Big Data Cyber Security Analytics

Research topic: Big Data Cyber Security Analytics

Background:

According to Gartner a research firm, Big Data analytics will play a fundamental role as far as Cyber security is concerned. The Cyber Security analytics of Big Data would enable the organizations to sift their massive organizational data in order to maintain data security. By considering the outside and inside aspects of data security, organizations would be in position to detect patterns of cyber crimes, eliminate threats and uncover hidden relationships (Moura & Serrao, 2003). The move would enable the organizations to view the broader and big picture of cyber security landscape of the organizations. The cyber security analytics dealing with the Big Data is normally applicable in various aspects such as: network monitoring, authorization of users, authentication, identity management, risk compliance and systems of governance (Lehto, 2012). The adoption of the new technology by various organizations is likely to attract Cyber security controls in the form of data loss prevention, anti-malware and convectional firewalls.

The information needed to reveal security events loses value over time and timely data intelligent analytics is vital as the cyber criminals normally move quickly to commit the cyber attacks. Therefore, cyber security analytics must therefore blend real-time analytics on data in motion and the historical analysis of the rest of the data (Alexander & Wang, 2015). By the organizations adopting security specific analytics, they are in a better position to establish new associations to uncover cyber crimes facts and patterns. In addition, the real-time security measures might also be invaluable in detecting and dealing with the new types of threats.

Aims:

In my project, I will work on real-time cyber-attack prediction and mitigation solutions leveraging Big Data analytics, in order for organizations to detect new threats early and react quickly before they propagate.

More specifically, this project aims to:

  • Design a novel model for real-time Cyber Security analytics to detect anomalies and abnormal behaviors immediately. Huge volumes of Big Data from diverse sources need to be observed, visualized and analyzed in real-time manner to achieve automated controls and advanced predictive capabilities.
  • Establish software tools which implement the proposed model, in particular, based on open source large-scale Big Data processing platform such as Hadoop.
  •  Evaluate and demonstrate the Cyber Security analytics tool on Amazon Cloud.
  • Experiments will be conducted to benchmark the performance of the developed model.

Methodology:

The research would use both qualitative and quantitative methods to evaluate the impact of the Big Data security Analytics in dealing with the continuing and recent problems in response and detection of the cyber attacks in most of the organizations dealing with huge data. Open ended questionnaires and closed ended questionnaires shall be used to establish how the data crackers and hackers use the open source and data gaps to interfere with the organizations’ data (Lehto, 2012). The research would also use interviews to establish the security policies and mechanisms being implemented by various organizations in order to deal with the enterprise data security in the challenging tasks (Kiran, 2014). The research would also use interviews to establish how data collection, integration and machine learning approaches might be of great help in reducing and curbing expansion of cyber crimes and maintaining cyber security. The research will establish how Hadoop which is a software framework for processing and storing Big Data under the Big Data Analytics may influence the cyber security using both qualitative and quantitative methods to analyze the data.

Bibliography:

Alexander & Wang, (2015). Big Data in Distributed Analytics, Cyber security, Cyber Warfare and Digital Forensics. Digital Technologies Journal. Vol. 1(1), Pp. 22-27.

Kiran, J. (2014). Big Data Analytics with Hadoop to analyze Targeted Attacks on Enterprise Data. International Journal of Computer Science and Information Technologies, Vol. 5 (3), Pp. 3867-3870.

Lehto, M. (2012). Cyber Security: Analytics, Technology and Automation. New York Publishers.

Moura & Serrao, (2003) Security and Privacy Issues of Big Data: An Open and Secure Digital Rights Management Solution. International Conference e-Society.

Journals Reflection on HTML

According to Andy Carvin, HTML refers to a standardized system and language for establishing Web pages. It enables the web users to use codes and symbols in the web browser to express files and images. The standardized system is used to achieve hyperlink, graphic, color, font and graphic effect on the World Wide Web pages. A learning management system is a platform that enables delivery and storage of the learning content for the purpose of educating and training the employees. Just like the Hyper Text Markup language the learning management system is easy to develop and use. In the establishment of the learning management systems various HTML tags are usually used as well as web based learning tools. For individuals with the basic knowledge of the HTML and are in need of understanding the coding techniques, they should understand that there are various ways in which the HTML language may be represented (Dodge, 2015). The Kompozer is software that can be downloaded from the world web that may assist people without the knowledge of HTML to establish attractive professional looking web without the knowledge of the web coding. The Kompozer is a software application that is downloaded and installed in the computer to assist individuals with the mere knowledge of HTML to establish coding and systems in the web.  The browser extensions normally extend the web browser with additional web pages and integrate the web browser with other users. Chrome Web Store is an example of coding language where an individual may discover various applications, themes and extensions.

The Google sites are very important while learning how to use the different coding language because they enable the learners to share and create web pages. The Google sites are easy, free and fun to use sites. In addition, the Google sites enable the users to configure and customize their navigations in the private and public sites in the web pages (Dodge, 2015). The Google sites are fundamental tools for the users with the basic knowledge and understanding of the web pages because they have a variety of ideas and knowledge from which the learners and users may use to communicate and exchange their knowledge with other web users.

While learning web languages such as HTML it is vital to understand that there are best practices to apply in order to produce supportive materials which related to the learning task and which ensures effective engagement. Online instructional videos are compelling in nature depending on the host platform in the web and the users experience in using the media (Dodge, 2015). The teaching with instructional videos is web pages which can be used by the web users to create playlists.

Micro-lecture is a short recorded video or audio presentation on tightly and single defined topic. The micro-lectures are normally established by the instructors to ensure easy learning in classrooms or meetings. The micro-lectures are technology resources which are used by the instructors to address the technological, learning and teaching aspects in the institutions. On the other hand, digital story telling is a practice of bringing together digital content with the narratives such as images, videos and sounds. Digital story telling can be a combination of interactive movies and stories which might produce both visual and audio effects. Screen casting is a systematic way in which videos and audios are presented in a given screen broadcasts. Depending of experience and expertise one can have a variety of screen casting.

WebQuest is an inquiry oriented lesson formatted in a way which ensures that the information used by the learners comes from the established webs. The instructor may establish different programs such as simple word document which might be linked with the websites (Dodge, 2015). The WebQuests are normally used by the instructors to educate the students on how different websites may be integrated.

The Learning management systems are important systems which making learning and teaching much easier and enjoyable for both the instructors and the learners. Prior to establishing the learning management systems it is important to establish whether it achieve the intended objectives. Blackboard is an example of a learning management system which fosters quality learning, interaction and engagement between the students and instructors (Dodge, 2015). In addition, Schoology is an important social networking, online learning and classroom management platform which improve collaboration, communication and access to curriculum content.  Google classroom is mainly used by the instructors in giving instructors and as part of learning management systems.

References

Dodge, B. (2015). The impact of digital story telling as part of learning management systems. New York Publishers.

data normalization

 

  1. From the response of the first student, I think that in order for us to continue expanding our databases and all of its features, the information gathered from components of relational model, integrity constraints and data normalization should be used together. This is because the information provided by these topics helps in understanding the constrains, rules, entities, attributes, and anomalies that is required in creating a good database. In creating a database with proper tables, rows and columns, relational model is required and it helps in correct manipulation of data, and implementing business rules that maintain integrity of the manipulated data. Similarly, integrity constraint provides entity integrity and referential integrity to ensure any foreign key value within the created database matches the primary key value in the relation of the one side. Finally, in order to validate and improve a logical design that prevents data duplication within the database, data normalization information is required.
  2. From the response of the second student, I think that a good database design required to store an invoice should have an invoice ID primary key containing no null values. Moreover, fully functional dependencies for such a database should include attributes that provides a relationship with another attribute. The transitive dependencies for this database should be the invoice and product. In normalizing the table to 2NF, invoice relates to products, and invoice ID relate to product name. On the other hand, in normalizing the table to 3NF, invoice relates to product, and product to customer. Invoice ID relate to product name, and product name to Customer ID. De-normalizing the tables can also be done when adding back redundant data after the tables have already been normalized in order to allow normalization to dictate which table they belong to.

Environmental Sensor Tech Review

Environmental Sensor technology involves the review o the sensor technology in terms of operational limits and principle of operation. The operational limits are based on the aspects of error measurement, interferences and detection limit. Prior to an individual acquiring a new sensor technology for the facility it is important to compare the available sensor products and put into consideration the future technology developments (Nickel, 2015). The role of the work is to compare and critique the sensor technologies TZOA, HazeWatch, AirBeam and Lapka PEM.

The Lapka PEM devices have sensors which assist the users to measure the nitrate count in certain food, the electromagnetic strengths in the surrounding fields, and the amount of the emitted radiation by the surrounding devices and the relative humidity and temperature of the surrounding. The Lapka PEM technology normally uses the Lapka and Lapka Pro application to track the environment (Deage, 2012). Despite the fact that the two applications serve the same purpose, the data presentation among them is different. The Lapka application not only indicate the values of what one is measuring but also provide the visual problematic and acceptable ranges based on particular environmental parameters.

The TZOA technology is the use of smart wearable devices which monitors the surrounding environment by delivering the UV metrics and real time air quality. The TZOA devices have the laser based optical sensor design in a way that provides the users with immediate feedback in regard to their environment.  The TZOA devices are also made of UV sensors which monitor the sun exposure and measures the appropriate light levels, humidity and temperatures that a person might expose himself or herself upon (Luxan, et. al. 2010). Both the Lapka PEM and TZOA devices use the sensors which monitor the surrounding environment aspects in terms of temperature, light and humidity. Nevertheless, the Lapka PEM devices are portable and present the data collected in a variety of ways but the TZOA devices are importable and present the data in only one way.

The AirBeam devices are wearable devices which assist the users to crowdsource, graph and map the air pollution in the real time through the use of the AirCasting Android application. Just like the Lapka PEM devices and the TZOA devices, the AirBeam devices are used to evaluate the surrounding environment quality of air and the impacts associated with air pollution (Kuljanic, 2009). The quality of measurement and accurate assessment of the level of air pollution using the Air Beam devices has be supported by the devices being portable and of low cost such that they become affordable to many people (Daskalaki, 2010). Unlike the Lapka PEM devices and the TZOA devices which have a variety of uses in improving the life of different individuals, the Air Beam devices are only used to evaluate and assess the impact of air pollution to the health of the population.

The Haze Watch technology uses several low cost mobile sensors attached on the vehicles to measure the air pollution and the mobile phones to upload and tag the data in real time. The Haze Watch devices comprise of gas sensors, battery power supply, micro-controllers and the Blue Tooth transmitters which measures the rate of air pollution in the environment. The gas sensor assists in presentation of the different air pollution trade-offs (Myung, 2015).  Nevertheless, unlike the Air Beam devices which accurately measure the level of air pollution, the Haze Watch is presents non-linear and inaccurate measurements. In addition, the Haze Watch devices are believed to be bulky and expensive unlike the Air Beam Devices which are portable and less expensive. In conclusion, both the Air Beam and Haze Watch devices are fundamental devices for measuring the level of air pollution in the environment.

References

Nickel, D. (2015). Interpolation, Extrapolation, And The Limits Of Science. Oxford University Press.

Deage, A. (2012). Hands-On with the Lapka PEM. Retrieved from: https://physiquegeek.wordpress.com/2014/09/16/hands-on-with-the-lapka-pem/
Luxan, et. Al. (2010). HazeWatch: A Participatory Sensor System for Monitoring Air Pollution in Sydney. New York Publishers.
 Kuljanic, E. (2009). Advanced manufacturing systems and technology: proceedings of the seventh international conference. Wien [u.a.] Springer.

Myung, H. (2015). Robot intelligence technology and applications 3: Edition of the selected papers from the 3rd International Conference on Robot Intelligence Technology and Applications. Hershey, PA : Medical Information Science Reference

Daskalaki, A. (2010). Informatics in oral medicine: Advanced techniques in clinical and diagnostic technologies. New York Publishers.

The Christchurch, New Zealand earthquake of February 2011: before and after

Introduction

Earthquakes are common phenomena in New Zealand. The islands in New Zealand regularly encounter noticeable earthquakes and tremors which occur two times every three days. The United States seismologists’ geological survey reveals that most of the tremors experienced in the area ranges from magnitude of five or more but the September 2010 tremor was of magnitude 7 (Picchiani, et, al. 2011).  Despite the earthquake registered a magnitude of 6.3 which was approximately around magnitude 7, or merely eleven times weaker than the previous earthquakes it was enough to cause destruction of properties and loss of life. The role of the work is to focus on the period from the first earthquake in September 2010 and the second earthquake in February 2011. In particular, the work will focus on the aftershocks as a feature of daily life while the second section shall focus on describing the events of the 22nd February 2011 and after.

September 2010 earthquake aftershocks

Unlike the previous earthquakes experienced in Christchurch in New Zealand, the September 2010 earthquake in the area was believed to be more energetic but it cause less property destruction and loss of life. As a matter of fact, the Christchurch earthquake was definitely an aftershock of the previous aftershocks which had locked the area. The September 2010 earthquake was much more amazing because it was much closer to the Christchurch, shallower and arrived around the middle of the day. The earthquake was blames by many people for breaking a chunk of ice from the Tasman glacier in Aoraki Mount Cook (Salori, 2010). The Iceberg was destructive in nature as it resulted into the destruction of the city, destabilized the normal life of the Christchurch population and resulted to the loss of life. Although the Christchurch earthquake in New Zealand focused on shallow depth of around 5km it resulted to severe ground shaking which was much closer to the city and yet the worst because it razed down the buildings in the city and weakened others which risked the life of many people in the Christchurch city.

Basically, New Zealand is a “Ring of Fire” because of the extraordinary geological activities experienced in the area.  It is believed that for every ten earthquakes experienced in the globe, 9 are expected from the region. The reason for this is because New Zealand straddles between Australasian and pacific tectonic plates which grind slowly on one another (Henshall, 2012). The earthquake was so much energetic in nature the blind faults which had remained inactive for a long time become active on the very day. The fact that the Christchurch city lies on tectonically active area where the Alpine faults segments exists there was likelihood for extreme destruction of life and property despite how minimal the earthquake appeared.

The 22 February 2011 Earthquake in Christchurch city in New Zealand

Just like the September 2010 earthquake which had a magnitude of 6.3, the 22 February Earthquake was of the same magnitude but was felt was felt on both the North and South Island of the city. The fault which caused the earthquake was not experienced on the surface but it ran for more than 6 km south of the city (Garevski, 2013). Despite the fact that the February 2011 earthquake was of less magnitude than the September 2010 earthquake it had a greater impact. The fact that it happened at night most people in the city were asleep and the ground acceleration was of high magnitude. As a result, the earthquake resulted into injuries and fatalities in the Christchurch city in New Zealand.

It was estimated that approximately 185 people lost their life while thousands of families were seriously injured by the after month of the earthquake. In addition, the earthquake resulted into destruction of city buildings mostly on the south part of the city (Moore, 2011). Based on the after month survey, it was realized that more than 100, 000 buildings in the city were damaged while more than 10, 000 buildings in the city were required to be demolished. After the earthquake, the Christchurch city was subdivided into four zones. The un-damaged Green Zone was ready to be rebuilt again while the Orange Zone required more checks before reconstruction. Nevertheless, the Red Zones were declared inhabitable while the White Zones was safe for building construction and habiting (Murray, 2010). In conclusion, the September 2010 after months was the major cause of the February 2010 earthquake and the after months because the earthquake magnitude of 6.3 caused the faults which were later shaken by the earthquake which occurred later causing the destruction of the Christchurch city in New Zealand

Food Insecurity in Australia

Task A

Introduction:

Food insecurity defines a condition to which constant access to enough food is limited due to lack of resources such as money within a given period (Bell et al., 2015). Therefore, an individual or people may not live actively as well as healthy, or have the conviction of obtaining food in a socially acceptable process. Statistic on food insecurity in Sydney reports that one in every fifty older people experienced food insecurity within a period of twelve months (Booth and Whelan, 2014). Additionally, more than one-third of the women with children in Sydney experienced a shortage of enough food due to difficulties they experience in meeting daily expenses such as food (Crawford et al., 2014). Similarly, of the individuals reviewed around the localities of Sydney, about twenty-eight percent reported the purchase of low quality of food in a bid to save money (Ingram, Ericksen and Liverman, 2012). Individuals within a society may experience food insecurity due to: one, lack of resources such as money and access to transport. Two is the inability to access affordable and nutritious food. Three is failure to access food due to geographical isolation, and lastly, lack of any knowledge about the existence of nutritious diet in a locality.

Specific Issue:

Food insecurity caused by the cost of food as well as household income is of interest to this study (Bell et al., 2015). Sydney is a town and a business hub located at the harbors of New South Wales, Australia. The harbor is accessible to most of the merchants, hence, food availability is ensured. A scenario arises that leads to the target group experiencing food insecurity (Booth and Whelan, 2014). Therefore, it is due to cost of the food and household low-income that majorly contributes to food insecurity among the target group.

Target Group:

The beneficiaries as well the target group to this study are the people from low-income households of Sydney’s family. The children from the low income earning households require to be sent to school, fed, clothed and their medical bill met time after time. Therefore, this study aims to provide the target group with strategies and solutions to address their inability to afford enough to eat and meet other bills.

Task B

Public Health Nutrition Consideration:

Currently, food insecurity is categorized among the social determinants of health which has time and again compromised the health of the children from the low-income children in Sydney’s local households (Bell et al., 2015). The low-income earners often have little food and sometimes unbalanced diet for their children. Studies reveal that food insecurity often exposes the children to clinical conditions including their parents (Farahbakhsh et al., 2016). With the low-income neighborhood, the farmers’ lack market to which the residents can purchase varieties of quality dairy products, vegetables and other foodstuffs (Stirling, 2014). The low-income neighborhoods, therefore, possess limited corner stores where food products of low nutritious value can be purchased, if available to feed the children and other families (Watts, Thorpe and Blechynden, 2015). The low nutritious value food products, therefore, lead to unbalanced diets, hence, malnutrition cases to the children from the low-income neighborhoods in Sydney.

Similarly, in case healthy foods are available, the low-income households due to lack of enough capital may not afford such foods since they are quite expensive (Stirling, 2014). Research points that most of the low-income households would try stretching their food budget with an aim of purchasing cheap food stuffs.

Therefore, the less expensive food is linked to the energy giving food which is often less nutritious (Crawford et al., 2014). Through overconsumption of the calories from the energy giving foods, such households are linked to obesity which is a major public health concern among the low-income household not only in Sydney, but also across the globe.

Besides, in the absence of food in the low-income households, studies show that such people may incur cycles of food deprivation as well as overeating (Booth and Whelan, 2014). Skipping meals by the low-income individuals may encourage them to purchase much food when money is available, thereby resulting to chronic upsets of the body systems, hence leading to weight gain (Crawford et al., 2014). Additionally, deprivation of food has been medically linked to cases of eating disorders, metabolic changes as well as an unhealthy preoccupation with food which often leads to fat storage.

Studies also report that scarcity of food among the low-income households often live in anxiety coupled with stress, leading to poor mental health (Ghattas et al., 2013).  Anxieties often result from emotional pressure of food insecurity and their financial position. With limited financial access, the low-income household members may not access better health care provisions, hence increasing incidences of depression and stress by such individuals (Stirling, 2014). Studies also link stress to poor mental development to children and obesity. Children also suffer deficiency diseases during their development such as kwashiorkor, rickets and marasmus among others.

TASK C

Addressing Food Insecurity

  1. Right to Food Coalition

Food security is everyone right, priority and business in the globe especially in Australian community.  Given the significance of food security among the community, over one hundred and fifty delegates across Australia ranging from health professionals, community development, academics and policy makers were inspired to come together in attempt to initiate and explore actions and solutions in regard to governance, population, communication aspects result into food insecurity. The role of Sydney Food Fairness Alliance was established with the aim of recognized the importance of food security. Basically, the Right to Food Coalition is made up of representatives from various organizations based in Sydney working together to sensitize the low income earners community in regard to aspects of food security. The organization believes that everyone and more so the members from the low- income communities in Sydney have the right to nutritious, culturally, affordable and access to appropriate fresh food (Booth et al, 2014). The program comes together with the aim of ensuring that the low income earners population is able to put nutritious, affordable and fresh food on the table. In attempt to ensure that the low income community manages to raise food on their tables, the organization has established Food 4 Life markets which ensure that the disabled, aged, and poor people in the community get access to nutritious and affordable food on their tables. The food is normally sourced from Australian Food Bank and donations from independent individuals and charitable organizations. The limitation of this program is inadequate funding and timing as the disadvantages group in the Australian community keeps on enlarging.

  1. Community Stores Program

Community stores food program is a model that aim at supporting the community to get access to nutritious food in remote community.  The program builds opportunities for improved and sustainable nutrition and health food for the remote communities. The program retains and attracts public health nutrition among the remote communities in Australia. The program promote consumption of nutritious feeding among the remote communities through promotional of retail outlets which improves indigenous health outcomes through improved food supply and remote indigenous community stores. The program is based on the pillars o creating an effective and sustainable transformation of food availability among the remote communities (Stirling, 2014). The fact that working with the remote community in Australia is a challenging process and improvement of food nutrition might be a conflicting goal based on food retail business, the Community based stores work through financial support of the workforce in the remote community in Australia. The community supports the remote to access affordable and nutritious food security through the development of the personal career of various individuals by ensuring that there is no professional isolation and promoting innovation in practice. The limitation to the program is that change might be gradual and mainly depend upon working community in Australia rather than the community in general.

Proposed Strategy

Establishment of Right to food Coalition and Community Stores strategies aims at ensuring that the  misfortune and less privileged people in the Australian community gets access to affordable, nutritious and quality food.

Overview

As a matter of fact, the Right to food Coalition and Community Stores strategies are fundamental programs which are aimed at ensuring quality of life through consumption of healthy food. The Right to food Coalition and Community Stores food programs are mainly implemented in Sydney, Australia. The two programs ensure that the less privileged communities are provided with financial and innovative skills which ensure that they make health choices as far as their balance diets are concerned (Stirling, 2014).Despite the fact that food insecurity is a major threat to the whole community especially among the Sydney community, Right to food Coalition and Community Stores programs normally use the available resources such as labor, capital and land to produce sufficient food for the community. Moreover, the programs adopt better health systems through innovative and financial based support programs within the community.

How the strategies work

The Right to food Coalition establishes Food 4 Life markets which ensure that the disabled, aged, and the low-income people in the community get access to nutritious and affordable food on their tables. The food is normally sourced from Australian Food Bank and donations from independent individuals and charitable organizations. Given the poor eating habits among low income earners in Sydney, the Right to Food Coalition realized the need to provide nutritious food in order to avoid the various nutritional diseases such as obesity and high blood pressure. The Food 4 Life markets provide appropriate skills of making appropriate choices in regard to their habits of consumption (Booth et al, 2014). In the same move, the community stores program in Sydney ensures that the less privileged members of the community get access to affordable, nutritious and quality health food in their balanced diet. The program support the community with employment in order to obtain finances which enables them to get access to quality food in the community stores established in Sydney, Australia.

Strengths

Strength of the Right to food Coalition and Community Stores strategies is that the programs cover a wider perspective of the community (Smith and Blumenthal, 2012). The programs which have been adopted in Sydney, Australia addresses economic conditions of the low-income households by ensuring that there exist food security and sustainability. The health programs and established health facilities ensures that the entire families are attended to, and their health conditions addressed (Gichunge et al., 2015). The households’ nutritional requirements and programs are equally addressed, and the nutritional diseases are eradicated as well with time.

Second, both the young and the adults from the less privileged communities will gain from the strategies since it accommodates the entire households (Herbert et al., 2014). Everyone from the households is cared for and helped to make choices on the food materials they consume to avoid nutritional disorders early in life.

 

Limitations

Acknowledging the programs by the low income earners and less privileged members of the community is a likely challenge to the program organizers (Herbert et al., 2014). The participants are people with different goals in life; therefore, getting them to conform to a single goal would be a greater challenge.

Also, the federal government would be slow at financing such good intended approaches to solving food insecurity. The government processes are often slow as various channels to achieve the actual funding takes time (Jones et al., 2013). Therefore, with little capital, the program organizers may be unable to accomplish the entire process.

Finally, the entire program may be hindered in the case of natural disasters such as drought, which may lead to failure of the agricultural activities aimed at achieving food security.

Conclusion

Food insecurity among the low-income households is a current problem in Sydney, Australia. Food insecurity may be caused by inability to access affordable, nutritious foods, failure to access food due to geographical isolation and lastly, lack of any knowledge about the existence of nutritious diet in a locality. Therefore, educational and community-based strategy would be of importance since it addresses both knowledge and health skill required by the low-income households to acquire enough food and access better healthcare at the same time. This strategy upon development will be a success to ensure food security among the low-income households in Sydney, Australia.

Analyzing Advertisement Rhetorics

Background

The advertisement in regard to different weed strains and the rate of pot dispensaries was established by the Leafly a world Cannabis information resource as an application and a website. The website establishes great reputation by eliminating the stoner image among the marijuana users.  In addition, the advertisement indicates that the advertisement might be helpful to the people suffering from the various diseases. The medical marijuana was passed in New York in the summer (Barbara, 32). The advertisement is aimed at sensitizing the patients in new Yorktha the dangers of using marijuana. Despite the fact that there are negative sides of using marijuana the advertisement believes that there are situation when the patients might be allowed to use marijuana for medical purposes. The audience for the Leafly marijuana advertisement would be the United States patients despite the fact that they might not find the use of marijuana to be good.  Through the use of the logos, ethos, and pathos Leafly advertisement tries to convince it audience that the use of marijuana might be useful to patients seeking MS symptoms and cancer treatment. Both the logos and ethos which use the textual evidence to support the marijuana use positively is the strongest part of the advertisement while pathos are the weakest part of the advertisement despite using a lady running and a successful elegant looking man.

Pathos

The lady running and an elegant looking man are the strong are the textual features which correlate with the strong pathos. From the merely observation of the two pathos, the audience believe that marijuana may be of great help to them medically. Moreover, the logo and the website are the two major textual support features which weakly support the use the medical use of marijuana.  Both the textual support is in the form of periodic tables (Barbara, 12). The “Just Say Know” is about the Nancy Reagan “Just say no” while she was the first lady and the two are the textual features which are geared toward the target audience. The use of the textual features from Nancy Reagan would make the advertisement to be stronger in the category because she is a public figure.

The textual support in the textboxes with information backing the use of marijuana for the medical purpose is the stronger textual feature of the ethos while the use of the visual of successful elegant man and a running lady is the weaker textual feature of the ethos despite the two visual features eradicating the stereotype of a “Stoner.” The credible website in the form of textual support in the textboxes is an important textual feature that is geared towards specific target audience. The textual and visual features in the website build bridges through the use of hash tags. The advertisement feature uses the real world situation to portray the real picture of what is going on (Barbara, 18). The goodwill is created by the advertisement because it is informing the audience that marijuana is helping many people hence the US patients should therefore consider using is for medical purposes. It advertisement believes that the use of marijuana is for the sake of the society and everyone’s health. The advertisement uses the aspects of periodic table to grab attention from its audience. The marijuana strain abbreviation makes the advertisement stronger in the ethos category because it adds the overall theme of potraying marijuana as a substance that is essential to the world. The use of textual support ideas makes the advertisement to be very simple and yet so effective.

Logos

The message is for the audience for the advertisement to download the advertisement from the application or from the website.  The reason for the audience downloading the advert is for the United States patients to gain knowledge of the different strains that could potentially treat them.

Conclusion

Through the use of the logos, ethos, and pathos Leafly advertisement tries to convince it audience that the use of marijuana might be useful to patients seeking MS symptoms and cancer treatment. Both the logos and ethos which use the textual evidence to support the marijuana use positively is the strongest part of the advertisement while pathos are the weakest part of the advertisement despite using a lady running and a successful elegant looking man. The advertisement eliminates the stoner stereotype of using the marijuana and encourages the audience to use weed for medical purpose.

Work cited

Barbara, N.Beyond Rocking the Vote: An Analysis of Rhetoric Designed advertisement. 2012. New York Publishers.

Luck is a matter of preparation meeting opportunity

I do agree with Oprah Winfrey the famous American show talk host saying, because proper preparation for an opportunity is a fundamental key to success rather than luck (Chang, 2011). I also agreed with the saying because preparation is more important in the world for every man who succeed or the one who fails. My agreement to the saying shall be based on the following grounds:

Basically, opportunity is a rare occurrence in life and should be grabbed once one meets it.  The act of grabbing the opportunity means that a person was ready and prepared. For instance, prior to Winfrey becoming a famous national television host, she had gone through uncountable interviews and without her experience she would not become successful (Chang, 2011). Actually, when preparing for something, an individual increases his or her possibility of success or luck. Despite the fact that an individual might not be lucky for putting extra effort in the preparation he or she might become efficient in the near future.

It should be known that our lives in the future are determined by our attitude towards everything we encounter in our previous lives. Our luck in our daily lives are determined by our determination to achieve goals, level of desire, how we view things and the way we behave whenever opportunities comes our way. If our beliefs are pre-destined, it is hard for many people to put more effort and luck shall never come along their way (Chang, 2011). As a matter of fact, people who lack preparation lack luck because no matter how lucky an individual might be he or she need good sense of preparation in order to be in a better position to handle luck.  In conclusion, the saying: is a clear demonstration of how we should deal with our lives. It teaches us to be well prepared in order to face problems and obstacles successfully in our lives.

US History on American democracy

American democracy has never been static but it has always been evolving since the declaration of independence, the bill of rights and enactment of the constitution. Over the years, the meaning of democracy being exercised has been shifting from time to time. The civil wars in America were a watershed to the country’s democracy evolution just like the revolution themselves. The work will present the extent to which the American revolution and the ideas unleashed in the aftermath of 1920 lead to radical changes of the women African-Americans and the lower class ordinary which men.

Prior to the American revolution in 1920, African-American women could not be allowed to join the formal structures of political life of serving on juries, voting or even hold an elective position in government. They were subjected to a wide rage of discrimination which pointed then as secondary citizens in America. Back in 1900, women legitimacy was governed by their marital standing in the society and therefore they had few rights. The American Revolution laid a foundation for the African-American women to fight for their rights through the formation of suffrage movement which fought for their basic rights in the society. Despite the fact that the suffrage movements in 1920 were control by educated white women, they were later dominated by women of all working class and race especially the African-American women. The inclusion of the African-American into the suffrage movement was the best way of linking the struggles, oppression and the racial discrimination the women were going through in America. In addition, the inclusion of different women groups into the suffrage movement was a mere underscore into the womanhood in America.

By women being united to fight for their right, the 19th amendment was passed. Afterward, the suffrage movements were dismantled as the women had now the rights to vote and participate in all political arenas. The American Revolution in 1920 led to radical changes of the African-American women as they had the freedom to exercise their citizenship rights regardless of their race or position in the society. As women gained more power, they fought for the amendment of equal rights amendments in order for them to be given more powers as they male counterparts. Basically, with the American Revolution, women were able to gain more freedom and their rights were respected.  By being able to fight for their rights women gain power in all sectors of the economy more so in the political arena.

The American Revolution involved many conflicting interests and goals such as discrimination and radical reforms in all sectors of life.  The amendments of the constitution established a legitimate framework for voting rights and full citizenship of upper class, lower class and ordinary white men. Prior to the revolution, the lower class ordinary white men had no right to hold any political position as they were discriminated due to their class position in the society. They had no voting rights and they could not form any bargaining groups which would enable them to fight for their rights. The revolution involved potential resistance of the lower class ordinary white men fight for their rights in the society. Given that the ordinary lower class men lacked good political will, the American Revolution created a good opportunity for them to fight for their rights.  Therefore, the 1920’s revolution created democracy for blacks, white, and lower class ordinary men and for all the whites. In conclusion, the American Revolution led to radical changes of the rights and democracy of women and lower class ordinary people in America.

Work cited

Sara, E. women in American politics in the twentieth century. 2013. Retrieved from: https://www.gilderlehrman.org/history-by-era/womens-history/essays/women-american-politics-twentieth-century

Project Charter

Project charter is a form document which authorizes the commencement of a project once it is selected. It is sometimes called project initiation or authorization document. In the document, the stakeholders provides the go ahead and commits funds to the selected project. It reviews the critical parameters and conditions for the project and creates a detailed plan on how the project will proceed. Project charter is not always standard as it varies from one organization to the other. Therefore, the project charter contains several characteristic as show below:

Project authorization- The non-for-profit medical research center engages in research for diseases which are related to aging. The work of the center depends of sources of funds from multiple sources such as the individual estates, grants from corporations, federal government and the general public.

Goals and scope- The non-for-profit medical research center aims at preparing an annual report which will be used in promotion and marketing purposes. The report which will be prepared will be sent to various stakeholders in a move to target more high potential future donors. The report is of great importance to the institution as it would enable it to be in the same competitive position just like the other non-profit making organization which competes for funds and donations. The management believes that the report will be used to inform other stakeholders about the advances the organization is making as far as the research effort are concerned. It will also indicate the organization efficiency in using the donations and the funds it receives.

Deliverables- In order for the non-for-profit medical research center to get access to funding and donations it requires the report to be prepared to include pictures from different hospitals, a long term care facility and clinics which are currently using the research from the center. The report should also include testimonies various families and patients who have benefits from the use of the research conducted by the non-for-profit medical research center. The report will necessitate the use of printing, design and distribution of these materials to different contractors in order to obtain their cost. The project charter will ensure that approximately about five million copies shall be printed.

Business Case- The project charter will be of great benefits to the organization as it will enable the non-for-profit medical research center to capture more donors and funding organization. It will also be able to compete with other non-profit making organization once the funds are made available. With the use of the annual report the non-for-profit medical research center will be able to attract more stakeholders such as the patients, families and medical research institutes which will be in a position to use the research from the organization.

Project manager authority- Alexis is the project manager for the non-for-profit medical research center. He was appointed by the organization to be the project manager because she is the director of external affairs for a national non-profit medical research center. Her responsibility is to ensure that the report prepared enable the organization obtain more funds from the donors and also capture more stakeholders who will be using the report. She will determine the duties of every member and determine the number of copies to be printed.

Time Frame-  The board meeting was held on April 1. The project manager has been request to come with the project charter on the next meeting which will be held on May 15. The board demands the actual report of the project to be ready by 15th November in order for it to be distributed to the donors during their holidays. The center financial year is on 30th September, hence its financial reports are expected to be out on 15th October.

Budget Summary- The non-for-profit medical research center is in need of more funds and donors because it is required to print and mail about 5 million copies of its budget.

Project sponsors- The director of the external affairs for a non-profit medical research would be one of the sponsors, the board of directors, donors, patients families, medical institutions, marking specialists, editors, staff assistants and photographers. All these members will be in a position to sign the project charter as they were the main participants.