Monday, September 30, 2019

How well does Zara’s advantage travel globally? Essay

Zara has several advantages when it expands its operation in global markets. Firstly, Zara has always promoted its products via its stores and it had its own centralized distribution center which will translate to low advertising and logistics costs when it enters new markets. As opposed to its competitors who would invest heavily on advertising and organize a distribution system. Secondly, apparel retailing was witnessing increasing concentration which would benefit Zara when it entered new markets. Thirdly, there was more homogeneity in fashion which supported Zara’s brand of clothing since its target market is consumers receptive to fashion. Moreover Zara has an adequate system of knowing local trends and tastes which it would reflect in its designs. The strategy of opening one store for information gathering in the initial phase of entering new markets is one of its key strengths. Lastly, economies of scale were another advantage for Zara when entering a new market. The International strategy of Zara. After opening its first store in La Coruna in 1975, ZARA expanded within the domestic market during the 1980s. International expansion started with the opening of a store in Oporto, Portugal in 1988 (Carmen & Ying 2009). Currently, ZARA is already operating over the five continents with over 1,700 stores. International sales accounted close to 70% of its total turnover, with Europe being its largest market by far. ZARA has been identified as a trans-national retailer (Alexander & Myers 2000). On the surface, this may appear as a peculiar classification since they appear committed to a highly standardized operating formula which provides little opportunity for market responsiveness. Analysis of ZARA’s internationalization strategy would indicate otherwise (Bruce, Moore & Birtwistle 2004). While the brand image is highly standardized, its product development and merchandising strategy are very flexible and allows for the integration of pan-national fashion trends as soon as it emerges. This is evident by its approach to trading in the British market. ZARA recognizes the appeal that their Spanish origin provided for its brand and clearly  understood the distinctive positioning they had within the United Kingdom as a fashion forward retailer. The company therefore focused upon the more fashionable lines within their British stores. Pricing policy within the United Kingdom has been more upscale than their home market in order to exploit their advantages within the British market. Best way to grow for Zara Zara is the meaning of â€Å"instant fashion†. Instead of creating demand for new trends and using fashion shows, Zara uses another method. They study the demands of the actual customers in their stores and then deliver that design at very high speeds. They save tons of money on their delivery methods. I would say they are very much ahead of the fashion market in terms of production and sales. Zara is the number 1 most profitable out of 8 other companies in the Inditex Group. Their production cycles are much faster than H&M. In 1 year Zara launches 11,000 new items compared to 2,000-4,000 from H&M. Over the next 4 years the brand plans to double in size opening over 4,000 new shops. They plan this expansion to mostly start out in Europe before pushing anywhere else.

Sunday, September 29, 2019

Computing and Ieee-754 Floating-point

1. Name the three ways in which signed integers can be represented in digital computers  and explain the differences. 2. Which one of the three integer representations is used most often by digital computer  systems? 3. How are complement systems like the odometer on a bicycle? 4. Do you think that double-dabble is an easier method than the other binary-to-decimal  conversion methods explained in this chapter? Why? 5. With reference to the previous question, what are the drawbacks of the other two  conversion methods? . What is overflow and how can it be detected? How does overflow in unsigned numbers  differ from overflow in signed numbers? 7. If a computer is capable only of manipulating and storing integers, what difficulties  present themselves? How are these difficulties overcome? 8. What are the three component parts of a floating-point number? 9. What is a biased exponent, and what efficiencies can it provide? 10. What is normalization and why is it necessary? 11.W hy is there always some degree of error in floating-point arithmetic when performed  by a binary digital computer? 12. How many bits long is a double-precision number under the IEEE-754 floating-point  standard? 13. What is EBCDIC, and how is it related to BCD? 14. What is ASCII and how did it originate? 15. How many bits does a Unicode character require? 16. Why was Unicode created? 17. Why is non-return-to-zero coding avoided as a method for writing data to a magnetic  disk? 18.Why is Manchester coding not a good choice for writing data to a magnetic disk? 19. Explain how run-length-limited encoding works. 20. How do cyclic redundancy checks work? 21. What is systematic error detection? 22. What is a Hamming code? 23. What is meant by Hamming distance and why is it important? What is meant by minimum  Hamming distance? 24. How is the number of redundant bits necessary for code related to the number of data  bits? 25. What is a burst error? 26. Name an error detection met hod that can compensate for burst errors.

Saturday, September 28, 2019

Brutus The Tragic Hero Essay Research Paper

Brutus The Tragic Hero Essay, Research Paper In the drama Julius Caesar by William Shakespeare, Brutus had many defects such as he trusted people, he had a scruples, and he had a lecherousness for power. Many times in the drama he made errors. He likely made more errors in the drama so any other character. Like other tragic heroes, Brutus had great promise and ability. One of the many ways Brutus was a tragic hero was that he trusted people excessively easy. The first clip he trusted anybody in the drama was when he joined the confederacy. He trusted the letters that were sent to him and so he trusted Cassius to take him in the right way. Then Brutus gave his trust to Antony to give a address and non state anything bad about the confederacy. Antony made the rabble angry and they went on a violent disorder. Brutus had a scruples. This is another defect. Brutus was an honest adult male and did some dishonourable things. After he acted dishonorably, he felt bad about it. For illustration he felt bad about killing Caesar. He had a guilty scruples about Caesar because he saw his shade. The shade was non truly at that place, it was Brutus? s scruples that made the shade appear. A good leader must non hold a scruples because it will acquire in the manner of what must be done. Brutus was power hungry. He ever had to hold the last word in a conversation and he wanted to be the leader. When Brutus joins the confederacy he became their leader. Then the plotters wanted Cicero to fall in, but Brutus did non desire it because he would lose power. When Brutus and Cassius were discoursing schemes, Brutus had the last word and they used his conflict tactics. Brutus had a lecherousness for power and wanted to be in charge invariably. Brutus was destroyed by his personal failing and hapless determinations. Brutus gave his trust to many people, had a scruples, and had a lecherousness for power. Those are many of the errors Brutus recognizes at the terminal of the drama. Brutus was one of the noblest work forces in the drama, if non the noblest. N/A

Friday, September 27, 2019

Principles of Marketing Report Essay Example | Topics and Well Written Essays - 500 words - 192

Principles of Marketing Report - Essay Example Millennials are diverse and optimistic and are aged between 18 and 36. This generation account for 24 percent of the U.S population only 21 percent of this age group are married meaning their finances are less committed, and they are likely to buy a new product. The income of this demographic is between $25k and $48k. With the younger Millennials aged between 18 and 27 earning $25k and the older ones aged between 27 and 36 earning $48k (Nelsien, 2014). This is a diverse generation composed of Hispanics who make 19 percent, African Americans 14 percent and Asians 5 percent. They are also bilingual, and two-thirds were born in the US. Millennials are also tech-savvy and are likely to visit the company’s website before making an actual visit to a retail store. The company will have to engage them both online and in the media. Millennials like city life and are less likely to live in suburbs. They are social and do not fancy the picket- fence mythology that is associated with the suburbs. With this in mind, the company will target the urban areas of the state (Nelsien, 2014). The targeted areas also have the some highest concentration of Millennials in the state. In their research on Millennials, Nielsen found that three cities in California were in the top ten markets where the concentration of Millennials was high in the US. The areas are San Diego, Los Angeles, and San Francisco. Since San Diego ranks the highest of the three it will be the company’s area of focus in the state (Nielsen, 44). San Diego is also ranked third in the country making it an ideal location for the company to achieve the greatest distribution. These demographics are ideal for the company as a target group because they live in urban environments and live mostly in Western states that make California, an ideal place for the company (Kotler, 2009). Millennials have become influential in America.  

Thursday, September 26, 2019

Sex Disparities in the Use of IV Rt-PA Essay Example | Topics and Well Written Essays - 2500 words

Sex Disparities in the Use of IV Rt-PA - Essay Example For the women who are 50 years and above they are less likely to be admitted in the ICU as compared to men. For the women they have to wait for a long time in the emergency section than for the men it has always been believed that men are at more risk when suffering from cancer as compared to the men. A woman suffering from stroke is much different from a man with the same disease. The disease ranges from the symptoms to the treatment process (Gerarld, 2009). ii. Loss of balance and dizziness. When you’re experiencing all this and having trouble when walking one might end up coming to assumptions that it is the intoxication process but these might be one of the symptoms of stroke. v. Severe headaches. When one is suffering from stroke one is likely to experience severe headaches now and then. In a recent study it was noted that 600 patients were found to be experiencing headache women are likely to have headaches than the men. The researchers have indicated that the physicians treat the women who experience stroke in a less aggressive manner than the way they handle men. There are so many differences between thesymptoms of a stroke in a man and in a woman. The rt-PA method of treatment stands for Recombinant Tissue Plasminogen Activator which is an enzyme that has proteins and it helps so much in the breaking of the blood clots. It is a very common method of the treatment of stroke. The research that has been taken in New York it indicates that women have got around 30% lesser odds of getting the treatment using the rt-PA method of treatment. The research has also touched on other sectors and the findings are that women are less likely to receive Thrombolytic treatment in the New York. Thrombolytic treatment of cancer entails the dissolving of the blood clot. The reason why there is a challenge in the chances of women to get thrombolysis is that timeliness

Do The Right Thing Review Movie Example | Topics and Well Written Essays - 500 words

Do The Right Thing - Movie Review Example Lee could have named the owners without having mentioned their race as white, but the sole purpose behind doing so was to build the audience’s understanding of the plot as racism oriented. Where Sal and his sons have been presented as owners because they are white, Mookie has been presented as the delivery boy, fundamentally for the reason that he is an African American. This tells that this film particularly differentiates between people and decides their status on the basis of their race. White owners and black delivery boy are the signals that have been used by Lee to construct the racist mood. In the beginning, the movie maintains a low profile with light entertainment and jolly mood. Characters in the start are quite amusing. But as some time passes, the film suddenly gains an upsurge until the tension between individual characters reaches its apogee. The conflict between races and ethnic identities overtly shows up in the form of hatred among characters belonging to diff erent races. The tension in the film’s climax is unbearable. A deep analysis of the film suggests that Lee has, for the most part of the movie, not discussed characters, as much has he done the relationships between them and their interpersonal conflicts.

Wednesday, September 25, 2019

Management Information System. (Position Paper) Assignment

Management Information System. (Position Paper) - Assignment Example Voice via internet protocol (VOIP) telephones offer high-tech means for employees to connect (Legge, 1991). When it comes to inventory management, Syndicate Technological Company has adopted the urgency to ensure that there is adequate stock to meet demand without spending in more than they need. Systems for managing inventory that track the measure of each item a company keeps, triggering an order of extra stock when the quantities goes below a certain amount. These systems work effectively when the inventory management system is linked to a point-of-sale (POS) system. The POS system ensures a removal of item from the inventory count, the moment an item is sold, creating a closed information loop between all departments. Syndicate Technological Company keeps digital forms of documents on servers and other mass storage devices like flash disk, DVD’s among others. These documents become instantaneously accessible to everybody in the company, irrespective of their geographical locality. Syndicate Technological Company is able to store and preserve an incredible amount of chronological data economically, and employees profit from instantaneous access to the documents they want. Storage of data and information is only an advantage if that data can be used successfully. Syndicate Technological Company use that information part of their strategic design procedure as well as the tactical implementation of that approach (Sarngadharan & Minimol, 2010). Management Information Systems (MIS) aid Syndicate Technological Company to follow up on sales data, expenditures and yield levels. The statistics can be used to track viability over time, capitalize return on investment and find areas to improve. Syndicate Technological Company is adopting information technology to enhance its design and management of customer affiliations. Consumer Relationship Management (CRM) systems records every dealings a business has with a consumer, so that a more

Tuesday, September 24, 2019

Assessment for Learning Essay Example | Topics and Well Written Essays - 2000 words

Assessment for Learning - Essay Example This essay will talk about the student-centred assessment process on vocational teaching and learning process. MCAST is offering a chance to several individuals to acquire effective knowledge and skills in order to make themselves more employable through the lifelong education and assessment process (MCAST, 2010, p.1). This study will discuss the student-centred assessment approach to MCAST Art & Design Institute’s Media Studies subject. In student-centred learning process, the students play an important part in the learning evaluation. In this process, the students can decide the demonstration of their learning process. The students should develop an assessment that supports motivation and learning which can be thought of to be an important criterion of student-centred approaches. Media studies generally deals with the history, effects and contents of several media. Media studies deal with traditions from the humanities and social sciences. Communication science, mass communi cation, communication studies and communication are the important ingredients of the media studies. MCAST Art & design institute incorporated these subject matters in Media studies. MCAST conducts assessments in the international and national context of higher education. The major aim of student-centred assessment strategy in MCAST is to develop skills, knowledge and competencies. The program learning outcomes are very much practical. These outcomes are focused to help the students to develop their skills, competencies and knowledge. This program has several clear and transparent program assessment strategies like assessment plans. The learning assessment strategies are very much student focused. Both the program teams and program board work together to develop the skills, competencies and knowledge of the students. In this process students are supported and encouraged to become significant independent learners. E-learning facility and advanced technology are implemented to assist t he students to achieve the learning outcomes. It is important that the teachers should help their students to make a positive approach to the subject matter. Student centred assessment strategy is important in the vocational institutions as it helps the students to provide the practical knowledge. It is important for the students to gain practical knowledge in the media studies. The institution focused on providing effective practical guide to the students. It is important to apply Student-centred assessment approach in media studies. It will help to fulfil the special needs of students. This educational approach of students has several propositions for the designing of the course content, curriculum, assessment of courses and evaluation process. Question 2 Formative, summative and portfolio assessment methods are three major assessment methods. Formative assessment takes place throughout the learning program. In MCAST, the learner is assessed and provided feedback during the learni ng process. It is known as the formative assessment. On the other hand, summative assignment helps to assess the students at predetermined points at the end of the learning process. Portfolio assessment can be described as the collection of activities that are linked with concepts which are required for the students to learn. Validity of an assessment method is the specific extent that helps to measure the suitability of the interpretation of outcomes. It is a matter of degree. There are four types of validity, such as content

Sunday, September 22, 2019

A Relevant Factor in Drama and Poetry Essay Example | Topics and Well Written Essays - 500 words

A Relevant Factor in Drama and Poetry - Essay Example What makes poetry and drama different to other literary works is that these are delivered through performance. For these to be appreciated by the audience, people who recite the poems or who act in the drama must deliver the words according to the essential points raised by the author. It must be noted, however, that while other literary works read are subject to the interpretation of the reader, drama and poetry tend to be performed according to the elucidation of the actors and directors. As pointed out by Clugston, â€Å"drama is mimetic art† (2010, 13.1). This means that that the performers or actors make it a point to imitate life. Because of this, there is always the tendency to deliver the lines in a realistic or natural conversational manner. However, this may not always be the case as in the versions of Macbeth by William Shakespeare. Definitely, in the first production in which Shakespeare himself oversaw, the actors stuck to the lines just as the playwright created it. Roman Polanski’s 1971 film, particularly in the first part, Witches’ Opening, remained loyal to the original script. The lines â€Å"when shall we meet again, in thunder, lightning, or in rain† were delivered in the same manner that actual Shakespearean actors do (Shakespeare, Act I, Scene I). Although its setting is exactly the same as described by the playwright, it does seem unnatural for the film audience, people who have become accustomed to the listening to script being delivered in normal conversational manner. The TV adaptation produced by the BBC did not use the original script in verbatim. Instead, they developed a script that is more attuned to the tastes of the modern audience.

Saturday, September 21, 2019

Of mice and men was written in a period when mentally disabled people were treated like outcasts Essay Example for Free

Of mice and men was written in a period when mentally disabled people were treated like outcasts Essay Of mice and men was written in a period when mentally disabled people were treated like outcasts. They were treated like that simply because they were different. Mental people were thought to be almost like a different species. Black people were considered outcasts because they had different skin-colour to white people. Also women were treated like property that belonged to men. The novel was written during the Great Depression, where jobs and employment were scarce. The USA was quite a poor country back then. Lennie is considered an outcast because he is mentally disabled. Mentally disabled peopled in that time were treated badly. They were locked up and separated from the rest of society. This is known as segregation. They also use to be sterilised. This means that they werent allowed to have babies or reproduce. Those are all very horrible. However, lennie was not treated like any other mental people. This is because he has George to look after him, and many other mentally disabled people didnt have anybody to care for them or to look after them. But Lennie had that someone, and it was George, so that is whats different about Lennie. In the ranch, however, lennie was considered an outcast. We know this because lennie says to crooks, Everbody went slim, George and everbody. George says I gotta stay here. This shows that Lennie is not allowed to go into town like the rest. Hes not considered good enough do anything with the lads. Lennie is not allowed to play games, such as horseshoe, with the others. From outside came the clang of horseshoe only Lennie was in the barn. This shows that while the others played their games lennie was made to stay inside the barn. He is like an outsider or a refugee. Crooks is considered an outcast simply because he is black. In those days, black people were treated very badly. They were treated differently from white people. Black people were often never called by their first names. Crooks is considered an outcast on the ranch because hes black and isnt referred to his real name, its either crooks or nigger. Crooks also has his pride he is a proud and aloof man. This means that crooks is not allowed inside the bunk house because hes black. Hes allowed to play sports outside the bunk house, but not inside it, which is why he had a separate room. I aint wanted in the bunk house cause Im black. This shows the racial issue of how black men did not mix with whites. Crooks is being segregated in this way. That is also another reason why crooks is an outcast. Curleys wife is presented as an outcast. This is because women in those times were treated as a piece of property by the men. They may have also been treated as a sex object by their husbands; there to cook, clean and have babies. In the ranch Curleys wife is considered an outcast because shes a woman. Also she is related to the boss. She is not allowed to play horseshoe or go into town or even talk to anyone. We know that when she was in the barn with lennie, I get lonely you can talk to people, but I cant talk to nobody but Curly. This shows us that everyone else can talk with whom they like, but she can only talk to her husband. In conclusion, 1930s America is presented as a racist country who thinks black should be separated in terms of class. It is presented as a country that thinks mentally disabled people should be separated from the rest of society. It was also a sexist country who treated women very badly. A very uncivilized country.

Friday, September 20, 2019

Advantages and Disadvantages of Biometrics

Advantages and Disadvantages of Biometrics ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote convenient methods such as online banking and use of ATM for their customers to access their money strives to ensure only the right person has access to the account. Also, military and national security services store high sensitive and critical information that must only be accessed by specific individual thereby deploying security measures to keep this tradition. However, achieving these goals largely depends on securing and controlling the assets as documented which means only authorised individuals have access to these environments and eventually the assets. Sequel to the importance of access control, different security techniques have been deployed to safeguard these assets which ranges from PINs and passwords, ID cards, smart card est. Vulnerabilities to these methods have lead to the recent surge in biometrics industry as many believe this is the future. Reasons such that the physical presence of the authorized person is needed at the point of access and also, the fact that it is unique and almost impossible to duplicate emphasis the benefit of biometrics and explain its glooming popularity. However like any other security methods, biometrics has limitations and threats which can impact its effectiveness and efficiency. It is not suitable for every application and can be a very wrong choice for certain applications. Therefore, it is essential to manage these limitations and threats properly to enhance the success factor of biometrics. Finally, it is important for any sector deploying biometrics to understand the various issues associated with biometrics such as privacy, standards and what the law requires of biometrics. CHAPTER ONE INTRODUCTION Organizations strive to secure their assets and provide means of controlling access to these assets. This process requires identification and authorization to ensure the right person is accessing the right asset. Over the years, traditional methods of authentication, mainly passwords and personal identification numbers (PINs) have been popularly used. Recently, swipe card and PINs have been deployed for more security since one is something you have and the latter something you know. However, these methods still have vulnerabilities as swipe card can be stolen. Also, bad management of passwords has left people writing them on papers and desks or simply choosing easy and general words for quick remembrance which expose the password to intruders. More recently, stronger identification and authorization technologies that can assure a person is who he claims to be are becoming prominent and biometrics can be classified to this category. Biometric technology makes use of a persons physiological or behavioral characteristics in identification. Every human being is unique in nature and possesses physical parts completely different from any other person. The September 11, 2001 terrorist attack did not help security concerns as governments and organizations all around the world especially the border security agencies have greatly embraced this human recognition technology. As both private and public entities continue to search for a more reliable identification and authentication methods, biometrics has been the choice and considered the future. WHAT IS BIOMETRICS? Biometrics refers to the automatic identifications of a person based on his or her physiological or behavioral characteristics (Chirillo and Blaul 2003, p. 2). It is an authorization method that verifies or identifies a user based on what they are before authorizing access. The search for a more reliable authorization method to secure assets has lead to the revelation of biometrics and many organizations have shown interest in the technology. Two main types of biometrics have been used mainly physical and behavioral. A physical biometrics is a part of a persons body while, a behavioral biometric is something that a person does (Lockie 2002, p. 8). He added that although there are some more unusual biometrics which may be used in the future, including a persons unique smell, the shape of their ear or even the way they talk, the main biometrics being measured include fingerprints, hand geometry, retina scan, iris scan, facial location or recognition (all physical), voice recognition, signature, keystroke pattern and gait (Behavioral). However, it has been argued by Liu and Silverman (2001) that different applications require different biometrics as there is no supreme or best biometric technology. HISTORY OF BIOMETRICS According to Chirillo and Blaul (2003, p. 3) the term biometrics is derived from the Greek words bio (life) and metric (to measure). China is among the first known to practice biometrics back in the fourteenth century as reported by the Portuguese historian Joao de Barros. It was called member-printing where the childrens palms as well as the footprints were stamped on paper with ink to identify each baby. Alphonse Bertillon, a Paris based anthropologist and police desk clerk was trying to find a way of identifying convicts in the 1890s decided to research on biometrics. He came up with measuring body lengths and was relevant till it was proved to be prone to error as many people shared the same measurement. The police started using fingerprinting developed based on the Chinese methods used century before by Richard Edward Henry, who was working at the Scotland Yard. Raina, Orlans and Woodward (2003, p. 25-26) stated references to biometrics as a concept could be traced back to over a thousand years in East Asia where potters placed their fingerprints on their wares as an early form of brand identity. They also pointed Egypts Nile Valley where traders were formally identified based on physical characteristics such as eye color, complexion and also height. The information were used by merchant to identify trusted traders whom they had successfully transacted business with in the past. Kapil et al also made references to the Bible, first pointing to the faith Gileadites had in their biometric system as reported in The Book of Judges (12:5-6) that the men of Gilead identified enemy in their midst by making suspected Ephraimites say Shibboleth for they could not pronounce it right. The second reference is to The Book of Genesis (27:11-28) where Jacob pretended to be Esau by putting goat skins on his hands and back of his neck so his skin would feel h airy to his blind, aged fathers touch. This illustrates a case of biometric spoofing and false acceptance. They finally wrote Biometrics as a commercial, modern technology has been around since the early 1970s when the first commercially available device was brought to market (p. 26). HOW BIOMETRICS SYSTEMS WORK A biometric system is essentially a pattern-recognition system that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristics possessed by the user (Blaul 2003, p.3). Biometrics has so far been developed to work in two ways mainly verification and identification. Verification systems are designed to give answer to the question, Am I who I claim to be? by requiring that a user claim an identity in order for a biometric comparison to be performed. The user provides data, which is then compared to his or her enrolled biometric data. Identification systems gives answer to the question, who am I? and do not require a user to claim an identity as the provided biometric data is compared to data from a number of users to find a match (Nanavati 2002, p. 12). An illustration of a scenario using an identifying biometrics system is given below and thus gives an answer to the question Who am I? In October 1998 in the United Kingdom, Newham Council introduced face recognition software to 12 town centre cameras with the sole purpose of decreasing street robbery. Images are compared against a police database of over 100 convicted street robbers known to be active in the previous 12 weeks. In August 2001, 527,000 separate faces were detected and operators confirmed 90 matches against the database. Where a face is not identified with any in the database, the image is deleted; if a match is found a human operator checks the result. The introduction of face recognition technology to Newham city centre saw a 34% decrease in street robbery. The system has not led directly to any arrests, which suggests that its effect is largely due to the deterrence/displacement of crime. The face recognition system has been widely publicised by the council and 93% of residents support its introduction (Postnote Nov 2001, p. 1). The case study below illustrates a verifying biometrics system and supply answers to the question Am I who I claim to be? The US Immigration and Naturalization Service Passenger Accelerated Service System (INSPASS) has been introduced at eight airports in order to provide a quick immigration processing for authorised frequent flyers entering the US and Canada. On arrival at an airport, a traveller inserts a card that carries a record of their hand geometry into the INSPASS kiosk and places their hand on a biometric reader. A computer cross-references the information stored on the card at registration with the live hand geometry scan. The complete process takes less than 30 seconds. If the scans match, the traveller can proceed to customs; if not, travellers are referred to an Immigration Inspector. There are more than 45,000 active INSPASS users with, on average, 20,000 automated immigration inspections conducted each month (Postnote Nov 2001, p. 1). Verifying system is often referred to as a one-to-one process and generally takes less processing time compared to the identifying systems. This is due to the fact that in identifying systems, a user is compared to all users in the database (one-to-many). Verifying systems are also more accurate since they only have to match a users data against his or her stored data and do not need hundreds, thousands or even millions of comparisons like the identifying systems. However, it is important for an organization to decide the type appropriate for the applications. RESEARCH METHODOLOGY The research methodology designed for this dissertation is mainly the qualitative approach. A quantitative approach has been overlooked due to limited time as designing surveys, distribution take time and response time could not be predicted. Therefore, my effort will be concentrated on critically reviewing previous literatures in order to acquire an overview of, and intakes on the topic. For more details, Journals, Books, Publications, Documentaries and previous dissertations related to the topic will be reviewed, compared and analyzed. The objectives will be achieved by purely reviewing literatures and previous researches and the literatures critically analyzed by comparing information obtained from different sources. Findings, recommendations and conclusions will be made from the analysis. OBJECTIVES OF THE STUDY The aim of this research is to critically analyse biometric security as an emerging and booming industry by examining the positives and negatives and providing ways of improving the method effectively and most importantly efficiently. Since biometrics applies to many applications, access control will be the main focus of this dessertation. Also, issues such as privacy, laws governing biometrics and standards will be examined. The main objectives of this research are; To review biometric security and issues related to it. To evaluate the threats, advantages and disadvantages of biometrics. To propose ways of improving the effectiveness and efficiency of biometrics from previous researches. CHAPTER 2 LITERATURE REVIEW This chapter is aimed at critically reviewing and analysis of numerous works of researchers in the area of biometrics, threats to biometrics, advantages and disadvantages and ways of improving biometrics efficiency in access control. The effect of privacy (human rights) and the need to conform to biometrics standards will also be examined and reviewed. DEFINITION OF BIOMETRICS According to Jain, Ross and Pankanti (2006, p. 125), one great concern in our vastly interconnected society is establishing identity. Systems need to know Is he who he claims he is, Is she authorized to use this resource? or simply who is this? Therefore, a wide range of systems require reliable personal recognition schemes to either verify or identify of an individual seeking access to their services. The purpose of that scheme is to ensure that the rendered services are accessed by only the authorized and not any intruder or imposer (Ross 2004, p. 1). Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and, or behavioral characteristics (Jain, 2004 p. 1). Woodward (2003, p. 27) cited biometric industry guru Ben Millers 1987 biometric definition: Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physical or behavioral characteristic. Shoniregun and Crosier (2008, p. 10) provided several definitions of biometrics which include: Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological science. Biometrics = identification/verification of persons based on the unique physiological or behavioral features of humans. Biometrics is the measurement and matching of biological characteristics such as fingerprint images, hand geometry, facial recognition, etc. Biometrics is strongly linked to a stored identity to the physical person. Nevertheless the various definitions, it can be seen that the science of biometrics is based on the fact that no two people are the same and this has a significant influence on its reliability and success factor. THE BIOMETRICS INDUSTRY According to Lockie (2002, p. 10), the biometric industry did not really get established until the middle of the twentieth century. The researchers at that particular time were investigating whether various human parts and characteristics, such as the iris or the voice, could be used to identify an individual. This was made public by publishing papers and as a considerable number of these strands of research began to form a piece, the biometrics industry as we know it these days was established. As organization search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention (Liu 2001, p.27). Higgins, Orlan and Woodward (2003, p. xxiii ), emphasized that even though biometrics have not become an essential part of all systems requiring controlled access, the emerging industry has come a long way from its modern founding in 1972 with the installation of a commercial finger measurement device on Wall Street. He made reference to the highly respected MIT Technology Review called biometrics one of the top ten emerging technologies that will change the world. The growth in biometric industries is reflected in the numbers. The trio cited Rick Noton, the executive director of the International Biometric Industry Association (IBIA), who reported in the Biometrics 2002 Conference in London, United Kingdom, that the industrys trade association has indicated the surge in biometric revenues over recent years. From $20 million in 1996, it has increased to $200 million in 2001 and Norton believes they will increase as the years pass on significantly in 5 years time. Also, a forecast made by the International Biometric Group (IBG), which is a biometric consulting and integration firm located in New York City, estimate that biometric revenues totaled $399 million in 2000 and will increase to $1.9 billion by 2005. Both IBIA and IBG believe that the private sector will be responsible for much of the growth. These give evidence of the relevance of biometrics in organizations in modern times. BIOMETRICS AND ACCESS CONTROL Over the years, biometrics has evolved rapidly and many vertical markets such as governments, transport, financial sectors, security, public justice and safety, healthcare and many more have adopted biometrics. Due to this wide range of users, biometrics has been deployed to many applications. Biometrics has been of high benefit to organization as they seek a reliable security method to safeguard assets. Fully understanding how biometrics work, it can be said that the ultimate aim of applying biometrics in the vertical markets listed above is to control access to a resource irrespective of the system used whether a verifying or an identifying process It has been stated by S. Nanavati, Thieme and R. Nanavati (2002, p. 14), that biometric systems are deployed for two primary purposes which are physical and logical access. LOGICAL VERSUS PHYSICAL ACCESS Physical access systems monitors, restricts, or grant movement of a person or object into or out of a specific area (Thieme 2002, p. 14). This could be implemented to control entry into rooms or even the main building. Popular examples are control towers, bank vaults, server rooms and many other sensitive rooms requiring controlled access. In physical access, biometrics replaces the use of keys, PIN codes access cards and security guards although any of these could be combined with biometrics as a complementation. Common physical access application is time and attendance. Thieme also gave a definition of logical access systems as one that monitor, restrict or grant access to data or information listing examples such as logging into a PC, accessing data stored on a network, accessing an account, or authenticating a transaction. In this case, biometrics replaces and can be designed to complement PINs, passwords and also tokens. Basic biometric functionality precisely acquiring and comparing of biometric data is often identical in both physical and logical systems. For example, the same iris scan data can be used for both doorway and desktop applications. Thieme explained that the only difference between the two is the external system into which the biometric functionality is integrated. The biometric functionality is integrated into a larger system. This applies for both physical and logical access system and actions such as access to any desktop application or access to a room via a doorway are effected by a biometric match. However, not every system can be classified as physical or logical access as the end result does not indicate access to data or a physical location and the result therefore may be to investigate more. An ATM secured by biometrics allows access to money, a physical entity. This is made possible by allowing the user logical access to his or her data. In the example above, the application is even difficult to classify as either physical or logical. Thieme (2002, p. 15) suggested that the distinction between physical and logical access systems is a valuable tool in understanding biometric. He noted that key criteria such accuracy, fallback procedures, privacy requirements, costs, response time and complexity of integration all vary effectively when moving from logical to physical access. WHAT ARE BIOMETRIC STANDARDS Stapleton (2003, p. 167) defined a standard in a general term as a published document, developed by a recognized authority, which defines a set of policies and practices, technical or security requirements, techniques or mechanisms, or describes some other abstract concept or model. The growth of the biometric industry has been relatively slowed by the absence of industry wide standards and this has also impeded various types of biometric deployment. Nanavati (2002, p. 277) stated that the relative youth of the technology in use, coupled with the disunified nature of the industry, has impacted the developments of standards resulting in a sporadic and frequently redundant standards. Nanavati also noted that the live-scan fingerprint imaging is the only segment of biometric industry with widely accepted and adopted standards. Due to this absence of biometric standards, some institutions have been concerned of being tied into technologies they actually believed as not mature or even dev elopmental. However in an effort to actively address the standards issue, the biometric industry has finalized some blueprints and the process of getting industries to accept these standards is ongoing WHY IS STANDARDIZATION NECESSARY? The high rate of biometric development and rapid growth in adoption of biometric technologies in recent years has resulted in ever-increasing levels of what is expected in terms of accuracy, adaptability, and reliability in an ever-wider range of applications. Due to the adoption of biometric technologies in large-scale national and international applications, involving a potentially unlimited range of stakeholders, Farzin Deravi (2008, p. 483) stated that it has become essential to address these expectations by ensuring agreed common frameworks for implementation and evaluation of biometric technologies through standardization activities. Majority of biometric systems, including both the hardware and software are made and sold by the owner of the patent at this stage in their development. They are being proprietary in numerous aspects including the manner in which biometric devices and systems as a whole communicate with applications, the method of extracting features from a biometric sample, and among many more, the method of storing and retrieving biometric data. This resulted in many companies in most cases, being wedded to a particular technology, once they agree to implement that particular technology. Nanavati (2002, p. 278) stated that in order to incorporate a new technology, the companies are required to rebuild their system from scratch upward, and in some cases duplicating much of the deployment effort. Deravi (2008 p. 483) noted that the need for interoperability of biometric systems across national boundaries has implied a rapid escalation of standardization efforts to the international arena, stating that the sense of urgency for the need for standardization has been the priority of internal security concerns. The industry wide or universal adoption of biometric standard will not make biometric technology interoperable at least, to the state where an old device can be replaced by a new device without rebuilding the system. However, Nanavati (2002 p. 278) argued the core algorithms through which vendors locate and extract biometric data are very unlikely to be interoperable or standardized, the reason being that these algorithms represents the basis of most vendors intellectual property. Numerous reasons are responsible for the motivation towards standardization. These include the desire for reducing the overall cost of deploying biometrics technologies and optimize the reliability of biometric systems, to reduce the risk of deploying solutions to biometric problems, to ensure in the area of encryption and file format, that the basic building blocks of biometric data management have been developed based on best practice by industry professionals. Nanavati (2002 p. 278) concluded that standards ensure that, in the future, biometric technology will be developed and deployed in accordance with generally accepted principles of information technology. EXISTING BIOMETRIC STANDARDS Shoniregun and Crosier (2008 p. 22) stated that the evolving interest and developments have made developments of standards a necessity with the sole aim of allowing compatibility of different systems. The detailed standards in the Biometrics Resource Centre (2002) report are summarised below: Common Biometric Exchange File Format (CBEFF): The Common Biometric Exchange File Format (CBEFF) sets a standard for the data elements essential in supporting biometric technology in a common way irrespective of the application involved or the domain in use. It makes data interchange between systems and their components easier, while promoting interoperability applications, programs as well as systems based on biometrics. INCITS MI-Biometrics Technical Committee: The committee which was established by the Executive Board of the International Committee for Information Technology standards (INCITS) with the responsibility to ensure a focused and reasonably comprehensive approach in the United States for the rapid development and approval of previous national and international generic biometric standards (Shoniregun ad Crosier 2008, p. 22) BioAPI Specification (Version 1.1): The BioAPI standard defines the architecture for biometric systems integration in a single computer system. (Deravi 2008, p. 490). The Bio API specification has been one of the most popular standards efforts since it was formed in April 1998 according to Nanavati (2002, p. 279). Nnavati stated that the standard was formed to develop an API that is both widely accepted and widely available while being compatible with various biometric technologies. Other general standards available are Human Recognition Module (HRS), ANSI/NIST-ITL 1-2000, American Association for Motor Vehicle Administration and American National Standards Institute (ANSI) which specifies the acceptable security requirements necessary for effective management of biometric data especially for the financial services industry. BRITISH BIOMETRICS STANDARDS The British Standards Institution (BSI) commenced work in June 2004 on biometrics standards and since then, has published according to Shoniregun and Crosier (2008, p. 24) a set of four new BS ISO/IEC 19794 STANDARDS, reported to have covered the science of biometrics, and using biological characteristics in identifying individuals. The objective of publishing these standards is to promote interoperability between the several products in the market. BS ISO/IEC 19784-2:2007: This standard defines the interface to an archive Biometric Function Provider (BFP). The interface assumes that the collected biometrics data will be managed as a database, irrespective of its physical realization. Crosier (2008, p. 24) defined the physical realization as smartcards, token, memory sticks, files on hard drives and any other kind of memory can be handled via an abstraction layer presenting a database interface.) BS ISO/IEC 19795-2:2006: According to Shoniregun (2008, p. 25), this standard provides recommendations and requirements on collection of data, analysis as well as reporting specific to two types of evaluation (scenario evaluation and technology evaluation). BS ISO/IEC 19795-2:2006 further specifies the requirements in the development and full description of protocols for scenario and technology evaluations and also, in executing and reporting biometric evaluations. BS ISO/IEC 24709-1:2007: ISO/IEC 24709-1:2007 specifies the concepts, framework, test methods and criteria required to test conformity of biometric products claiming conformance to BioAPI (ISO/IEC 19784-1). (www.iso.org). Crosier (2008, p. 25) stated ISO/IEC 24709-1:2007 specifies three conformance testing models which allows conformance testing of each of the BioAPI components mainly a framework, an application and a BSP. BS ISO/IEC 24709-2:2007: The standard BS ISO/IEC 247 defines a number of test assertions composed in the assertion language explicitly required in ISO/IEC 24709-1. The assertions allow a user to test the conformance of any biometric server producer (BSP) that claims to be a conforming implementation of that International Standard to ISO/IEC 19784-1 (BioAPI 2.0) (www.iso.org). BIOMETRICS AND PRIVACY The fact that biometric technologies are based on measuring physiological or behavioral and archiving these data has raised concerns on privacy risks, and also raised discussion on the role biometrics play when it comes to privacy. As stated by Nanavati (2002, p. 237), increase in the use of biometric technology in the public sector, workplace and even at home has raised the following questions: What are the main privacy concerns relating to biometric usage? What kinds of biometric deployments need stronger protections to avoid invading privacy? What biometric technologies are more prone to privacy-invasive usage? What kinds of protections are required to ensure biometrics are used in a non privacy-invasive way? Woodward (2003, p. 197) cited President Clintons speech in his commencement address at Morgan State University in 1997: The right to privacy is one of our most cherished freedomsWe must develop new protections for privacy in the face of new technological reality. Recently, Biometrics has been increasingly deployed to improve security and a very important tool to combat terrorism. Privacy issue is central to biometrics and many people believe that deploying biometrics poses a considerable level of risk to human rights, even though some are of the opinion that biometrics actually protect privacy. Human factors influence the success of a biometric-based identification system to a great extent. The ease as well as comfort in interaction with a biometric system contributes to how people accept it. Jain, Ross and Prabhakar (2004 p. 24) stated an example of a biometric system being able to measure the characteristic of a users without touching, such as those using voice, face, or iris, and concluded that it may be perceived to be a more user-friendly and hygienic system by the users. They added that on the other hand, biometric characteristics not requiring user participation or interaction can be recorded without the knowledge of the user, and this is perceived as a threat to human privacy by many individuals. According to Sim (2009, p. 81), biometrics compared to other security technologies has significant impacts on users privacy (Civil Liberties). It can protect privacy when deployed in an appropriate manner; but when misused, it can result in loss of privacy. ADVANTAGES OF BIOMETRIC OVER TRADITIONAL METHODS Password and PINs have been the most frequently used authentication method. Their use involves controlling access to a building or a room, securing access to computers, network, the applications on the personal computers and many more. In some higher security applications, handheld tokens such as key fobs and smart cards have been deployed. Due to some problems related to these methods, the suitability and reliability of these authentication technologies have been questioned especially in this modern world with modern applications. Biometrics offer some benefits compare to these authentication technologies. INCREASED SECURITY Biometric technology can provide a higher degree of security compared to traditional authentication methods. Chirillo (2003 p. 2) stated that biometrics is preferred over traditional methods for many reasons which include the fact that the physical presence of the authorized person is required at the point of identification. This means that only the authorized person has access to the resources. Effort by people to manage several passwords has left many choosing easy or general words, with considerable number writing the Advantages and Disadvantages of Biometrics Advantages and Disadvantages of Biometrics ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote convenient methods such as online banking and use of ATM for their customers to access their money strives to ensure only the right person has access to the account. Also, military and national security services store high sensitive and critical information that must only be accessed by specific individual thereby deploying security measures to keep this tradition. However, achieving these goals largely depends on securing and controlling the assets as documented which means only authorised individuals have access to these environments and eventually the assets. Sequel to the importance of access control, different security techniques have been deployed to safeguard these assets which ranges from PINs and passwords, ID cards, smart card est. Vulnerabilities to these methods have lead to the recent surge in biometrics industry as many believe this is the future. Reasons such that the physical presence of the authorized person is needed at the point of access and also, the fact that it is unique and almost impossible to duplicate emphasis the benefit of biometrics and explain its glooming popularity. However like any other security methods, biometrics has limitations and threats which can impact its effectiveness and efficiency. It is not suitable for every application and can be a very wrong choice for certain applications. Therefore, it is essential to manage these limitations and threats properly to enhance the success factor of biometrics. Finally, it is important for any sector deploying biometrics to understand the various issues associated with biometrics such as privacy, standards and what the law requires of biometrics. CHAPTER ONE INTRODUCTION Organizations strive to secure their assets and provide means of controlling access to these assets. This process requires identification and authorization to ensure the right person is accessing the right asset. Over the years, traditional methods of authentication, mainly passwords and personal identification numbers (PINs) have been popularly used. Recently, swipe card and PINs have been deployed for more security since one is something you have and the latter something you know. However, these methods still have vulnerabilities as swipe card can be stolen. Also, bad management of passwords has left people writing them on papers and desks or simply choosing easy and general words for quick remembrance which expose the password to intruders. More recently, stronger identification and authorization technologies that can assure a person is who he claims to be are becoming prominent and biometrics can be classified to this category. Biometric technology makes use of a persons physiological or behavioral characteristics in identification. Every human being is unique in nature and possesses physical parts completely different from any other person. The September 11, 2001 terrorist attack did not help security concerns as governments and organizations all around the world especially the border security agencies have greatly embraced this human recognition technology. As both private and public entities continue to search for a more reliable identification and authentication methods, biometrics has been the choice and considered the future. WHAT IS BIOMETRICS? Biometrics refers to the automatic identifications of a person based on his or her physiological or behavioral characteristics (Chirillo and Blaul 2003, p. 2). It is an authorization method that verifies or identifies a user based on what they are before authorizing access. The search for a more reliable authorization method to secure assets has lead to the revelation of biometrics and many organizations have shown interest in the technology. Two main types of biometrics have been used mainly physical and behavioral. A physical biometrics is a part of a persons body while, a behavioral biometric is something that a person does (Lockie 2002, p. 8). He added that although there are some more unusual biometrics which may be used in the future, including a persons unique smell, the shape of their ear or even the way they talk, the main biometrics being measured include fingerprints, hand geometry, retina scan, iris scan, facial location or recognition (all physical), voice recognition, signature, keystroke pattern and gait (Behavioral). However, it has been argued by Liu and Silverman (2001) that different applications require different biometrics as there is no supreme or best biometric technology. HISTORY OF BIOMETRICS According to Chirillo and Blaul (2003, p. 3) the term biometrics is derived from the Greek words bio (life) and metric (to measure). China is among the first known to practice biometrics back in the fourteenth century as reported by the Portuguese historian Joao de Barros. It was called member-printing where the childrens palms as well as the footprints were stamped on paper with ink to identify each baby. Alphonse Bertillon, a Paris based anthropologist and police desk clerk was trying to find a way of identifying convicts in the 1890s decided to research on biometrics. He came up with measuring body lengths and was relevant till it was proved to be prone to error as many people shared the same measurement. The police started using fingerprinting developed based on the Chinese methods used century before by Richard Edward Henry, who was working at the Scotland Yard. Raina, Orlans and Woodward (2003, p. 25-26) stated references to biometrics as a concept could be traced back to over a thousand years in East Asia where potters placed their fingerprints on their wares as an early form of brand identity. They also pointed Egypts Nile Valley where traders were formally identified based on physical characteristics such as eye color, complexion and also height. The information were used by merchant to identify trusted traders whom they had successfully transacted business with in the past. Kapil et al also made references to the Bible, first pointing to the faith Gileadites had in their biometric system as reported in The Book of Judges (12:5-6) that the men of Gilead identified enemy in their midst by making suspected Ephraimites say Shibboleth for they could not pronounce it right. The second reference is to The Book of Genesis (27:11-28) where Jacob pretended to be Esau by putting goat skins on his hands and back of his neck so his skin would feel h airy to his blind, aged fathers touch. This illustrates a case of biometric spoofing and false acceptance. They finally wrote Biometrics as a commercial, modern technology has been around since the early 1970s when the first commercially available device was brought to market (p. 26). HOW BIOMETRICS SYSTEMS WORK A biometric system is essentially a pattern-recognition system that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristics possessed by the user (Blaul 2003, p.3). Biometrics has so far been developed to work in two ways mainly verification and identification. Verification systems are designed to give answer to the question, Am I who I claim to be? by requiring that a user claim an identity in order for a biometric comparison to be performed. The user provides data, which is then compared to his or her enrolled biometric data. Identification systems gives answer to the question, who am I? and do not require a user to claim an identity as the provided biometric data is compared to data from a number of users to find a match (Nanavati 2002, p. 12). An illustration of a scenario using an identifying biometrics system is given below and thus gives an answer to the question Who am I? In October 1998 in the United Kingdom, Newham Council introduced face recognition software to 12 town centre cameras with the sole purpose of decreasing street robbery. Images are compared against a police database of over 100 convicted street robbers known to be active in the previous 12 weeks. In August 2001, 527,000 separate faces were detected and operators confirmed 90 matches against the database. Where a face is not identified with any in the database, the image is deleted; if a match is found a human operator checks the result. The introduction of face recognition technology to Newham city centre saw a 34% decrease in street robbery. The system has not led directly to any arrests, which suggests that its effect is largely due to the deterrence/displacement of crime. The face recognition system has been widely publicised by the council and 93% of residents support its introduction (Postnote Nov 2001, p. 1). The case study below illustrates a verifying biometrics system and supply answers to the question Am I who I claim to be? The US Immigration and Naturalization Service Passenger Accelerated Service System (INSPASS) has been introduced at eight airports in order to provide a quick immigration processing for authorised frequent flyers entering the US and Canada. On arrival at an airport, a traveller inserts a card that carries a record of their hand geometry into the INSPASS kiosk and places their hand on a biometric reader. A computer cross-references the information stored on the card at registration with the live hand geometry scan. The complete process takes less than 30 seconds. If the scans match, the traveller can proceed to customs; if not, travellers are referred to an Immigration Inspector. There are more than 45,000 active INSPASS users with, on average, 20,000 automated immigration inspections conducted each month (Postnote Nov 2001, p. 1). Verifying system is often referred to as a one-to-one process and generally takes less processing time compared to the identifying systems. This is due to the fact that in identifying systems, a user is compared to all users in the database (one-to-many). Verifying systems are also more accurate since they only have to match a users data against his or her stored data and do not need hundreds, thousands or even millions of comparisons like the identifying systems. However, it is important for an organization to decide the type appropriate for the applications. RESEARCH METHODOLOGY The research methodology designed for this dissertation is mainly the qualitative approach. A quantitative approach has been overlooked due to limited time as designing surveys, distribution take time and response time could not be predicted. Therefore, my effort will be concentrated on critically reviewing previous literatures in order to acquire an overview of, and intakes on the topic. For more details, Journals, Books, Publications, Documentaries and previous dissertations related to the topic will be reviewed, compared and analyzed. The objectives will be achieved by purely reviewing literatures and previous researches and the literatures critically analyzed by comparing information obtained from different sources. Findings, recommendations and conclusions will be made from the analysis. OBJECTIVES OF THE STUDY The aim of this research is to critically analyse biometric security as an emerging and booming industry by examining the positives and negatives and providing ways of improving the method effectively and most importantly efficiently. Since biometrics applies to many applications, access control will be the main focus of this dessertation. Also, issues such as privacy, laws governing biometrics and standards will be examined. The main objectives of this research are; To review biometric security and issues related to it. To evaluate the threats, advantages and disadvantages of biometrics. To propose ways of improving the effectiveness and efficiency of biometrics from previous researches. CHAPTER 2 LITERATURE REVIEW This chapter is aimed at critically reviewing and analysis of numerous works of researchers in the area of biometrics, threats to biometrics, advantages and disadvantages and ways of improving biometrics efficiency in access control. The effect of privacy (human rights) and the need to conform to biometrics standards will also be examined and reviewed. DEFINITION OF BIOMETRICS According to Jain, Ross and Pankanti (2006, p. 125), one great concern in our vastly interconnected society is establishing identity. Systems need to know Is he who he claims he is, Is she authorized to use this resource? or simply who is this? Therefore, a wide range of systems require reliable personal recognition schemes to either verify or identify of an individual seeking access to their services. The purpose of that scheme is to ensure that the rendered services are accessed by only the authorized and not any intruder or imposer (Ross 2004, p. 1). Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and, or behavioral characteristics (Jain, 2004 p. 1). Woodward (2003, p. 27) cited biometric industry guru Ben Millers 1987 biometric definition: Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physical or behavioral characteristic. Shoniregun and Crosier (2008, p. 10) provided several definitions of biometrics which include: Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological science. Biometrics = identification/verification of persons based on the unique physiological or behavioral features of humans. Biometrics is the measurement and matching of biological characteristics such as fingerprint images, hand geometry, facial recognition, etc. Biometrics is strongly linked to a stored identity to the physical person. Nevertheless the various definitions, it can be seen that the science of biometrics is based on the fact that no two people are the same and this has a significant influence on its reliability and success factor. THE BIOMETRICS INDUSTRY According to Lockie (2002, p. 10), the biometric industry did not really get established until the middle of the twentieth century. The researchers at that particular time were investigating whether various human parts and characteristics, such as the iris or the voice, could be used to identify an individual. This was made public by publishing papers and as a considerable number of these strands of research began to form a piece, the biometrics industry as we know it these days was established. As organization search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention (Liu 2001, p.27). Higgins, Orlan and Woodward (2003, p. xxiii ), emphasized that even though biometrics have not become an essential part of all systems requiring controlled access, the emerging industry has come a long way from its modern founding in 1972 with the installation of a commercial finger measurement device on Wall Street. He made reference to the highly respected MIT Technology Review called biometrics one of the top ten emerging technologies that will change the world. The growth in biometric industries is reflected in the numbers. The trio cited Rick Noton, the executive director of the International Biometric Industry Association (IBIA), who reported in the Biometrics 2002 Conference in London, United Kingdom, that the industrys trade association has indicated the surge in biometric revenues over recent years. From $20 million in 1996, it has increased to $200 million in 2001 and Norton believes they will increase as the years pass on significantly in 5 years time. Also, a forecast made by the International Biometric Group (IBG), which is a biometric consulting and integration firm located in New York City, estimate that biometric revenues totaled $399 million in 2000 and will increase to $1.9 billion by 2005. Both IBIA and IBG believe that the private sector will be responsible for much of the growth. These give evidence of the relevance of biometrics in organizations in modern times. BIOMETRICS AND ACCESS CONTROL Over the years, biometrics has evolved rapidly and many vertical markets such as governments, transport, financial sectors, security, public justice and safety, healthcare and many more have adopted biometrics. Due to this wide range of users, biometrics has been deployed to many applications. Biometrics has been of high benefit to organization as they seek a reliable security method to safeguard assets. Fully understanding how biometrics work, it can be said that the ultimate aim of applying biometrics in the vertical markets listed above is to control access to a resource irrespective of the system used whether a verifying or an identifying process It has been stated by S. Nanavati, Thieme and R. Nanavati (2002, p. 14), that biometric systems are deployed for two primary purposes which are physical and logical access. LOGICAL VERSUS PHYSICAL ACCESS Physical access systems monitors, restricts, or grant movement of a person or object into or out of a specific area (Thieme 2002, p. 14). This could be implemented to control entry into rooms or even the main building. Popular examples are control towers, bank vaults, server rooms and many other sensitive rooms requiring controlled access. In physical access, biometrics replaces the use of keys, PIN codes access cards and security guards although any of these could be combined with biometrics as a complementation. Common physical access application is time and attendance. Thieme also gave a definition of logical access systems as one that monitor, restrict or grant access to data or information listing examples such as logging into a PC, accessing data stored on a network, accessing an account, or authenticating a transaction. In this case, biometrics replaces and can be designed to complement PINs, passwords and also tokens. Basic biometric functionality precisely acquiring and comparing of biometric data is often identical in both physical and logical systems. For example, the same iris scan data can be used for both doorway and desktop applications. Thieme explained that the only difference between the two is the external system into which the biometric functionality is integrated. The biometric functionality is integrated into a larger system. This applies for both physical and logical access system and actions such as access to any desktop application or access to a room via a doorway are effected by a biometric match. However, not every system can be classified as physical or logical access as the end result does not indicate access to data or a physical location and the result therefore may be to investigate more. An ATM secured by biometrics allows access to money, a physical entity. This is made possible by allowing the user logical access to his or her data. In the example above, the application is even difficult to classify as either physical or logical. Thieme (2002, p. 15) suggested that the distinction between physical and logical access systems is a valuable tool in understanding biometric. He noted that key criteria such accuracy, fallback procedures, privacy requirements, costs, response time and complexity of integration all vary effectively when moving from logical to physical access. WHAT ARE BIOMETRIC STANDARDS Stapleton (2003, p. 167) defined a standard in a general term as a published document, developed by a recognized authority, which defines a set of policies and practices, technical or security requirements, techniques or mechanisms, or describes some other abstract concept or model. The growth of the biometric industry has been relatively slowed by the absence of industry wide standards and this has also impeded various types of biometric deployment. Nanavati (2002, p. 277) stated that the relative youth of the technology in use, coupled with the disunified nature of the industry, has impacted the developments of standards resulting in a sporadic and frequently redundant standards. Nanavati also noted that the live-scan fingerprint imaging is the only segment of biometric industry with widely accepted and adopted standards. Due to this absence of biometric standards, some institutions have been concerned of being tied into technologies they actually believed as not mature or even dev elopmental. However in an effort to actively address the standards issue, the biometric industry has finalized some blueprints and the process of getting industries to accept these standards is ongoing WHY IS STANDARDIZATION NECESSARY? The high rate of biometric development and rapid growth in adoption of biometric technologies in recent years has resulted in ever-increasing levels of what is expected in terms of accuracy, adaptability, and reliability in an ever-wider range of applications. Due to the adoption of biometric technologies in large-scale national and international applications, involving a potentially unlimited range of stakeholders, Farzin Deravi (2008, p. 483) stated that it has become essential to address these expectations by ensuring agreed common frameworks for implementation and evaluation of biometric technologies through standardization activities. Majority of biometric systems, including both the hardware and software are made and sold by the owner of the patent at this stage in their development. They are being proprietary in numerous aspects including the manner in which biometric devices and systems as a whole communicate with applications, the method of extracting features from a biometric sample, and among many more, the method of storing and retrieving biometric data. This resulted in many companies in most cases, being wedded to a particular technology, once they agree to implement that particular technology. Nanavati (2002, p. 278) stated that in order to incorporate a new technology, the companies are required to rebuild their system from scratch upward, and in some cases duplicating much of the deployment effort. Deravi (2008 p. 483) noted that the need for interoperability of biometric systems across national boundaries has implied a rapid escalation of standardization efforts to the international arena, stating that the sense of urgency for the need for standardization has been the priority of internal security concerns. The industry wide or universal adoption of biometric standard will not make biometric technology interoperable at least, to the state where an old device can be replaced by a new device without rebuilding the system. However, Nanavati (2002 p. 278) argued the core algorithms through which vendors locate and extract biometric data are very unlikely to be interoperable or standardized, the reason being that these algorithms represents the basis of most vendors intellectual property. Numerous reasons are responsible for the motivation towards standardization. These include the desire for reducing the overall cost of deploying biometrics technologies and optimize the reliability of biometric systems, to reduce the risk of deploying solutions to biometric problems, to ensure in the area of encryption and file format, that the basic building blocks of biometric data management have been developed based on best practice by industry professionals. Nanavati (2002 p. 278) concluded that standards ensure that, in the future, biometric technology will be developed and deployed in accordance with generally accepted principles of information technology. EXISTING BIOMETRIC STANDARDS Shoniregun and Crosier (2008 p. 22) stated that the evolving interest and developments have made developments of standards a necessity with the sole aim of allowing compatibility of different systems. The detailed standards in the Biometrics Resource Centre (2002) report are summarised below: Common Biometric Exchange File Format (CBEFF): The Common Biometric Exchange File Format (CBEFF) sets a standard for the data elements essential in supporting biometric technology in a common way irrespective of the application involved or the domain in use. It makes data interchange between systems and their components easier, while promoting interoperability applications, programs as well as systems based on biometrics. INCITS MI-Biometrics Technical Committee: The committee which was established by the Executive Board of the International Committee for Information Technology standards (INCITS) with the responsibility to ensure a focused and reasonably comprehensive approach in the United States for the rapid development and approval of previous national and international generic biometric standards (Shoniregun ad Crosier 2008, p. 22) BioAPI Specification (Version 1.1): The BioAPI standard defines the architecture for biometric systems integration in a single computer system. (Deravi 2008, p. 490). The Bio API specification has been one of the most popular standards efforts since it was formed in April 1998 according to Nanavati (2002, p. 279). Nnavati stated that the standard was formed to develop an API that is both widely accepted and widely available while being compatible with various biometric technologies. Other general standards available are Human Recognition Module (HRS), ANSI/NIST-ITL 1-2000, American Association for Motor Vehicle Administration and American National Standards Institute (ANSI) which specifies the acceptable security requirements necessary for effective management of biometric data especially for the financial services industry. BRITISH BIOMETRICS STANDARDS The British Standards Institution (BSI) commenced work in June 2004 on biometrics standards and since then, has published according to Shoniregun and Crosier (2008, p. 24) a set of four new BS ISO/IEC 19794 STANDARDS, reported to have covered the science of biometrics, and using biological characteristics in identifying individuals. The objective of publishing these standards is to promote interoperability between the several products in the market. BS ISO/IEC 19784-2:2007: This standard defines the interface to an archive Biometric Function Provider (BFP). The interface assumes that the collected biometrics data will be managed as a database, irrespective of its physical realization. Crosier (2008, p. 24) defined the physical realization as smartcards, token, memory sticks, files on hard drives and any other kind of memory can be handled via an abstraction layer presenting a database interface.) BS ISO/IEC 19795-2:2006: According to Shoniregun (2008, p. 25), this standard provides recommendations and requirements on collection of data, analysis as well as reporting specific to two types of evaluation (scenario evaluation and technology evaluation). BS ISO/IEC 19795-2:2006 further specifies the requirements in the development and full description of protocols for scenario and technology evaluations and also, in executing and reporting biometric evaluations. BS ISO/IEC 24709-1:2007: ISO/IEC 24709-1:2007 specifies the concepts, framework, test methods and criteria required to test conformity of biometric products claiming conformance to BioAPI (ISO/IEC 19784-1). (www.iso.org). Crosier (2008, p. 25) stated ISO/IEC 24709-1:2007 specifies three conformance testing models which allows conformance testing of each of the BioAPI components mainly a framework, an application and a BSP. BS ISO/IEC 24709-2:2007: The standard BS ISO/IEC 247 defines a number of test assertions composed in the assertion language explicitly required in ISO/IEC 24709-1. The assertions allow a user to test the conformance of any biometric server producer (BSP) that claims to be a conforming implementation of that International Standard to ISO/IEC 19784-1 (BioAPI 2.0) (www.iso.org). BIOMETRICS AND PRIVACY The fact that biometric technologies are based on measuring physiological or behavioral and archiving these data has raised concerns on privacy risks, and also raised discussion on the role biometrics play when it comes to privacy. As stated by Nanavati (2002, p. 237), increase in the use of biometric technology in the public sector, workplace and even at home has raised the following questions: What are the main privacy concerns relating to biometric usage? What kinds of biometric deployments need stronger protections to avoid invading privacy? What biometric technologies are more prone to privacy-invasive usage? What kinds of protections are required to ensure biometrics are used in a non privacy-invasive way? Woodward (2003, p. 197) cited President Clintons speech in his commencement address at Morgan State University in 1997: The right to privacy is one of our most cherished freedomsWe must develop new protections for privacy in the face of new technological reality. Recently, Biometrics has been increasingly deployed to improve security and a very important tool to combat terrorism. Privacy issue is central to biometrics and many people believe that deploying biometrics poses a considerable level of risk to human rights, even though some are of the opinion that biometrics actually protect privacy. Human factors influence the success of a biometric-based identification system to a great extent. The ease as well as comfort in interaction with a biometric system contributes to how people accept it. Jain, Ross and Prabhakar (2004 p. 24) stated an example of a biometric system being able to measure the characteristic of a users without touching, such as those using voice, face, or iris, and concluded that it may be perceived to be a more user-friendly and hygienic system by the users. They added that on the other hand, biometric characteristics not requiring user participation or interaction can be recorded without the knowledge of the user, and this is perceived as a threat to human privacy by many individuals. According to Sim (2009, p. 81), biometrics compared to other security technologies has significant impacts on users privacy (Civil Liberties). It can protect privacy when deployed in an appropriate manner; but when misused, it can result in loss of privacy. ADVANTAGES OF BIOMETRIC OVER TRADITIONAL METHODS Password and PINs have been the most frequently used authentication method. Their use involves controlling access to a building or a room, securing access to computers, network, the applications on the personal computers and many more. In some higher security applications, handheld tokens such as key fobs and smart cards have been deployed. Due to some problems related to these methods, the suitability and reliability of these authentication technologies have been questioned especially in this modern world with modern applications. Biometrics offer some benefits compare to these authentication technologies. INCREASED SECURITY Biometric technology can provide a higher degree of security compared to traditional authentication methods. Chirillo (2003 p. 2) stated that biometrics is preferred over traditional methods for many reasons which include the fact that the physical presence of the authorized person is required at the point of identification. This means that only the authorized person has access to the resources. Effort by people to manage several passwords has left many choosing easy or general words, with considerable number writing the

Thursday, September 19, 2019

Perceptions of Anomalous Cognition :: Biology Essays Research Papers

Why Psi: Perceptions of Anomalous Cognition Why would I risk the ridicule of my peers to explore a topic as controversial and inflammatory as that which is known as "psi" phenomenon? And more importantly how and why is it relevant to the study of neurobiology? Given the nature of the topic, it may not always be easy to discuss such scientifically or diplomatically. It is my contention; however, that serious review of the scientific evidence, legitimate scientific discourse and funding for research has been seriously impeded because of its controversial nature. And, furthermore, that it is as relevant a topic for investigation as are other methods by which information is perceived by humans. There are some valid reasons for the prejudice that surrounds this topic. Often when one thinks of psi phenomenon some strange themes come to mind such as UFO's and Alien Abductions, ESP, crop circles, Astrology, Ghosts, Mediums, Channeling and Angles. Most of these come under the heading of "paranormal" and are decidedly difficult to examine scientifically. The plethora of information on such subjects that floods the internet is more likely to reference mysticism, faith and spiritually than offer scientific theory or experimental outcomes and I will leave such to those realms. I, therefore, in this paper will not be referring to alien astrologers channeling their horoscopes through mediums who have been abducted. Only the concepts that comprise that which is known as "anomalous cognition will be discussed." Its components are telepathy, clairvoyance, and precognition (1). My first exposure to the term "anomalous cognition" came as a result of my research for this paper. I just had always called it "knowing." Ever since I was a little girl, however, I have been repeatedly told that my experiences were "all in my head." That had been exactly my position also. But what my critics, who included my family members, friends and my husband, really meant was that my experiences existed only in my imagination. They argued, as is commonly believed and sometimes verified, that experiences like mine could be caused by selective or faulty memory, wishful thinking or subliminal clues (2). And for many years, I tried to believe that one of those explanations applied to me. My husband the scientist, engineer and amateur magician has been telling me for years what he believed to be the prevailing opinion about psi within much of the scientific community. The picture was not very flattering.

Wednesday, September 18, 2019

Homeschooling Essay -- Teaching Public Education

Homeschool Home schooling is an alternative to public education. It is a choice that many more parents are making today, and even more are projected to make by the year 2000. It is estimated that at the end of the year 2000 there will be 2,000,000 home schoolers in the United States (Gorder 1996). There are other alternatives to Public School education. Some examples are Catholic or Private schools or a privately hired tutor. There are many reasons why people home school their children. Religious beliefs, academic achievement, social development, moral and psychological reasons are all cited (Wade 1996). However, religious beliefs are often the main reason (Gorder 1996). Some parents feel as if their children are not learning enough academics, but that they are learning moral and social values that conflict with their own (Gorier 1996). Many parents teach their children at home because they feel they can provide a better education for them. Another problem parents see with the school syste m is the lack of control and discipline in the schools today. â€Å"In 1996 every day 35,000 children took guns to school with them† (Gorder, p.15, 1996). Parents feel that since the government funds these schools they are used as podiums for preaching. They see the teacher using the class as an audience to preach to. There are also parents who want to teach their children so that they can spend more time with them. â€Å"The average school-age child spends only fourteen minutes a week talking to their parents† (Gorder, p.16, 1996). There are others who think that parents home school their children because they get joy out of seeing them learn and discover new things (Henger 1995). There is some history to the issue of home schooling. There are also many pros and cons, which will be addressed in this paper. Home schooling has been around for hundreds of years. There are many famous and intellectual people that have had their education through home schooling. Some examp les are George Washington, Abraham Lincoln, Woodrow Wilson, Thomas Edison, Winston Churchill, Agatha Christie, Margaret Mead, Charlie Chaplin, Thomas Jefferson, Albert Einstein, Charles Dickens and Mark Twain (Gorder, p.11, 1996). Most of these famous people were home schooled when it was a common occurrence and more than acceptable. Home schooling has grown substantially over the last twenty-five years. In that... ...he people that home schooled their children were extremists. Some were about religion; some were for other topics. I realized that not many average people home school their children. This movement is going to continue to grow over the coming years. Violence and control of the kids in school is going to have a lot to do with it. Parents are not going to send their children to school if they think that they are going to get shot, stabbed, or even killed. Parents’ feel that it is their job to protect their children and they will do whatever it takes. I can not see this movement taking over, if for no other reason because today two people need to work to run a sufficient household. I think that more people are going to want their children home but not be able to afford it. Bibliography: Works Cited Dorian, T. & Tyler, A.P.(1996). Anyone can home school. Louisiana: Huntington House. Gorder, C.(1996).Home schools: an alternative. Arizona: Blue Bird Publishing. Gutterson, D.(1992). Family Matters. New York: Harcourt Brace Jovanovich. Hegener, M.(1995). The home school reader. Washington: McNaughton & Gunn. Wade, T.E.(1996). The home school manual. Mi.: Gazelle

Finding Deeper Meaning in Ode on the Death of a Favourite Cat :: Ode to the Death of a Favorite Cat Essays

Finding Deeper Meaning in Ode on the Death of a Favourite Cat      Ã‚  Ã‚  Ã‚   First impressions are important when meeting new people, applying for jobs, and even when reading literature. It provides us with an idea of what is going on, where things are taking place, and who the important characters are. This first impression can be described is the Pre-Critical Response; the average reader performs this type of analysis every time he or she reads. For some people, this simplistic perspective is satisfactory; others find the quest for deeper understanding intriguing and part of the ultimate experience gained through literature.    The Formalistic Approach is one way to analyze literature in order to gain fuller understanding. This approach examines a piece of literature by identifying its individual structures and form. It studies sentence structure in terms of verb placement, the multiple meanings and etymology of words, and the stanza and line breaks. The Formalistic Approach stresses sensitivity to words and their connotations, denotations, and implications they may have to surrounding words and phrases. Location, setting, place, and time are other aspects identified through this approach. Formalistic analysis is referred as "...close reading in practice" (HCAL 73).    The Dialogical Approach recognizes "...the essential indeterminacy of meaning outside of the dialogic - and hence open - relationship between voices" (HCAL 349). The voices of a novel or work create a dimension all their own. Dialogical's creator, Mikhail Mikhailovich Bakhtin, uses the key term of carnivalization to describe the "...diversities of speech and voice reflected in its structure" (HCAL 351). Mood and tone are derived from this and can be further amplified through the Formalistic Approach of analysis.    My Pre-Critical Response to Thomas Gray's "Ode on the Death of a Favourite Cat, Drowned in a Tub of Gold Fishes" is as follows: A cat was playing with a fish in the fish bowl. The cat fell in and then drowned because none cared enough to save her. When I take a second look, details of the setting and location; language usage and sentence patterns; tone and mood; deeper meanings to the poem can be found. The Formalistic and Dialogical Approaches can be used to find these deeper meanings.    Setting and location are essential when creating atmosphere.

Tuesday, September 17, 2019

A Game of Thrones Chapter Ten

Jon Jon climbed the steps slowly, trying not to think that this might be the last time ever. Ghost padded silently beside him. Outside, snow swirled through the castle gates, and the yard was all noise and chaos, but inside the thick stone walls it was still warm and quiet. Too quiet for Jon's liking. He reached the landing and stood for a long moment, afraid. Ghost nuzzled at his hand. He took courage from that. He straightened, and entered the room. Lady Stark was there beside his bed. She had been there, day and night, for close on a fortnight. Not for a moment had she left Bran's side. She had her meals brought to her there, and chamber pots as well, and a small hard bed to sleep on, though it was said she had scarcely slept at all. She fed him herself, the honey and water and herb mixture that sustained life. Not once did she leave the room. So Jon had stayed away. But now there was no more time. He stood in the door for a moment, afraid to speak, afraid to come closer. The window was open. Below, a wolf howled. Ghost heard and lifted his head. Lady Stark looked over. For a moment she did not seem to recognize him. Finally she blinked. â€Å"What are you doing here?† she asked in a voice strangely flat and emotionless. â€Å"I came to see Bran,† Jon said. â€Å"To say good-bye.† Her face did not change. Her long auburn hair was dull and tangled. She looked as though she had aged twenty years. â€Å"You've said it. Now go away.† Part of him wanted only to flee, but he knew that if he did he might never see Bran again. He took a nervous step into the room. â€Å"Please,† he said. Something cold moved in her eyes. â€Å"I told you to leave,† she said. â€Å"We don't want you here.† Once that would have sent him running. Once that might even have made him cry. Now it only made him angry. He would be a Sworn Brother of the Night's Watch soon, and face worse dangers than Catelyn Tully Stark. â€Å"He's my brother,† he said. â€Å"Shall I call the guards?† â€Å"Call them,† Jon said, defiant. â€Å"You can't stop me from seeing him.† He crossed the room, keeping the bed between them, and looked down on Bran where he lay. She was holding one of his hands. It looked like a claw. This was not the Bran he remembered. The flesh had all gone from him. His skin stretched tight over bones like sticks. Under the blanket, his legs bent in ways that made Jon sick. His eyes were sunken deep into black pits; open, but they saw nothing. The fall had shrunken him somehow. He looked half a leaf, as if the first strong wind would carry him off to his grave. Yet under the frail cage of those shattered ribs, his chest rose and fell with each shallow breath. â€Å"Bran,† he said, â€Å"I'm sorry I didn't come before. I was afraid.† He could feel the tears rolling down his cheeks. Jon no longer cared. â€Å"Don't die, Bran. Please. We're all waiting for you to wake up. Me and Robb and the girls, everyone . . . â€Å" Lady Stark was watching. She had not raised a cry. Jon took that for acceptance. Outside the window, the direwolf howled again. The wolf that Bran had not had time to name. â€Å"I have to go now,† Jon said. â€Å"Uncle Benjen is waiting. I'm to go north to the Wall. We have to leave today, before the snows come.† He remembered how excited Bran had been at the prospect of the journey. It was more than he could bear, the thought of leaving him behind like this. Jon brushed away his tears, leaned over, and kissed his brother lightly on the lips. â€Å"I wanted him to stay here with me,† Lady Stark said softly. Jon watched her, wary. She was not even looking at him. She was talking to him, but for a part of her, it was as though he were not even in the room. â€Å"I prayed for it,† she said dully. â€Å"He was my special boy. I went to the sept and prayed seven times to the seven faces of god that Ned would change his mind and leave him here with me. Sometimes prayers are answered.† Jon did not know what to say. â€Å"It wasn't your fault,† he managed after an awkward silence. Her eyes found him. They were full of poison. â€Å"I need none of your absolution, bastard.† Jon lowered his eyes. She was cradling one of Bran's hands. He took the other, squeezed it. Fingers like the bones of birds. â€Å"Good-bye,† he said. He was at the door when she called out to him. â€Å"Jon,† she said. He should have kept going, but she had never called him by his name before. He turned to find her looking at his face, as if she were seeing it for the first time. â€Å"Yes?† he said. â€Å"It should have been you,† she told him. Then she turned back to Bran and began to weep, her whole body shaking with the sobs. Jon had never seen her cry before. It was a long walk down to the yard. Outside, everything was noise and confusion. Wagons were being loaded, men were shouting, horses were being harnessed and saddled and led from the stables. A light snow had begun to fall, and everyone was in an uproar to be off. Robb was in the middle of it, shouting commands with the best of them. He seemed to have grown of late, as if Bran's fall and his mother's collapse had somehow made him stronger. Grey Wind was at his side. â€Å"Uncle Benjen is looking for you,† he told Jon. â€Å"He wanted to be gone an hour ago.† â€Å"I know,† Jon said. â€Å"Soon.† He looked around at all the noise and confusion. â€Å"Leaving is harder than I thought.† â€Å"For me too,† Robb said. He had snow in his hair, melting from the heat of his body. â€Å"Did you see him?† Jon nodded, not trusting himself to speak. â€Å"He's not going to die,† Robb said. â€Å"I know it.† â€Å"You Starks are hard to kill,† Jon agreed. His voice was flat and tired. The visit had taken all the strength from him. Robb knew something was wrong. â€Å"My mother . . . â€Å" â€Å"She was . . . very kind,† Jon told him. Robb looked relieved. â€Å"Good.† He smiled. â€Å"The next time I see you, you'll be all in black.† Jon forced himself to smile back. â€Å"It was always my color. How long do you think it will be?† â€Å"Soon enough,† Robb promised. He pulled Jon to him and embraced him fiercely. â€Å"Farewell, Snow.† Jon hugged him back. â€Å"And you, Stark. Take care of Bran.† â€Å"I will.† They broke apart and looked at each other awkwardly. â€Å"Uncle Benjen said to send you to the stables if I saw you,† Robb finally said. â€Å"I have one more farewell to make,† Jon told him. â€Å"Then I haven't seen you,† Robb replied. Jon left him standing there in the snow, surrounded by wagons and wolves and horses. It was a short walk to the armory. He picked up his package and took the covered bridge across to the Keep. Arya was in her room, packing a polished ironwood chest that was bigger than she was. Nymeria was helping. Arya would only have to point, and the wolf would bound across the room, snatch up some wisp of silk in her jaws, and fetch it back. But when she smelled Ghost, she sat down on her haunches and yelped at them. Arya glanced behind her, saw Jon, and jumped to her feet. She threw her skinny arms tight around his neck. â€Å"I was afraid you were gone,† she said, her breath catching in her throat. â€Å"They wouldn't let me out to say good-bye.† â€Å"What did you do now?† Jon was amused. Arya disentangled herself from him and made a face. â€Å"Nothing. I was all packed and everything.† She gestured at the huge chest, no more than a third full, and at the clothes that were scattered all over the room. â€Å"Septa Mordane says I have to do it all over. My things weren't properly folded, she says. A proper southron lady doesn't just throw her clothes inside her chest like old rags, she says.† â€Å"Is that what you did, little sister?† â€Å"Well, they're going to get all messed up anyway,† she said. â€Å"Who cares how they're folded?† â€Å"Septa Mordane,† Jon told her. â€Å"I don't think she'd like Nymeria helping, either.† The she-wolf regarded him silently with her dark golden eyes. â€Å"It's just as well. I have something for you to take with you, and it has to be packed very carefully.† Her face lit up. â€Å"A present?† â€Å"You could call it that. Close the door.† Wary but excited, Arya checked the hall. â€Å"Nymeria, here. Guard.† She left the wolf out there to warn of intruders and closed the door. By then Jon had pulled off the rags he'd wrapped it in. He held it out to her. Arya's eyes went wide. Dark eyes, like his. â€Å"A sword,† she said in a small, hushed breath. The scabbard was soft grey leather, supple as sin. Jon drew out the blade slowly, so she could see the deep blue sheen of the steel. â€Å"This is no toy,† he told her. â€Å"Be careful you don't cut yourself. The edges are sharp enough to shave with.† â€Å"Girls don't shave,† Arya said. â€Å"Maybe they should. Have you ever seen the septa's legs?† She giggled at him. â€Å"It's so skinny.† â€Å"So are you,† Jon told her. â€Å"I had Mikken make this special. The bravos use swords like this in Pentos and Myr and the other Free Cities. It won't hack a man's head off, but it can poke him full of holes if you're fast enough.† â€Å"I can be fast,† Arya said. â€Å"You'll have to work at it every day.† He put the sword in her hands, showed her how to hold it, and stepped back. â€Å"How does it feel? Do you like the balance?† â€Å"I think so,† Arya said. â€Å"First lesson,† Jon said. â€Å"Stick them with the pointy end.† Arya gave him a whap on the arm with the flat of her blade. The blow stung, but Jon found himself grinning like an idiot. â€Å"I know which end to use,† Arya said. A doubtful look crossed her face. â€Å"Septa Mordane will take it away from me.† â€Å"Not if she doesn't know you have it,† Jon said. â€Å"Who will I practice with?† â€Å"You'll find someone,† Jon promised her. â€Å"King's Landing is a true city, a thousand times the size of Winterfell. Until you find a partner, watch how they fight in the yard. Run, and ride, make yourself strong. And whatever you do . . . â€Å" Arya knew what was coming next. They said it together. † . . . don't . . . tell . . . Sansa!† Jon messed up her hair. â€Å"I will miss you, little sister.† Suddenly she looked like she was going to cry. â€Å"I wish you were coming with us.† â€Å"Different roads sometimes lead to the same castle. Who knows?† He was feeling better now. He was not going to let himself be sad. â€Å"I better go. I'll spend my first year on the Wall emptying chamber pots if I keep Uncle Ben waiting any longer.† Arya ran to him for a last hug. â€Å"Put down the sword first,† Jon warned her, laughing. She set it aside almost shyly and showered him with kisses. When he turned back at the door, she was holding it again, trying it for balance. â€Å"I almost forgot,† he told her. â€Å"All the best swords have names.† â€Å"Like Ice,† she said. She looked at the blade in her hand. â€Å"Does this have a name? Oh, tell me.† â€Å"Can't you guess?† Jon teased. â€Å"Your very favorite thing.† Arya seemed puzzled at first. Then it came to her. She was that quick. They said it together: â€Å"Needle!† The memory of her laughter warmed him on the long ride north.