office of the presidency. While the system of electoral votes generally reflects the national will, it has the capacity to elect a president with a minority of the popular votes. Since its inception at the birth of our constitutional government, the Electoral College has been an issue that has been widely debated. While some see it as a stabilizing force in our two-party system, others see it as a vehicle that promotes unfair spending and inappropriate voter pandering. Intuition will tell us that in a democracy the popular vote should be the all-important component in the presidential election. Yet, the popular vote can bring the risk of chaos and splintered political parties. The US electoral system is in need of reform, and simple popular vote would be a move towards eliminating the current system 's inadequacies. The Electoral College system of electing a president uses a system where each state has a number of electoral delegates that are equal to the number of the members of the House of Representatives plus two. The voters then vote for a bloc of delegates that represent the individual candidates. After the election, the delegates cast their electoral vote and the winner is decided. This system was necessitated at the birth of the nation when counting a national popular vote was impractical.

International Fasion Marketing Research Paper Example | Topics and Well Written Essays - 750 words

International Fasion Marketing - Research Paper Example From this paper it is clear that may pose some hurdles in crossing national borders in terms of compliance with the foreign country’s national law and ethics. Specially as Brora is going multinational, the terms and conditions related to a helpline that  is being governed by British law has been assessed as a negative factor for international customers.Brora was started as a small enterprise with a narrow range of cashmere sweaters, but with the passage of time, it swelled to 15 stores in the UK. The primary factor was the use of modern technology for marketing and servicing purposes.As the discussion stresses the extent of variation and popular addition to the stock can also be counted in the economic gain of the company. Even by maintaining relatively higher prices as compared to its competitors in cashmere, Brora has successfully maintained its market value. With the high notion of ‘made in UK’, Brora is quite well accepted in the UK. Brora has its   genre of customers with which it has maintained good relations. While finding enough space in the peculiar market of cashmere, Brora has successfully expanded   its business.  Brora has successfully integrated the traditionalism of handwork with the latest technology of cashmere production.  If SWOT analysis is applied on Brora, we will find that Brora has many factors  that  are the necessary ingredients of its expanding business. It is wholly owned by Victoria Stapleton.

Wednesday, September 25, 2019

How to Develop Growth Strategies for Businesses Case Study

How to Develop Growth Strategies for Businesses - Case Study Example After having full knowledge about all these we have to develop strategies about taking advantage of existing customers. For this Kelly should not leave her established business and attract existing and loyal customers to her new restaurant by giving them some sort of incentives in terms of discounts and one dish offered. Better promotion policies should be used for the attraction of new customers. More focus should be on the quality of food items that the restaurant will offer. Talented and efficient employees are the asset of any organization but organizations also have the responsibility to develop the best working environment to take full advantage from these employees. The use of new technology is also required for the best quality and efficiency. 2. Business Form Kelly should start her new business as a limited liability company (LLC). Most of the costs for Sole proprietorship and sole LLC are the same but one fee is required (Anaejionu, 2012). When filing a certificate of formation for an LLC which is done through the secretary of state and its fee is not more than 300 dollars. There are many reasons to advice Kelly to run her restaurant as sole LLC. First of all, LLC provides limited liability if there are losses in business then creditors are limited to the assets of the business and they can not claim against personal assets of the owner. Through sole LLC Kelly will be able to issue new shares of stock to new owners in order to raise funds to grow business. But in the sole proprietorship, she is limited to take loans only from banks.

Monday, September 23, 2019

When should we bring our troops home from Iraq Essay

When should we bring our troops home from Iraq - Essay Example On 19th September 2005, in a joint press conference with then President George Bush, Jalal Talabani, the incumbent and 6th President of Iraq, was quoted saying that, â€Å"We will set no timetable for withdrawal, Mr. President.A timetable will help the terrorists, will encourage them that they could defeat the superpower of the world and the Iraqi people† (GOLIATH, 2005). 6 years, 455 Bn dollars and over 4421 military deaths later (Congressional Research Service, 2010), Mr. Talabani’s words on ‘timetable’ still hold true with the current 50,000 US military boots on the grounds of Iraq. Since its inception, Iraq war has been subjected to debates starting right from the justification of war, official and unofficial causes, foreign and homeland public support, and troops withdrawal. Even though a quasi-withdrawal deadline was set by the status of forces agreement to leave Iraq by 31 December 2011 (Congressional Research Service, 2009), but the realities behind the actual troop withdrawal are still mushy as described by Secretary of Defense, Robert Gates on April 7th 2011 (BBC News, 2011). The issue of troops withdrawal is not just a question of date but is a convoluted situation of geopolitics, business (read oil), foreign and humanitarian policy goals, insurgencies, stabilization and sustainability. It is worthwhile to note or contemplate on whether the troops should return from Iraq today, tomorrow or should have done it yesterday. America & Iraq – Looking back at past 8 years The Republic of Iraq, once a haven to the earliest civilizations (Mesopotamia) in the world, became a troubled shadow of its past with multi-ethnic clashes and violence, barbaric dictatorships, religious intolerances and fanaticism, social and economic divides and a rich reserve of â€Å"black gold†. On 20th March 2003, President Bush declared war against Iraq as American forces attached the middle-east nation from its southern border. Prior to the announcement, US had gathered international support and alliances with UK, Australia, Canada and Netherlands to fight Iraq. Reasons of combat intrusion of US allied forces in this Arab country have been debatable since the war started. The official rationalization of Operation Iraqi Freedom (official name of Iraq war) presented by US to the UN Security Council and by President Bush in his State of Union Address as (1) to destroy Saddam Hussain's (Reigning radical dictator of Iraq) weapons of mass destruction (WMD); (2) to eliminate the threat of international terrorism; and (3) to promote democracy in Iraq and surrounding areas (CNN, 2003). In coming years, these reasons would become the center of fierce debate and a liability for the Bush Administration to defend both to America and the rest of the world. Unofficial reasons why America was dragged into the center stage in Arab world are speculated to be (1) to control the oil reserves of Iraq, Israel-US relations (Perezalonso, 2006 ) and to make an American statement of influence in the Middle east. Whether the war was justified or not, America was in the middle of chaotic and emergency situation. Iraq witnessed Saddam Hussain’s capture in 2003, Evidence of American military personnel’s abuse and torture of prisoners in 2004, First Iraqi election in 2005, Saddam’s execution in 2005, Insurgency in 2007 and Stabilization efforts since 2008. The total cost of war was estimated to be 3 Trillion dollars (Washington Post, 2010). Apart from expected causalities and economic loss, the major consequences of the Iraq war have been (1) Deconstruction of Iraq (2) Possible radical empowerment of in Middle East and (3) US Hegemony at risk (Hinnebusch, 2007). The war was also a major cause of debate in US Elections 2008 and was one of the factors that led to elect of President Barack Obama. Should we bring our troops back home? Since the time, Bush Administration admitted that falsehood of Iraq’s possession of Weapons of Mass Destruction (WMD) argument (Usborne, 2003), public

Sunday, September 22, 2019

Concept of health (dementia) Essay Example | Topics and Well Written Essays - 3000 words - 1

Concept of health (dementia) - Essay Example arteries in the Heart are responsible for carrying the pure oxygenated blood and when it gets narrowed down due to the building of fatty substances on its walls, enough blood is not pumped in and out of the heart. This leads to symptoms such as chest pain, shortness of breath and in extreme cases, it leads to Heart attack. Coronary Heart Disease is called by different names such as Coronary Artery disease, Atherosclerotic Heart Disease and causes a combination of symptoms. The most important condition caused is called Angina which blocks blood flow in heart. Limitation of blood flow in turn causes a condition called ischemia in myocardial cells. When myocardial cells starve and die of oxygen it leads to a condition called myocardial infarction and there will be numbness in the body which is called as paresthesia. This disease is of particular interest because in England alone it kills more than 110,000 people annually. The disease does not have a big history as it was discovered very late after many changes have happened to the eating and working habits of people. CHD is also the most important cause of death in the US where more than 15 million people have some form of this condition. Also, according to Guinness Book of Records, Northern Ireland is the country with the most occurrences of CHD in the world. CHD is not biased with gender affecting both males and females equally. Although men in the 40’s are more susceptible than women, it gets evened out because as women get older, their risk is equally high as that of men. From 1984, more women have died of this heart disease than men. Already one in three females die of CHD while one in twenty five females die of Breast cancer. Forty to Fifty percent of women older than 45 have high levels of Blood pressure called Hypertension and high levels of Cholesterol which are the well-documented risk factors of heart diseases while smoking is the most common and preventable reason for cardio-vascular diseases in

Saturday, September 21, 2019

Most Violated School Policies Essay Example for Free

Most Violated School Policies Essay The formation of character is one of the most important features of the educational system at the University of Baguio. For this reason, the imposed discipline, while observant to the rights and feelings of others, is firm, especially when the reputation of the student body and institution is at stake. Students are expected to manifest both within and outside the University, the respect for order, morality, personal honor, and rights of others, which is required of God-fearing men and women. (UB student handbook, Article XIV: 2010 Edition) Schools have policies that are being implemented for the general welfare of its constituents. These policies provide a set of rules that the students, teachers, etc. should follow. These rules are necessary for the order and uniformity of the students within the school premises. Even with the presence of these rules, some of the students violate them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. Defined as a definite course of action adopted for the sake of expediency, facility, etc.; an action or procedure conforming to or considered with reference to prudence or expediency. (http://dictionary.reference.com/browse/policy) Educational policies are significant because these are rules that are used in schools to discipline students. These rules determine how effective and efficient the school is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies can help students in school on their day to day activity. For a policy to become effective, it must have a well-pronounced outcome, assumptions should be clear and explicit, linkage to organizational direction must be present, due process in the development has to be observed, the priority should be on the public interest, expectations have to be made, the policy must be both efficient and effective, results should be stated in measurable terms, evaluation of results should be capable, funding and allocation of resources must be appropriate, accountability should not be vague, it should be lawful and administered, it must be based from history, ideas have to be verified before implementation, and the policy results should be well stated. (http://manuals.ucdavis.edu/resources/coordinators.htm) One of the factors why students violate school policies can be explained through their different behaviours. Behaviour is the manner of behaving or conducting oneself; the aggregate of all the responses made by an organism in any situation. (http://dictionary.reference.com/browse/behavior) Based on Operant Conditioning of B.F. Skinner â€Å"All behaviour caused by external stimuli and all behaviour can be explained without the need to consider internal mental states or consciousness.† It means that the actions done by students are responses to its environment. (http://www.learning-theories.com/behaviorism) Another type of behaviourism is Radical Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In order to resolve this problem the group found out that the best solution is the use of Biometric identification systems which can be grouped based on the main physical characteristic that lends itself to biometric identification. There are different kinds of biometric system in which the fingerprint biometrics is the commonly used one. There are also other biometric identification systems such as the hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. There are biometric systems that are composed of more than two physical characteristics to be identified. Statement of the Problem 1) What are the reasons why these students violate such policies? 2) What are the most common policies that are violated by the violators? 3) How can the proposed biometric ID system control students from violating the wearing of ID? Scope and Delimitation This proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities. Significance of the Study With the help of this proposal, the University of Baguio would be able to control every entrance and exit of the school. The act of not wearing IDs for the students would no longer be possible because they will not be able to enter the school without their IDs. The biometric ID system would strengthen the security of the academe for the safety of the students. The time when the students would enter and leave their classes would be monitored. The system would be able to determine if the students will skip their classes. Also, the entry of thieves and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernized system to be established in the University, all of the students and personnel of the school will benefit from it. FRAMEWORK The leniency of the marshals in checking the ID’s and proper wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the school’s vicinity are the reasons why the researchers proposed an ID Biometric System. The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. Some students just wanted to violate such policies because they thought that it was a fun and interesting thing to do. If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitoring of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the data that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers foresee that this would be able to control the reoccurring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal. DEFINITION OF TERMS * Biometric – pertaining to, noting, or using a person’s unique physical and other traits for the purpose of identification and security. * Coincide –to occupy exactly corresponding or equivalent positions on a scale or in a series * Identification – psychological orientation of the self in regard to something (as a person or group) with a resulting feeling of close emotional association. * Implementation – the act of implementing, or putting into effect. * Policy – a definite course of method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal – An act of putting forward or stating something for consideration. * Scanner – a device sensing a recorded data. * System –a group of devices or artificial objects or an organization forming a network especially for distributing something or serving common purpose. * Units – a piece or complex apparatus serving to perform one particular function ASSUMPTION The group assumed that if the proposal is to be approved by the Board of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane place to study. CHAPTER II REVIEW OF RELATED LITERARTURE I. EXECUTIVE SUMMARY In the millennial years rapidly advancing technological world, the issue of security is becoming a more and more pressing matter. Computer crimes and identity theft related crimes are becoming more rampant and apparent, requiring better solutions to cope with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometrics. Biometrics defined simply in its regard to security matters is any method or technology which uses biological measurements to facilitate authentication for verification or identification of a particular user. Although still in major phases of development, biometrics is seen as a highly valuable initiative to one day replace present day security authentication practices due to its ideal concept of being virtually risk free and non-inaccurate. This paper will analyze all aspects concerning biometrics including its overall concept, how a biometrical authentication system works, controversial issues concerning its implementation, its current uses in technology, business, and governmental agencies and its future developments. II. CONCEPT OF BIOMETRICS IN SECURITY A. TWO CATEGORIES Biometrics can be subdivided into two main categories. These include physiological and behavioral categories of specific measurements. Physiological measurements include biological characteristics inherent to individual human beings. Some of these would include facial structure, fingerprints, hand structure, iris and DNA structure of a particular person. Behavioral measurements measure dynamics in individual behaviors. Some of these would include keystroke behavior, signature and voice recognition. B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS FACE: Facial recognition involves technology which scans the face and interprets the data as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to identify people they come into contact with, but it is not an easy method to duplicate for identification on a biometric system. This is due to changes such as plastic surgery, weight gain or weight loss which can cause the results to be inaccurate. Another emerging method of collecting biometric information involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted through the skin. FINGERPRINT: Fingerprint analysis has been around for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint analysis involves examining the ridges on an individual fingerprint in order to match them to a specific owner. HAND: Hands can be analyzed and measured in a few different ways. Aside from fingerprints, another way to use hands in biometrical analysis is through hand geometry which measures and compares the different physical characteristics of a persons hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a persons hand and measure the complexity of the vein patterns within that persons hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and difficult to be counterfeited by an illegitimate user. EYES: Eyes can be used in two different ways as a part of a biometrical scrutiny process. Iris scanning involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina scanning involves analysis of the capillary blood vessels located in the back of the eye. DNA: DNA verification uses analysis of genetic information found within a specific persons DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying paternity of a persons child or in forensic crime investigations as a evidence for convicting individuals for crimes such as murder or rape. ODOR SCENT: Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled individual odor theory. This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE ANALYSIS: Voice analysis involves analyzing of the pitch, tone, cadence, and frequency of a particular users voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but also the way that person speaks is also a unique and measurable trait. SIGNATURE: Signature analysis analyzes the way a person writes his/her signature as a basic means of identification. Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE: Keystroke analysis measures the dynamics of a persons typing rhythms to facilitate authentication of a particular person. Keystroke analysis may be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer session even after the access control point has been successfully passed by the user. GAIT: Another new developing biometrical technique is one which measures gait which is a persons particular way of walking and facilitating motion. Gait can be used effectively to recognize people coming in from a distance. COGNITIVE BIOMETRICS: Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer database as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses. C. PARAMETERS Given the various methods for collecting biometrical data, each of these techniques must pass a set of parameters to a degree in order to be considered as a viable method for integration within a biometrical system. These parameters include: UNIVERSALITY: The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. UNIQUENESS: The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE: The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery. COLLECTABILITY: The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more sanitary methods are more ideal for a viable biometrical system. PERFORMANCE: The performance principle is concerned with the accuracy, speed and the strength of the technology used to authenticate the user. ACCEPTABILITY: The acceptability principle is related to the degree of social approval for use of the technology as a means for collecting biometrical data. CIRCUMVENTION: Circumvention involves, the biometrical systems ease of adaptation to a substitute should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS (Based on the Comparison of Various Biometric Technologies table by A.K. Jain, et. al. 2004) FACE: Facial scanning has a high level of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning scores low in its level of uniqueness due to the fact that it can be difficult to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning scores a medium ranking under the permanence factor. This is due to the fact that although a persons actual facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning scores a high mark due to the fact that, going along with its high level of universality, every living human-being does have a face which is easy to locate on a human body. Facial scanning is low in performance because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also scores high in acceptability as a comfortable and accepted way people would want to collect their biometrical data, but it scores low in circumvention because it doesnt have an easy substitute which can replace it. Facial thermograph scores high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and medium in performance. FINGERPRINT: Fingerprinting scores medium in its level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be damaged via rare skin diseases or through loss of fingers, abrasions, etc. Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% failure to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND: Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability, and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability; but it scores hi gh in circumvention. The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to live without them. EYES: Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a better choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performance, and circumvention; receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA: DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention. Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR SCENT: Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and lotions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS: Voice analysis scores medium in its universality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system. This is because not only does a persons voice change throughout time, but people can knowingly change their voice or use technology to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE: Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person. This is because a persons handwriting can change depend on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE: Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously authenticate a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be easily changed if a person learns to type in different ways. GAIT: Gait scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data. III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM A biometrical system although seemingly complicated, has only two main steps, regardless of the methodology or the technology used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart card which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database. In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the systems objective is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the systems intention is to authenticate the user only on the basis of the biometrical data alone. The goal of this function is to identify the user according to the closest match within the allowable limit of the system. B. PERFORMANCE MEASUREMENTS The performance of a biometric systems technology can be broken down into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Rate. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un-authorized user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal error rate stands for the rate at which FAR and FRR are equal. This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating characteristics deals with the systems accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FTE- FTE stands for failure to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use. C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS The three most susceptible areas of vulnerability for attack of a biometric system are: 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) Replay attacks- where perpetrators obtain valid templates from the original user and then use them to directly dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones. IV. ISSUES WITH BIOMETRICS A. IDENTITY THEFT ISSUE Although the ideal goal of biometrical authentication is to have ultimate prevention of identity theft, the issue of an illegitimate user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a persons identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system. The main problem concerning this issue is in the fact that if an individuals identification is stolen by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate users existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does become compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original users biometric data can be used to replace it. B. PRIVACY ISSUE Privacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individuals movements can be tracked preventing anonymity. Safety of the legitimate users can become compromised, if malevolent individuals choose to target that person in order to obtain their goal. Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse users biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals. C. SENSOR OBSTACLES Different types of technology (hardware software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat. D. FAILURE TO MEET PARAMETERS Another issue concerning implementation of biometrics is in the issue of a systems failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery. V. CURRENT USES OF BIOMETRICS Although the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including private industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include: 1) Walt Disney World: Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union: First Tech Credit Union is an Oregon based credit union which utilizes keystroke recognition technology for authentication of users on its online website. 3) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Childrens Clearinghouse: A West Virginia based organization entitled Missing Childrens Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank Singapore: Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases. 6) Coca Cola: Coca Cola uses hand scanning machines to replace time cards for employees in order to document worker time keepinsg records. 7) Welfare crack-down: New Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) Notebooks: Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the identity of the user. 9) Prisons: Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners. VI. FUTURE DEVELOPMENTS IN BIOMETRICS Since the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 billion dollars annually by 2020. Emerging trends for future uses of biometric technology seem to lean more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and Naturalization Service may begin implementing biometric technologies to identify illegal immigrants. Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones. VII. CONCLUSION Although not that long ago, the concept of having biometric technology as a part of our mainstream society may have been seen as a science-fictional impossibility, technological innovation has grown to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer confidence and innovation within the biometric industry is also expected to improve. Although no single biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day. CHAPTER III METHODOLOGY There was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the â€Å"mandos† and â€Å"magnas† can easily enter the school’s premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school. Regarding this matter, the group came up with an idea for a topic for their action research. Before they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. After the interview, the group determined that the rules which are commonly violated are: a) wearing of I.Ds inside the school campus; and b) wearing of uniforms on the designated days. The group then convened and finalized their topic that would focus on â€Å"A proposed Biometric ID system to control the reoccurring violations by University of Baguio students.† Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group prepared communication letters addressed to the deans of the different schools of the University and respondents likewise with the survey questionnaire. Upon approval of the deans of the different schools, the group administered the questionnaires to the respondents. The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school. The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most likely be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By the time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study. CONCLUSION In light of the findings, the following conclusions are hereby presented: Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this attitude most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs. The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred fifty thousand pesos. In such case the University of Baguio can still afford this system since it does not only help the students but it can also secure their safety With the help of this proposal it will lessen the burden of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints. RECOMMENDATION Drawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gates should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the ID’s loss. BIBLIOGRAPHY BOOKS * Addiction Today, Sept. 27, 2008. Prisons Use Biometrics to Manage Methadone. * Germain, Jack M., Sept. 11, 2003. Beyond Biometrics: New Strategies for Security. * New York Times, Nov. 15, 2008. Technology and Media, a Surge in the Demand to use Biometrics. * Osborn, Alice, Aug. 17, 2005. Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. Biometrics: The Future is Now. * Technology and Human Values Senior Seminar, 2008. Biometrics. * Tilton, Catherine J., Feb. 2006. The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. Biometrics.† ONLINE * http://www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http://www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http://query.nytimes.com/gst/fullpage.html?res=9F06E0DB163EF934A25751C1A9679C8B63sec=spon=pagewanted=1 * http://www.video-surveillance-guide.com/future-of-biometrics.htm * http://www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124Category=1240 * http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf . * http://en.wikipedia.org/wiki/Biometrics#cite_note-jain_short_article-20 .