Tuesday, April 28, 2020

Religion The nineteenth century

Introduction The nineteenth century was a time of great revolution in the fields of agriculture, communication, transportation, technology, marketing and industry. It is in this period that the collapse of great empires like Portugal, Spain, Mughal, China, and the Holy Roman kingdom happened.Advertising We will write a custom research paper sample on Religion: The nineteenth century specifically for you for only $16.05 $11/page Learn More As a result, great empires like Germany, Britain, Japan and United States came into being. Great philosophers and religious leaders such as William Booth, who was the main founder of the Salvation Army, Karl Max, Ellen White, and John Stuart Mill, a great philosopher, among others, also arose in this century.1 This century marked the beginning of great evangelical revivals in various protestant churches. In this century, the modern scientific theory started having its way into the church, something that transformed the way Christians view their faith. Scientific theories like Darwinism encouraged Christian followers to become inquisitive and many of them started doubting the beliefs and values they previously held.2 Consequently, Christians deviated from the regular and traditional observance of religion and belief in biblical teachings to secularism and faith in personal gods.3 As soon as the radical effects of scientific secularism became prevalent in the Christian churches, several theologians and scholars like Friedrich Schleiermacher came up to defend Christianity.4 Unfortunately, their defense did little to protect Christianity from the criticism it faced, since it led to the emergence of liberal theology and Christianity. Liberal theology is on the other side of the same secularism coin, in view of the fact that it facilitated further criticism against the bible after its inception. Liberal theology is defined as a flexible method of understanding and knowing God. Although it uses the scrip ture, liberal theology still applies the same interpretations and principles used in exploring non-biblical ancient writings.5 This new philosophy has made it almost impossible for Christians to continue believing the bible is a divinely inspired script that is supposed to dictate their spiritual lives. Instead, they subject the bible to human reasoning and questioning, an action that greatly compromises its authority.Advertising Looking for research paper on religion theology? Let's see if we can help you! Get your first paper with 15% OFF Learn More This compromise is so grave such that the bible is taken to be an anthology that records the author’s own feelings and beliefs about God.6 Liberalism has led to the emergence of further criticisms against the bible, therefore creating more reliance on human experience rather than the bible. In an attempt to reject this influence, various radicals have decided to acquire their own religion. Christian fundamentalist s arose to oppose these critical approaches to the scripture during the nineteenth century.7 However, their opposition was a futile attempt as it did not prevent atheistic scientific theories from influencing Christians. These criticisms have led to the emergence of new knowledge concerning religion and science, a factor that has encouraged deism among Christians. It appears like every effort to defend God or the bible results into further attacks on Christianity. Although the intentions of earlier scholars and theologians like Friedrich Schleiermacher were to defend the scriptures, at some point they deviated from this objective. What Went Wrong? Deviation from Initial Intentions Modern scientific theories like Darwinism are responsible for secularism, the religion of humanity that does not acknowledge or give any credit to God or allow His worship.8 Secularism and humanism mainly focus on cultural achievements of humans and their possibility of getting fulfillment in this world. D arwin’s theories place the authority of the bible at stake since theories of evolution make the creation story in Genesis to appear erroneous. They make the bible look like a simple a collection of different literary genres such as poetry, parables and stories among others, which simply speak of human experiences. This has led to the development of new critical approaches to the bible, aimed at questioning the facts contained in it. In the nineteenth century, the liberal Christians emerged to defend the authority of the scripture and the reality and existence of God, but they erred when they deviated from conservative Christian beliefs to secularism.9 These liberals also compromise Christianity by subjecting the principles of the bible to human reasoning and wisdom instead of relying on faith.10 Darwinism theory promotes modernism, which motivates some Protestants to formulate a liberalistic approach to Christianity. Even though these scholars’ main aim is defending th e authority of the bible, they normally subject it to further criticism.Advertising We will write a custom research paper sample on Religion: The nineteenth century specifically for you for only $16.05 $11/page Learn More Paul, an apostle of Jesus Christ, says that Christianity probably appears as foolishness to the intelligent.11 He says that the bible is spiritually discerned and can appear as nonsense when subjected to the reasoning of human beings.12 Subjecting biblical concepts to criticisms that are based on the understanding of humans, is considered erroneous since their wisdom, knowledge, and intelligence is limited. How the efforts to defend God or scriptures resulted into the breakdown of an attack on Christian thought The efforts by the liberals to defend the scripture were necessary at that time when a lot of criticism was being directed towards its authority. However, instead of resolving the issue, this defense led to further criticisms ag ainst Christianity as outlined below: The movement focused more on retaining the spiritual and religious values of Christianity while at the same time denying the infallible authority of the scripture upon which these values are based. This attempt to exclude the bible from Christianity gave room for other teachings to define it. This provision compromised the basis upon which Christianity is built. Instead of looking at the bible in its complete perspective, including the divine and corporeal aspects, this movement was attached to the physical aspects of the word of God. The bible defines itself as a scripture that is spiritual and divine.13 After doing away with the divine aspect of the bible, they made it appear like any other literal work or book of fiction that advocates for secularism. This movement was aimed at denying the scripture its rightful authority. Denying the word of God amounts to denying God’s authority and power and this is manifested in acts such as quest ioning His existence. The existence of God and the authority of the scripture are the essence of Christianity and are the pillars upon which this faith is based. The removal of these facts makes Christianity no different from atheism. These efforts were aimed at reconciling Darwinism and Christianity. Scientific reasoning diluted Christianity and its influence, and altered its teachings, values and beliefs. This movement denounced the existence of miracles and divine healings and people started preferring naturalistic explanations. Miracles started being dismissed as legends or myths that did not exist and by this they denounced the existent of the spiritual world. The bible declares that God is a spiritual being that is invisible.14 The fact that a person has never experienced a miracle or seen God does not nullify His existence. Denying His existence only leads to further attacks on Christianity. This movement is more of a Darwinism interest group as it lays emphasis on the value and importance of the individual rather than that of God. It aims at improving the life of human beings rather than strengthening their relationship with their creator, which is the major aim of Christianity. This movement has made the belief in God to be based on individual experiences, since its followers misconstrue the bible to be a collection of the author’s own personal experiences with Him. This belief held by liberalists has completely changed Christianity in terms of the way it is perceived and interpreted. In conclusion, the attempt by the nineteenth century theologians and scholars to defend the bible against the influence of Darwinism only encouraged more criticism against Christianity. This attempt was a way to accommodate the humanism beliefs portrayed by Darwin, which eventually led to the emergence of a new religion called liberal Christianity. Liberal Christianity is responsible for the persistent criticisms against the bible and has since its inception only led to further disagreements among Christians. Bibliography Ayers, Philip E. What Ever Happened to Respect? Bloomington: Author House, 2006. Barnes, Michael H. Understanding Religion and Science: Introducing the Debate. London: Continuum International Publishing, 2010. Webster, John B., and George P. Schner. Theology after Liberalism: A Reader. Oxford: Blackwell Publishers, 2000.Advertising Looking for research paper on religion theology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Footnotes 1 Michael H. Barnes, Understanding Religion and Science: Introducing the Debate (London: Continuum International Publishing, 2010), 2. 2 Ibid., 2. 3 Ibid., 2. 4 Ibid., 27 5 John B. Webster and George P. Schner, Theology after Liberalism: A Reader (Oxford: Blackwell Publishers, 2000), 346. 6 Michael H. Barnes, Understanding Religion and Science: Introducing the Debate (London: Continuum International Publishing, 2010), 104. 7 John B. Webster and George P. Schner, Theology after Liberalism: A Reader (Oxford: Blackwell Publishers, 2000), 24. 8 Philip E. Ayers, What Ever Happened to Respect? (Bloomington: Author House, 2006), 94. 9 John B. Webster and George P. Schner, Theology after Liberalism: A Reader (Oxford: Blackwell Publishers, 2000), 104. 10 1 Cor. 2:5 11 Ibid., 1: 21 12 Ibid., 1: 18 13 2 Tim 3:16 14 John. 4:24 This research paper on Religion: The nineteenth century was written and submitted by user RoxanneSimpson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, April 14, 2020

Why a Good Sample of Transfer Essay Should Include Focus on Resolve

Why a Good Sample of Transfer Essay Should Include Focus on ResolveA good sample of transfer essay should include a variety of skills and qualities. In order to get the most out of your time, I want to show you how. The most important part of this article is the first paragraph.A good sample of transfer essay will need to highlight the fact that the writing skills you possess have something to do with your course of study. It will also need to show how your abilities are influenced by your class schedule. I will explain these points and what you should be focusing on in the following paragraphs.When it comes to what I like to call 'The Four Pillars' of life, these include commitment, persistence, self-discipline and responsibility. These four qualities can be used as the basis for an amazing resume. By learning to apply them you will develop into someone who has to be handled very carefully. This is exactly why so many students are so enthusiastic about their courses.There are many p eople who find themselves dealing with the pressures of college life every day. They work hard to get an education because they are not confident that they can achieve all that they are hoping to achieve. While many students learn through hardship, others learn to be resilient by attending the classes that they are needed for.The obvious problem that is presented by the four-pillared nature of life is that there is no 'p' at the end of the word 'education'. To avoid the stress and problems that come from academic overload, it is very important to choose the classes that you attend that will be the most beneficial to you. We already know that English is the most popular major in college and this is because it is a more basic major and will usually offer a more flexible schedule.A good sample of transfer essay will take advantage of the strengths of a basic major in the hopes of pushing forward. For example, people who go into health-related courses are going to have the best opportun ities when it comes to landing jobs that require college-level writing. Taking a writing class in the health field will help you become more able to handle difficult situations. This is why you should look at these types of transfer programs and realize that there is a great deal of flexibility in each of these topics.A strong foundation in a common major is a huge benefit to any student, whether it is one's career path or future educational potential. People who work in medical fields are going to have a much better chance at landing a job in this area if they understand the responsibilities of researching and testing. Since so many people are still unsure of their future, it is important to make sure that you get the best use out of the time you are currently spending.A good sample of transfer essay is a concise yet thorough summary of why you are happy with your choice of school. This is why you should consider getting the best student aid available to you. You will be doing your self a big favor by creating the most reliable guide possible for your degree.

Friday, March 20, 2020

Icici marketing stategy Essays

Icici marketing stategy Essays Icici marketing stategy Essay Icici marketing stategy Essay It pays special attention to customers needs and has a separate department named Product development department, which studies the market on a continuous basis and then analyze the competitive landscape. It constantly practices product innovation, for example, in order to meet the needs and wants of deferent customers, they have variants in many basic products like saving bank account. Further, it also indulges in product augmentation I. E. Defining the bank product with some extra benefits and features. They have adopted modernized by basing all its operations on technology. Some of the breakthrough Annihilates taken by ICC bank are: l) xx electronic branch which are one stop shop for all banking transactions and reaming operative 24 hours a day. II) Tab banking that allows customer to access their bank account at their own convenience through their tablets. Iii) Mediation Mobile App for Gnarls that allows then to track tier money transfer to India anytime, anywhere. Iv) My savings reward aerogram which allows customer to accumulate points on their ICC payback card and then redeem those points for exciting gifts from Icicles partners. ICC have followed various pricing strategies in order to attract customers and gain a major share of market. It has followed penetrative market strategy, gaining profit through volume, being the price leader in the retail banking sector. The distribution system of ICC is one of the best in the industry. Rather than waiting for the customer to come to them, they believe In reaching out to the customer. For this season, they have Introduced the concept of Direct Selling Agents (Adds) and Direct selling Teams (Dots). Apart from the sales agents, It also tries to reach out to Its customers through mobile, Tams and various online platforms on internet. The promotion strategy of ICC has been divided into two parts: I) Corporate branding focusing on the organization as a whole I) Product branding focusing on specific products of the organization The promotion of the bank is generally done through print media. Various other promotional tools Like billboards, signboards, kiosks at existential and commercial complexes, promotional material at the channel partners outlet.

Wednesday, March 4, 2020

Career Advice I Wish Someone Had Given Me

Career Advice I Wish Someone Had Given Me I’m not exactly ready for my â€Å"lifetime achievement† career highlight reel yet (after all, I’m only [age redacted] years old). However, there’s not much point in making you wait for my retirement party to share some professional truths I’ve learned along the way- things I wish I’d figured out earlier. These pointers might have saved me some stress and aggravation along the way. Even when things are bad, try to relax a little.Years ago, a friend and colleague astutely pointed out that even when people were freaking out about deadlines and deliverables and general chaos at our educational publishing company, â€Å"no one dies here.† There are plenty of life-and-death industries, but unless you’re an actual surgeon or air traffic controller, consequences are not deadly. Everyone lives to work and fuss another day.The bottom line: Workplace issues are typically not worth waking up at 3 a.m. with a raging panic attack.There is al ways a solution.If you forgot to do a crucial task, or missed a deadline, or are otherwise stumped†¦there is a fix available. It may not be a pretty one, and could involve either extra work or a large slice of humble pie with blame ice cream on top- but there is always a way out.One of the most valuable workplace skills I’ve developed, by far, is the ability to stop, tune out the panic or anger, and plot out different ways to resolve an issue. Creative problem-solving isn’t necessarily something you have in your arsenal already†¦but you can develop it with time and practice. It can be as simple as jotting down a quick outline of the problem, then brainstorming ideas about what can be done. Not all of these ideas are necessarily winners or feasible, but the process can get the lateral thinking juices flowing even when you feel stuck.The bottom line: Don’t hide or walk away because something seems insurmountable.Ask for help.This is one I struggle with a ll the time. And this is not a new thing- if you ask my parents, they’d tell you that my middle name should probably have been changed to â€Å"I Can Do It Myself† by the time I was six years old. It can be really hard to admit that you can’t handle all things at all times, or that you don’t understand the next steps. This is especially true in the workplace, when you feel the need to be The Indispensable Employee, the superstar.The bottom line: Asking for help prioritizing, or for extra hands on a project, is not an admission of defeat. It means you know your human limitations well enough to let others in when necessary.No individual is  indispensable  in the workplaceThis was a really hard one to learn. At one company, I watched as waves of people were let go over a period of two years, with little rhyme or reason. I survived round after round, and it created a false sense of security. I had great employee reviews, and a string of promotions! I was well-liked! I was me, darnit! Then it was my turn to be laid off, and it was devastating. Sometimes circumstances beyond your control (economics, social dynamics, a dartboard in HR) will play out, no matter who you are. You are unique, but roles can always be changed or filled as necessary.The bottom line: There’s no magic way to guarantee job security forever. All you can do is work hard and make yourself as valuable as possible. If that fails you and you find yourself out the door, be ready to take up new paths and opportunities.Don’t let impostor syndrome pull you down.If you’re not familiar with â€Å"impostor syndrome,† it’s the feeling that you’re secretly lousy at your job. The name is a new-ish and trendy one, but the feeling probably goes back to the first wheel-making company started by our cave people ancestors. It’s a basic human insecurity that you’re just barely scraping by while everyone around you is dazzlingly competent and talented. Yet if you look carefully at your most recent job (and any previous one you’ve held), you got it and kept it because others saw quality in you. Flukes happen. They don’t happen repeatedly, and they certainly don’t amount to a career. You can be good at your job while still having imperfections and leaving room for improvement.The bottom line: If you’re worrying that your job performance is a fluke, you’re probably fine. Someone who actually wasn’t good at his job probably wouldn’t care very much.And last but not least, wear sunscreen. (Okay, so that’s not my advice per se, but it still works.) Seriously, I hope you take this advice in the spirit in which it’s given- by someone who knows all of these things, and still struggles to master them anyway. Overall, I think they make me a stronger and more adaptive employee with much to learn, and I hope you find the same.

Sunday, February 16, 2020

How do our checks and balances work Essay Example | Topics and Well Written Essays - 750 words

How do our checks and balances work - Essay Example The branches are considerably equal in power and their jurisdictions are mutually independent to eliminate probability of conflict of interest in implementing the checks and balances. The legislative arm of the government that consist of two houses, the Senate and the House of Representatives, makes laws that govern operations of other government arms as well as citizens. Administrative law, as developed by the legislature, for example, determines organization of the executive in implementation of its governing roles. The legislature also has the sole role of developing bills that regulate government policies, such as tax policies, and this checks on the executive arm’s authority to develop and implement rules policies that relates to taxation. The legislature therefore regulates tax rates that may be imposed by the executive on citizens and corporate parties. The legislature also ensures checks on the executive through its powers to impeach an officer in the executive arm of the government for improper conduct. Such impeachment powers are also dispersed within the legislature to ensure balance and checks in their implementation. The House of Representative, for example, serves the role of impeaching officers in the executive arm of the government while the congress presides over impeachment cases. The same impeachment role applies over judicial officers and it ensures that the judiciary and the executive are run in accordance with the law and any other constitutionally established standard (Adamson and Morrison 31). Our checks and balances also work through the roles and powers of the judiciary over constitutionality of laws and actions. The power to determine constitutionality of laws offers checks over the legislature by ensuring that enacted laws or amendments are consistent with the constitution. In its roles and powers, the judiciary that is headed by the Supreme Court can declare legislation unconstitutional through its mandate of interpreting the constitution and such a pronouncement renders the subject legislation null and void. The role therefore checks on the legislatures powers to make laws and discourages legislations that are beyond the powers and scope of the houses under the doctrine of ultra vires. The judiciary also offers checks over the executive through its veto powers over decisions made by the executives and its officers. This is also based on its interpretative role that determines constitutionality of controversial decisions by the executive branch. This allows the courts to rescind a decision by a representative of the executive arm (Adamson and Morrison 32). Similarly, our checks and balances work through the powers of the executive arm of the government over both the judiciary and the legislature. The power of the precedent, the head of the executive arm, to approve of all laws that the legislature passes offers check by ensuring that the laws are valid. The powers also ensure that the legislatureâ€℠¢s interest is not passed into law by subjecting the passed laws to an independent party to the law making process. The Congress however has powers to reverse a decision by the executive not to approve legislation and this identifies the role of the three arms of government in ensuring valid laws. The legislature makes the law, the executive approves the laws, and the judiciary interprets them for implementation, besides validating controversial ones, by the

Sunday, February 2, 2020

Contingency Theory Research Paper Example | Topics and Well Written Essays - 1250 words

Contingency Theory - Research Paper Example Science is a process of inquiry and is an organized body of knowledge, and so contingency theory is a science because it involves the two. Accordingly, contingency theory can as well be categorized technology, and technology refers to activities developed by individuals to satisfy their needs. Contingency theory is a body of knowledge and knowledge acquired can be applied in various organizations to change to a more efficient processes. Literally, humans develop organizations and so the application of contingency theory helps to satisfy their needs (Betts, 2011). This article clearly explains how the operation and performance of an organization and the environment in which it operates relates. More so, it provides a clear elaboration of contingency theory as a science and technology. However, some of the weaknesses that have been identified in this article is that the causation that is assumed has not been explained in a more convincing manner. According to contingency theorists, the re is an association between the environmental conditions and organizational design and this was assumed the best fit. However, this assumption has not been well elaborated and it does not put into consideration other factors that related to organization’s performance (Betts, 2011). ... nce of that particular organization, for instance, organization’s performance is associated with the internal operational effectiveness and support from external forces. More so, the strategy of Information Technology (IT) in an organization is supposed to be aligned with its business strategy since the performance of a business is promoted by effective alignment between the organization’s competitive strategy and technologies that it uses (Croteau and Raymond, 2004). Arguably, the study of competencies alignment and organization’s performance is conducted based on the contingency theory. This article thoughtfully describes IT competencies alignment and organizational performance. It proposes that contingency theory covers other issues such as the organization’s competencies and strategic orientation and explains how they affect the performance of business (Croteau and Raymond, 2004). On the other hand, this article does not provide useful and convincing e xplanation of the underlying assumptions, for instance, one of the major assumption of contingency theory is that the better the fit among various contingency variables the better performance of the organization. Furthermore, this theory claims that there is a fit between strategic variables and use of IT and this positively affects the performance of information system (Croteau and Raymond, 2004). Tackling Design Anew: Getting Back to the Heart of Organizational Theory This article mainly focuses on the importance of organization design, and according to contingency theory, every relevant axis of an organization needs to be present in the organization design (Greenwood and Miller, 2010). Moreover, contingency theory suggests that the size of an organization and its geographical cover leads to the

Saturday, January 25, 2020

The Role Of Internet And Web Service

The Role Of Internet And Web Service The roll of internet The internet is a universal technology platform that allows any computer to communicate with any other computer in the world. Furthermore, one of the advantages of the internet is that nobody really owns it. It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as the internet. 2) The internet has revolutionized communication and thereby its contribution to information sharing. With access to a computer and an appropriate connection, anyone can interact with others worldwide; however the web is designed to exchange unstructured information: while people can read web pages and understand their meaning, computers cannot. 3) If corporations want to conduct business over the web, humans have to be involved unless there is a way for computers to communicate on their own. Web services:- Web services play a complementary and dominant role in building global IS for todays dynamic business world. Web services are self-contained, modular applications that can be described, published, located and invoked over a network. Web services perform functions ranging from simple requests to complicated business processes. Once a web service is developed, other applications and other web services can discover and invoke the deployed service through universal description, discovery and integration. The idea of web service is to leverage the advantages of the web as a platform to apply it to the application services. We use them, not just to the static information. Services refer to components and the services offered that can be used to build larger application services. Benefits of web services for developing IS of global natures are as follows: Web services tools are available for most computer systems, including mainframes and packaged applications. This means that not only the existing applications can be retained, but also the existing knowledge of staff can be applied and extended using web services for business integration. Web services are adaptable and can handle changes ore readily than other integration solutions, because they use structured text as their message format. IT managers now have the ability to exchange data between most applications, on most computers in a consistent and standard way tools and further standards are therefore emerging to build composite applications that can model and manage business processes around these business-level components. If necessary, an alternative application can be used to provide web services without changing the overall effect of the system. Q:-2.How do distributed information systems help the global enterprises? Ans) Distributed information systems help the global enterprises as follows:- Success in the digital economy led by the rise of e-business. Business completion and pressures are on the rise like never before. Business now has no geographical boundaries. With the rise of mobile commerce fuelled by mobile technologies. We are now witnessing the era of anywhere anytime computing. Naturally, information that has been one of the vital corporate resources assumes a higher dimension when it comes to data and information security. There is an important point to be noted-while the industrial age witnessed great developments in terms of engineering, a significant dimension. Producers and consumers of goods all remained disparate and unconnected. They operated is islands of geographical pockets without knowing how the others were transacting their business. Q:-3 briefly describe about the information level threats versus Network level threats? Ans) information level threats versus network level threats:- Information level threats Network level threats Information level threats are threats that involve the dissemination of information in such a way that organizations, their operations and their operations and their reputations may be affected. 1. Network level threats face any application that is connected to an IP network such as the Internet or includes campus and corporate networks. Servers and clients for Email and web applications have faced these threats for ten years or more, and the range of threats and the technologies used to exploit them is well understood. Information level threats also make heavy use of network but at the primary level is the content of a message and not its form. Sending take inquires to service accounts to eat up resources would qualify as an information based attack as it is the content of the messages that would provide a basis for the attack. The example of information based accusation. Such attacks can cause considerable damage to the goodwill of the organization against which they may be launched, and customer loyalty is too good to lose. 2. network based threats are hacking of computer systems and launching of DOS attacks as well as spreading malicious code such as viruses. Other security issues involved when data are transmitted over networks are confidentiality, authentication, integrity and non-repudiation. A DOS attack that is based on flooding accounts with large quantities of e-mail is a network-based attack as it is the size and the quantity of the e-mail that matters and not the content of the e-mail. Part B Q:-4 how the security challenges presented by mobile devices and information systems access in wireless computing environments? Ans) Mobile computing with real world significance has been expanding since the introduction of laptop computers into everyday use. During the last few years new classes of smaller wireless portable devices have come to the market place. The possible and probable shift from wire-line terminals to relatively cheap, wireless, small, portable devices in huge numbers poses as such new challenges to the security in the network infrastructure. This holds not only for the air-interface, but also for the wire-line backbone network. It is foreseeable that, e.g. roaming between different types of networks becomes necessary and possible. Evidently, secure roaming between the networks is an issue, because otherwise a hostile terminal could take-over a session during hand-over from a network to another. 2) The scope of the security issues related with the terminals will be enhanced as compared to the current voice terminals on one hand and the fixed terminals on the other hand. This is because the internet-enabled terminals will be used as PTDs. to conduct diverse mobile electronic commerce transactions and possibly also transactions towards the authorities. They are also natural part of information systems of corporations. Thus, such a terminal becomes a much more attractive object for ordinary thieve s or fir other people wanting to misuse the cyber-identity of the owner, than the current voice terminals. The information stored into such a device or the access to the corporate networks through stolen device may also be interesting for criminal elements, enemies, or for hard commercial competitors. 3) Location -based services are emerging as a brand-new service typical of the globally roaming PTDs. The possibility to track the persons location at any time is evidently a threat to privacy. The location-based services also entail many security aspects; for instance, if a burglar could track a persons position unnoticed, he/she would know when the owner is far enough so that the home could be robbed. And vice verso, if a person can show her trace on earth she can argue against claims raised against her in criminal cases. Q:-5 what is the role of Information Security Scenario in the financial sector? Ans) Parma Systems, Inc.  allows financial organizations to protect their data communications against both internal and external security risks. The last twelve to fifteen years have seen a fundamental transformation occur in the financial services sector mergers and acquisitions, regulatory changes, the globalized economy, new requirements for anytime, anywhere access and the changing role of the technology have reshaped the industry and significantly altered the way financial organizations must manage their businesses. In response to these challenges, financial services organizations have implemented a number of new corporate strategies, remote management and access capabilities, and extended networking infrastructure. However, the infrastructure that supports these new processes is often managed by a myriad of legacy and inherently complex set of networking and security systems. This creates significant complexities with regards to network connectivity and security management.   Additional information security challenges arise from a series of legislative and regulatory initiatives including the Sarbanes-Oxley Act (SOX), Graham-Leach-Bliley Financial Services Modernization Act (GLBA), and the European Data Privacy Directive (EDPP). These laws require enhanced security and privacy, and raise the legal and financial stakes for enterprises that fail to meet their standards. More legislation that further controls the protection of privacy data is also on the way. Parma Systems, Inc.  technologies are designed to help your organization to effectively manage security risks, and comply with external and internal security policies. The Parma product suite allows for your organization to customize and develop a robust, secure, and scalable product that can address the most stringent secure connectivity requirements now and in the future. Q:-6 explain the significance of authentication security service? Ans) There are two components of security in mobile computing: security of devices and security in networks. A secure network access involves the mutual authentication between the device and the base stations or web servers. This is to ensure that only authenticated devices can be connected to the network for obtaining the requested services. No malicious node can impersonate the service provider to trick the device into doing something it does not mean to. Thus, the networks also play a crucial role in the security of mobile devices. Some eminent kinds of attacks to which mobile devices are subjected to be push attacks, pull attacks and crash attacks. Authentications services security is important given the typical attacks on mobile devices though wireless networks: denial of services attacks, traffic analysis, eavesdropping, man-in-the-middle attacks and session hijacking. Cryptographic security for mobile devices:- Cryptographically generated addresses. CGA are internet protocol version 6 addresses where up to 64 address bits are generated by hashing the address owners public key. The address owner uses the corresponding private key to assert address ownership and to sign messages sent form the address without a public-key infrastructure of other security infrastructure. For exp, the cryptographic provider manager in palm OS5 is a system-wider suite of cryptographic services for securing data and resources on a palm-powered device. The CPM extends encryption services to any application written to take advantage of these capabilities, allowing the encryption of only selected data or of all data and resources on the device.