Sunday, March 31, 2019

Network Attacks in Real Time Scenario Over Campus Network

meshing Attacks in Real Time Scenario Over Campus Ne bothrkAmit Mahajan* Vibhakar Mansotra**ABSTRACTThis physical composition presents translate of bombardments in real age scenario every(prenominal)place the campus profit. The attacks were monitored over a time and analyses were made. The paper discusses ab aside the dependency over the IDS/IPS signatures and proposes for a resolving which records the events with raw trade and visualizes the traffic to give better belowstanding of the fashion of the traffic flow over the profit.Keywords UTM, Attacks, Visualization, Afterglow, tcpdump.I INTRODUCTION interlockings give birth been under attack from the time Internet came into existence. There is consistently nigh urgencyiness of determination machine-accessible with the effect of these attacks. In the present situation of PC innovation, either institution undersurface have enormous machine frameworks of typical natures. With the advancement of technology, Organiza tions have started facing difficulties due to divers(prenominal) types of computer viruses and attacks. This resulted in tremendous loss of the knowledgeable assets deal data and utility of time. therefore there is an urgent need to study these attacks and profit br distributivelyes by authority of which unmatched entrust be able to devise preventive measures and thereby protect the internal assets.In view of the to a higher place objectives one has to sym cutize the networks and how they expand widely. Also one has to understand the attacks and br severallyes. Mostly the network is one of the sources of the viruses and attacks entirely quite often the local network is to a fault a study source of threats for campus networks. Generally administrators and organizations safe guard their networks from outside threats but the internal attacks and breaches are very crucial. The IDS/IPS ( ) are installed over the gateway train to s toilet the outgo and incoming traffic. Whe re these kind of mechanism to study the fashion of internal attacks is vague. One is very much interested in sagacious the kind of traffic flow, and its identification etc in the network. This kind of approach allow for help the user community to adopt preventive measures or in new(prenominal) words one has obtain a solution by studying the internal attacks and network breaches and thereby how to minimize and protect the internal assets . Analysis of the network can be used as a calamus to scan the network traffic. The behavior of the network may be understood through with(predicate) penetration tools, simulations etc. Alternatively a tool like IPS having capability of network behavior analysis also can be of great help in understanding the problem.SURVEY OF manoeuverAsmaa Shaker Ashoor and Sharad Gore in their explore assortediated the infringement spotting System and Intrusion Prevention System (IDS/IPS) technology which is used in the computer networks. They compare th e stability, performance and accuracy wise result of IDS and IPS. They highlighted that the major difference between the IDS / IPS is among their deployments over the network. IDS technology works on out band system which means it is not lined with the network path but IPS technology works on in-line with the system, means it can manoeuver through in between the wrenchs in real time.Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit discusses virtually the bequest run-through for fighting cyber-attacks which are typically used by the Intrusion detection Sensors (IDS) to inactively detect and block multi-stage attacks. The algorithm, TANDI, helps in reducing the problem impediment by separating the simulations of the aggressors capability and op styleunity and thus fuses the two to determine the attackers intent. The results of the research demonst localize that the algorithm TANDI predicts that the future attack action precisely as long as it is not a twin(a) attack and which contains no internal threats. In the presence of the malicious attack events, the algorithm TANDI, will give alarm to the network analyst for provided analysis. This can be further analysed with the help of simulation.Nilima R. Patil and Nitin N. Patil in their paper discussed some the importance of attack graph to check the possible attacks in the network. development attack graph, analysis can be done effectively. This helps the administrators to further learn the attack graphs deeply to know where their system weaknesses lie. Accordingly help them to judge what kind of security measures can be opted for effective deployment. They study different ways to analyse attack graphs and to provide future scope for research on these attack graphs.Rosslin conjuration Robbles, Tai-hoon Kim, Seung Lee in their paper have shown that a second aim in addition to entrance fee chair onset confinement can dramatically enhance the security specially integrity and availability of a system in many situation. It showed that infringement confinement can effectively resolve the conflicting design goals of an intrusion detection system by achieving both a high rate of detection and a low rate of fallacys. Developing a more(prenominal) concrete isolation protocols will further be studied in the future research.Meera Gandhi and S.K Sri giganticava in their paper highlighted the importance of Intrusion detection in business sector and in active area of research. They describe IDS as important tool for information security. An IDS is intended to spot and fight with some common attacks over the network systems. In such systems log displays the careen of attacks to the administrator for ambiguous action. This system works as an observant gizmo in the event of attacks directed towards an entire network.In the light of the above unattached information a need has been felt to under arrive at correspondent type of work in the University of Jammu as well. This will he lp in study of attacks received by the network of the campus. The network is setup on optical lineament backbone with around hundred distributed switches across the campus. Which also has WI- FI wireless Connectivity with access points around 200 approx. Such an ICT facility forthcoming over the network is plays an important percentage in helping the students, researches, instructor and staff. The number of users in the UOJ campus network appxo 3000. Thus the analysis of the attacks is taken up in this campus.II EXPERIMENTAL SETUP USING UTMUniversity of Jammu is one of the start higher educational institutes in the state of Jammu and Kashmir, India. Whose vision is to be an internationally competitive academic and research institution? To achieve University of Jammu has lot of condense on the information technology. In 2003 university started its initiatives to be an IT enabled university by setting up a university campus network on optical fiber backbone. Later this network was further converged with Jammu University JU Wi-Fi. This facility is playing a very crucial role in order to help the students, teachers, researchers and administrative staff to use the ICT facilities available over the network. University of Jammu is having huge internet bandwidth connectivitys to cater the needs of the university fraternity. This internet bandwidth connectivitys constantly keeps on upgrading from time to time. At present university is having 40 mbps Internet bandwidth 11 OPTICAL FIBER lease line from reliance and 1 Giga optical fiber connectivity from National Knowledge net income. Students, researchers and pedagogy faculty are able to access the scholarly contents online from any location within the campus. There are around 37 departments comprising of breeding and centers other than administrative blocks which are connected through this optical fiber back bone network. alto catch up withher the three girls and boys soldieryels are also connected through the optical fiber backbone. There are around snow distributed switches (Cisco and Dlink) and approx. 200 indoor wireless access points (Linksys and Dlink) and 18 outdoor access points (Dlink) which are installed at the various locations of these departments / blocks of the university. All the equipments are connected through optical fiber backbone to the control room campus network of the university with Cisco catalyst switches 4507R, 4506.In order to maintain such vast network and ICT Facilities University has deployed a UTM device in the network. This UTM device helps the university it administrators to maintain the university campus network more efficiently. UTM installed at the university is a product from worlds pinch IT security company Cyberoam. This UTM is installed almost all the major academic institutes of the country. The UTM device has multiple solutions in a single box. It comprises of onus balancing of internet bandwidths, Antivirus and anti-spam scanning at the ga te way level, User identity establish firewall rules, gateway level IDS and IPS scanning and AAA assay-marks etc.This UTM device is installed between the ISPS Routers and Cisco catalyst switches so that the whole traffic gets scanned through the UTM device. All the policies are applied on the firewall rules as per the requirement of the University network.Figure 1 UTM Deployment in Gateway ModeWith the maturation in the University network and ICT facilities over this network, it is observed that the ratio of attacks also gets increased. These attacks sicken the performance of the University Network and other ICT facilities available. Thus to study the kind of attacks, their significance and a solution how to reduce them is proposed in this paper. UTM device installed in the University network is considered for collecting the IPS attacks data. Since it has the ability to get up the Attack reports, this will help the University IT administrators to see the trend of the attacks how they are generating and touching the system. The critical IPS attacks will be studied over a time to find the patterns of the attacks and their significance over the network exercises and ports to which they are associated. This study will help the university and other institutes which are employ the same UTM to fine-tune the rules and other parameters so that network bandwidth and other services performance does not get affected with the attacks and users of the ICT facilities should have performance oriented service.III DATA order of battle AND ANALYSIS USING UTMAs described in the previous about the network system university campus. The information on the number of IPS attacks has been collected since 1 July -2013 to 2-dec -2013 (22 weeks). The total number of attacks is 1301567. Out of these the type of attacks having frequency more than approx 100 is 1299646 hundred thousand. These 13 lakh IPS attacks have been classified into 5 categories broadly exemplar HTTP/ HTTPS, ICMP , UDP, FTP, TCP based on the signatures. The display of the number of IPS attacks belonging to each category is shown in variety-2Figure -2 Classifications of AttacksOut of the above 13 lakh of the attacks the top 14 critical attacks from the five major categories have been identify to 162810 by the IPS and them display is shown in figure-3From the figure-3 it may be noted that the boastful attack having a frequency greater than equal to 4.38% are 6 types (responses 403 forbidden type is 45.62% , 17.38 % weave misc handler access 8.57 % is https/ssl renegotion , 7.38% web php , 7.34% web cgi count , 4.38% info ftp bad login) . While rest of the 16 attacks less than 10 % are having very small frequencies. The percentage of attacks each of the 22 weeks is shown in the bar diagrams in figure series week 1hebdomad 2hebdomad 3Week 4Week 5Week 6Week7Week 8Week 9Week 10Week 11Week 12Week13 Week 14Week15 Week 16Week 17Week 18Week 19Week 20 Week 21Week 22Out of 22 weeks, the percentage of Attack Responses 403 nix is the most dominant one.Forbidden attack response is the highest attacks with 45.62% overall in the 22 weeks, this incidence is generated when a 403 error response code is returned to a client by a web server, which indicates that an effort is made to take an unofficial access to a web server or an application running on a web server. The 400 series error messages indicate an error on the part of the browser client reservation the signal to a web server. The 403 response shows a request for a forbidden resource which cannot be gain access to even with authentication identifications. Many events can show a determined effort to try photograph on the victims server. Certain applications do not perform strict checks when confirming the security of a client host linking to the services offered on a host server. It can lead to an unauthorized access and probably escalated rights to that of the administrator. Information stored on the machine will be compr omised and trust relationships established between the victim server and the other hosts that can be intercepted by an attacker. In such Attack Scenarios attacker can access the authentication mechanism and provide his/her own credentials to gain access. On the other hand the attacker can tip the weaknesses to gain the administrator access without any exploit code.While the other self-aggrandizing attacks are-ICMP canvass despatch This attack is generated when a Windows trace route (tracert) is detected. A trace route is be used to discover choke hosts and network topologies. A Windows trace route command uses an ICMP echo request with a lower than normal Time to Live (TTL) value to identify live hosts and network topologies.Web- MISC handler Attacks this attack is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server.The other attack which has very high severity level is the SNMP attack. From the figur e- 4 shown below , it is noted that there is a baksheesh in the number of attacks in the 8th (19-0ct-2013 and 9th week).It may be noted that this peak is due to SNMP attack responded by UDP with application whose activity is pronounced.Figure 4 shows16 different types of attacks out of 22 attacks per week are shownFigure 5 different types of major attacks per weekFigure 5 Shows 16 different types of attacks out of 22 attacks per week are shown over the entire period. Of these 6 are found to be more conspicuous invade-RESPONSES 403 Forbidden (ATK-RES403F) 71067, ICMP trace route (29205), WEB-MISC handler access (13959), SNMP request UDP (11954), SNMP public access UDP (11952), HTTPS/SSL Renegotiation make (7062)IV FRAME WORK FOR EVALUATION AT THE GATEWEY LEVEL TO necessitate THE ATTACKS USING RAW PACKETS GENERATED BY THE NETWORKTo study the attacks more affectively, a frame work was deployed using open source software like Ubuntu, tcpdump with visualizing software like afterglow to charm real time at the sum total switch. This will help to monitor and analyze the network traffic in real time scenario. Data was evaluated for two hundred thousand packets captured using tcpdump nnelr data.pcap l wc l at the root.This will capture the raw traffic for two hundred thousand packets for data analysis and visualization. The data captured by the tcpdump will be converted to a csv file with all fields.Tcpdump-vttttnnelr ju.pcap./tcpdump2csv.pltimestamp sourcemac destmac imbibe dip sport dport flags len proto ttl id offset tos ipflags ju.csv.The Csv file is then exported to Mysql database.load data infile ju.csv into table analysis fields modify by , lines terminated by n (timestamp, sourcemac, destmac, sourceip, destip, sourceport, destport, proto, tcpflags, length, ttl, ipid, iptos, ipflags, offset)Further, ju.csv file was converted to dot file, which was converted to png file.tcpdump -vttttnnelr Ju.pcap ./tcpdump2csv.pl./afterglow.pl-c color.properties Ju.dot flush Ju.dot neato -Tpng o Ju.pngFigure 6 shows Whole Traffic captured for networkFigure-6 shows that the outgoing traffic is greater than incoming traffic, which states that traffic is compromised. Therefore there is need to identify the port 80 traffic and identify the machines which are compromised. From figure 7 we identify visually that the out traffic on port 80 is very high. Therefore, needs to identify machines which are compromised.Figure 7 shows the out going traffic of port 80Figure -8 shows ATTACK from IP 192.176.2.25Figure-8 Shows visualization of machine with IP 192.176.2 25 that is connected over the network which is compromised and sending malicious traffic outside. This helps the administrators to identify the machine irrespective of any signatures within the IPS database. Similarly other machines can be identified.V CONCLUSION AND FUTURE SCOPEIDS/ IPS are installed in almost every organization but they are designed to work on signatures. To study attacks which ex ist other than signatures, we need to further do the analysis through the frame work created with high end hardware which is required to capture and analyze the traffic for longer duration. So that fine tuning of the IDS/IPS as per the campus network requirement will be done to further increase the network performance.VI REFERENCES1 Paxson. Bro A System for Detecting Network Intrudersin Real- Time. In Computer Networks, volume 31 (2324), pages 24352463, 19992 G. Stein, B. Chen, A.S. Wu, and K.A. Hua, DecisionTree Classifier for Network Intrusion Detection withGA- Based Feature Selection, Proc. 43rd ACMSoutheast regional Conf.Volume 2, Mar. 2005.3 Schwartz, Matthew, Beyond Firewalls and IPSMonitoring Network Behavior. February 2006,available on http//esj.com/articles/2006/02/07/beyond-Firewalls-and-ips-monitoring-networkbehavior.aspx4 S. J. Yang, J. Holsopple, and M. Sudit, Evaluating nemesisAssessment for Multi-stage Cyber Attacks, in Proceedingsof IEEE MILCOM 2nd IEEE Workshop on state of affairsManagement (SIMA), Washington, DC, Oct 23-25, 20065 Z. Yu and J. Tsai, An efficient intrusion detection systemusing a boosting-based learning algorithm. global daybook of Computer Applications in Technology, Vol. 27(4), 2007, 223-231.6 Meera Gandhi, S.K.Srivatsa Detecting and preventingAttacks using network intrusion detection systemsInternational Journal of Computer acquisition and Security,Volume (2) Issue (1) June 20097 Asmaa Shaker Ashoor, Prof. Sharad Gore, IntrusionDetection System (IDS) Intrusion Prevention System(IPS) Case Study. International Journal of Scientific Engineering Research Volume 2, Issue 7, July-20118 Rosslin John Robles, Tai-hoon Kim,SeungLee, A Studyon Intrusion Confinement for Internal Network, Journal ofSecurity Engineering), vol.5issue no1, P73, 20089 Patil, Nilima R. Patil, Nitin N, A comparative study ofnetwork vulnerability analysis using attack graph WorldJournal of Science Technology 2012, Vol. 2 Issue 3, p91*University of Jammu, e-mail id emailprotected , **University of Jammu, email id emailprotected1

The Necessity Of The Mobile Phone Today English Language Essay

The Necessity Of The Mobile Ph mavin at present English Language EssayHand name, cell earpieces or drop deadset has been the one of necessity quite an than a desirable in our alive(p) in this modern day. Nowadays, transcend rally has been an affordable gadget for e realbody and the erect can effort to obtain a f all(prenominal) out squall for their youngsterren. thus far our children excessively can be seen with mess predict at anyplace they go and even in cultivate. The nous begging a authorized answer is whether they argon responsible enough to be departed to be with these communion gadgets in enlighten.Ministry of Education has set a regulation on development book bid in emergence aim day which is I strongly refute with that regulation and purpose. The regulations atomic number 18 to allow initiatechild on exploitation authorise call off in tame but with limitation usage. With this regulation savant still can employment perish phone in sc hool. see of Education should non allow the scholar to bring and recitation a slide by phone in school at all matters. thither argon much(prenominal) unfavourableness rather than a benefit when pupil bring their extend to phone in school. This is beca delectation the technology in the guide phone can ca mapping the student imperils to a pestilential behavior. in that location atomic number 18 still young and they are suppose to concentrate on their mull over first rather than playing or victimization their authorise phone. During the school mea confident(predicate) they halt to spend that valuable eon on their study and mannikin. After school time they gift a serve up of time for playing with their fade phone. The school authorities and the instructor mainly should play a major role to prevent these usages of exit phone among the students. The provokes alike strictly obligate to control their children from mis hold the hand phone.In the school besides they provide a public telephone for student to wont. counterbalance in school r all(prenominal)ice withal they have a direct line telephone that the student can use to squall their kick upstairs in urgencies cases. The lifts should trust the school solicitude when their children are in school. There is no need to be worried because the school management can aim sure 100% golosh on our children, this is practicedy guarantee by the Ministry of Education and even the Government of Malaysia. Although I have left hand school 11 years ago, but considering that Ive been in school for 12 years from pre-school to form 5, everyone did just fine without hand phone in school. So we should strongly not allow our children to bring the hand phone in school.2.0 Statement of the problem.There are too legion(predicate) problems when we allowed the student to use the hand phone. One of the problems is there entrust be a tendency to show come to ones hand phone, especially of the a la mode(p) regulate. This will not totally bring a beginning to the precipitation of human values and becoming a snob of the society, but similarly cause inferiority of other students who cannot afford the latest models or hand phone. The inferiority will affect the esteem of students and if they are caught with the trend, they might reply to stealing in whatever means either directly or monetary, or pressure the parents who have been releaseing hard for the children to have cheeseparing education. This will burden the parent to find extra money to full fit their children necessity. Nowadays the children dont want a cheaper hand phone they only want the sophisticated hand phone such as I phone 4, Blackberry etc. Just because the market price of hand phone are regressing fast, it doesnt mean that one should just affect their current model for granted and if it gets stolen, one will just procure a new one. So what if you or the parents can afford to a new phone, life just does nt land in such a way that when just closelything goes missing, you just get a replacement. When the stealing happen the outlaw cases in school will increase and this will drop the personality of the school itself. The school can be varietyified by a school for a rugged student and this will make the parent thing they should not let their children to enter the school and find the diametrical school. otherwise than that, the student has spent the pocket around RM10 to RM40 per month to buy a prepaid. No wonder the pocket money for our student. RM50 per month are never enough for the student nowadays. Some of them even ask their parent to register a postpaid due to insufficient prepaid top-up use per month.With the gadget technology nowadays, hand phone are already integral with camera, video and even Internet in hands. This is easy to capture or downloading a picture and videos in this case the student can expose on pornographic or sex video with are irreconcilable on thei r age. After that they may distribute them among their schoolmates. This will end up with rape and sexual intercourse among the student and will be bad influences for young children. Camera hand phone is increasingly popular. And you never write out when pictures or videos are taken, or where they are taken for what purposes. Sure, all of us will be saying that we drug abuse do such remote thing but you never have sex about the person succeeding(prenominal) to you. We can never be too careful. By using a hand phone the student also can surf to internet. This will end up they are not concentrate with their lesson in the class but they busy with their hand phone even nowadays plaque book also can surf through hand phone. The unblemished student for sure has a face book account and they certainly more focus on face book rather than their education.Although the usage of hand phone is limited to before school and rift time. preferably of students socializing and wining up with schoolmates, hand phone, reputed to be the cannot leave slowly companion of individual nowadays, will probably make students pay more attention to the handset quite. All hand phones moldiness be switched off during classes and curricular activities. Lets be real. If we can turn the phone off, we might as well leave it at home. And to expect students to turn it off is one thing that is unlikely to happen. The most theyll do is obtuse it and set it to tingle mode. You dont have to look into school role. Even in university lectures, most undergrads dont silent the phone when theyre supposed to. The phone will normally be in the pocket or at least in the bag. The particular is, it will never be anywhere far but forever in finish up since the phone is on silent. With that, theres always a possibility of using phones during lessons to SMS, play games or download. Some of student will play with their hand phone during their boring subjects. One, this clearly doesnt shows any respe ct to the instructor. Two, its taking the teacher for granted. Three, just because the person is smart and playing with hand phone wont affect the studies hence why are you even in school? School is not just a place to study or speed your time to get into college and university. Its a place where you learn to grow up socially.Furthermore, cell phone should be banned at all because when we allow student to use hand phone in school the teaching and learning process will certainly be disrupted. When teacher enter the classroom they need to spend a lot of time to check and make sure all of their student already switched off the phone. It will be a need for teachers to do so or some of their students may take out the phones and start playing games instead of focusing on the class. Some more students may misuse their hand phone by cheating in examinations by sending the answers using SMS or by write down the notes in the hand phone. Other than that, imagine the situation when every stud ent in a school takes out their hand phone and keeps sending SMS or makes phone calls during recess time. Compare this condition with a situation where every student takes out a book and keeps reading it during recess time. I am very sure that no school would want to see the first situation and all schools are looking forward to see the second situation. Schools would not be the place for students to attain get laidledge if hand phone were to be allowed in schools.3.0 Methodology.As for to support my argumentation or oppose the proposal I have made an call into question and discussion with them with three respondents which is ii from them are same with me to oppose the proposal and they dont agreed to allowed the students using hand phones in school. Some of the discussion Ive done it at the school and some in their house. The three respondents on my interview which is a parent who have children in school, the first respondents are Mr. Mahmad Bin Abd. Kadir live in Taman Putri Kulai. do as a clerk in school. He has one child who is still in school. His children are study at Sekolah Kebangsaan Taman Kota Kulai. Second respondents is Mrs. Norzaila, work as a clerk in school. She lives in Taman Melati Indahpura, Kulai. She has three children who are still in primary school. Her children are study at Sekolah Kebangsaan Taman Kota Kulai. The deuce-ace respondents are Mrs. Norzana Mohammed Noor. Shes work as a teacher. Shes has a three children in primary school. Her children are study at Sekolah Kebangsaan Taman Kota Kulai.4.0 Findings. correspond to my outline through these three respondents, two of them are not agreeing with the proposal and they are not allowing the student using hand phone in school. Even though, they have children they still not allowing their children using a hand phone in school. Their spring is children are still young and are not sufficient on using hand phone. They also mention in the interview that there is many problems may ar ise if they using hand phone in school. Furthermore, they cant afford to buy a hand phone for their children. If they have three children it is impossible for them to buy three hand phones for each one of them. This will burden the parents if their children keep pushing them to buy the hand phone for them. They want their children to concentrate more on study rather than playing with hand phone. They dont want their children negligence. They also want their children to success during the examination. So they should start from the beginning to archive their goal and ambition. They want their children to success in study until to University. They also mention that they dont want their children to be a bad boy by against the school rules. So the two respondents are same with me to not agree with the Ministry of Education proposal and strongly not allow the student using hand phone in school.The last respondent are agree with the proposal which is Im not agree with her. She agrees for t he student to use the hand phone in school and accept the proposal of Ministry of Education. According to her, the proposal is good. Shes agree because for her children safety in school or outdoor(a) the school. This is because shes working and their children always alone afterwards the school hours. Shes often to contact their children through phone. This is too easy for her to check on their children while working. Her economise also working and dont have much time to look after their children. They need to communicate through phone to check wheatear their children are groovy go back home after school or not. They also worried if their children misuse the hand phone. If not about safety reason she also dont to let their children use hand pone in school. Shes work as a teacher and shes know about good and bad if their children misuse the hand phone. Shes just let their children use the phone for safety purpose and easy to communicate. Shes always reminded their children to not misuse the hand phone and just uses it for important thing only such as essential call. Shes only bought a simple hand phone for their children, the hand pone without Internet or camera only use for call and SMS.It essentialiness be seen that the main reason by parents to let their children continue to use cell phones is because of safety purposes. If they have the phones, it is easier to reach them and even know where they are. It is also beneficial during requirement situations when the child can either call for abet or be located in case he or she is gone missing. Even though those parents who do not support this view say the children are not yet responsible enough to be given the cell phones, they tend to stick to the fact that the youth are likely to abuse the trust bestowed on them by parents. The parents can blossom to the fact that youth are always seen talking endlessly on phone to their friends. Even the short text technology on phone has been abused but the childre n see it as a pastime whereas the parents are usually uneasy when they see the youth misusing the privilege given them. Since parents know exactly what their children are like, they would be in the best position to make the decision on this matter. They are also the ones to decide at what point their children should be allowed to go ahead and own phones. It is advisable to set time limits on the time they can use the phone though as this will show that the parents are in control.5.0 Suggestions.After made an analysis on these matters, my suggestion is there no need to allow the children to use the hand phones in school. In school, teachers are the ones who take care of our well-organism. When we fall sick and really need to be taken home, injured or emergency, the teachers are more than willing to contact parents to inform them. Isnt that what the use of the school having emergency contact numbers for, after all, the use of the office phone is always there when in need. Even public phones in school or outside the school grounds are available. And to say that the phones are frequently not in good condition or not working, that will teach students to take care of public premises. We never know when we are in dire need to use it. The Ministry of Education also needs to add more public phones in school for student needed. The school management also needs to play important roles to take a good care of safety among the student.Having problems and need to call parents, theres always the office for emergency. And public phones for all reasons. And if all means doesnt work, Im very sure teachers are kind enough to lend their own hand phones to use. The question of teachers using the hand phones in school also needs to be given a thought. Teachers should also understand that they are the role model in school and it is not appropriate to show the misuse of the phone. Even worse, give students work and then laugh on a communion over the call. They will lose the respect o f the students and students are not to be blamed for not respecting teachers in this case. I feel that if teachers are expecting an emergency call like if someone is in a hospital, they should inform the class first, rather than disrupt the class in the middle of a lesson and then apologizingAnd being careful, it is true to say that the society out there is no longer of what it used to be before. Sometimes I wonder, for parents to keep come home the whereabouts of their children, how sure are they that the children are not elsewhere from what is said, or mayhap for parents to make sure the kids reach a place safely (school in this case), dont you think that a mere phone call is good enough, we compute on technology too much that personal responsibility is no longer shown. I may not know the worries of a parent and yet it may seem easy for me to say. But as a child of my parents, even they never need to check on me, I feel that its more meaningful and to realize how much my parents cared for me if they can fall by the wayside some time to check on me other than just a call. Again, most parents are working and time is hardly there. Or the length is too far between home and school.Hand phones mustiness be banned from school among the student. If there still the stubborn student being the hand phones the school authorities should do ascertain and confiscate hand phones. The discipline teacher should play major roles, ask their prefects to do spot-check before school hour begin. This is to make sure there is no student bring the hand phones to school and then keep their phones at house. On the school banning students from bringing hand phones, the students itself must certified why the school had done so, the students must understand that the kind figure behind the schools decision. They also must accept the reasons. If they want to use the hand phones, use it after school time outside the school. They have more time to play after school hour. School is the place for study not for playing or to show off our wealth. Parents and teacher must monitoring and proper guidance on the students to prevent anything happen.The student must think during their parents childhood there are no hand phones use and there nothing happen during that time. Their parents also should explain to their children there is no issue during their childhood without hand phones. They still can manage to go to school without hand phones. Dont just depend on the technology too much. If there are still the stubborn student bring the hand phones to school, school management must take a serious accomplish by fine the student minimum RM5 per day. This is not to burden the student but to teach them not to bring the gadget to school and left it at home rather than bring to school. The money can use for the improvement purpose and development in school. The school management must assign their teachers to handle this issue. The school management also must devour a motivatio nal class or series of lessons for students to teach them about proper etiquette and ethics that govern the virtual world. Classes are held once a term to teach students on what they should look out for when taking a picture or video, such as whether they are infringing upon the privacy of others. The lesson also educates students on the concept of intellectual property law, critical especially when downloading data and music from the Internet.

Saturday, March 30, 2019

Swot Of Virgin Atlantic And The Airline Industry

Swot Of double-dyed(a) Atlantic And The Airline constancyFor its service social club is well recognized and has been getting rewards which are providing them with a backbreaking brand image. Zagat, 2009 ranked them as leading players for international inflight run like entertainment and flyer program. overly by touch off weeklys 2009 pure Atlantic was ranked as the best international directline.http//www.travelweekly.co.uk/Articles/2009/01/28/30064/globe-travel-awards-2009- all told-the-winners-by-category.htmlAlso in Western Europe, political party has been ranked on first buns in comparison to British Airways, Air France and Lufthansa. Also in January 2010, lodge has received award of Best Scheduled Airline and Favourite Airline. A good brand is a competitive advantage for the company to urinate position in global commercial messageize and also to compete with its competitors.http//www.travelweekly.co.uk/Articles/2010/01/20/32852/globe-travel-awards-2010-the-winners -in-full.htmlComprehensive serveCompany set asides a good service to its customers. Services like check in facilities, baggage handling, meal catering, and in-flight entertainment. It is one of the superst British companies which provide coarse haul international channellines. Sometimes they also provide passengers with special treatment i.e. providing them with the special meals, mobility aids and also with the health camps at the time of departure and arrival.Virgin Atlantic also offers flying clubs on which they can earns miles and after having a specific number of miles they can crap a free ticket. It is one of the largest airlines that provide long haul tours all over the world.Strong financial military operationCompany is enjoying a strong financial performance even during the financial crisis and saving crisis.200720082009Turnover1,816,2002,010,9002,238,800 loot Before Tax31,4006,00049,800Profit Margin1.730.302.22In 2009 the company disorder has cast upd by 10.17% a s compared to 2008. Also the profit before levy increased by 87.95% to reach 49,800 in fiscal year 2009 compared to 6000 in 2008. Also profit margin increased from 0.30 to 1.73 in 2009. From the financial digest we can see that company is enjoying the strong financial performance that has allowed the company to expand its operating activities in both markets i.e. municipal and international.WEAKNESSESPrivate self-possessionIts really difficult for the company to raise capital as it is hugger-mugger owned, which gives unfavour adapted position to a company in comparison to publicly owned company. Publically owned company go through healthier devil to capital market, and also superior financial flexibility in sustenance initiatives. Virgin Atlantic airways needs extensive capital to grows its business market for that they have to be under public ownership rather than hugger-mugger ownership as private ownership provide limited count of financing option for the company.Lack o f ScaleVirgin Atlantic airways in its operation is lacking behind with large players in the market i.e. large players like British Airways and Air France- KLM ope locates in 300 and 249 destinations whereas Virgin Atlantic is only functioning in 30 worldwide destinations only. Also British airways and Air France- KLM got fleet solution of 245 and 635 aircrafts whereas Virgin Atlantic got fleet base of 38 aircraft only. So we can close up that its competitors are large in size which gives them a competitive disadvantage.OPPORTUNITIESGrowth of Global Airlines IndustryWith the assist of research it has been found that airlines industry has got a tremendous growth in past few years and is evaluate to grow more in next. Researchers found that airlines industry worldwide had total gross of $467.4 billion in year 2008. By 2013, the airlines industry globally impart get the revenue of $609.3 billion i.e. increase of 23.30%.In 2008, 2.1 billion passengers travelled with the source of airways. Researchers forecasted that by 2013 the volume of passengers will increase to 2.6billion i.e. by 19.23% since 2008. Right now Virgin Atlantic is only operating in 30 destinations globally. In future as the global airlines industry is growing, it will provide an opportunity to company to increase their operating destinations which help them to increase their revenue and market.Global travel and tourism industry is growingAir travel industry is well-known within the canalise and tourism industry, as it is the only source of transport for international travellers. With the help of research it has been found that in 2009 over one-half of the UK population had travel by the source of air travel, which tells that the indigence for the air travel is very strong. Even at the time recession, the outlook for the air industry remains stronger for the long term prospective.With the help of World trigger off Tourism Councils Tourism Satellite Account research we are able to discove ry that the revenue passenger-Km has grown to 11.9% in June 2010. This has helped air industry to convalesce from the volcanic eruption in April. Also it has been found that the Real gross domestic product for the Travel Tourism Economy was -4.8% in 2009 and now in 2010 is expected to be 0.5%. Also they have predicted that the world travel and tourism will produce over $13trillion for the period of 2008-2017, i.e. is the average growth of 4.3% per annum. We can conclude that in future change magnitude of global travel and tourism industry will generate entreeal revenue for the virgin Atlantic airways.(http//www.wttc.org/eng/Tourism_Research/Economic_Research/Monthly_Update_of_Tourism_Indicators/) holy terrorIntense competition and price discountingIntense competition and price discountingThe airline industry is characterized by substantial price competition, especially in domestic markets.Carriers use discount fares to stimulate traffic during periods of slack demand.Virgin Atla ntic competeson the basis of price, customer service, cost, frequency and convenience of scheduling, frequentflier benefits, might and productivity. Some of its major competitors include, AMR, Air France-KLM,British Airways, Cathay Pacific Airways, Continental Airlines, Delta Air Lines, Japan Airlines System,Lufthansa and UAL.In recent years, the domestic market office held by low-cost carriers has increased significantly andis expected to continue to increase, which is dramatically changing the airline industry.The increasedmarket presence of low-cost carriers, which contract in substantial price discounting, has diminishedthe ability of the network carriers to support sufficient pricing structures in domestic markets toachieve profitability.In addition to price competition, airlines also compete for market share by increasing the size of theirroute system and the number of markets they serve. The increased competition in these markets,particularly to the extent the companys co mpetitors engage in price discounting, may have a materialadverse effect on the companys results of operations, financial dispose and liquidity.EU regulationsThe European Union has passed legislation that came into effect beginning primeval 2005, for compensating airline passengers who have been denied boarding on a flight for which they dominate a valid ticket. The legislation also imposes fixed levels of compensation to passengers for cancelled flights, except where the airline can prove that such cancellation is caused by iniquitous circumstances, such as weather, air-traffic control disciplines or safety issues.Passengers subject to long delays (in excess of two hours for short haul flights) would also be authorise to assistance including meals, drinks and telephone calls, as well as hotel accommodation if the delay extends overnight. In addition for delays, over five hours, the airline would be infallible to reimburse the cost of the ticket or provide rerouting to the passengers final destination. The imposition of the regulation would significantly increase the expenses incurred by Virgin Atlantic and may affect its profitability.Rising aviation fuel pricesDue to the rising vegetable oil prices globally, the prices of aviation fuel have gone up substantially in the pastfew years. The average cost of a gallon of commercial jet fuel in the US has increased since 2000,from $0.7 per-gallon in 2000 to $1.9 per-gallon in 2006. According to the Air Transport Association(ATA), at a role rate of 19.5 billion gallons of fuel a year, each penny increase in price per gallonadds $195 million in annual costs for the airline industry. Aviation fuel, which comprises the largestcost component for a transporter, is responsible for the declining margins of close air transportationcompanies. As a result, some logistics companies incurred huge overheads speckle operating in manylow-volume destinations. This trend could impact Virgin Atlantics margins too as it is mostly relianton air freight business. slow down of global economyAccording to the IMF world economy outlook, the world economy will slow sharply in 2008 and in2009, with the US belike to slide into recession triggered by the current financial turmoil. The IMFforecasts, that the global economy, which grew by 5% in 2007, will lose considerable speed slowingto 3.9% in 2008 and 3% in 2009, marking the lowest growth rate since 2002. In the past, the IMFhas called global growth of 3% or less the alike to a global recession. Virgin Atlantic operatesthrough 30 countries globally. A weak global economic outlook is credibly to impact demand for airtravel and the company cannot offer any assurances in regards to the performance of its businessmodel under changed economic conditions. Therefore, Virgin Atlantics business is likely to beadversely affected

Japanese Foreign Policy In The Prewar Era History Essay

japanese Foreign Policy In The Prewarfare sequence History EssayDuring the early twentieth century, japan was confronted with growing pressures on its already scarce resources that compelled its leaders to pursue increasingly militaristic solutions. In fact, during the first half of the twentieth century, Japan engaged in a series of military adventures in Korea and China that were specifically designed to remediate the availability and reliability of its cut chains for vital resources. In the twenty-first century, some scholars may question whether these same coatings could not dedicate been achieved done change magnitude unknown trade rather than an expansionist policy. A polish examination of the conditions in which these events occurred, though, shows that the proximate cause for these impressions was the strategic naivet of the Japanese leading based on its past successes combined with internal political rivalries. To sterilize the facts, this paper provides a rev iew of the relevant literature concerning the causes of pre-war Japans policy of expansion, including an compend of the congeneric weight of various domestic and remote factors to determine whether it would bemuse been possible for pre-war Japanese leaders to pursue a pacificist trading-centered schema that would become the defining characteristic of postwar Japanese distant policy. A summary of the research and important findings are presented in the conclusion.Review and synopsisIn many ways, the exotic policy decisions that led to Japans attack on bone Harbor were based on the opportunistic expectation that prevailed among the nations lead that the nation would succeed in any military enterprise. This optimistic mindset was reenforce by several extraordinary events in the historical point that back up this view. fit in to Okazaki, Because the only two large-scale attempts at infringement of Japan in sayed Japanese history were both abrupt by typhoons, the Japanes e believe that they are a nation prosperous by God, and are optimistic about inter matter affairs to a greater degree than any other nation (p. 5). This assertion is back up by Satos observation that, A nations contrasted policy may presently or indirectly be affected by a miscellanea of factors including weather conditions.1(p. 369). In addition, Japans favorable geographical proximity also reinforced a mindset among Japanese political leaders that the nation was by nature protected from outsiders. In this regard, Sato emphasizes that, A distinctive feature in the international purlieu surrounding modern Japan is its relative isolation from and fringy position with reference to the humannesss major powers.2The Japanese leaders interpreted the countrys relative isolation and its historic relationships with its larger neighbors as being sufficient reason for a sentience of national guarantor. For instance, according to Okazaki, The historic background baron explain this Japanese attitude towards national security. Certainly Japan was inviolate because China, the traditionalistic superpower in eastmost Asia, maintained restraint on strange expeditions, including military ones, since the time that Japan entered international politics.3With the vivid geographic advantage, Japan was accustomed to its success in international relations and treasured to achieve what the western countries have Imperialism and Expansionism.This powerful combination of fortuitous weather-related events and geographic posture instilled the idea that Japan was destined for greater things into Japanese unlike policymakers, a perception that was reinforced by the Bushido work out and track record of military successes in the field. This type of outcome is congruent with Satos observation that national policymakers typically rely on their unique interpretation of these factors in formulating contradictory policy.4For example, Sato advises that, Factors with the potent ial for exercising long-term find out on a nations foreign policy may be divided into three groups the realities of the international environment and national power the attitudes within the society toward the international environment and the extra characteristics of a nations foreign policy formulation swear out.5With the foreign policy formulating process already skewed to fulfill the ending to be a stronger and imperialistic country, Japan was almost destined to go towards the Empire route and stick its conquest for more resources and power. Furthermore, the international environment at that time was already a heavily imperialistic one as most of the countries in Asia were already in the press out of colonization or something close to it. With these factors, the external and internal factors has heavily influence the long-term agenda for Japans foreign policy. more importantly for the formulation of pre-war Japanese foreign policy, this unique interpretation of world even ts and Japans destiny would have profound implications for choosing military solutions all over diplomatic ones during the pre-war era.6 by and by all, the historical record supported the expansionist view and Japans scotch security was at stake. For instance, Sato emphasizes that, Aside from the confrontation betwixt Japan and the Western powers over opening the doors of the country in the late Tokugawa period, the only instance of a direct threat to Japans security occurred when Russia advanced into Manchuria and promote increased its influence over Korea early in the twentieth century.7Saying Japan increased its influence over Korea early in the 20th century is homogeneous saying a drowning man has moist skin, though, and Japans formal annexation of its protectorate on the Korean peninsula in 1910 followed its victory in the Russo-Japanese warfare in 1905.8In verity, Korea was the keystone to Japanese expansionist policies during the first half of the 20th century due in la rge part to its strategic location between Russia to the north and China to the west. In fact, Okazaki emphasizes that, In all the wars involving Japan prior to World War II, the key strategic territory was the Korean peninsula. Even thirty years after the Korean War, deployment of U.S. forces in East Asia is centered on the Peninsula.9In this regard, Japanese expansionist policies during this period in history were not unlike the lebensraum, or living space policies utilize by Germany prior to and throughout World War II to brandish its geographic territory and access to valuable resources. For example, Barhart reports that, The roots of Japans aggressive, expansionist foreign policy have often been traced to its concern over acute economical vulnerability.10During the period immediately preceding the outbreak of World War II, a growing debate over the proper course of Japanese foreign policy drive toward national economic self-sufficiency was hampered by discordant internal an d external policies.11Despite growing pressure from the international companionship in general and the United States in picky, Japans foreign policy was shape as much by military leaders as civil politicians. According to Barnhart, Japans internal political dynamics, especially the bitter rivalry between its army and navy, played a far greater parting in propelling the nation into war with the United States than did its economic condition or even pressure from Washington.12The role of the military in shaping Japanese foreign policy pre-World War II is also cited by Snyder who advises, A belligerent, zero-sum approach to politics was deeply rooted in the Bushido code of the samurai and permeated traditional Japanese culture. Thus, the peaceable war was simply a Kurosawa epic in modern battle gear.13This seemingly plausible explanation, though, fails to take into account the role played by the political leadership during this formative period in Japanese history. By fixing the li ons share of the responsibility for Japans expansionist policies purely on the military, historians run the risk of overlooking the other salient forces that were at work in shaping pre-war Japanese foreign policy. In this regard, Snyder emphasizes that, The Bushido code obviously served as the legitimating ideology of a military ruling elite, not just a belief system. Moreover, it leaves unexplained huge variations in Japanese strategic thinking over time and across groups.14The contribution of Japanese political leaders in shaping pre-war foreign policy was highlighted by Pyle who describes the Meiji leaders as being tired of Japans economic backwardness and sense of inferiority to the West.15As a result, Japanese political leaders were amenable to reshaping their country in a modern image notwithstanding what these actions would have on Japanese culture. In this regard, Pyle emphasizes that the Japanese political leaders were on that pointfore ready and willing to sacrifice t ime-honored institutions to achieve their goals. The Meiji leaders espouse European legal codes, imported thousands of advisers, and built the most centralized state in Japanese history.16The Meiji leaders also fought wars with the dual goal of acquiring resources while doing so in an orderly and legal fashion that would consecrate Japan as an equal with Western nations.17Taken together, it is apparent that there were increasing internal rivalries between political and military factions that had distinctly diametrical visions of what type of foreign policies Japan should pursue in furthering its expansionist goals. In sum, a combination of expansionist policies combined with modernization reforms domestically was apply by foreign policymakers to lead Japan into the second half of the 20th century. For example, historians such as Barnhart emphasize that this approach was responsible for Japans military adventurism in the pre-World War II years. In this regard, Barnhart advises, F rom the commencement of the Meiji Restoration to the conclusion of the Pacific War, Japan pursued the status of a great power through expansion abroad and reform at home.18Likewise, Barnhart notes that Japans experiences with Germany in World War I confirmed the need for domestic reform combined with expansionist foreign policies that would help ensure the nations economic security in the future. According to Barhart, the nature of warfare itself had changed substantively during the early 20th century and the waging of total war meant that national security required a viable domestic foundation that could withstand this type of all-out warfare long enough for Japan to prevail. In this regard, Barnhart emphasizes that, Certain officers in the Imperial Army concluded that, for their Asian empire, the lessons of the European conflict were ominous. Future wars would be fought not only with guns but with the entire resources of nations, from engineers to doctors, from cotton plant to iron ore. Without these requisites of economic security, the mightiest army would be paralyzed.19Given Japans lack of natural resources, these issues were even more poignant during this formative period in foreign policymaking. Indeed, Barnhart points out that, Without a modern industrial base that could be mobilized in time of need, even these requisites would prove useless. A nation that could not supply all of its own needs in wartime, a nation that was under attack(predicate) to economic pressure from other nations, would be neither truly skilful nor truly sovereign.20A fresh and expensive war with China in 1937, though, made it virtually impossible for Japan to realize the complete goal of becoming economically self sufficient, and this conflict in particular served to further underscore Japans economic vulnerability.21This threat to Japanese national security was fit by the aforementioned positive Bushido-based mindset among some leaders that supported straightforward milit ary solutions for these complex domestic problems on the one batch with others that sought a more moderate path to achieving Japans goals of acquiring saucily resources and achieving economic security. Indeed, some authorities suggest that the expansionist policies used in the pre-World War II era were less important for some foreign policymakers than the domestic reforms that would be required to sustain any gains achieved on the battlefield. many another(prenominal) Japanese foreign policymakers, though, defined the nature of the political, economic and social reality that was faced by Japan during the pre-World War II years in ways that were supportive of expansionist views rather than a strictly prosaic analysis of world events and Japans place among the international community that was based in reality.22ConclusionTaken together, the events that led Japan into World War II appear to be inexorable in nature, and given the divisiveness among foreign policymakers during this p eriod, the outcome could not have been easily changed from an expansionist policy to a pacifist trading-centered strategy. In fact, the handwriting was on the wall and Japans expansionist approach to achieving its goal of economic security was well underway. The research showed, though, that Japans internal political problems, including the animated rivalries between military leaders, served to shape pre-World War II Japanese foreign policy in ways that would make it difficult to respond to economic pressures from the Western world in general and the United States in particular without resorting to military solutions. In the final analysis, it is reasonable to conclude that if the Japanese leadership of the early 20th century could have foreseen what pacifist trading opportunities shag do for economic security, they would not have resorted to the expansionist approach that include the annexation of Korea, warring on China and the rest of Asia and attacking Pearl Harbor. These effo rts were clearly influenced by a misguided application of traditional Bushido machismo that resulted in Japan being leveled and rebuilt in the pacifist trading model anyway.

Friday, March 29, 2019

Supply Chain Management in Tourism

Supply Chain focus in TourismThe integration of key business processes from end users through and through original suppliers that provides yields, improvements and information that add value for customers and diametricalwise situation holders.Supply set up forethought (SCM) is the process of planning, implementing, and controlling the operations of the cede chain as expeditiously as possible. Supply Chain oversight spans all movement and storage of raw materials, run low-in-process take stock, and finished goods from point-of-origin to point-of-consumption. (wikipedia.com)SCM in tourerry will start from planning of a product, identifying the diverse aras to be include in the complete touristry product and also, in all(prenominal) domain of the product, The worry of the raw material , farm animal of raw material and speech of the function.Tourism An industryTourism de nones the temporary, short term movement of plenty to tenia point outside the place where they normally live and work and their activities during their pinch at these destinations.Tourism is a multi segment industry. It is an industry where the products argon consumed on the spot forming invisible exports. It is also a fragmented industry with richly complexity due to the price sensitive nature of demand and the intangibility, cronk skill and inseparability.Tourism, similar all other supplement chains, operates through business-to-business tattleships, and picture chain steering net be applied to deliver sustainability mathematical process improvements alongside financial process, by working to improve the business operations of each supplier in the fork out chain. The of import differences between touristry sum up chains and those of other sectors atomic name 18 that tourists travel to the product, and the product that they cloud has a federal agencyicularly uplifted operate component in other words, it involves a higher proportion of people in t he immediate action of the holiday experience.Supply Chain Management in tourismThe coach of supply chain management is to eliminate raving mad in the chain and to improve the customer service. The elimination of waste for ideal hold sequence, inventory and production of non-requested products leads to lower costs. The improved customer service by performer of, interlinked processes, lead to preferred suppliers and to a bigger turnover. exclusively this leads to higher productiveness (more income/ less costs). In tourism it plays a very all important(predicate) subprogram to deliver the tonicity service with minimum gaps or reduced gaps. brief product life cycles, increased competition, and heightened expectations of customers cave in forced many star edge companies to move from physical logistic management towards more right supply chain management. Therefore, in many cases, the only possible elbow room to further reduce costs and lead times is with effective supply chain management.In addition to cost reduction, the supply chain management approach also facilitates customer service improvements. It enables the management of inventories, gestateation musical arrangements and consentient distri plainlyion networks so that organizations argon able meet or as yet exceed their customers expectations.Tourism supply chains involve many components not just accommodation, transport and excursions, but also bars and restaurants, handicrafts, regimen production, waste disposal, and the infrastructure that supports tourism in destinations. These all form a part of the holiday product that is expected by tourists when they purchase holidays, calibre, depends on performance at all the links in the tourism supply chain.A further aspect of the tourism supply chain is the activities of customers charm on holiday, particularly in relation to their behavior, and what they source for themselves in particular situations.The main strategies in any supply cha in are sourcing strategy, distribution strategy, inventory strategy, manufacturing strategy, customer service strategy and the strategy of integration.Tourism comprises of different industries product and service like of Hotels, accommodation, transport, destination and so forth SCM strategies can be change to suit the nature of the product.Sourcing dodge -Sourcing mainly constitutesMake or bargain decisionManufacturing management capability ManagementMake or sully decision Services can be delivered now or can be outsourced/Co-Sourced as done by Thomas Cook a reputed name in providing tourism services. Thomas Cook implemented strategic sourcing arrangement with Accenture by outsourcing its Back-Office activities. Through this model they were able to improve operations and reduce its cost, by US $ 243.72 million in just 16 months.Manufacturing management In tourism, manufacturing component is limited only to certain sectors like food and craft, memento, gifts etc. Services are pr ocessed at each stage in the tourism. For example, in transport sector at airport different services like visa and immigration processing, waiting time etc are processed to deliver the maximum satisfaction to the travellers. At the destination the service is processed by providing safe environment and security to the tourists.Capacity Management The tourism products are subject to instability of demand. Example during muscat festival in Oman, the demand exceeds the supply in many of the sectors of tourism like in hotels and airlines. Airlines meet this excessive demand by change magnitude the capacity by introducing additional special flights at special rates. scattering strategyIn tourism industry, the distribution strategy has far ambit impact on the initiatement of the industry. This makes it innate that the channel decisions are break d make so that the beginning and end process of marketing are managed efficiently and effectively.A basic clearing of the structure and wo rking of the distribution frame in travel industry, including the middlemen who form the part of the dodge, is run aground essential to understand the Economics of the tourism industry. The current practices insist on four types of sales distribution of tourism as a product.One stage trunk This system provides direct sales from primary suppliers of the services to consumers through its own reservation departments. E.g. airlines directly selling tickets to travellers through its reservation office.Two- stage system This system involves single middlemen i.e travel agent.Three-stage system This system involves two middlemen, sell travel agent and wholesaler or a tour streetwalker.Four-stage system This system involves a retail travel agent, wholesaler and additional middlemen cognise as Speciality Chancellor, who is instrumental in the development of tour packages. stemma Strategy An inventory of tourism products identifies the opportunities and constraints that a topical anae sthetic authority has in attracting visitors to their town/ city/region. The number and range of attractions and activities, things visitors can see and do, are particularly important. Gaps in the product range and/or poor bore facilities will make places less attractive to visitors. In the same counselling lack of transport and accommodation will deter visitors from travelling to and stopping at the destination. Until an inventory of attractions, activities, accommodation and transport has been completed and this is matched with an understanding of visitor demand and Visitor satisfaction, destinations will be unsure whether they are meet visitor expectations. In terms of prioritising tourism requirements, the attraction and activity sectors are the key areas. For Example, Tourist visit Switzerland for fun and excitement and it is the service supplier that provides this opportunity to the tourists. Local government is oft also, a key provider of visitor (and residents) theses attractions and amenities.Customer Service Strategy The aim of the tour operator should be that he consistently makes the customers happy 100% of the time .Inconsistent service leads to customers not knowing what to expect. Customer service includes providing accommodation, flight details, and attractive tourist points. Employees are vital in this attempt to achieve consistently high customer service. Organisations mustiness have the right systems in place in order to achieve their goals. If staff cannot take the right action when relations with customers, the business will suffer. It is about five times as pricey to win over a rude(a) customer as it is to work with an existing one.Integration Strategy Supply Chain integration Strategy links all the business entities in the supply chain. In tourism the tour operators act as producers as well as distributors. In an efficient supply chain, manufactures, suppliers, distribution channels and customers are linked in the form of a cha in to develop and deliver products as a single organization of pooled skills and resources. Higher the integration process, greater is the success of supply chain system.Tour operator or service provider has to commingle all the services together effectively to design the preferred railroad siding to gain the private-enterprise(a) advantage.For effective supply chain management of tourism services, it is essential that different segments of product (tourism) are managed in tune with changing habits and desires of users. SCM in few of the important aspects of the tourism like accommodation, transport, food and crafts and destination are discussed briefly in this paper.AccommodationAccommodation facilities are put to be important aspect of Tourism product. For managing hotel services, at the very outset, the locational reckons are found important. It is essential those hotels are easily accessible to the tourists sites or beaches or shop. The staff of the hotel should be trustwo rthy, well trained, and well versed with technology. Hilton Properties California manages their procurance and inventory using software application called Birch Street.There is hold for development of Hotels of different Grades and categories to accommodate the tourists of all segments. The restaurants and cafeterias are also found to be image creators. The accessibility and comfort of user is important factor in satisfying experience. The place should be free from all industrial Hazards. The guests staying in hotel should be able to avail the facilities like Quality Bedrooms, conclave halls, bars, shopping arcade, swimming pool, exaltation arrangement, first aid facilities etc. epoch developing the product, the quality of services comprising of efficiency, personal attention become significant. tally to Carla Gold GM Radisson hotel, Cleveland A good supply chain management starts with Hotel operator knowing the upcoming business demand. Optimum inventory management is required to minimize the cost.The tourist organizations cant think in favor of an optimal product strategy, if classified and unclassified hotels of different grades or stars are not easily available to the tourists. Unplanned development of accommodation sector can hamper the quality holiday experience of the tourist.TransportAll ingredients of tourism product fail in getting positive response, if the tourists do not experience comforts while travelling or while coming to the destination. It is not possible that all the tourist sites are directly linked to the airports. Hence other transportation facilities like railways and road transport facilities become significant. The tourist organization may also offer services but most of the guest prefers to avail private transportation services. This makes it essential that the transport facilities are well integrated. The tourist should be offered safe, fast, convenient and economic transport services. Since all the tourists cannot avail air s ervices, the railways and roadways are required to develop planned way. The schedule and speed should be maintained. The number of visitors to a terra firma also depends on the ease with which tourists are able to obtain Visas and canvas tent through immigration procedures. At Muscat international airport immigration procedures are being modernised to cut the wait for travellers. To speed up the processing of registration and to take care of security of the travellers electronic supply are installed.Hong Kong International Airport has been named best airport in the earthly concern by Skytrax.Travellers look for speed and maximum time utilization in the airport, clean washrooms, seating availability, and prices charged at food and beverage outlets, and how subservient the airport staffs are.The transport operators should behave properly, so that the tourists are motivated. The seating arrangements should be comfortable. The drivers and the conductors and other window staff shoul d behave properly. At any cost, there should not be any compromise with the safety principles.It is important to boot that the inadequate airline capacity is critical bottle neck in are travel to and fro India, particularly during peak season. Charters not only affix air capacity but also help in promoting new destinations.This necessitates adequate attention for upgrading transporting facilities, in important tourist centres.Rail transportation needs to develop special fascination for foreign tourists. It is appreciated rook on wheels scheme. The coast line and back water areas need an intensifier care. The possibility of having ship cruises along with coast line and the potential offered by the back waters of Kerela and sunderbans (West Bengal) for river cruises are required to be fully tapped.solid food and craftsIn many cases tour operators use local anaesthetic food and crafts as one of the tourist attractions of their packages Food and crafts can generate considerable s ugar for the local population, when volume production and delivery at set quality standards can be met by local producers. Key issues for local sourcing of food supplies in the tourism sector are quality, reliability and quantity of supply. forwarding of local sourcing therefore requires training and technical support and enthronement for example in storage and distribution facilities to meet quality and reliability standards, as well as the development of production and distribution networks to gather supplies from different local producers into the quantities required by hotels.Few tour operators have supply chain initiatives on the production and distribution of local, sustainable food and crafts, but some work with their local suppliers to promote local sourcing of food and other local products. Small hotels are more likely to buy from local suppliers, while some large hotels have developed programmes to encourage local production at the standards they require. This generall y requires constant supervision and commitment, and success is often linked to championing of local sourcing by hotel chefs. Local sourcing and production will commonly improve the contribution of tourism to the local economy, both financially and in terms of employment, and may also help to preserve local skills in craft production. For example Surajkund Crafts Mela, is the prominent tourist destination of Haryana, India. The Mela attracts lakhs of visitors, both for the fearsome range of interesting crafts it showcases as well as the relaxing uncouth ambience of the Mela grounds. Besides shopping to your hearts content, you can also find beautiful, colourful folk dances and also savour delicacies of various states of India. name and addresssIn relation to the tourism supply chain and direct inputs to tourism, destinations provide infrastructure and services. Destination initiatives for sustainable tourism seek to improve the quality of infrastructure for example, through impr ovements to waste management infrastructure for solid wastes and awareness raising programmes on waste management practices , to transport systems and to reduce vehicle impacts and to increase the ability of the destination to gain from tourism. Other initiatives include the promotion of linkages between tourism sites, and promotion of a wider range of tourism activities to encourage tourists to sample different aspects of the country and thereby diversify and spread the economic benefits of tourism.A number of initiatives in destinations in many developing countries are designed to advance local employment in tourism, such as by encouraging the substitution of locally-grown and locally-manufactured products in place of imports in the tourism sector, the establishment of investment and loan funds to assist local tourism businesses to start and expand, or the setting up of employment bureaux to match employees with tourism jobs.Some destinations have set up local quality of life an d sustainability programmes using sustainability indicators to monitor environmental quality, and in some cases, biodiversity, as well as supervise visitor satisfaction and changes in tourism markets. selling, products and operations can and so be adapted according to the monitoring information obtained.The Taj Mahal one of the septet Wonders of the World in India attracts 2 to 4 million visitors every year with more than 200,000 from overseas. Polluting traffic is not allowed near the complex and tourist must either walk from the car parks or catch an electric car bus. For security reasons only five items water in transparent bottles, picayune video cameras, still cameras, mobile phones and small ladies-purse are not allowed wrong the Taj Mahal.ConclusionsBased on various discussions in the above paper, it can be concluded that rules/ trends/models of supply chain management of manufacturing technology holds good for service sector also with root to tourismVarious aspec ts of services with reference to tourism are discussed separately. This paper discusses that there are many components in tourism. In each component like Accommodation, transport, food and Crafts Destination etc. there is need for Supply Chain Management to deliver quality service resulting in satisfying experience or tourist satisfaction.From the discussions in the paper it can be concluded, higher the integration of services indoors a particular sector (intra relationship) and also amongst the different sectors (inter relationship) of tourism, greater is the competitive advantage.Services in tourism like security of tourists, minimum waiting time at different locations, Environment friendly operations etc forms the important constituents in strategies of SCM.Supply Chain Management is a strategic dent which leads in cost reduction, optimum utilization of resource, sustainability resulting in leadership in todays global competitive market.ReferencesJha, S.M. Services marketing H. P.H., Bombay, 1994. Predictions that will make you conceive your supply Chain Supply chain management review phratry/October 2002 Anderson Supplier OEMSahay, B. S. (2000). Supply Chain Management for global competitiveness, Macmillan IndiaBerry and Parsuraman, Marketing Services Competing through quality (New York The Free Press), 1991Web sites visitedhttp//tourism.gov.in/statistics/statistics.htmhttp//en.wikipedia.org/wiki/Supply_chain_managementwww.http// ITT9603 Tourism and randomness Technology.htmhttp//www.fincorp.net/reports/tourism sector report-09-04.pdfhttp//www.tourism.govt.nz/tourism-toolkit/toolkit-word-docs/planning-checklist-TOUR-IND-INVEN.doc

Thursday, March 28, 2019

Hardships Of Southern Sharecroppers :: essays research papers

For umpteen bulk in the 1930s living conditions were not as adequate as they needed to be. The stock market had bonnie crashed in 1928, and the US was in the midst of the Great Depression. Many people suffered from lack of money, and many others suffered from lack of food. One group of people who suffered greatly during this time period were the grey share croppers. Factors that caused the substandard living conditions of the gray share croppers in the 1930s include lack of education, poor wellness care, and inadequate living facilities. The first factor that caused the substandard living conditions of the southerly share croppers was their lack of education. There were several reasons the share croppers didnt lay the education they needed. One main reason was because many tiddlerren didnt go to rail. Harold Walker writes that Southern cotton states ranked lower in send of attendance for each student enrolled than any of the other states in the country (4). A factor that co ntributed to this was their excessive mobility, which inhibited many children from going to civilize (Corder 27). It is common knowledge that any child who constantly moves around lead not be adequate to(p) to attend school on a regular basis, and even if they go to a school when they get a chance they will be so far behind they would book a difficult time catching up. another(prenominal) factor that keep on a childs attendance at school was the fact that they never went to school when there was cotton to be picked (Walker 8). This may not seem like a large task, but rough times it could take weeks to pick all the cotton. These few weeks that a child spent picking cotton was valuable learning time, and missing it could roam a child too far behind to catch up. Another reason share croppers didnt get the education they needed was because many southern rural schools had short terms (Gentry 21). Because of this teachers would not be able to cover all of the material that they ne eded to cover, or they would have to billing through the material they did cover. A final reason the education of the southern cotton states was not as good as other states was because their teachers were not as good. This was reflected in the fact that the salaries of Southern teachers were not as amply as the salaries of other teachers (Mckeon 98).

sports management Essay examples -- essays research papers

Sports management is an bowl of professional endeavor in which a broad classification of sport affiliated careers exists. It is also an area of collegiate professional preparation. Careers in sports management are established in schools, collegiate sports programs, professional sports, amateur sports organizations, commercial sports establishments, sports arenas, etc. One performer of sports management is not only having athletes but also have a place to utilize their talents in. Facility management and marketing play a big role in the sports and figurer industry. Facility management involves the co-ordination of the material surrounding and related services with the users needs. In just about cases, like privately owned gymnasiums, the preparedness itself is the service, while for other organizations, such as a boat club with a boat house, the facility is a storage place that aids the delivery of the service. Choosing the correct realistic estate for a sporting facility is v ital to its success. An apparent component to contemplate is the number and proximity of prospective users. Use of a computer comes in an important role. You can use the computer to find the U.S. potency of Statistics printout on local government demographics to determine how many prospective users may be in the area. Other factors to take into consideration when building and managing a facility are the direct costs such as rent, utilities, insurance, physiological satisfaction of the building, proximity to staff and suppliers, ...

Wednesday, March 27, 2019

Midnight in the Garden of Good and Evil by John Berendt Essay -- Midni

Midnight in the Garden of Good and Evil by fundament BerendtThe nurse Midnight in the Garden of Good and Evil was written by John Berendt and was388 pages long. This was a non-fiction report card of the beautiful town of Savannah, Georgia. JohnBerendt was a reporter who lived in New York and one night while dinning forth he realized thatone plate of food cost him the resembling amount of bills that it would to fly to Savannah. So he didand he anchor himself in love with the city and stayed. It is a spellbinding story bulk by ag exclusivelyery of remarkable characters a fading belle who packs a pistol in her dcolletage acharming, piano-playing con opus who moves analogous a hermit crab from one empty showplacehouse to the next, attach to by his high-living entourage and pursued closely by hiscreditors a monied dowager who conducts business from a cruising Mercedes limousine asour alcoholic armorer who claims to own a vial of poison so powerful that it could massacre off t heentire city a voodoo priestess in empurple shades and a foul-mouthed black drag queen whopasses so convincingly for a woman that she is able to extort abortion money from the parents ofher white boyfriend. With these and other people from savannah, Berendt reviles his alliancesand enemies in the town where everybody knows everybody else.The exciting vivid town of Savannah is said to be the main character in this Novel, butthe main character was actually John Berendt, he was the narrator and main character . He was areporter from New York who do savannah and the people in Savannah his interest, his home,and his life. He learned all about this secluded city through observation, meetings, and gossip.He was an intelligent man who always knew where to be at the right time. There was this one guesswork in the book where he was having an interview with Jim Williams when Danny Hansfordwalked in, in a tirade, with a shirt on that said F-U on it. Well earlier that daytime his other fri endJoe Oldem had been talking about this strange man who woke up in his bed with that same thingprinted on his shirt. John was in the right place at the right time to put ii and two together. JimWilliams was the other major(ip) character in this book, he was an antiquate dealer who owned one ofthe nicest homes in Savannah. He was a major ... ...job at it. The strongest features of the book was the way he described the people and the city asbeing one, The weakest part of the book was that the actually story of the murder didnt startuntil the second part of the book. If I was the beginning I would probably incorporate more of themurder story name into the first part of the book and introduce the characters passim thewhole book not just the first part ( the book was separated into a part 1 and part 2).The ending of Midnight in the Garden of Good and Evil was very satisfactory, Jim wasfound not punishable of Danny Hansfordss death. Jim threw his first Christmas party of the year forthe first time in 8 years, where he found himself remaking the guest list. Then at the very end hedied, I believe that it was ideal for him to die, it was nonnatural though that he died in thesame place that he would of died 8 years ago if Danny had shot and killed him like he intendedtoo. afterward Jims death Savannah was still the same. It was growing inward extraneous from the realworld, living in its own. The book starts with the town and ends with the town and I found that tobe very satisfactory.

Physical and Environmental Effects of a Nuclear War :: science

Physical and Environmental Effects of a atomic WarImagine the heat of millions of degrees, the immediate destruction of thousands of acres, and the deaths of hundreds of thousands of lives. Now speak up all of that times a thousand. There you have a nuclear war, the explosion of a thousand or more nuclear bombs on the earth. That is what is estimated would be a nuclear war. All of that power packed in relatively small(considering the power they unleash) bombs. The results of a nuclear war would be devastating. It would be devastating to the health and lives of people, and to the environment in which we live. The world wouldnt fully think for hundreds of years. How a nuclear weapon works In a innovational nuclear bomb, commonly called a thermonuclear bomb or a H-bomb, fusion is the power behind the explosion and destruction. Fusion is the fusing of the nuclei of two atoms, which produces an perfect amount of energy(about 40 times that of a fission reaction). For fusion to occur, though, an extremely high temperature and pressure must first be reached, and this is achieved by fission(splitting of the meat of an atom). The detonation of a fusion weapon begins with the detonation of a ceremonious explosive that sets off a fission reaction explosion. Plutonium and atomic number 92 atomic number 18 used to create fission. The atoms fused are those of the isotopes of hydrogen, deuterium or tritium. The fusion and fission from a thermonuclear weapon result in large amounts of radiation that arsehole be fatal to humans and animals and can also cause many other cause. Short-term physical effects One short-term effect of a nuclear war would, of course, be the deaths of millions of people. It has been estimated that an attack on U.S. populations centers by 100 one-megaton nuclear weapons would kill up to 20 percent of the population immediately through blast, heat, flat coat shock, and vociferous radiation effects. Also, and attack with 1,000 one-megaton nucle ar weapons (which many say is more earthy than just 100 weapons) would destroy immediately almost half the U.S. population. Those that do survive the initial explosions would be far from out of the clear. Those estimates above do not include the additional deaths from fires, starvation, or the lethal fallout showering to the ground downwind of the explosion. Skin burns, acute radiation sickness(which includes nausea, vomiting, diarrhea, and fever), and noticeable blood changes are just a few of the effects of radiation on the body.

Tuesday, March 26, 2019

Mother’s Fight with Cancer :: Influential Person Essays

Mothers Fight with CancerI am learning, some(prenominal) through observations and first-hand experiences, that there are many mishaps in life which earlier to be unexplainable and unfair, and yet wee-wee devastating consequences. Disease fits into this category. Its barbarity does non stem from the fact that it is a rare or bizarre occurrence, since illness and disease pervade our lives as we hear numerous stories of flush people and come into contact with them each day. However, there is a attach difference between reading in the newspaper that a notable rock star or sports icon has tested H.I.V. positive and discovering that your aver mother has been diagnosed with cancer.Undoubtedly, the most influential people in my life discombobulate been my mother and father. It is to them that I credit many of my accomplish-ments and successes-both inside and outside of school. passim my childhood, my parents have always fostered and encouraged me in exclusively my endeavors. At all my sporting events, spelling bees, concerts, and countless other activities, they have always been front row and center. My parents, in conjunction with twelve years of Catholic training, have also instilled in me a sound belief in a loving, caring God, which I have come to firmly believe. It therefore should not come as a surprise that the news of my mothers sickness would greatly alter my entire outlook on life. Where was my God?My mother, in fact, had been sensitive of her condition in the spring of my junior year in laid-back school. She deliberately did not inform my sister or me of her illness because she did not want to distract us from our studies. Instead, my mother waited for the completion of her radiation therapy treatments. At this time, she brought me into her room, sat me down on the same wooden rocking chair from which she utilize to read me bedtime stories, and began to relate her story. I did not weep, I did not flinch. In fact, I hardly even moved, but fro m that point onward, I vowed that I would do anything and everything to please my mother and make her proud of me.Every sequent award won and every honor bestowed upon me has been inspired by the recall of my mothers plight. I look to her as a driveway force of motivation. In her I see the firm, enduring qualities of courage, strength, hope, and especially love.

Protect Me? Essay -- Essays Papers

Protect Me?Ive decided to write my paper on protection policies associated with pile. I should allow you know that Ive been reading the make handle Under blast and I agree that trade restrictions overall cause more wrong than good. Ill focus mainly on American policies regarding import tariffs and the stupor it has on domestic producers and the domestic job market. My paper will be delivered as followsBenefits from TradeImports and ExportsTariffs on ImportsThe Job IssueConclusionBenefits from TradeAs weve discussed in class, any time in that location is trade there argon benefits. David Ricardo helped prove this with his Law of Comparative Advantage, which states Each country (involved in trading) should completely specialize in producing the good that it has comparative advantage in and then exchange the good with other countries to import goods it wants, if this is through with(p) apiece trading country gains from free trade. This makes sense and every model weve done in class shows countries that trade with each other increase their utilisation possibilities. This potential increase in consumption is known as gains from trade. The gains from trade can be limited however by protectionist policies. These are policies put in place by governments to protect domestic pie-eyeds from creation hurt by free trade. There are numerous ship canal to enact protectionist policies for domestic firms. The main one Im breathing out to colloquy about is tariffs (taxes). But first lets talk about the balancing act that egresss place mingled with imports and exports.Imports and ExportsIn the book Free Trade Under Fire Douglas Irwin discusses the mutuality (balancing act) that needs to take place between imports and exports. Basically, pr... ...cally been good for consumers and bad for firms. But when you factor in the job issue it frightens workers into thinking that if they dont stick with their firm and fight imports they wont have a job. Creating an allian ce between firms and labor against imports. Nobody wants to be unemployed. And being told that your job is obsolete besides a different job that might pay more is on the way doesnt really cushion the blow of being place off. But the overall picture (long run or long marches effect) basically states that protection doesnt benefit the world overall. This is in my opinion the strongest case for free trade.ReferencesFree Trade Under Fire By Douglas Irwin Principles of Macroeconomics (Vijay Sharma) Notes by Jeff MaffittInternational Trade (Steven Beckman) Notes by Jeff MaffittInternational Finance (Suzanne Uroz-Korror) Notes by Jeff Maffitt

Monday, March 25, 2019

Comparing War in the Poems, Dulce et Decorum est and Who’s for the Game

The two poems, Dulce et decorum est and Whos for the game? are two very(prenominal) different war poems. Although they were both written about the First worldly concern War, they both had different purposes. The poems have aspects in which they are similar, but they too have very big differences.One similarity between the two poems is that they both have titles which express positive feelings about war. However, the titles are both used in different ways Whos for the game? is an extended metaphor, as it is repeated again during the poem, Whos for the game, the biggest thats playedAlso it is equivalence the war to a game, which is a euphemism as well as a metaphor. It is a euphemism because war is a very serious, dangerous matter whereas a game is something that people enjoy and never get seriously wound in. By using this euphemism, Jessie pontiff - the poet lessens the severity of war, and clear ups her readers think of it as enjoyable, and something that they compulsion t o do. On the other hand, Dulce et decorum est is quite a sarcastic and dry title. Dulce et decorum est literally translates as It is sweet and fitting, and it is a quotation mark from the Roman poet Horace. It is repeated in the last line of the poem, which is Dulce et decorum est master patria mori.This means It is sweet and fitting to die for ones country. except in Wilfred Owens opinion it is a lie, because during his poem he expresses his feelings on war, and gives the impression that you shouldnt go. And floundring like a man in fire or lime Dim, through the misty panes and think thou light, as under a green sea, I saw him drowning.This is display one of the appalling ways in which soldiers in the war nominate die. Also this man dying is not going to save t... ...ch gritty zest Although he does directly address his reader too, he is utter completely opposite things to Jessie Pope.In conclusion, the two poems, Whos for the game? and Dulce et decorum est litigate the war very differently. This is mostly because of the different purposes both poets had for writing them. Jessie Pope was enrolled by the government to write poems for newspapers as part of the propaganda trying to make young men sign up for the army. Whereas Wilfred Owen was a soldier who fought in the war himself, and he wrote Dulce et decorum est as a response to Jessie Pope, because he saw her as a typical unfeeling civilian who was backup the war from the relative safety of the Home Front. Jessie Pope had a modified viewpoint, never having been on the battlefield herself, whereas Wilfred Owen wrote about his first hand endure in the trenches.

Catcher In The Rye :: essays research papers

The Catcher in the rye whiskey locoweed be strongly considered as one of the greatest novels of wholly time and Holden Caufield distinguishes himself as one of the greatest and most diverse characters. His example system and his sense of justice force him to detect horrifying flaws in the society in which he lives. However, this is not his principle difficultness. His principle difficulty is not that he is a rebel, or a coward, nor that he hates society, it is that he has had many experiences and he remembers everything. Salinger indicates this through Holdens confusion of time end-to-end the novel. Experiences at Whooten, Pency, and Elkton Hills combine and no levels of time separate them. This causes Holden to end the novel wanting(p) everyone and every experience. He remembers all the good and bad, until distinctions between the two disappear. Holden believes passim the novel that certain things should stay the same. Holden becomes a character portrayed by Salinger that di sagrees with things changing. He wants to control everything, in short he wants everything to always repose the same, and when changes occur Holden reacts. However the most important aspect of Holden Caufields character can be attributed to his judgment of wad. Holden Caufield, a character who always jumps to conclusions about people and their phoniness, can be labeled as a hypocrite because he exemplifies a phony himself.Holden Caufield the 16 year old protagonist and main character of The Catcher in the Rye narrates the story and explains all the events throughout three influential days of his life. A prep school schoolchild who has just been kicked out of his second school, Holden struggles to find the right path into adulthood. He does not know what road to follow and he uses others as the whipping boy for his puzzlement in life. Harold Bloom explains, His central dilemma is that he wants to retain a childs innocence., but because of biology he must move every into adulthoo d or madness. As a sort of compromise Holden imagines himself as "the catcher in the rye," a protector of childhood innocence exculpate from movement into adulthood, which is neither possible nor sane." (Blooms Notes 22)Even Gerald Rosen states that, "It is important to note here that Holdens rejection of an adult role is not a case of sour grapes. He believes he will succeed and it is the successful life he fears"(101).