Sunday, January 26, 2020
Disadvantages Of Arv Treatment Health And Social Care Essay
Disadvantages Of Arv Treatment Health And Social Care Essay Herbs have been used extensively in hopes of improving immune response and reducing symptoms. No known herbal remedy has been shown to cure AIDS or even reduce chances of AIDS-related infections. Still, some herbs can be worth trying if used safely and in consultation with a qualified practitioner who not only understands herbs but also has experience treating AIDS and HIV infection. Immunity-boosting herbs (such as Astragalus, Echinacea, and Ginkgo) may help revive an ailing immune system, and certain herbs (such as Garlic) may help battle bacteria and viruses. Deglycyrrhizinated licorice can soothe the mouth and throat ulcers that often accompany full-blown AIDS. Unfortunately, there is no known scientific explanation yet, for how herbs have these powers in treating AIDS and the only information available about how useful herbal treatments and remedies can be, is based on the knowledge gained from people living with HIV/AIDS. This means that not all herbs and remedies have the same effect on all people. Some communities have their own knowledge of health and nutrition, based on local traditions and culture. This may complicate the administration of herbal remedies from region to region, as the fundamental factor is now depending whether the patient is willing to cross cultures in order to obtain treatment. In some extreme cases, any external medical recommendations that a patient may receive is compared with their cultural practices and the recommendations of their traditional healers. Patients will only take action if the recommendations they receive appear to make sense and provide some benefit. Ironically, some traditional beliefs and food practices may not be useful at all, judging that a herb like Garlic root should work whether the patient is of Chinese or African descent. Patients with HIV/AIDS often become frustrated with management of the disease and are willing to try anything in the hope of staying healthy and living longer. One of the greatest disadvantages is that HIV/AIDS is not a traditional illness and so far, there is no hard evidence to believe that traditional medicines or herbal remedies can treat HIV and cure AIDS. However, certain herbal medicines may help to treat many of the symptoms of opportunistic infections that are part of AIDS. While some of these medicines may be undoubtedly helpful, others may be dangerous as they may do more harm than good. This happens when the patient mixes pharmaceutical drugs and herbs resulting in contra-indications or when they take certain foods that should be otherwise avoided. The notion that herbal medicines are natural and therefore safe is as widespread as it is misleading. Some of these remedies have been associated with severe adverse effects caused by the toxicity of the herbal ingredients. Others may cause problems because of contamination or adulteration [9]. Herbs and spices should be used in moderate amounts. Exceeding these amounts may cause problems and have a toxic effect; moreover, the function of the herbs and spices will not be increased. Herbs do not replace healthy eating and should not be used in place of a healthy and balanced diet but they do retain the bodys natural pH (alkaline) and this in turn, as discussed before, forces the microzymes to stop mutating into bacteria, viruses and funguses that cause opportunistic infections. 2.1.7 Advantages of Herbal Treatment: On general note, Herbal therapies seek to boost patients immune systems, inhibit opportunistic infections, alleviate symptoms, and inhibit HIV itself. Herbal medicines are very cheap in comparison to the conventional form of medication Herbal medicine helps the body to maintain its natural pH, which is alkaline; this in turn starves and inhibits all adverse microzymes from growing or mutating. Herbal medicines can be consumed without the aid of any kind of prescription, although a herbal or medical practitioner has to be consulted prior Herbal medicines are known to be more productive in comparison to other forms of medication in curing certain conditions. Herbal medicines offer long lasting benefits in terms of overall wellness. In certain situations, Herbs are considered a possible means to minimize drug side effects. Unlike with the convectional highly active antiretroviral therapy (HAART), herbs do not need to work in combination in order to get effective results Herbs are readily available and once a patient knows which herb to use, he/she can grow their own. 2.1.8 Disadvantages of Herbal Treatment: Curing period is usually longer in comparison to conventional medication Drug-interactions can be hazardous to a patient ,if they decide to mix herbs and drugs Herbal medicines are known to be ineffective against serious ailments Herbal medicines are taken without prescription which means that in some cases, individual might be undergoing a trial and error process with their medication. Herbal medicines can cause allergic reactions in some cases Herbal medicines will not eliminate the HI virus out of the body Most governments do not approve of any kind of herbal medication. Its usually consumed upon the persons own risk, and when it comes to branded herbal supplements one cant expect any kind of quality assurance 2.2 Expert Systems and their use on the Internet 2.2.0 Expert systems An expert system is a computer program that incorporates concepts derived from experts in a field, uses the available information, heuristics and inference to suggest solutions to problems in that particular discipline or give advice. An expert system should have good decision making, this is strongly dependent on various capabilities that include the effective acquisition, storage, distribution and sophisticated use of the human experts in the field in question. The most widely used way of representing domain knowledge in expert systems is as a set of production rules which is also how humans generally infer decisions. Expert systems were made to provide knowledge and advice to a larger number of users than one user. An Expert system can be viewed as a teaching tool because it is equipped with the unique features which allow the users to ask questions on how, why and what format, expert systems also allow automation of many tasks that could not be effectively handled by human experts. In addition, an Expert system attempts to emulate how a human expert solves a problem, mostly by the manipulation of symbols instead of numbers. As a result because of the low cost per user and automation of numerous tasks ,expert system making has become very attractive and in the long run is much cheaper than getting human expert advice, its development is however relatively costly but its operation is easy and quite cheap. Maintenance is easy as well because once an expert system is developed it is simple to add new information to the knowledge base and new rules can be developed. 2.2.1 Advantages of Expert systems Availability: The expert system is always available 24 hours a day and will on no account tire Can capture scarce expertise, collected from a number of experts and integrate their opinions. Consistency: The computer does not make common futile human mistakes such as forgetting, getting drunk or strike when it is most needed. Data can be kept up-to-date. Efficiency: Expert systems have an increased output and productivity as well as decreased decision making time. Flexibility: Expert systems can operate in hazardous environments. They can also work with incomplete or uncertain information. Scalability: The system can be used at a distance over a network therefore can reach a large population. The computer can store far more information than a human expert. 2.2.2 Disadvantages of Expert systems Expertise can be hard to extract from humans Expert system users have natural cognitive limits (therefore can not perform as perfectly as a human) Experts vocabulary is often limited and highly technical Expert systems may not be able to arrive at valid conclusions and sometimes produce incorrect recommendations Knowledge is not always readily available Lack of trust by end-users Most experts have no independent means to validate their conclusions 2.3 Structure of Expert systems A typical expert system consists of: A knowledge base; this contains the specific domain knowledge that is used by an expert to derive conclusions from facts The inference engine, which is responsible for using the rules and facts to derive conclusions whether it is through forward, backward chaining or a combination of both. An explanation system, which provides information to the user about how the inference engine arrived at its conclusions A fact database, which contains the case-specific data that are to be used in a particular case to derive a conclusion and A User interface, which provides access to the inference engine, the explanation system, and the knowledge-base editor. KnowledgeBase Fact Database Expert System Shell Inference Engine Knowledge Base Editor Explanation System User Interface User Figure2.1 A basic structure of an Expert System. An Expert System can be rule-based, frame based or both. In a rule-based system, the knowledge base is a database of rules. Rule-based systems are computer systems that use rules to provide recommendations or diagnoses, or to determine a course of action in a particular situation or to solve a particular problem. Its line of reasoning or the inference engine technique can be forward chaining, backward chaining, or a combination of both and the Rete algorithm. 2.4 Inference Engine The knowledge in the knowledge base is used for reasoning and inferring conclusions. An inference rule is an abstract structure that contains a set of rules that mathematically delineates a (usually infinite) set of finite length strings over a (usually finite) alphabet. It is a two part structure using First Order Logic for knowledge representation. If then The brain of expert system is the inference engine which is generally a large number of rules and facts. The inference engine matches facts and data, which is in the fact database against the inference rules to infer conclusions which result in actions. The process of matching the new or existing facts against inference rules is called Pattern matching. Pattern matching in the inference engine can use any of the following algorithms: Linear Rete Treat Leaps Most of the rule engines under study implement and extend the Rete algorithm. Leaps is also used widely but is questionable due to poor maintenance. Rete based engines have proprietary enhancements to the Rete algorithm like RetePlus, Rete III and ReteOO. The Rete algorithm is responsible for ensuring that there is a clear distinction between rules and facts in the database. This algorithm takes the form of a network, with nodes and paths. Each path from the root node to a leaf in the tree represents the left-hand side of a rule. Each node stores details of which facts have been matched by the rules at that point in the path. In situations where new data or facts are added, it means the Rete algorithm will propagate and change data stored at the node accordingly. In this way, the system only needs to test each new fact against the rules, and only against those rules to which the new fact is relevant, instead of checking each fact against each rule. 2.4.1 Methods of Inference Engine execution There are two methods of execution for rule based expert systems, forward chaining and backward chaining. And systems that implement both are called hybrid production rule systems. 2.4.2Forward Chaining This is a data driven and thus reactionary method. When applying forward chaining, the first step is to take the facts in the fact database and see if any combination of these matches all the antecedents (conditions) of one of the rules in the rule database. When all the antecedents of a rule are matched by facts in the database, then this rule is triggered. Usually, when a rule is triggered, it is then fired, which means its conclusion is added to the facts database. 2.4.3 Backward Chaining This method is goal driven, meaning that we start with a conclusion which the engine tries to satisfy. An inference engine using backward chaining would search the inference rules until it finds one which has a then clause that matches a desired goal. If the if clause of that inference rule is not known to be true, then it is added to the list of goals. Searches for sub goal conclusions begin, in hopes that, that will help satisfy some part of the current goal. It continues this process until either the initial conclusion is proven or there are no more sub goals. 2.5 Expert system shells Expert systems can be built that contain all the useful methods without any domain specific knowledge. These systems are called skeletal systems, shells or Artificial intelligence tools. The interpreter is separated from the domain-specific knowledge and thus creating a system that could be used to construct new expert systems by adding new knowledge corresponding to the new problem domain. Examples of shells include CLIPS, eGanges, OPS5, ART, JESS, and Eclipse. 2.6 Systems currently in use 2.6.1 Expert System for HIV/AIDS information The above expert system was created under the motivation of a Microsoft sponsored project called IHISM, which aims to contribute to the digital divide by developing an HIV and AIDS public information portal accessible through mobile phones [10]. The Expert system was tailored made with reference to Botswana, according to UNAIDS estimates, HIV/AIDS has affected every segment of Botswana society and one-third of Botswanas sexually-active population between the ages of 15 and 49 (out of a total population of 1.5 million) are infected with the virus, which is the highest rate in the world [11]. The information service portal would allow the public to request for information on topics related to HIV and AIDS such as descriptions, infection, testing, counselling and support, opportunistic diseases and paediatric care etc. The portal represents this information in the form of Frequently Asked Questions (FAQ) service where the user inputs a query on any of the subjects. The system is meant to act as an online expert in HIV and AIDS information such that, some information may have to be derived through inference as opposed to simple data retrieval. The system is to accept as input a FAQ from the user and provide the most relevant answer to the question. Challenges of the system: Users may ask the questions differently in pursuit of the same answer System should be able to systematically analyse the questions and provide an appropriate answer System should be able to determine the various forms in which a typical FAQ question could be mapped to the relevant answer. Participants agreed that the expert system was not only easy to use 2.6.2 A Self-Learning Fuzzy Discrete Event System for HIV/AIDS Treatment Regimen Selection The HI virus mutates often and so a patient has to be frequently changing their medication course. And because of the strict drug adherence guidelines, it therefore becomes desirable to have a treatment- decision support system that is capable of self-learning. Basing on the fuzzy discrete event system (FDES) theory, a self-learning HIV/AIDS regimen selection system for the initial round of combination antiretroviral therapy, which is one of the most complex therapies in medicine, was developed [12]. The system consists of a treatment objectives classifier, fuzzy finite state machine models for treatment regimens, and a genetic-algorithm-based optimizer. System focuses on the four historically popular regimens with 32 associated treatment objectives involving the four most important clinical variables (potency, adherence, adverse effects, and future drug options). Advantages of the A Self-Learning Fuzzy Discrete Event System for HIV/AIDS Treatment Regimen Selection: Higher flexibility and scalability Easier knowledge upgrade for accommodating fast treatment strategy evolution with minimal system modification. Challenges of the A Self-Learning Fuzzy Discrete Event System for HIV/AIDS Treatment Regimen Selection: Patient-specific medical simulation raises several moral, ethical and policy questions that need to be answered before the methodologies can be put to widespread use. 2.6.3 A grid-based HIV expert system This system is for physicians to provide an adaptive interactive advice on treatment applied to drug resistant HI virus. Its knowledge base comprises of distributed data from infectious disease patient databases, literature on in-vitro and in-vivo pharmaceutical data, mutation databases, clinical trials, simulations and medical expert knowledge. The research uses a variety of statistical and numerical methods to identify relationships between HIV genetic sequences and antiviral resistance to investigate consistency of results. Access to and integration of data is done through existing Internet servers and emerging grid-based frameworks like Globus [13]. Advantages of the grid-based HIV expert system: Cellular automata-based simulations are used to predict the drug behaviour overtime Limitations of grid-based HIV expert system: Little data privacy. Sensitive clinical information is often kept on highly secure hospital networks 2.6.4 HIVPCES: a WWW-based HIV patient care expert system Diagnosing HIV-patients and prescribing the correct drug regimen can be a complex task whose outcome is dependent on a large number of variables. The cost of an incorrectly administered drug even for a very short time can be enormous; the HIV virus has specific drugs that can manage its growth at different levels of its life cycle. HIVPCES is a WWW-based HIV patient care expert system. It is an interactive expert system to diagnose HIV patients, and is managed centrally and accessed either as part of an intranet, or as an Internet site.781273 The user interface has been carefully designed to provide a high-level of interaction and therefore improve some of the current limitations of Web applications. The system comprises three modules: (1) A patient self-monitoring personal diary, to create a follow-up patient record; (2) A data analysis and visualisation tool; and (3) A section to allow patients to ask for advising and remote doctor support. abstract Advantages of a WWW-based HIV patient care expert system: Provides health professionals with new means for tele-monitoring and tele-caring patients. Limitations of a WWW-based HIV patient care expert system: Low system security Users anonymity features are required but hard to incorporate in this clinical domain. 2.7 Outline of proposed system In the vast world of medical expert systems there is little attention given to HIV /AIDS and when the topic does get acknowledged, little focus is put into the treatment and much more attention on the common FAQs about the virus. This system aims to center on HIV/AIDS suffering patients and offer advice on supplementary natural treatments such as herbal medicines that these patients can use. Unlike some of the current existing systems, which look at drug adherence plan, i.e. narrowing the users down to only, those on the HAART program, the proposed system can be used by patients whose CD4 count has not yet plummeted therefore allows the patient to have a informed decision on how to maintain a healthy life and have a boosted immune system. Proposed system will offer information on particular herbs, that is, the name, healing effects and the contra-indications and explanations for every herb it advises. Advantages of proposed system: Caters for both physicians and patients Caters for patients not yet on the HAART program, thus serves a wider user range Knowledge base is an integrated pool of various expert views therefore each answer supplied is about 85% System is a web based application, which is easily accessible from any computer or location with Internet access. 2.8 Conclusion The collected information above was used for the design and methodology of the proposed system. This chapter reviewed the domain in study i.e. HIV/AIDS, expert systems and a review of systems currently in existence. The following chapters of the document consist of the integration and modification of the gathered literature.
Saturday, January 18, 2020
Applications of Biometrics in Cloud Security
CHAPTER ONE 1. 1 INTRODUCTION The success of modern day technologies highly depends on its effectiveness of the worldââ¬â¢s norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure ââ¬Ëin the cloudââ¬â¢ that supports them [15, 16].Authentication, thus, becomes pretty important for cloud security. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. The term comes from the Greek words bios (life) and metrikos (measure). To make a personal recognition, biometrics relies on who you are or what you doââ¬âas opposed to what you know. OBJECTIVES 1 To know and understand the meaning of biometric, its uses, the characteristics and also its advantages and challenges. To know and understand the full meaning of cloud computing its type and its service providers 3 To explain the about cloud security and its shortfalls 4 To know how biometric technology can be applied to enhance security in cloud computing CHAPTER TWO 2. 0 BIOMETRICS The word ââ¬Å"biometricsâ⬠comes from the Greek language and is derived from the words bio (life) and metric (to measure). Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits.Computer science, biometrics to be specific, is used as a form of identification [1]. Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic [2]. Biometrics offers new perspectives in high-security applications while supporting natural, user-friendly and fast authentication. Biometric technology uses these characteristics to identify individuals automatica lly1. Ideally the characteristic should be universally present, unique to the individual, stable over time and easily measurable [5]. 2. Biometric systems A biometric system provides an automated method of recognizing an individual based on the individual's biometric. A biometric is a measurement of a biological characteristic such as fingerprint, iris pattern, retina image, face or hand geometry; or a behavioural characteristic such as voice, gait or signature. Behavioural biometrics are related to the behaviour of a Person, including but not limited to: typing rhythm, gait, and voice. Some researchers have coined the term behaviourmetrics to describe the behaviour class of biometrics [1].A biometric system is essentially a pattern-recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioural characteristic that the person possesses [3]. Biometric systems can be used in two different modes. Identity verification occurs wh en the user claims to be already enrolled in the system (presents an ID card or login name); in this case the biometric data obtained from the user is compared to the userââ¬â¢s data already stored in the database Identification (also called search) occurs when the identity of the user is a priori unknown.In this case the userââ¬â¢s biometric data is matched against all the records in the database as the user can be anywhere in the database or he/she actually does not have to be there at all [4]. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. 2. 2 Biometric Authentication Authentication on the other hand, is a process where a known person's live biometric is compared to a stored template of that person.For example, an individualââ¬â¢s identity is revealed to the biometric system upon entering a PIN (Personal Identification Number). To authenticate that this is the person associated wi th this PIN, a live biometric is presented by the individual and compared to the template and a match is determined. This is known as a ââ¬Ëone to oneââ¬â¢ search. It is more accurate than the ââ¬Ëone to manyââ¬â¢ application and is the predominant biometric process in place today and the more privacy friendly of the two systems.This answers the question ââ¬â Are you who you say you are? Two general uses of biometrics are identification and verification which both require the existence of reference data that the personââ¬â¢s measured traits will be compared with reference templates or raw data. During these processes, a biometric data sample is compared against the respective biometric data of every person enrolled in the database or against a single reference template of a particular enrolled individual in order to confirm the identity of that person respectively.When a biometric system correctly identifies a person, then the result of the identification process is a true positive, whereas if the system correctly rejects a person as not matching the respective enrolled template, the result is a true negative. Similarly, when the system incorrectly identifies or rejects a person then we speak about a false positive or a false negative. Fig 2. 1 Components of a Biometric Authentication System[31] 2. 3 BIOMETRIC SECURITY SYSTEM The biometric security system is a lock and capture mechanism to control access to specific data.In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometric s is the key to open that lock [11]. 2. 4 CRITERIA FOR BIOMETRIC SYSTEM[12]There are seven basic criteria for biometric security system: [12] * Uniqueness: uniqueness is considered as the priority one requirement for biometric data. It will indicate how differently and uniquely the biometric system will be able to recognize each user among groups of users . For instance, the DNA of each person is unique and it is impossible to replicate. * Universality: Universality is a criterion for the biometric security that indicates requirements for unique characteristics of each person in the world, which cannot be replicated. For example, retinal and iris are characteristics will satisfy this requirement. Permanence: permanence parameter is required for every single characteristic or trait which is recorded in the database of the system and needs to be constant for a certain period of time period. This parameter will mostly be affected by the age of the user * Collectability: The collectabil ity parameter requires the collection of each characteristic and trait by the system in order to verify their identification * Performance: performance outlines how well the security system works. The accuracy and robustness are main factors for the biometric security system.These factors will decide the performance of the biometric security system * Acceptability: The acceptability parameter will choose fields in which biometric technologies are acceptable. * Circumvention: circumvention will decide how easily each characteristic and trait provided by the user can lead to failure during the verification process. DNA is believed to be the most difficult characteristic leading to the failure of the verification process [13]. Figure 2. 2 Basic Criteria for Biometrics Security System [26] 2. 5 TYPES OF BIOMETRIC systems Two classes of biometric methods are: 1) Physical Biometrics:Physiological biometrics is based on measurements and data derived from direct measurement of a part of the human body. * Fingerprint: Fingerprint recognition is one of the best known and most widely used Biometric technologies. Fingerprint recognition technology extracts features from impressions made by the distinct ridges on the fingertips. * Iris-scan: Iris recognition technology is based on the distinctly coloured ring surrounding the pupil of the eye. Iris recognition systems use a small, high-quality camera to capture a black and white, high-resolution image of the iris. Retina-scan: Retina recognition technology captures and analyses the patterns of blood vessels on the thin nerve on the back of the eyeball that processes light entering through the pupil. * Hand geometry: Hand geometry technology takes 96 measurements of the hand, including the width, height, and length of the fingers; distances between joints; and shape of the knuckles. * Facial recognition : Facial recognition technology identifies people by analysing features of the face not easily alteredââ¬âthe upper out lines of the eye sockets, the areas around the cheekbones, and the sides of the mouth..Facial recognition can be used in both verification and identification systems. 2) Behavioural characteristics are based on an action taken by a person. Behavioural biometrics, in turn, are based on measurements and data derived from an action, and indirectly measure characteristics of the human body * Voice recognition: Voice authentication is unique and non-intrusive method and also the hardware requirements required for this type of authentication are cheap and are available readily. Microphones can be used for this purpose.However the back ground noise must be controlled, high storage is required for this kind of authentication. This type of authentication can also be extraneously influenced by once sore throat and cold. [7] * Keystroke-scan: Keystroke dynamics is a biometric based on the assumption that different people type in uniquely characteristic manners. Observation of telegraph operato rs in the 19th century revealed personally distinctive patterns when keying messages over telegraph lines, and telegraph operators could recognize each other based on only their keying dynamics [22].Keystroke dynamics is known with a few different names: keyboard dynamics, keystroke analysis, typing biometrics and typing rhythms [22]. Currently users begin information to computer systems via physical keyboards or keyboards on touch screens. The main advantage of using keystroke dynamics is that it can be used without any additional hardware. Thus it is inexpensive. The user acceptance of a keystroke dynamics biometric system is very high, since it is not intrusive and users do not necessarily even notice that such a system is used [22, 27]. Signature Recognition: Signature recognition authenticates identity by measuring handwritten signatures. The signature is treated as a series of movements that contain unique biometric data, such as personal rhythm, acceleration, and pressure flo w. In a signature recognition system, a person signs his or her name on a digitized graphics tablet or personal digital assistant. The technology can also track each personââ¬â¢s natural signature fluctuations over time. The signature dynamics information is encrypted and compressed into a template.One of the defining characteristics of a behavioural biometric is the incorporation of time as a metric ââ¬â the measured behaviour has a beginning, middle and end [6]. A number of biometric methods have been introduced over the years, but few have gained wide acceptance. 2. 6 PERFORMANCE OF BIOMETRICS SYSTEMS The following are used as performance metrics for biometric systems [8]. * False Accept Rate FAR and False Reject Rate FRR: The FAR gives a measure of the probability that an individual will be ââ¬Ëfalsely acceptedââ¬â¢ by the system (i. . that the system accepts someone who is not enrolled on the system, or makes an incorrect identification). The FRR indicates how like ly it is that a legitimate user will be rejected. The balance between the FAR and the FRR greatly influences both the security and usability of the system. The False Rejection Rate (FRR) is usually caused by lighting, climate conditions, low quality equipment or inexperience. The False Acceptance Rate (FAR) is caused by the security standard being too low [9]. False Match Rate FMR and False NonMatch Rate FNMR: A false match occurs when a system incorrectly matches an identity, In verification and positive identification systems, unauthorized people can be granted access to facilities or resources as the result of incorrect matches. That occurs when a subsequent reading does not properly match the enrolled biometric relating to that individual, something that results in Denial of Access to services. * The Crossover Error Rate (CER): The Crossover Error Rate (CER) is defined as the error rate of the system when the FAR and FRR are equal.Usually expressed as a percentage, the CER can b e used to compare the performance of different biometric systems. * False enrol rate: This occurs when a personââ¬â¢s biometric is either unrecognizable, or when it is not of a sufficiently high standard for the machine to make a judgment, something that does not allow the user to enrol in the system in the first place. The fingerprints of people who work extensively at manual labour are often too worn to be captured. A high percentage of people are unable to enrol in retina recognition systems because of the precision such systems require.People who are mute cannot use voice systems, and people lacking fingers or hands from congenital disease, surgery, or injury cannot use fingerprint or hand geometry systems [10]. Applications of biometrics 2. 7ADVANTAGES OF BIOMETRIC SECURITY [14] 1. The first advantage of using this new technology is the uniqueness and it is also the main characteristic which allows biometrics technology to become more and more important in our lives. With un iqueness of biometrics technology, each individual's identification will be single most effective identification for that user.A chance of two users having the same identification in the biometrics security technology system is nearly zero. 2. Secondly, the highly secure way of identifying users makes this technology less prone for users to share access to highly sensitive data. For example, users can share their fingerprints, iris and so forth allowing other users access to secure information. Each trait used during identification is a single property of that user. In other words, it is extremely hard or impossible to make duplicate or share biometrics accessing data with other users.This makes it ever more secure allowing user information and data to be kept highly secure from unauthorized users. 3. This identification of users though biometrics cannot be lost, stolen or forgotten. This aspect of biometrics technology allows it to become more popular in its use. This method of ide ntifying and giving access to user makes user identification a lot easier. Finally, most biometrics security systems are easy to install and it requires small amount of funding for equipment (except modern biometrics technology such as: DNA/retinal/iris recognition). . 8 CHALLENGES AND ISSUES Nothing is 100% secure, not even biometrics. Nevertheless, biometrics does provide the means to present security credentials that are unique. Unlike other systems that may rely on passwords or tokens that can be vulnerable to loss or exploitation, no one is going enter your live biometric as a means of impersonation Just as a firewall does not constitute a network security solution but rather a component of a defensive strategy, biometrics could be viewed in the same manner.It is not enough to assume absolute verification with biometrics alone but rather as part of a well designed security implementation that considers strong two factor authentication. The second major threat is concerned with modification of the components of the authentication system. The capture device could be modified to output a different image to the one captured. Alternatively, it could be modified to create a denial-of-service (DoS) that will prevent legitimate users accessing the system (by smashing a camera, for example). The processes of emplate generation or template matching could be subverted to produce erroneous results; for example, a piece of malicious code could interfere with the template generation software to produce the attackerââ¬â¢s template rather than that of the legitimate user, or the matching process could be modified to produce an artificially high or low matching score. CHAPTER THREE 3. 1 CLOUD COMPUTING Cloud computing is a means of accessing computer facilities via the Internet, where the adjective ââ¬Å"cloudâ⬠reflects the diagrammatic use of a cloud as a metaphor for the Internet.Most of us have been using cloud-computing facilities in one form or another for years through ordinary email and the World Wide Web. Recently, the term has come to reflect the use of software and the running of computer applications via the Internet where the computer infrastructure and software are not ââ¬Å"on premises. â⬠Cloud computing, as a form of service provisioning, has given rise to several related concepts, such as mesh computing, cloud platforms, and software plus service. Cloud Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources.In a survey undertaken by the International Data Corporation (IDC) group between 2008 and 2009, the majority of results point to employing Cloud computing as a low-cost viable option to users [17] developers or research projects and even e-commerce entrepreneurs. Using Cloud computing can help in keeping oneââ¬â¢s IT budget to a bare minimum. It is also ideally suited for development and testing scenarios. It is the easie st solution to test potential proof of concepts without investing too much capital.Using cloud computing service, users can store their critical data in servers and can access their data anywhere they can with the Internet and do not need to worry about system breakdown or disk faults, etc. Also, different users in one system can share their information and work, as well as play games together. Many important companies such as Amazon, Google, IBM, Microsoft, and Yahoo are the forerunners that provide cloud computing services. Recently more and more companies such as SalesForce, Facebook, YouTube, MySpace etc. also begin to provide all kinds of cloud computing services for Internet users . 2 TYPES OF CLOUDS [18] In providing a secure Cloud computing solution, a major decision is to decide on the type of cloud to be implemented. Currently there are three types of cloud deployment models offered, namely, a public, private and hybrid cloud. A. Public Cloud A public cloud is a model whic h allows usersââ¬â¢ access to the cloud via interfaces using mainstream web browsers. Itââ¬â¢s typically based on a pay-per-use model, similar to a prepaid electricity metering system which is flexible enough to cater for spikes in demand for cloud optimisation.This helps cloud clients to better match their IT expenditure at an operational level by decreasing its capital expenditure on IT infrastructure [19]. Public clouds are less secure than the other cloud models because it places an additional burden of ensuring all applications and data accessed on the public cloud are not subjected to malicious attacks. Therefore trust and privacy concerns are rife when dealing with Public clouds with the Cloud SLA at its core. B. Private Cloud A private cloud is set up within an organisationââ¬â¢s internal enterprise datacenter.It is easier to align with security, compliance, and regulatory requirements, and provides more enterprise control over deployment and use. In the private clo ud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organisation itself, similar to Intranet functionality. Utilisation on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure.Only the organisation and designated stakeholders may have access to operate on a specific Private cloud [20]. C. Hybrid Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit, and circumscribed by a secure network [20]. It provides virtual IT solutions through a mix of both public and private clouds. Hybrid Clouds provide more secure control of the data and applications and allows various parties to access information over the Internet. It also has an open architecture that allow s interfaces with other management systems. . 3 CLOUD COMPUTING DELIVERY MODELS [18] The architecture of Cloud computing can be categorised according to the three types of delivery models, namely Infrastructure as a service (IaaS), Software as a service (SaaS) and Platform as a service (PaaS). A. Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendorââ¬â¢s dedicated resources are only shared with contracted clients at a pay-per-use fee. This greatly minimizes the need for huge initial investment in computing hardware such as servers, networking devices and processing power.They also allow varying degrees of financial and functional flexibility not found in internal data centers or with co-location services, because computing resources can be added or released much more quickly and cost-effectively than in an internal data center or with a colocation service [21]. B. Software as a Service (SaaS) Software as a Service also operates on the virtualised and pay-per-use costing model whereby software applications are leased out to contracted organisations by specialised SaaS vendors. This is traditionally accessed remotely using a web browser via the Internet.Software as a service applications are accessed using web browsers over the Internet therefore web browser security is vitally important. Information security officers will need to consider various methods of securing SaaS applications. Web Services (WS) security, Extendable Markup Language (XML) encryption, Secure Socket Layer (SSL) and available options which are used in enforcing data protection transmitted over the Internet. C. Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of ââ¬Å"rentedâ⬠functionality.Clients using PaaS services transfer even more costs from capital investment to operational expenses but must acknowledge the additional constraints and possi bly some degree of lock-in posed by the additional functionality layers [20] . The use of virtual machines act as a catalyst in the PaaS layer in Cloud computing. Virtual machines must be protected against malicious attacks such as cloud malware. Therefore maintaining the integrity of applications and well enforcing accurate authentication checks during the transfer of data across the entire networking channels is fundamental.Figure 3. 1 CLOUD COMPUTING MAP [18] 3. 4 CLOUD SECURITY Cloud computing have many advantages in cost reduction, resource sharing and time saving for new service deployment. While in a cloud computing system, most data and software that users use reside on the Internet, which bring some new challenges for the system, especially security and privacy. Since each application may use resource from multiple servers. The servers are potentially based at multiple locations and the services provided by the cloud may use different infrastructures across organizations.Al l these characteristics of cloud computing make it complicated to provide security in cloud computing. To ensure adequate security in cloud computing, various security issues, such as authentication, data confidentiality and integrity, and non-repudiation, all need to be taken into account. The biggest challenge in implementing successful Cloud computing technologies is managing the security. As with any new technology enhancements, criticisms are driven by fear of unknown variables and changes to current control procedures. How can cloud stakeholders ensure and promote the security of Cloud computing?In the Cloud Computing Services Survey conducted during August 08/09 by IDC IT group [17], users were asked to rate their issues and challenges experienced with Cloud computing. The results illustrate that security is the biggest concern. Security is the main issue users are concerned with when considering Cloud computing solutions. CHAPTER FOUR 4. 1 APPLICATION OF BIOMETRICS IN CLOUD SECURITY One of the Security risks in cloud computing according to Garfunkel [23] is hacked passwords or data intrusion. If someone hacks a password they get control over the resources.They can manipulate the information or disable the services. Furthermore, there is a possibility for the userââ¬â¢s email (Amazon user name) to be hacked (see [24] for a discussion of the potential risks of email), and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password [25]. As an excellent storage scheme for tenantsââ¬â¢ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenantsââ¬â¢ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant , want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_c hecker A Hybrid biometric method can be developed by fusing finger prints and voice biometric methods. The fused value can be used as signal sign on for multiple resources provided by cloud. This encrypted data is used for authentication 4. 2BIOMETRIC AUTHENTICATION SYSTEM AS A CLOUD SERVICE:The authentication service provider maintains the biometric data base . The data has to be stored in encrypted format using cryptography on biometric for the security reasons 4. 2. 1ARCHITECTURE BIOMETRICS AUTHENTICATION SYSTEM A secure data access scheme based on identity-based Encryption and biometric authentication for cloud communication Cloud Services1 CS1 Cloud Services1 CS3 Cloud Services1 CS2 Biometric Authentication Service Org1 User1 User2 â⬠¦ Org2 User1 User2 Fig4. 1: Biometric Authenticating System in cloud [30].The user initially enrols with the biometric system which is provided by a cloud, once the identity is registered his/her biometric authentication details are stored in c loud service provider database. The authorization details are also entered at the registration time which is also encrypted. Whenever the user wants to use any cloud service user first uses the biometric authentication service rather than a traditional password mechanism. Once authenticated, the user is redirected to the actual cloud service for which he is authorized to use. 4. 3 A PROPOSED METHOD [29] Step1: Setup cloud side parameters . Initialization On the cloud service side, given a security parameter 2. Key generation When tenants are registered in cloud computing providers, each tenant will obtain a unique identity to identify him or her. The phase generates private key corresponding to given registered ID of every tenant in cloud computing. Step2: Generate tenantââ¬â¢s biometric template Cloud computing is a pervasive service environment for tenants, different tenants have different security requirement. To these tenants who have special security concern on data can gene rate their biometric template and be stored in cloud database.Biometric authentication must be needed when someone wants to access the data. Step3: Encrypt cloud data Input: cloud data (which is created by cloud tenants and stored in the database of cloud platform), a private key (the cloud service providers), and an ID (the cloud tenant who want to access the data); output: encrypted cloud data. Step4: Biometric authentication As an excellent storage scheme for tenantsââ¬â¢ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenantsââ¬â¢ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. Step4: Biometric authentication As an excellent storage scheme for tenantsââ¬â¢ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenantsââ¬â¢ different data should be processed by different security modes. Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant say, p, want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_checker.Then, cloud tenants use registered identity ID to create their biometric template and all of the created templates are stored in cloud_sys_database. In cloud data access, cloud tenant p must pass the biometric authentication performed by biometric matcher in cloud computing. Step5: Decrypt cloud data Input: encrypted cloud data ciphertext (which is generated in Step3), an ID (the cloud service providerââ¬â¢s), a private key (the cloud tenant who want to access the data), and output: the corresponding plaintext i. e. cloud data. CHAPTER FIVE 5. 1 SUMMARYIn summary, as Biometrics allow for increased security, convenience we can say that fused biometric authentication system will be novel solution for authenticating users on cloud computing ,which can be provided as service on cloud . By following guiding principles discussed in this paper, a great deal of insecurities may be easily expelled, saving business ownersââ¬â¢ valuable time and investment. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution. Future work and progress lies in standardising Cloud computing security protocols 5. CONCLUSION . Authentication is necessary in Cloud Computing. In order to seek a secure data access method for cloud tenants, a proposed method presented a secure data access mechanism based on identity-based encryption and biometric authentication in this paper, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by root administrator in cloud service. The security of data is maintained even though the same application is shared by mu ltitenant.To ensure the correctness of usersââ¬â¢ data in cloud data storage, an effective and flexible biometric is proposed. i believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. This proposed method can be implemented with more security by using strong biometric m easures like eye. REFERENCES [1] http://en. wikipedia. org/wiki/Biometrics [2] J. L. Wayman, ââ¬Å"Fundamentals of Biometric Authentication Xhtp:/ww. engr. sisu. edu/biometrics/nbtcw. p 4] http://www. fi. muni. cz/reports/files/older/FIMU-RS-2000-08. pdf [6] http://www. indexbiometrics. com/physiological_or_behavioral. htm [7] http://ntrg. cs. tcd. ie [8] Cernet. ââ¬Å"CHARACTERISTICS OF BIOMETRIC SYSTEMSâ⬠. [online] available: http://www. ccert. edu. cn/education/cissp/hism/039-041. html. February 2013 [9] V. Vijaya Kumari and N. Suriyanarayanan. ââ¬Å"Performance Measu re of Local Operators in Fingerprint Detection. â⬠Academic Open Internet Journal, vol. 23, pp. 1-7, (2008). [10] www. gao. gov/cgi-bin/getrpt? GAO-03-1137T. February 2013 [11] Jain, A. K. ; Ross, A. Pankanti, S. , ââ¬Å"Biometrics: a tool for information securityâ⬠Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 ââ¬â 143 [12] Michael E. Schuckers, ââ¬Å"Some Statistical Aspects of Biometric Identification Device Performanceâ⬠, 2001 [13] Sandra Maestre, Sean Nichols ââ¬Å"DNA Biometricsâ⬠, 2009 [14] Massimo Tistarelli and Marks Nixon, ââ¬Å"Advances In Biometricsâ⬠, Springer-Verlag Berlin Heidelberg 2009, ISBN 03029743 [15]Erdogmus, H. : Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26(2), 4ââ¬â6 (2009) [16] Leavitt, N. : Is Cloud Computing Really Ready for Prime Time?Computer 42(1), 15ââ¬â20(2009) [17] Gens F, 2009,ââ¬â¢ New IDC IT Cloud Services Survey: Top Benefits and Challengesââ¬â¢,IDC eXchange, viewe d 18 February 2010, Accessed online @ . February 2013 [18]Ramgovind S, Eloff MM, Smith E,â⬠The Management of Security in Cloud Computingâ⬠[Online] Available: http://uir. unisa. ac. za/bitstream/handle/10500/3883/ramgovind. pdf;jsessionid=75882F66B5AF28B3D640A3C5F9CFD837? sequence=1 February 2013 [19] A Platform Computing Whitepaper, ââ¬ËEnterprise Cloud Computing: Transforming ITââ¬â¢, Platform Computing, pp6, viewed 13March 2010. 20]Global Netoptex Incorporated, 2009, ââ¬Å"Demystifying the cloud. Important opportunities, crucial choicesâ⬠, [online] pp 4-14 Available: http://www. gni. com, February 2013 [21] Brodkin J, 2008, ââ¬ËGartner: Seven cloud-computing security risksââ¬â¢, Infoworld, Accessed [emailà protected] http://www. infoworld. com/d/security-central/gartner-seven-cloudcomputing-Security-risks-853? page=0,1 February 2013 [22] J. Ilonen, Keystroke dynamics, Lappeenranta University of Technology, Finland, http://www. it. lut . fi/kurssit/ 03-04/010970000/seminars/Ilonen. pdf (2003) [23] S. L.Garfinkel, ââ¬Å"An evaluation of amazonââ¬â¢s grid computing services: EC2, S3, and SQSâ⬠, Technical Report TR-08-07, Computer ScienceGroup, Harvard University, Citeseer, 2007 [24] S. L. Garfinkel, ââ¬Å"Email-based identification and authentication: An alternative to PKI? ââ¬Å", IEEE Security and Privacy, 1(6), 2003 [25] Cloud Computing Security: From Single to Multi-Clouds [Online] Available: http://ieeexplore. ieee. org/stamp/stamp. jsp? tp=&arnumber=614956 February 2013 [26] Rahultech ââ¬Å"IT trends-latest/recent trends in information technologyâ⬠2010[online] available:
Thursday, January 9, 2020
The Debate Over Dissertation Writing Services
The Debate Over Dissertation Writing Services You ought to be very detailed so the writer knows just what to do and the best way to do it perfectly. You are going to be cooperating with the writer the entire moment. Our writers promise to deliver their very best work for you, but they can't guarantee you will land work. From anywhere on the planet, talented dissertation writers can be working on your thesis at the same time you sleep, as you go out with buddies, or as you relax in a movie theatre for a while to yourself. Dissertation writing services are a handy approach to care for your writing needs. You're advised to undertake extensive research of the internet services before you may settle on one. Our professional services can allow you to succeed. Our dissertation companies include having the capability to communicate with the writer during the length of the undertaking. Your goal is to get the ideal balance of value for money in time. Putting a significant sum of time in just for the research is going to be the very first hassle. A dissertation should cost you a significant amount of money, but it ought not break your bank. Then you should set a critical period of time into research. But What About Dissertation Writing Services? A dissertation is a sort of academic paper aimed to verify that a student has absorbed the fabric of the course and understands it well enough to make their own research based on it. Normally, an abstract is a really brief overview of the paper's major points that ranges from 150 to 300 words. Your papers will get the greatest possible grades. Verwhelmed and efficient work and 100% so you've accumulated a dissertation on. When you are in need of a dissertation or thesis, select the most trusted, custom-writing service in the business to assist you. The best method of writing dissertation is to obtain custom dissertation online from us. Our dissertation writing service supplies a variety of benefits students are certain to appreciate including proofreading, editing, revisions, formatting and far more. The Good, the Bad and Dissertation Writing Services The organization employs only certified writers specializing in various spheres. Our dissertation writing services are famous in PhD and master degree students and we've been providing them along with the best of qualified help throughout. Each writer has a strict screening process geared toward revealing their wisdom and aptitude. Skilled dissertation writers have the ability to give research in any particular area of knowledge. Maybe you currently have a notion. You are able to come across people that are unhappy with individual dissertation writing service they used before. Should you need dissertation help, you've come to the correct location! In case you go to college or work, you don't get sufficient time to fulfill the guidelines and you forgot a paper was due as you do not have the opportunity to do it. What You Can Do Ab out Dissertation Writing Services Starting in the Next 20 Minutes When you pay for a thesis writing service you are receiving the very best help that money can purchase and searching for that service on the internet is the ideal location. A genuinely professional dissertation writing service will surely have customers' testimonials so you can see what others say regarding their results. On the flip side, you also need to stay clear of services that overstretch your budget since they might be taking advantage of you. The service supplies a wide variety of freebies and flexible discounts. Ideas, Formulas and Shortcuts for Dissertation Writing Services The ways you'll be able to discover a service to aid you with your dissertation is vast. While quality services do not come cheaply, we are glad to try and match your financial plan. So, you might have different reasons for using a dissertation services. No wonder you're looking into our dissertation assistance support! As part of the procedure, the writer and the student ought to be in constant communication, which permits the student to be updated with the advancement of their assignment. You may also submit details such as guidelines, notes and other details you need to include to make sure your dissertation is customized to fulfill your academic needs. College is important and the start of your future. With their professional aid, students may write a winning dissertation without an excessive amount of effort. Dissertation writing is just one of the toughest academic assignments that all students want to manage. Dissertations demand a whole lot of work and, as a consequence, require longer deadlines than the majority of other kinds of writing. As a consequence, many students will attempt to come across some sort of dissertation writing service. Students who need to free their time for unique obligations should. Dissertation Writing Services - Is it a Scam? When you spend an excessive amount o f time and efforts for such complicated task you've got a tunnel vision and don't see your mistakes. It isn't as straightforward as it sounds to compose a dissertation, but it's really very hard and tricky which test your skills, knowledge, stamina, every bit of your nerve and capability to take care of pressure, since it needs a lot to be carried out in a particular format, coupled with a great deal of research, modeling, and outlining the important concepts before you begin the writing. When you ask for aid with dissertation, you're taking a step in the proper direction. You should be pleased to be aware that there is cheap, affordable writing help available and you're just a click away from it. The One Thing to Do for Dissertation Writing Services Producing an essay isn't a very simple endeavor, as it requires a great deal of effort and time. Paper writing requires a good deal of effort to complete successfully. As previously mentioned, dissertations require more time and effort to be placed into research than every other academic undertaking. Dissertation Writing Services Fundamentals Explained 1 critical aspect about dissertations is they should have unique content and fresh ideas about this issue available. First things first, a suitable introduction is supplied in context of the required information. Allowing us to care for your dissertation takes an additional burden off your shoulders, which means that you won't get weighed under and over stressed, and that you're going to be in a position to deal effectively with the remainder of your university workload, or with anything else that you should attend to. In some instances, you might not have a research topic to write about, and a few of the services find an appropriate topic within the line of your academics. Choosing Good Dissertation Writing Services Expert writers can come across distinctive and intriguing facts for your dissertation. Professional dissertation writers are the secre t to a very good paper.
Wednesday, January 1, 2020
Essay about Walgreens SWOT Analysis - 1001 Words
Walgreens was founded in 1901 and provides convenient access to consumer goods and services, pharmacy, health and wellness services (Walgreens.com). Walgreens has a conglomerate diversification business strategy which means they expand not only in pharmacy services but unrelated businesses such as health care clinics and in some areas Walgreens hosts 800 E.V. chargers. This type of business strategy helps to minimize risks due to fluctuations in one industry (Bateman, Snell 85). This type of corporate strategy is working very well for the Walgreens organization. The ability to service customerââ¬â¢s needs in a variety of needs is significant to a successful business. The Mission of Walgreens, ââ¬Å"To be the most trusted, convenientâ⬠¦show more contentâ⬠¦Upon completion of the SWOT analysis, it has been determined that Walgreenââ¬â¢s has a great deal of potential. A SWOT analysis is an assessment of the organizationââ¬â¢s strengths, weaknesses, opportunities, and threats (Bateman/Snell 84). Determining what is best for the business to do in order to compete or survive amongst the competition of other businesses is valuable to profit margins. The following is the SWOT analysis that our group has come up with for Walgreens. Strengths- Take Care Clinic Drop in or scheduled appointments, personalized quality care, convenience to pick up any prescriptions necessary at pharmacy Available in 18 different states Preventative, treatment and management services of a variety of afflictions, including vaccines and physically Digital Photo Printing Ability to upload digital photos and pick up in store Single prints, photo books, greeting cards, calendars, and posters are some of the available print options Same day pickup is available for rush orders Changing deals are available such as free shipping, discounted prices, and personalized photo gifts Pharmacy Prescription refills with free shipping to your home Online prescription history for easy ordering/verification of existing or past prescriptions Refill reminders are available by text or email Weaknesses: Competing Pharmacies ComputerizationShow MoreRelatedStradegy Management3174 Words à |à 13 Pages September 1, 2015 Executive Summary The primary intent of this paper is to compare the current strategy and operational approaches for two pharmacy retail stores such as Walmart and Walgreens chain stores. A SWOT analysis for both companies is bellow in table. My understanding after the initial study / investigation is that Walgreens has chosen to be conservative with their strategy in increasing their customer reach, market and base by a more organic growthRead MoreWalgreens Company Analysis and Integration Strategy Essay10861 Words à |à 44 PagesAnalysis of Walgreens By: Robert Antioho Christopher Bennington Andrew Graeff Jordan Lenz Jacob Wyand Chapter 1: Company Background and Mission Chapter 1: Company Background and Mission Walgreen Co. Introduction: Walgreen Co. (Walgreens) and its subsidiaries operate a drugstore chain in the United States. ââ¬Å"The Company provides its customers with multichannel access to consumer goods and services, and pharmacy, health and wellness services in communitiesRead MoreWalgreens Analysis2782 Words à |à 12 PagesWalgreens Strategy Analysis Retailing: MKTG 3740 B April 7, 2013 I. History and Mission Statement Walgreens has grown from a small, neighborhood-oriented drug store to a trusted, national pharmacy. Founded in 1901 by Charles R. Walgreen, the company bloomed from a commitment made to perseverance. Walgreen came from Dixon, Illinois at the age of sixteen, working an unpleasant job at a drug store after he lost a portion of a finger that left him incapable of continuing a career in athleticsRead MoreWalgreens Analysis Essay2212 Words à |à 9 PagesVision statement analysis To be ââ¬Å"My Walgreensâ⬠for everyone in America ââ¬â the first choice in health and daily living â⬠¦ owning the strategic territory of ââ¬Å"well.â⬠Effective elements of the statement: Graphic - the companyââ¬â¢s vision clearly paints a picture of the company becoming the nations top retail resource for pharmacy and health-and-wellness services and products. Easy to communicate ââ¬â the vision is easy understandable, has memorable slogan ââ¬Å"My Walgreens for everyone in Americaâ⬠FeasibleRead MoreMission And Target Market Of Rite Aid Pharmacy4505 Words à |à 19 PagesContents Introduction 1 Key Personnel 1 Financial Overview 2 Mission and Target Market 3 Competitive Strategy 4 Retail Mix 7 Industry Analysis 8 Competitors 10 Customer Demographics 11 Swot Analysis 13 Summary 15 Introduction Being involved in the US retail drugstore industry, Rite Aid Pharmacy is the third largest drugstore chain, when comparing number of stores and revenue, in the United States. Operating around 4,623 stores in 31 states, with majority of their store placement located on theRead MoreCvs Caremark Essay1973 Words à |à 8 Pages In this paper, I will give you a financial analysis of CVS Caremark for the years of 2009, 2010, and 2011. I have given an overview of the corporation, now I will evaluate the companyââ¬â¢s vulnerability to current financial threats and predict how trends will impact their financial performance in the future. I will analyze their financial statements, their stock and give a recommendation to improve their stock performance. The companyââ¬â¢s ratio analysis will give information about their operation andRead MoreWalgreens Future Trends Essay1832 Words à |à 8 Pagesmarket position, Walgreens must also concentrate on expanding its online services. Online services add convenience and contribute to Walgreensââ¬â¢ brand image while allowing the company to achieve the benefits of a multichannel strategyâ⬠(p. 13). Walgreenââ¬â¢s image is about creating value and making shopping either for consumer goods or prescription drugs more convenient. Finally, changes in government programs such as Medicaid, social security, and others will bring changes to the prescription drugRead MoreWalgreens Marketing Plan10648 Words à |à 43 PagesMarketing Project: Walgreens Company Table of Contents Introductionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.3 Market Situation/External Analysisâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..3 Current Industryâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.3 SWOT Analysisâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦4 Major Changes and Trendsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦6 Key Success Factorsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦8 Marketing Strategyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.9 Segmentation Strategyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.9 Target Market Description and Strategyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..13 Read MoreClocky Marketing Analysis4906 Words à |à 20 Pagesstill over a year away from production, Nanda was faced with a number of difficult decisions as she attempted to devise a marketing plan to bring her Clocky project to fruition. The following is our analysis of her situation, and suggestions on how she should proceed. Question 1 Using a SWOT analysis we are able to define the success factors that will influence Clockyââ¬â¢s future launch on the market by identifying the potential threats that Nanda is facing as well as weaknesses inherent in her businessRead MoreClocky Marketing Analysis4922 Words à |à 20 Pagesstill over a year away from production, Nanda was faced with a number of difficult decisions as she attempted to devise a marketing plan to bring her Clocky project to fruition. The following is our analysis of her situation, and suggestions on how she should proceed. Question 1 Using a SWOT analysis we are able to define the success factors that will influence Clockyââ¬â¢s future launch on the market by identifying the potential threats that Nanda is facing as well as weaknesses inherent in her business
Subscribe to:
Comments (Atom)