Monday, March 23, 2020

CVE-2005-0551 Essay Example

CVE-2005-0551 Essay CVE-2005-0551 is privilege lift exposure. On successful development of this exposure aggressor could take complete control over the attacked system and can act every bit normal as the decision maker on the machine. Privilege can be defined as the procedure of verifying the permissions before leting making something ( accessing protected resources ) . User provides some individuality for proof. In instance of Windows, the logged in user certificates can be an individuality to supply entree to the resources ( state meats maps ) . The act of deriving the entree to the protected resources from the application user by working the bug or design defects in the package application is usually referred as the privilege escalation. We will write a custom essay sample on CVE-2005-0551 specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on CVE-2005-0551 specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on CVE-2005-0551 specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Privilege lift is a particular sort of privilege escalation referred as perpendicular privilege escalation. In this procedure a low privileged user entree the resources of the high privileged user. The illustration of one such is, the terminal user of the waiter making install/ uninstall of the plans on the machine that he logged in. The merchandise bug may allow higher permissions than the user meant for when supplying a specially crafted input to the applications. Buffer/ stack flood can besides leads to this sort of onslaught. CVE-2005-0551: An application that provides console window information with a long FaceName value may do buffer overflow in WINSRV.dll in csrss.exe procedure. Attacker can work this exposure by specially planing an application that causes buffer overflow and derive the elevated permissions. CVE ( Common Vulnerabilities and exposures ) provides the undermentioned description for the CVE-2005-0551. â€Å"Stack-based buffer flood in Winsrv.dll in the client waiter runtime system procedure of Windows NT4 runing systems allows local users to derive privileges via a specially designed application that provides console window information with a long FaceName value† . CSRSS: Client/ Server runtime subsystem ( csrss.exe ) is a Microsoft Windows NT runing system constituent. CSRSS provides user mode side of the win32 subsystem and is chiefly responsible for Win32 console applications and threading. Buffer Overflow exposure: Whenever a plan efforts to hive away informations beyond the boundaries of a fixed-length buffer, the information is overwritten into the next memory locations. Some times it may overwrite the next buffers and some times variables and in the worst the plan flow which may do a procedure to crash or bring forth wrong consequences. The buffer overproduction may trip the executing of some malicious codification if the aggressor designed the input in such a format to make so. Stack based development: Overflowing the stack by go throughing the statements of size greater than the size of the variable allocated in the stack section we could make that. By making beastly force onslaught on this at some point we could hit the system bid and the parametric quantity values that are passed to the map could really a plan or a arrow to a map that contains some malicious codification. Scale and range of the exposure: The aggressor can research this exposure if he has at least local user permissions on the machine that he wants to assail. Unless he log on to the machine he can non research the exposure. The terminus users where maintain for public entree etc. are largely exposed to the aggressor. Attacker could non assail the machine through Internet or from some other distant location. He needs to be the local user of that machine. Anonymous user can non work this exposure as he can non entree the machine and log in to the machine and run the crafted application. To research the exposure aggressor foremost needs to log in the machine with his certificates on the machine. Then he needs to run a specially designed application to research the exposure. This stack based exposure can be exposed by crashing the csrss.exe procedure and besides providing FaceName of length greater than 32bytes. Once the onslaught is successful, the aggressor gets the complete control over the machine. He can move as the decision maker of that machine. He is free to add new plans, take plans, add new users to the machine group, take the bing users, alter the permissions of the users, take the critical information in the machine, adds the malicious content to the bing informations and so on. Mitigating/ deciding this exposure is really of import as the impact of this would be immense on the waiters those act as the waiter for the terminal clients. The factor that the distant users can non research this exposure of class reduces the surface country of the exposure but the issue is really of import from the security concern. Microsoft Systems it effects: The feat can go on in the undermentioned Microsoft Systems Windows 2000, Windows XP Sp1, Windows XP Sp2, and Windows Server 2003. This exposure is non exposed in Windowss view, windows waiter 2008 and Windows 7 runing systems though the csrss.exe procedure tallies on those machines. Degree of menace posed by this exposure to Microsoft Systems: Attacker can work this exposure and addition unauthorised entree to the resources of the machine. Once the development win he can derive full entree to the machine, and now he is free to change the machine constellation, and scenes. He can add new users to the machine group, take the users from the group and do denial of service onslaught ( as the attested users no more used the services provided by the system ) , add new plans ( these plans can be sniffers that sends the user secret information to the aggressor by listening them in secret ) , take installed plans, entree the cardinal files and deletes those, entree the database and take the database that resides in the machine. How does the feat map? Attacker should log into the terminus that he has entree to, by supplying the certificates ( local user certificates, who has limited entree ) . He so runs a specially designed application to work the exposure with his certificates. The application is designed such that it causes stack flood in winsrv.dll in csrss.exe procedure. After running the application successfully, aggressor additions complete control over the targeted machine. How is the exploit codification delivered to the mark system? This onslaught can non be performed remotely. It does intend that aggressor can non be one of the Internet user or remote user. The system can non be affected because of linking to the Internet. This onslaught is possible if the aggressor is a local ( limited entree ) user of the targeted machine. The purpose of the onslaught is to derive unauthorised entree on the resources that he does non hold entree permissions. The exploit codification will be delivered to the mark system by copying the specially crafted application from any removable media or from mail fond regard. Attacker he himself cognizing will make this to derive the control over the targeted machine. Manage/ mitigate this exposure: This exposure can be mitigated by downloading and put ining the updates available at the following location ( hypertext transfer protocol: //www.microsoft.com/technet/security/bulletin/ms05-018.mspx ) . One of the common guidelines to follow are that ever turn on automatic updates, so that the new updates will be automatically downloaded and installed from Microsoft. Restricting the user accounts merely to the attested users can extenuate the job though non wholly. The waiters do non hold job unless non-administrative entree permission is given to login the waiter and running the plans. This is non the recommended best pattern counsel for configuring the waiter. Restricting console entree at the hazardous terminuss can extenuate the job and cut down the surface country of the job. This is a trade-off between the capableness we provide and the security that we want to supply. Mentions: hypertext transfer protocol: //www.cve.mitre.org/cgi-bin/cvename.cgi? name=CAN-2005-0551 hypertext transfer protocol: //labs.idefense.com/intelligence/vulnerabilities/display.php? id=230 hypertext transfer protocol: //en.wikipedia.org/wiki/Privilege_escalation hypertext transfer protocol: //www.watchguard.com/infocenter/editorial/135144.asp CVE-2005-0551 exposure is because of the feat of the stack based buffer flood in winsrv.dll in the client waiter runtime system ( csrss ) procedure of Windows NT4 ( Microsoft server 2000, Windows XP ( SP1 and SP2 ) , windows server 2003 ) systems. Attacker exploits the exposure of the targeted system and gets unauthorised entree to the resources on that machine. Runing the specially designed application to work the exposure of the Windows NT4 systems ( mentioned above ) and deriving entree to the unauthorised resources for that user is nil but the privilege lift. Privilege lift is a type of privilege escalation and the Wikipedia definition of privilege lift is â€Å"A lower privileged user entrees maps, and other resources such as files etc reserved for higher privilege users† . The lower privilege users of the targeted system exploit the exposure and seek deriving the control over the resources of the decision maker of the machine or he can see the contents of other users which he is non supposed to make. On successful development, the local unauthorised user ( non-admin ) can entree the system thrust, add/ remove plans, start new procedure, alter the constellation, add new histories for that machine, take the users, changes the entree rights of the machines, changes the user privileges and so on. It is frequently people design applications that accepts input from the user through console ( by come ining the text input ) , i.e. is a character based user interface. Win32 API ( application plan interface ) offers this and the codification to run this characteristic resides in csrss procedure, a nucleus system procedure. This procedure manages Microsoft client/ waiter runtime waiter subsystem. Winsrv.dll file is responsible for creating/ deleting, pull offing the console windows. The codification in this Anethum graveolens manages these operations. Winsrv.dll contains the win32 user modus operandis and in writing engine modus operandis ( GDI ) . On choosing the belongingss item from the system Menu of a console window, CONSOLE_STATE_INFO construction ( a information construction that contains the information about the console window belongingss ) will be copied into the file-mapping object. This construction contains a nothing terminated threading stipulating the name of the fount, FaceName [ 32 ] . This twine is copied it in to a fixed size stack buffer without any saneness checking. Wcscpy ( ) map do the transcript operation. By providing a twine longer than 32 bytes, the onslaught can be explored ( It is nil but the stack based buffer overflow onslaught ) . Once the onslaught is successful the targeted system will be to the full compromised and the aggressor additions the entree right ( full permissions ) on all sorts of resources that are available to the decision maker of the box. Now he can add, take the plans, install sniffers ( spywares to listen other user activities ) , delete the sensitive content in the system, add the new users in to the system ( he can make a new history for himself as the decision maker on the box so that he need non make the same onslaught for deriving the control once more ) , he can disenable the other user histories so that they can non entree their histories, take permissions of other users ion certain resources and so on. The range of the exposure is high as the non-admin user can acquire administrative permission of the targeted system. Once an unauthorised user gets entree permissions the system can be said as compromised and every possible onslaught is now possible on that system. The system is no more secure to utilize and is extremely recommended to non to utilize. Besides it is difficult for the decision maker to happen it out that the system is compromised unless he sees some harm go on. In the average clip the aggressor can listen the other Sessionss of the attested users by put ining the undercover agent ware.The onslaught is non possible from the Internet or from some other distant locations. The onslaught will merely go on if the user is in the local user group of that machine ( i.e. user should hold some degree of entree on that machine ) . Unauthorized users, those who can non login to the machine can non work the onslaught and compromise the system. Attacker can non load/ run the plan re motely by working this exposure. Attacker who wants to work the exposure at first demands to login with his certificates and so run specially designed application for the onslaught ( the fount name value should be more than 32 bytes to do the stack flood, this is the field that needs to be build to derive the control over the machine ) . On successful development, aggressor additions the control over the targeted machine. Waiters those provide terminal client Sessionss are most prone to this onslaught than the normal waiters and client constellations. The machines that are exposed to the onslaught are: Windows waiter 2003 Windows waiter 2000 Microsoft Windows XP 32 spot edition ( SP1 and Sp2 ) and The version of ntoskrnl.exe is less than 5.1.2600.2622 and is the one non put in the spot KB890851. Microsoft released a new spot ( hotfix ) for this job. The Windowss machines that are exposed to this onslaught should put in the spot KB890851 to extenuate the job. This update removes the exposure by modifying the manner the messages proofs go oning before they pass them to the needed constituents. The best patterns to follow to avoid these sorts of onslaughts are: Keep spots up-to-date i.e. ever turning on Windowss updates and let put ining the new security updates. Need to put the constellation scenes sharply such that though they limit the functionality of the user the system will be more secure. Restrict console entree on public terminuss where security is a concern.This can be accomplished by making the undermentioned register key: HKEY_CURRENT_USERSoftwarePoliciesMicrosoftWindowsSystem Add a DWORD named DisableCMD with the value 1 to disenable bidprompt and batch files or the value 2 to disenable bid prompt butallow batch files. hypertext transfer protocol: //www.microsoft.com/technet/security/bulletin/ms05-018.mspx hypertext transfer protocol: //labs.idefense.com/intelligence/vulnerabilities/display.php? id=230 hypertext transfer protocol: //en.wikipedia.org/wiki/Privilege_escalation hypertext transfer protocol: //www.cve.mitre.org/cgi-bin/cvename.cgi? name=CAN-2005-0551 hypertext transfer protocol: //oval.mitre.org/repository/data/getDef? id=oval: org.mitre.oval: def:1822 hypertext transfer protocol: //downloads.bsi-fuer-buerger.de/produkte/bosscd/boss2/doc/mitre/CAN/2005/0551.html hypertext transfer protocol: //www.vupen.com/english/Reference-CVE-2005-0551.php

Friday, March 6, 2020

Authors on Deception Essay

Authors on Deception Essay Authors on Deception Essay Throughout our Eng. 101 course, we have covered several different authors who have delved into experiences and controversies involving deception. Although each author, Orwell, Haizlip and Viorst, writes about unique situations and occurrences concerning deception, all are issues pertaining to most if not all humans, including myself. Each required reading for me personally was a unique and intriguing doorway that opened to different paths upon personal reflection, question, and thought. Shooting an Elephant by George Orwell is a story involving a young, ill-educated, sub-divisional police officer stationed in lower Burma. His self-deception is put on display as he narrates his perception of how he is perceived and vice-versly from those around him. The writing specifically follows the decision to shoot an elephant and the consequences that may follow. In consciousness of Orwell’s experience, I have witnessed (and been a part of) actions that could have been solely based on the views of â€Å"on lookers†, even though personally I may have felt differently. Positions ranging from casually procrastinating to as unnerving as bullying solely based on miniscule differences. These outcomes (mostly mistakes) grounded from thoughts of others were mine alone to make, thus I accept full responsibility resembling Orwell as he must live with the decision he has made regardless of how or why it was made. I hope that I can not only recognize this truth but continue to implement positive changes to help better myself and those around me. Shirlee Haizlip wrote on the subject of â€Å"Passing†. The essay depicts several forms of deception and deceit. Including the deception of our own image in the eyes of others, their image portrayed in our eyes, and even how we identify with our own image. The term passing, the title of the writing, can even be defined as, â€Å"the deception that enables a person to adopt certain roles or identities from whic h he/she would be barred by prevailing social standards in the absence of his/hers misleading conduct.† (Kennedy, par. 1) Comparable to Orwell, we can all relate to the subject matter whether we do or do not consciously admit it. â€Å"Passing† helped me realize that while racial passing directly may not be overwhelmingly obvious in my personal everyday life, it represents itself in similar means. Such as how people adapt differently to unique social environments, parents input can alter personal belief as well as generally living of your life can change the deception of that belief and so forth. We must take into consideration that all distinctive circumstances may not be palpable as an individual but may concur in the lives of others or even in our own indirectly. Analogous to previously stated authors, Viorst’s essay on lying explores the subject/forms of deception. Naturally in deception and deceit itself, lying. She covers the subject by attempting to categorize the different reasoning of deceit

Tuesday, February 18, 2020

Predictive Policing Research Paper Example | Topics and Well Written Essays - 1250 words

Predictive Policing - Research Paper Example Information technology to reduce crime Vs random patrols Reports indicate that the application of information technology greatly assists police departments to take proactive measures against future crimes and thereby reduce crime rates. The recidivism rate for parolees, probationers, and sex offenders is on the rise in the United States and this issue has generated intense public scrutiny. Currently, the US police departments widely use advancements in information technology to optimize their performance and thereby reduce crime rates. Application of Global positioning system or GPS is currently used as an effective way to reduce the rate of recidivism. As Navarro (2007) points out, in Florida, micro global positioning chips are implanted in the body of child sexual predators to monitor them continuously. In addition, micro GPS chips are also used to accurately map the location of parolees and probationers so as to prevent them from committing crimes in future. A network of databases containing historical crime data has been established in the US for enabling police departments to get faster access to past crime information. This system improves the communication between police departments across the country and this strong policing network reduces crimes rates to a great extent. Similarly, application of information technology is of great help for police departments to reduce random patrol of the streets. As discussed earlier, the development of GPS greatly benefited the police to reduce random patrolling.... The satellite based radar system and surveillance camera systems aid US police departments to monitor streets from control rooms. To illustrate, traffic rule violations including over speed and signal jumping are captured and recorded by radar and surveillance camera systems and hence the law violators are identified using their vehicles’ registration numbers. The radar systems are also helpful to observe gangsters and other problem makers. In short, IT assists police departments to prevent crimes effectively without random patrol of the streets. IS functions of COMPSTAT Input, processing, output, and feedback are the four basic IS functions of COMPSTAT, a law enforcement crime fighting strategy adopted by the New York City Police Department. Four IS functions Four COMPSTAT principles Input Accurate and timely intelligence Processing Effective tactics Output Rapid deployment Feedback Relentless follow-up and assessment (Source: Godown, 2009) As the input, computer generated an d other statistical data are collected and gathered timely to present in various formats such as charts, maps, and graphs at COMPSTAT meetings. The process is initiated by timely given accurate information and data. At the primary level, â€Å"information is gathered from an agency’s statistical archives on crimes and arrests† and which is produced to the U. S. Federal Bureau of Investigation (FBI) Uniform Crime Reporting program (Godown, 2009). At the processing stage, effective tactics are developed to manage a particular situation. Once the staff officers are provided with timely and accurate information, they have to design, develop, and implement crime management policies and action plans

Monday, February 3, 2020

Interpretation of the film Like water for chocolate Essay

Interpretation of the film Like water for chocolate - Essay Example It is a story of fantasy, romance and food, full of color and intensity. In fact, food, cooking and the kitchen are essential elements in this movie to such an extent that even the title itself is a reference to food. The expression "como agua para chocolate", translated as â€Å"like water for chocolate†, refers to the boiling water used to prepare hot chocolate in Mexico. This South American idiom is often used to describe someone who is sexually frustrated. Pedro and Tita’s love story starts very early on when as a girl she catches the boy’s eye. When years later the family receives the visit of young Pedro, Tita and him immediately recognize each other and fall in love. However, this was not meant to be: Tita was the youngest of three daughters and, according to custom, the one that would stay at home and take care of the ageing parents. Consequently, Tita will only be allowed to marry after the death of her mother (Monografà ­as.com). Her mother, a strict, conservative and tyrannical character, will not break the tradition but offers Rosaura, the eldest, instead. After some deliberation Pedro decides that marrying Rosaura would bring him closer to his real love and, to Tita’s surprise, he accepts the proposal. As a consequence, they all end up living in the same house and the situation becomes untenable: Pedro and Tita cannot be together but cannot hide the love that is obvious to all. From the storyline it is obvious that, in such a conservative society as that found in Mexico during the early 20th century, traditions are more important than feelings and compliance with an old custom prevails over the love of the main characters. In this conventional and old-fashioned society, although individuals were not free to marry whoever they chose, no one dares to challenge the established rules and become conformist. This applies to women but also to men, as

Sunday, January 26, 2020

History and background of medical tourism

History and background of medical tourism CHAPTER 1 INTRODUCTION The practice of travelling abroad to obtain medical and health care services is called as medical tourism. The benefits of medical tourism are getting widely popular among people because people are getting aware about the benefits of medical tourism like the lower cost of the medical procedures and can enjoy their holiday in a exotic location during the recovery period. This outsourcing for health care is grown as a new trend and many American and European tourists prefer medical tourism for cosmetic and medical procedures. The countries which are lack of advanced medical procedures leads the people living there to fly abroad to get appropriate medical services. The practice of travelling abroad is a trend which developed from the ancient period and there is a long history of people travelling to other countries for health purposes. In Italy and throughout the Roman provinces, the Ancient Romans constructed resorts with thermal health spas, and the Ancient Greeks would travel to [on the Saronic Gulf] to visit the sanctuary of the healing god, Asklepios, who revealed remedies to them in their dreams (Bookman and Bookman 2007: 4-5). From the 15th to 17th centuries, the poor sanitary conditions in Europe prompted an interest by the rich in medicinal spas, mineral springs and the seaside for health purposes. These wealthy individuals would also travel to renowned medical schools for medical assistance (Swarbrooke and Horner 2007: 16, 33). This continued into the 18th and 19th centuries where spa towns, particularly in the south of France, became popular for health cures, the sun, and escaping the cold climatic conditions in the north of Europe (Holden 2006: 21-23). The rapid urbanisation and social change experienced during Industrialisation aggravated the unsanitary and poor living environments in Britain and some sections of Europe, with anti-urban values and a growing concern for health developing as a result (Holden 2006: 30). The formation of the railways allowed increasing and diverse flows of people to more distant seaside and coastal resorts, which provided a distinctive and escapist environment from urban isation, and the opportunity to practice what was viewed as a healthy pastime of sun-seeking (Holden 2006: 30; Swarbrooke and Horner 2007: 16,33) Spa tourism and sun-seeking persisted into the 20th century. Medicinal springs, spas, Beaches and resorts, particularly in warm and dry climates, continued to be considered therapeutic through long exposures to the sun, fresh air and water (Swarbrooke and Horner 2007: 33).Thus it is easy to understand that the health tourism has developed from the ancient age with myths and beliefs and as cure from natural resources to the current stage of various medical and surgical procedures and cosmetic therapies and for alternative therapies like yoga, naturopathy and ayurvedic medicine. Michael Moody (2007) indicates that the medical tourism trend began when residents of one country would go to another country to have cosmetic or dental procedures completed while on vacation or to recover from such procedures in a vacation like destination. Today, countries like India, the East Indies, South America and South East Asia offer treatment facilities at par with international standards at just a fraction of cost. The factors such as high cost of healthcare in developed countries, long waiting list in government medical facilities and the reduction of air fare are the majority of reasons which contributed for the growth of the medical tourism. The hospitals in India, the East Indies, South American countries and South East Asia offer a high quality medical care which is par with international standards in very cheap money compared to developed nations. India is one of worlds favorite tourist destinations and has many hospitals of international standard and English speaking staffs and therefore there are less chances of language barrier for the western patients. India has alternative therapies like Yoga naturopathy siddha and ayurvedic medical practices. One of the recent survey conducted in India on the healthcare indicates that the medical tourism in India will grow to US $ 125 to 250 million in the year 2012.(CII McKinsey study).The low cost and high standard treatment and care are the reasons which accelerates the medical tourism in India. The following example will illustrate about the economical as well as tourist benefits of medical tourism in India. Howard Staab, a self-employed carpenter from North Carolina, flew to India for his medically necessary heart surgery, scheduled a side trip to the TajMahal, and returned home to work in North Carolina. He spent a total of less than $10,000, instead of the $200,000 required from t he local hospital ( Milstein and Smith 2006).This indicates that India has patients for procedures like heart surgery which requires state of art facilities and highly skilled medical team. Other than that it also shows the money difference when compared with developed nations. Kerala like any other states in India also has lot of potential to be a market leader in medical tourism. Kerala often described as Gods own countryis one of the favorite tourist destinations in India. The geography of Kerala is embellished with lush green coconut groves, scenic beaches, tranquil backwaters and enriched culture. There is a pride of place in the field of medicine for this Indian state and medical tourism is the new facet of Kerala. Medical tourism is very popular in some states of India and this study focuses on a city of Kerala state. Kerala is considered one of the most favorite tourist destinations in India because of its beaches, hills, lagoons, backwaters and enriched culture. This state has tremendous potential to boom its medical tourism and the tourism industry is promoting itself with several ayurvedic and health packages. This study focuses on the trends of medical tourism in the city of Trivandrum which is located on the southernmost state of India called Kerala. This city is the current capital of the state of Kerala and it is known for its scenic beauties and beaches.This city also has several international standard hospitals and traditional ayurvedic resorts and clinics. Objective of the Research Study The principle aim of this study was to investigate and critically analyse the recent trends in the medical tourism in the Trivandrum, the southernmost city of India. This study also analyses the behavior of the medical tourist and their expectations in the services provided by the hospital or the clinic and the tourist operators or agencies. This study also focuses to address the a gap that exists in similar study conducted before. The aim was to address the gap between available literature and demand for further research on the subject by adopting a clearly defined and structured research design, utilizing both quantitative and qualitative research methods. Find the factors that drive Medical Tourism in Trivandrum Analyse the issues which determine success of medical tourism in Trivandrum Identify the problems faced by Medical Tourism in Trivandrum Make suitable suggestions for improvement of Medical Tourism in Trivandrum Rationales The first and foremost reason for choosing the topic of the study is to lay out before the readers the state of the Indian medical tourism sector at a moment in time when it is in great flux. Moreover the author was working in one such hospital which was market leader in medical tourism in the city of Trivandrum. The medical tourism sector is believed to be a great boon of economical growth in Kerala and therefore by doing a study at this particular time may give readers awareness about the situation challenges and scopes. Other than that medical tourism it is an area of interest of the author as he wants to analyse the trends and issues involved in the medical tourism industry in Trivandrum city. The purpose of this research note is to outline some of the challenges and opportunities ahead, as health tourism finds its prominence in the practical and conceptual domains of tourism. Further there are predictions for Trivandrum city to flourish with medical tourism in next five to ten y ears and it is right time to analyse the challenges and scopes ahead. Structure of the study This study explores the trends of medical tourism in Trivandrum city and the issues around it. The need for further research on the topic has been established with carrying out a secondary research followed by primary research and by comparing evaluating the primary and secondary research. According to McDaniels carrying out exploratory research will gave the researcher clarification to understand the magnitude of topic area and thereby permitted a clearer and stronger perception of the environment and the situation which arise within it. (McDaniels, 2001). CHAPTER 2 LITERATURE REVIEW The medical tourism has an advantage of providing cost effective medical care collaborating with the health care industry and with the travelling industry to the patients who need medical treatment in a location different to their home town. Thus medical tourism occurs with the combination of healthcare services and tourism and travel domain. The facts that led the growth of the medical tourism are the availability cheap and high quality medical care in one geographical location and existence of long queue of patients for medical procedure and high prices of medical care in one geographical region. The outcome of these factors is the growth of medical tourism resulting in people moving to another geographical location for health care. DEFINITION The term medical tourism is a term coined in recent period but the practise seems to exist from ancient period and the trends in medical tourism have changed with the time. The health tourist travel to their favourite destination for different medical and surgical procedures, cosmetic surgeries, alternative medicine, and spas and health resorts. The considerations and risk for different procedures vary accordingly. The medical tourism has gained social, economical and political interest but it has gained scant attention in tourism literature generally. Bookman and Bookman (2007) define medical tourism as travel with the aim of improving ones health, and also an economic activity that entails trade in services and represents the splicing of at least two sectors: medicine and tourism. The health tourism is seen as means of leisure oriented and stress relief as many people opt for sun and spas. Although there is no single definition for health tourism, it could be broadly defined as people traveling from their place of residence for health reasons (Ross 2001). Several demographic, economic, and lifestyle factors are driving such tourism (Handszuh and Waters 1997; Ross, 2001). Bennett et al. (2004: 123) acknowledge a liberal definition of health tourism would be any pleasure-orientated tourism which involves an element of stress relief, meaning it is an enjoyable and relaxing activity Pollock and Williams (2000: 165), Laws (1996 in Henderson 2004: 112) and tries to see the health tourism with the view that it is a separation between the ordinary and the extraordinary; the everyday world of work and home versus the combination of health and tourism in leisure, recreational and educational activities. Then Schofield has a view that health tourism is a means to achieve improvement in physical, mental and social well being. (Schofield 2004: 137). The above all definitions try to define health tourism as a means to escape from every day routine and improve stress free healthful life. Henderson (2004: 113) insists that health tourism as travel where the primary purpose is treatment in pursuit of better health that may involve hedonistic indulgences of spas and alternative therapies, while medical tourism incorporates health screening, hospitalization, and surgical operations. Ross (2001) after analysing various factors and literature tries to define health tourism as any kind of tourism that involves a person or his family member for the purpose of wellbeing and he considers that health tourism mainly focuses on two main domains as pampering and wellness. Pampering are services like massage, herbal wraps and exfoliating scrubs whereas wellness involves with improving physical and mental state and sometime it may involve with the treatment. MEDICAL TOURISM AND ITS TRENDS The concept of medical tourism have undergone many changes in recent times and there is a change in the trends like people from developed countries moving to developing countries for medical procedures for the difference in the cost. The global medical standards and regulations have been implemented in different countries and this in turn raises the number of people seeking cost advantage and best treatment in their preferred destination. The market of medical tourism depends on awareness and application of significant issues such as social diversities, consumer benefits, branding of products, legal frame work infrastructure, target markets, the actual product and communication channels (Dannell Mugumba).Therefore it is understood that the people from developed countries choose their destination after analysing various features and therefore there exist high competition between the countries to promote medical tourism. The one more key component in this medical tourism is the medical concierge services. These are medical travel companies that provide service to the traveller and they act as a link between tourist and the destination (Lagiewski, 2007).They have a vital role in the tourist experience from planning, stay, and post stages of the trip. The medical travel guide meets the tourist at the airport and he is the local agent who works as interpreter, guide and assists the tourist to stay in communication with his loved ones in his home. (Smith and Forgione, 2007). According to Connell (2006) the ability to the countries to ensure the medical tourist that healthcare is of safe quality is a vital factor and this will be the main barrier for a destination to promote itself as most favourite destination In order to combat this concern, international accrediting agencies are in the process of certifying the quality and safety of global healthcare delivery. The tourist decides to engage in medical tourism on the basis of five a factor identified by Lagieweskii.Her study identifies the first and foremost as the alternative healthcare facility to their countrys facility which should be of high standard and at affordable cost. This factor is the main factor and when the tourist is satisfied with first factor the next will be cost of treatment and travel of great importance. The tourist may seek other country because of the e big waiting list in their home country. There may be some reasons like remote destination for tourist for certain cosmetic proced ures. The nature of the country is also an important factor because tourist seeks a country free from risk factors associated with safety, security and actability. ( Lagiewski,2007). The country trying to make itself as most preferred destination for medical tourism it should emphasize on the fact that its overall appeal and the experiences offered to the other competing destinations. (Dwyer and Kim 2003).Dwyer and Kim insists that the destination should have the competitive advantage to become successful in the medical tourism industry. According to Dwyer and Kim the existence of two type of resource group may lead to achieve competitive advantage. They are the endowed resources and created resources. Endowed resources are natural heritage and cultural attributes to a specific destination and created resources are services associated with the tourist such as accommodation, food and beverage establishments, and manmade attraction. There can be created resources such as special events entertainment and shopping which adds extra value to he destination. There can be supporting factors such as general infrastructure; quality of service; accessibility of the destinat ion; hospitality of the host population; and market ties. Growth has been facilitated by the rise of the Internet, and the emergence of new companies, that are not health specialists, but brokers between international patients and hospital networks. It has also grown because of rapidly improving health care systems in some key countries, where new technologies have been adopted. Above all it has followed the deliberate marketing of health care (in association with tourism) as medical care has gradually moved away from the public sector to the private sector, ensuring that a growing majority of people, especially in the richest countries, and particularly in the United States, must pay-often considerably-for health care Finally, the factors like growth in medical tourism is done by the changing life style where people are ready to undergo cosmetic surgery, involving such elective procedures as rhinoplasty, liposuction, breast enhancement or reduction, LASIK eye surgery and so on, or more simply the removal of tattoos, have created new demands. Various forms of dental surgery, especially cosmetic dental surgery, are not covered by insurance in countries like the UK and Australia; hence dental tourism has become particularly common. In Asia these trends are the unlikely child of new global realities: the fallout of terrorism, the Asian economic downturn, internet access to price information, and the globalisation of health services (Levett, 2005) India and medical tourism India is a country of rich culture and heritage and one of the most favorite destinations for tourism. It is one of the existing oldest civilizations in the world for a period of more than 4000 years and it has fusion of traditions, customs and diversity. (myindia).The survey conducted by lonely planet about the worlds favourite tourist destination among 134 countries ranks India as one among the worlds top 5 tourist destination.(lonelyplanet) There are similar surveys and rankings for India as National Geographic describes India as Land of mystery and majesty. The company i explore also ranks India as one of the tp 5 destinations in world. The Forbes traveller states India as one the fast growing travel markets. (ICRImedical tourism) A number of destinations within India developed as havens for rest and recuperation such as hill stations at Darjeeling and the lakes in Kashmir where during the colonial era members of British era would retreat for cool breeze and a change of scenery. Late during the 19th century people began travelling India in search of alternative life style often focusing on yoga or meditation and following the footsteps of celebrities. India is building on these traditions as a wellness destination by a developing expertise in medical tourism (Garcia Altes 2005: conell 2006a). The main marketing segments for medical tourism in India are patients from USA and European and middle east nations, while growing niche is formed by Indian expatriates ,particularly those live in USA and the UK.(Conell 2006), who combine medical treatment with visits to family and friends. Medical tourism as a niche has emerged from the rapid growth of what has become an industry, where people travel often long distances to overseas countries to obtain medical, dental and surgical care while simultaneously being holidaymakers, in a more conventional sense. It has grown dramatically in recent years primarily because of the high costs of treatment in rich world countries, long waiting lists (for what is not always seen institutionally as priority surgery), the relative affordability of international air travel and favorable economic exchange rates, and the ageing of the often affluent post-war baby-boom generation. Growth has been facilitated by the rise of the Internet, and the emergence of new companies, that are not health specialists, but brokers between international patients and hospital networks. It has also grown because of rapidly improving health care systems in some key countries, where new technologies have been adopted. Above all it has followed the delibera te marketing of health care (in association with tourism) as medical care has gradually moved away from the public sector to the private sector, ensuring that a growing majority of people, especially in the richest countries, and particularly in the United States, must pay-often considerably-for health care Medical tourism is an important part of the Indian tourism industry and holds immense growth potential. The medical tourism sector had experienced a phenomenal growth in the flow of medical tourists from10,000 patients in 2000 to stupendous 180,000 by 2005. (Source: RNCOS report on Indian Tourism Industry Forecast (2007-2011) The Indian government takes meticulous steps in promoting medical tourism and it tries to increase the growth of foreign medical tourist by providing medical visas called M visas. These M visas are valid for one year and it is issued for the accompanies and Indian ministry of tourism has stocked its 13 overseas offices with information regarding these visas.( Meleigy) In 2002,2.2 million foreigners visited India :those numbers increased by 20 percent the following year(Mathew 2004).The tourist literature produced by the Indian government portrays India as a country rooted in tradition and also sufficiently modern to offer western style amenities (Bandyoupdhay and Morais 2005) A study by McKinsey and Confederation of Indian Industry says that at its current pace of growth, healthcare tourism alone can rake over 8,000 crore additional revenue by 2012.(cii mckinsey study) There are several states in India and the private hospitals in India target for the medical tourist other than the home patients. The southern state of Kerala which is very rich in culture and heritage and ancient medical practice like Ayurvediac ,Siddha and Yoga leads in attracting the foreign tourist for medical health and leisure tourism. Kerala Kerala is a bizarre anomaly among developing nations, a place that offers real hope for the future of the Third World. Consider: This small state in India, though not much larger than Maryland, has a population as big as Californias and a per capita annual income of less than $300. But its infant mortality rate is low, its literacy rate among the highest on Earth, and its birthrate below Americas and falling faster. Keralas citizens live nearly as long as Americans or Europeans. Though mostly a land of paddy-covered plains, statistically Kerala stands out as the Mount Everest of social development; theres truly no place like it. The National Geographic Traveler, which once made Kerala the cynosure of all eyes in the world travel circuit by describing it as one of the 50 paradises in the world. (National Geographic) Kerala is one of the most visited tourists destination of India. It is globally famous for its enchanting tourists attractions that are off beat than any other tourists places in the world. Every year hundred and thousands of tourists from all over the world come to Kerala to enjoy holidays in splendor. The state is endowed with palm fringed beaches, verdant hill stations, captivating beaches, emerald paddy fields, historical churches and more of all picturesque backwaters. This makes the marketing medical tourism easier in Kerala. Accreditation of health centers The quality of the medical care is the first and foremost factor considered by the medical tourist. According to the medical tourism association the accreditation is the means of way to attain safety and overall positive results to the patients who travel from one country to another for treatment purposes. The medical tourist can look into the accreditation to ensure the safety of the treatment in the hospital. The accreditation program is very essential to help patients, employers and insurance companies who can look into the accreditation status and thereby can find the hospitals with highest quality of care during their entire patient experience. The medical tourism industry grows day by day and therefore there is a necessity to ensure that hospitals, clinic and rehabilitation centers entering medical tourism posses proper infrastructure to meet the medical tourist. There is a need to certify that the center has proper communication facilities, transparency in quality and pricing, informed consent, proper medical care and further follow up facilities. The accreditation is focused on the fact that international patients have special needs and requirements than domestic patients. The accreditation is usually given by bodies which may by government or non government with the panel of expert members to examine and find whether the organization meets the requirements.(medical tourism association) The accreditation to the allopathic medical practice in Trivandrum is provided by the international accreditation bodies such as Joint Commission International (JCI), ISO 9001 2000 etc. Other than the international bodies Trivandrum city has hospitals certified by NABH, a board set up by government of India. (See appendix).These are the major accreditations of medical service in India. The ayurvedic practice is the unique specialty and most popular medical practice in India and they have accreditation done by Body set up by Government of Kerala as Green leaf and Olive leaf and green leaf is the highest degree of accreditation and its followed by olive leaf and these accreditation ensures the quality of ayurvedic treatment in Kerala. (expresshealthcare) Ayurvedic tourism in Kerala Kerala is usually marketed as a health destination for its ayurveda packages. Medical tourism is marketed along with ayurveda and other health packages. Kerala ayurveda tourism has becoming a huge selling point for Kerala tourism industry. State promotes Kerala ayurveda tourism as a part of medical tourism to the world. Today popularity of Kerala ayurvedic treatment has gained such a momentum that tourist from across the world come to Kerala to rejuvenate and for therapeutic treatment. Ayurvedic medical practice is the most ancient medical system originated in India before 10,000 years ago and in India the ayurvedic practice is more popular in kerala where it is practiced in traditional way. As per ayurveda specialists, the rainy season (June August) is the best time for ayurvedic treatments as the atmosphere remains dust free and cool, which helps open the pores of the body to the maximum.(Messerli and Oyama 2004) Ayurveda believes in the treatment of not just the affected part, but the individual as a whole. Kerala ayurvedic treatments and rejuvenation therapies are natural way to refresh and eliminate all toxic imbalances from the body and to regain resistance and good health. Most of the ayurvedictherapies help to strengthening the immune system, preventing and curing diseases without any side effects. There are number of resorts and hospitals throughout state which are integral parts of Kerala ayurveda tourism and offering customized ayurveda holiday packages which help you to rejuvenate the body and soul and to start a fresh life. Kerala ayurveda provides number of treatments ranging from de-stressing, anti-ageing, weight loss, joint pains and general rejuvenation. Elements of medical tourism in Trivandrm Review of similar studies.

Saturday, January 18, 2020

Electronic mail will out perform the regular Postal Service Essay

New technologies have always allowed us to do things faster, more efficiently and more professionally than ever before. Generally, every new technology is a step forward for speed and productivity. The speed, usage, reliability, and expense make electronic mail more desirable than our general postal system. The speed of transfer is an important part of the decision to send mail by either E-Mail or Postal System. E-mail has a distinct advantage in this category. With the click of a button, ones message is sent. Whether you are sending an e-mail to a person across the street or to Afghanistan, the transfer rate is virtually the same. The Postal Delivery System takes from two days to two weeks to deliver even the smallest package. Depending on the locations of the sender and the receiver, even sending a letter to the house across the street takes unnecessary time. Another variable aspect of the two mail systems is ease-of-use. E-Mail has advantages when viewed from this angle. For one thing, E-Mail has no limitations on pick up or delivery. Anyone who wishes to use E-Mail may do so on his or her own leisure. When receiving letters from the Post Office waiting is a major inconvenience, taking time out of the person’s day. In addition, writing a letter by hand often allows room for error. The E-Mail user also has to pay a monthly fee for an internet account, generally ranging from eight dollars to twenty-five dollars per month, and the user may send unlimited E-mails. Local Post Offices charge for envelops and packaging material. The cost of a stamp is thirty-seven cents for each letter. This cost adds up when mailing three to four letters a day. Reliability of E-Mail far outweighs the Postal System. Because a computer network runs e-mail, human error is unlikely. Consequently, E-Mail is usually transferred to the correct address; it is never lost, stolen, and its contents are never removed or damaged. On the other hand, the Postal System has more problems. Since humans deliver the envelopes, error is very  common. Letters are often delivered to the wrong address creating delay for the intended recipitant. In addition, dishonest postal workers have stolen checks and other items out of packages. When choosing how to mail letters, think about the most used system in the world of today. E-Mail is a system that rarely looses or damages letters, and offers fair and low rates. Even though the Postal System offers low rates, the speed and safety of delivery is sacrificed due to unqualified and dishonest employees. E-Mail is instant, cheaper, and most reliable way to send letters.

Friday, January 10, 2020

Importance of Greek Burial

The Importance of Burial in Greek Religion For the most part, the Greeks did not believe in a different afterlife for the good or bad—i. e. , no heaven or hell. In their view, the afterlife was almost universally grim; the important detail for the dead was whether they were buried or unburied. Those who did not receive proper funeral rites were doomed to wander by the river Styx, the entrance to the Underworld, for eternity; their souls could never be at rest.Thus, denying burial to a corpse not only insulted the body, but also damned his soul for all time. The buried were granted access to Hades, the name of both the Underworld and its king (who was also known as Pluto). In order for the dead to gain this access, a complicated ritual had to be performed. There were few ‘professional' undertakers, so a man's funeral fell to his family, especially the women of the family.They prepared the body for cremation, oversaw the collection of the bones and ashes and burial of the urn, provided the tomb with liquid offerings (libations), and led the mourning, a loud and violent process in which women tore their cheeks with their fingernails, ripped out their hair, and poured dirt over the heads and clothing. Mourning the dead was one of the few things women were allowed to do in ancient Greece, especially Athens. Women of well-born families were expected to stay at home in specially designated women's quarters at all times except during certain religions festivals.Marriages were arranged by a girl's father or guardian. Women were not true citizens of the democracy and could not speak or vote in the assembly. They were not even allowed to speak in court, a basic right for Athenian men. Burying and mourning their dead relatives gave women an opportunity to do something important for their families. It brought women to the fore and gave them a role to play. When Creon forbids burial of Polynices, he denies Antigone the chance to do one of the few important thing s society allowed women to do. Thus, he is attacking her identity, and that is a large part of the reason she opposes his orders.