Tuesday, October 29, 2019

Technology Essay Example | Topics and Well Written Essays - 500 words - 8

Technology - Essay Example For a school setup, the preeminent suggested computer placement arrangement entails the use of laboratories. In this setup, the placement of the machines should be done in the two 30-station computer labs. This method is suitable in this particular setting since the student’s improvement in learning computers can be closely scrutinized. Moreover, the vulnerability of destruction of the machines will be significantly reduced. In addition, the computer teachers are able to monitor the computers in order to avoid cases connected to theft of computers and the peripheral devices. According to the lab station method, the computers are arranged in the room in an organized manner to prevent learners and other individuals from stumbling over the peripheral devices. In the arrangement of computers, in a lab, there are three main arrangement setups. They include computers arranged in clusters of four, horse shoe facing the walls and rows of computers facing the front board (Andrew, 2010). Experts prefer the use of the horse shoe organization method. This is because the lecturer is able to move around the lab pretty effortlessly in case any novice needs aid on something (Andrew, 2010). In the horseshoe setting, the wiring method will be from the mains circuit to the feeder wires that will transmit power to the computers in the lab. In terms of security, the school should install an alarm system for the two lab rooms, and also introduce strict rules that will protect the computers from damage by the learners. Also, the arrangement setup should also consider that the lab is well aerated to prevent the machines from overheating. This will improve the effectiveness and performance of the computers (Tison, 1991). On the one hand, the school board should pick apt and learned individuals who will be responsible for maintaining the computers and the computer labs. The selection made

Sunday, October 27, 2019

History Of The Virtual Private Network

History Of The Virtual Private Network A VPN supplies virtual network connectivity over a possibly long physical distance. The key feature of a VPN, however, is its ability to use public networks like the Internet rather than rely on private leased lines which consume valuable recourse and extra cost . VPN technologies implement restricted-access networks that utilize the same cabling and routers as a public network, and they do so without sacrificing features or basic security , a simple cooperation office and remote branched VPN shown in below diagram . Sonicwall_Vpn A VPN supports at least three different modes of use as shown above: Remote access client connections. LAN-to-LAN internetworking . Controlled access within an intranet . A several network protocols have become popular as a result of VPN developments state as following : PPTP L2TP IPsec These protocols emphasize authentication and encryption in VPNs. Authentication allows VPN clients and servers to correctly establish the identity of people on the network. Encryption allows potentially sensitive data to be hidden from the general public. Many vendors have developed VPN hardware and/or software products. Unfortunately, immature VPN standards mean that some of these products remain incompatible with each other till now. Virtual private networks have grown in popularity as businesses to save money on remote network access for employees. Many corporations have also adopted VPNs as a security solution for private Wi-Fi wireless networks. Expect a continued gradual expansion in use of VPN technology to continue in the coming years. Objectives:- A virtual private network can resolve many of the issues associated with todays private networks. Cost: The cost of such links is high especially when they involve international locations. Even when VPNs are implemented on a provider private network, it would still be less expensive. Mobility of workforce: Many companies are encouraging telecommunications to reduce their investment in real estate, reduce traffic, and reduce pollution from automobile E-commerce applications: However, in traditional private networks, this kind of special access provision is difficult to incorporate because it is not easy to install dedicated link to all suppliers and business partners, nor it is flexible because a change in the supplier would require de-installing the link and installing another one to the new vendor. Advantages of VPN VPNs promise two main advantages over competing approaches cost savings, and scalability (that is really just a different form of cost savings). The Low Cost of a VPN One way a VPN lowers costs is by eliminating the need for expensive long-distance leased lines. With VPNs, an organization needs only a relatively short dedicated connection to the service provider. This connection could be a local leased line (much less expensive than a long-distance one), or it could be a local broadband connection such as DSL service. Another way VPNs reduce costs is by lessening the need for long-distance telephone charges for remote access. Recall that to provide remote access service, VPN clients need only call into the nearest service providers access point. In some cases this may require a long distance call, but in many cases a local call will suffice. A third, more subtle way that VPNs may lower costs is through offloading of the support burden. With VPNs, the service provider rather than the organization must support dial-up access for example. Service providers can in theory charge much less for their support than it costs a company internally because the public providers cost is shared amongst potentially thousands of customers. Scalability and VPNs The cost to an organization of traditional leased lines may be reasonable at first but can increase exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations. If a third branch office needs to come online, just two additional lines will be required to directly connect that location to the other two. However, as an organization grows and more companies must be added to the network, the number of leased lines required increases dramatically. Four branch offices require six lines for full connectivity, five offices require ten lines, and so on. Mathematicans call this phenomenon a combinatorial explosion, and in a traditional WAN this explosion limits the flexibility for growth. VPNs that utilize the Internet avoid this problem by simply tapping into the geographically-distributed access already available. Disadvantages of VPNs With the hype that has surrounded VPNs historically, the potential pitfalls or weak spots in the VPN model can be easy to forget. These four concerns with VPN solutions are often raised. 1. VPNs require an in-depth understanding of public network security issues and proper deployment of precautions. 2. The availability and performance of an organizations wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. 3. VPN technologies from different vendors may not work well together due to immature standards. 4. VPNs need to accomodate protocols other than IP and existing internal network technology. Generally speaking, these four factors comprise the hidden costs of a VPN solution. Whereas VPN advocates tout cost savings as the primary advantage of this technology, detractors cite hidden costs as the primary disadvantage of VPNs INTERNET VPNS FOR REMOTE ACCESS In recent years, many organizations have increased the mobility of their workers by allowing more employees to telecommute. Employees also continue to travel and face a growing need to stay connected to their company networks. A VPN can be set up to support remote, protected access to the corporate home offices over the Internet. An Internet VPN solution uses a client/server design works as follows: 1. A remote host (client) wanting to log into the company network first connects to any public Internet Service Provider (ISP). 2. Next, the host initiates a VPN connection to the company VPN server. This connection is made via a VPN client installed on the remote host. 3. Once the connection has been established, the remote client can communicate with the internal company systems over the Internet just as if it were a local host. Before VPNs, remote workers accessed company networks over private leased lines or through dialup remote access servers. While VPN clients and servers careful require installation of hardware and software, an Internet VPN is a superior solution in many situations. VPNS FOR INTERNETWORKING Besides using virtual private networks for remote access, a VPN can also bridge two networks together. In this mode of operation, an entire remote network (rather than just a single remote client) can join to a different company network to form an extended intranet. This solution uses a VPN server to VPN server connection. Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be one of two types: Intranet-based If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment. vpn-type INTRANET / LOCAL NETWORK VPNS Internal networks may also utilize VPN technology to implement controlled access to individual subnets within a private network. In this mode of operation, VPN clients connect to a VPN server that acts as the network gateway. This type of VPN use does not involve an Internet Service Provider (ISP) or public network cabling. However, it allows the security benefits of VPN to be deployed inside an organization. This approach has become especially popular as a way for businesses to protect their WiFi local networks. TUNNELING: SITE-TO-SITE In a site-to-site VPN, GRE (generic routing encapsulation) is normally the encapsulating protocol that provides the framework for how to package the passenger protocol for transport over the carrier protocol, which is typically IP-based. This includes information on what type of packet you are encapsulating and information about the connection between the client and server. Instead of GRE, IPSec in tunnel mode is sometimes used as the encapsulating protocol. IPSec works well on both remote-access and site-to-site VPNs. IPSec must be supported at both tunnel interfaces to use. TUNNELING Most VPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network and both points, called tunnel interfaces, where the packet enters and exits the network. Tunneling requires three different protocols: Carrier protocol The protocol used by the network that the information is traveling over Encapsulating protocol The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data Passenger protocol The original data (IPX, NetBeui, IP) being carried Tunneling has amazing implications for VPNs. For example, you can place a packet that uses a protocol not supported on the Internet (such as NetBeui) inside an IP packet and send it safely over the Internet. Or you could put a packet that uses a private (non-routable) IP address inside a packet that uses a globally unique IP address to extend a private network over the Internet. COST SAVINGS WITH A VPN A VPN can save an organization money in several situations: Eliminating the need for expensive long-distance leased lines Reducing long-distance telephone charges Offloading support costs VPNS VS LEASED LINES Organizations historically needed to rent network capacity such as T1 lines to achieve full, secured connectivity between their office locations. With a VPN, you use public network infrastructure including the Internet to make these connections and tap into that virtual network through much cheaper local leased lines or even just broadband connections to a nearby Internet Service Provider (ISP). LONG DISTANCE PHONE CHARGES A VPN also can replace remote access servers and long-distance dialup network connections commonly used in the past by business travelers needing to access to their company intranet. For example, with an Internet VPN, clients need only connect to the nearest service providers access point that is usually local. SUPPORT COSTS With VPNs, the cost of maintaining servers tends to be less than other approaches because organizations can outsource the needed support from professional third-party service providers. These provides enjoy a much lower cost structure through economy of scale by servicing many business clients. VPN NETWORK SCALABILITY The cost to an organization of building a dedicated private network may be reasonable at first but increases exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations, but 4 branch offices require 6 lines to directly connect them to each other, 6 branch offices need 15 lines, and so on. Internet based VPNs avoid this scalability problem by simply tapping into the public lines and network capability readily available. Particularly for remote and international locations, an Internet VPN offers superior reach and quality of service. USING A VPN To use a VPN, each client must possess the appropriate networking software or hardware support on their local network and computers. When set up properly, VPN solutions are easy to use and sometimes can be made to work automatically as part of network sign on. VPN technology also works well with WiFi local area networking. Some organizations use VPNs to secure wireless connections to their local access points when working inside the office. These solutions provide strong protection without affecting performance excessively. VPN SECURITY: IPSEC Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication. vpn-diagram2 Photo courtesy Cisco Systems, Inc. A remote-access VPN utilizing IPSec IPSec has two encryption modes: tunnel and transport. Tunnel encrypts the header and the payload of each packet while transport only encrypts the payload. Only systems that are IPSec compliant can take advantage of this protocol. Also, all devices must use a common key and the firewalls of each network must have very similar security policies set up. IPSec can encrypt data between various devices, such as: Router to router Firewall to router PC to router PC to server LIMITATIONS OF A VPN Despite their popularity, VPNs are not perfect and limitations exist as is true for any technology. Organizations should consider issues like the below when deploying and using virtual private networks in their operations: VPNs require detailed understanding of network security issues and careful installation / configuration to ensure sufficient protection on a public network like the Internet. The reliability and performance of an Internet-based VPN is not under an organizations direct control. Instead, the solution relies on an ISP and their quality of service. Historically, VPN products and solutions from different vendors have not always been compatible due to issues with VPN technology standards. Attempting to mix and match equipment may cause technical problems, and using equipment from one provider may not give as great a cost savings. TYPES OF VPN TUNNELING VPN supports two types of tunneling voluntary and compulsory. Both types of tunneling are commonly used. In voluntary tunneling, the VPN client manages connection setup. The client first makes a connection to the carrier network provider (an ISP in the case of Internet VPNs). Then, the VPN client application creates the tunnel to a VPN server over this live connection. In compulsory tunneling, the carrier network provider manages VPN connection setup. When the client first makes an ordinary connection to the carrier, the carrier in turn immediately brokers a VPN connection between that client and a VPN server. From the client point of view, VPN connections are set up in just one step compared to the two-step procedure required for voluntary tunnels. Compulsory VPN tunneling authenticates clients and associates them with specific VPN servers using logic built into the broker device. This network device is sometimes called the VPN Front End Processor (FEP), Network Access Server (NAS) or Point of Presence Server (POS). Compulsory tunneling hides the details of VPN server connectivity from the VPN clients and effectively transfers management control over the tunnels from clients to the ISP. In return, service providers must take on the additional burden of installing and maintaining FEP devices. VPN TUNNELING PROTOCOLS Several computer network protocols have been implemented specifically for use with VPN tunnels. The three most popular VPN tunneling protocols listed below continue to compete with each other for acceptance in the industry. These protocols are generally incompatible with each other. POINT-TO-POINT TUNNELING PROTOCOL (PPTP) Several corporations worked together to create the PPTP specification. People generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in client support for this protocol. The initial releases of PPTP for Windows by Microsoft contained security features that some experts claimed were too weak for serious use. Microsoft continues to improve its PPTP support, though. LAYER TWO TUNNELING PROTOCOL (L2TP) The original competitor to PPTP for VPN tunneling was L2F, a protocol implemented primarily in Cisco products. In an attempt to improve on L2F, the best features of it and PPTP were combined to create new standard called L2TP. Like PPTP, L2TP exists at the data link layer (Layer Two) in the OSI model thus the origin of its name. INTERNET PROTOCOL SECURITY (IPSEC) IPsec is actually a collection of multiple related protocols. It can be used as a complete VPN protocol solution, or it can used simply as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer (Layer Three) of the OSI model. Using PPTP PPTP packages data within PPP packets, then encapsulates the PPP packets within IP packets (datagrams) for transmission through an Internet-based VPN tunnel. PPTP supports data encryption and compression of these packets. PPTP also uses a form of General Routing Encapsulation (GRE) to get data to and from its final destination. PPTP-based Internet remote access VPNs are by far the most common form of PPTP VPN. In this environment, VPN tunnels are created via the following two-step process: The PPTP client connects to their ISP using PPP dial-up networking (traditional modem or ISDN). Via the broker device (described earlier), PPTP creates a TCP control connection between the VPN client and VPN server to establish a tunnel. PPTP uses TCP port 1723 for these connections. PPTP also supports VPN connectivity via a LAN. ISP connections are not required in this case, so tunnels can be created directly as in Step 2 above. Once the VPN tunnel is established, PPTP supports two types of information flow: Control messages for managing and eventually tearing down the VPN connection. Control messages pass directly between VPN client and server. Data packets that pass through the tunnel, to or from the VPN client PPTP CONTROL CONNECTION Once the TCP connection is established in Step 2 above, PPTP utliizes a series of control messages to maintain VPN connections. These messages are listed below. No. Name Description 1 StartControlConnectionRequest Initiates setup of the VPN session; can be sent by either client or server. 2 StartControlConnectionReply Sent in reply to the start connection request (1); contains result code indicating success or failure of the setup operation, and also the protocol version number. 3 StopControlConnectionRequest Request to close the control connection. 4 StopControlConnectionReply Sent in reply to the stop connection request (3); contains result code indicating success or failure of the close operation. 5 EchoRequest Sent periodically by either client or server to ping the connection (keep alive). 6 EchoReply Sent in response to the echo request (5) to keep the connection active. 7 OutgoingCallRequest Request to create a VPN tunnel sent by the client. 8 OutgoingCallReply Response to the call request (7); contains a unique identifier for that tunnel. 9 IncomingCallRequest Request from a VPN client to receive an incoming call from the server. 10 IncomingCallReply Response to the incoming call request (9), indicating whether the incoming call should be answered. 11 IncomingCallConnected Response to the incoming call reply (10); provides additional call parameters to the VPN server. 12 CallClearRequest Request to disconnect either an incoming or outgoing call, sent from the server to a client. 13 CallDisconnectNotify Response to the disconnect request (12); sent back to the server. 14 WANErrorNotify Notification periodically sent to the server of CRC, framing, hardware and buffer overruns, timeout and byte alignment errors. 15 SetLinkInfo Notification of changes in the underlying PPP options. With control messages, PPTP utlizes a so-called magic cookie. The PPTP magic cookie is hardwired to the hexadecimal number 0x1A2B3C4D. The purpose of this cookie is to ensure the receiver interprets the incoming data on the correct byte boundaries. PPTP SECURITY PPTP supports authentication, encryption, and packet filtering. PPTP authentication uses PPP-based protocols like EAP, CHAP, and PAP. PPTP supports packet filtering on VPN servers. Intermediate routers and other firewalls can also be configured to selectively filter PPTP traffic. PPTP AND PPP In general, PPTP relies on the functionality of PPP for these aspects of virtual private networking. authenticating users and maintaining the remote dial-up connection encapsulating and encrypting IP, IPX, or NetBEUI packets PPTP directly handles maintaining the VPN tunnel and transmitting data through the tunnel. PPTP also supports some additional security features for VPN data beyond what PPP provides. PPTP PROS AND CONS PPTP remains a popular choice for VPNs thanks to Microsoft. PPTP clients are freely available in all popular versions of Microsoft Windows. Windows servers also can function as PPTP-based VPN servers. One drawback of PPTP is its failure to choose a single standard for authentication and encryption. Two products that both fully comply with the PPTP specification may be totally incompatible with each other if they encrypt data differently, for example. Concerns also persist over the questionable level of security PPTP provides compared to alternatives. Routing Tunneling protocols can be used in a point-to-point topology that would generally not be considered a VPN, because a VPN is expected to support arbitrary and changing sets of network nodes. Since most router implementations support software-defined tunnel interface, customer-provisioned VPNs often comprise simply a set of tunnels over which conventional routing protocols run. PPVPNs, however, need to support the coexistence of multiple VPNs, hidden from one another, but operated by the same service provider. Building blocks Depending on whether the PPVPN runs in layer 2 or layer 3, the building blocks described below may be L2 only, L3 only, or combinations of the two. Multiprotocol Label Switching (MPLS) functionality blurs the L2-L3 identity. While RFC 4026 generalized these terms to cover L2 and L3 VPNs, they were introduced in RFC 2547. Customer edge device. (CE) In general, a CE is a device, physically at the customer premises, that provides access to the PPVPN service. Some implementations treat it purely as a demarcation point between provider and customer responsibility, while others allow customers to configure it. Provider edge device (PE) A PE is a device or set of devices, at the edge of the provider network, which provides the providers view of the customer site. PEs are aware of the VPNs that connect through them, and which maintain VPN state. Provider device (P) A P device operates inside the providers core network, and does not directly interface to any customer endpoint. It might, for example, provide routing for many provider-operated tunnels that belong to different customers PPVPNs. While the P device is a key part of implementing PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is allowing the service provider to scale its PPVPN offerings, as, for example, by acting as an aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity optical links between major locations of provider. Categorizing VPN security models From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs only among physically secure sites, both trusted and secure models need an authentication mechanism for users to gain access to the VPN. Some Internet service providers as of 2009[update] offer managed VPN service for business customers who want the security and convenience of a VPN but prefer not to undertake administering a VPN server themselves. Managed VPNs go beyond PPVPN scope, and are a contracted security solution that can reach into hosts. In addition to providing remote workers with secure access to their employers internal network, other security and management services are sometimes included as part of the package. Examples include keeping anti-virus and anti-spyware programs updated on each clients computer. Authentication before VPN connection A known trusted user, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users. Servers may also need to authenticate themselves to join the VPN. A wide variety of authentication mechanisms exist. VPNs may implement authentication in devices including firewalls, access gateways, and others. They may use passwords, biometrics, or cryptographic methods. Strong authentication involves combining cryptography with another authentication mechanism. The authentication mechanism may require explicit user action, or may be embedded in the VPN client or the workstation. Trusted delivery networks Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single providers network to protect the traffic. In a sense, they elaborate on traditional network- and system-administration work. Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality-of-service control over a trusted delivery network. Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Ciscos Layer 2 Forwarding (L2F) (obsolete as of 2009[update]) and Microsofts Point-to-Point Tunneling Protocol (PPTP). Security mechanisms Secure VPNs use cryptographic tunneling protocols to provide the intended confidentiality (blocking intercept and thus packet sniffing), sender authentication (blocking identity spoofing), and message integrity (blocking message alteration) to achieve privacy. Secure VPN protocols include the following: IPsec (Internet Protocol Security) A standards-based security protocol developed originally for IPv6, where support is mandatory, but also widely used with IPv4. Transport Layer Security (SSL/TLS) is used either for tunneling an entire networks traffic (SSL VPN), as in the OpenVPN project, or for securing individual connection. SSL has been the foundation by a number of vendors to provide remote access VPN capabilities. A practical advantage of an SSL VPN is that it can be accessed from locations that restrict external access to SSL-based e-commerce websites without IPsec implementations. SSL-based VPNs may be vulnerable to Denial of Service attacks mounted against their TCP connections because latter are inherently unauthenticated. DTLS, used by Cisco for a next generation VPN product called Cisco AnyConnect VPN. DTLS solves the issues found when tunneling TCP over TCP as is the case with SSL/TLS Secure Socket Tunneling Protocol (SSTP) by Microsoft introduced in Windows Server 2008 and Windows Vista Service Pack 1. SSTP tunnels Point-to-Point Protocol (PPP) or L2TP traffic through an SSL 3.0 channel. L2TPv3 (Layer 2 Tunneling Protocol version 3), a new[update] release. MPVPN (Multi Path Virtual Private Network). Ragula Systems Development Company owns the registered trademark MPVPN. Cisco VPN, a proprietary VPN used by many Cisco hardware devices. Proprietary clients exist for all platforms; open-source clients also exist. SSH VPN OpenSSH offers VPN tunneling to secure remote connections to a network (or inter-network links). This feature (option -w) should not be confused with port forwarding (option -L). OpenSSH server provides limited number of concurrent tunnels and the VPN feature itself does not support personal authentication. VPNs in mobile environments Mobile VPNs handle the special circumstances when one endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points. Mobile VPNs have been widely used in public safety, where they give law enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, as they travel between different subnets of a mobile network. They are also used in field service management and by healthcare organizations, among other industries. Increasingly, Mobile VPNs are being adopted by mobile professionals and white-collar workers who need reliable connections. They allow users to roam seamlessly across networks and in and out of wireless-coverage areas without losing application sessions or dropping the secure VPN session. A conventional VPN cannot survive such events because the network tunnel is disrupted, causing applications to disconnect, time out, fail, or even the computing device itself to crash. Instead of logically tying the endpoint of the network tunnel to the physical IP address, each tunnel is bound to a virtual IP address that stays with the device. The Mobile VPN software handles the necessary network logins and maintains the application sessions in a manner transparent to the user. The Host Identity Protocol (HIP), under study by the Internet Engineering Task Force, is designed to support mobility of hosts by separating the role of IP addresses for host identification from their locator functionality in an IP network. With HIP a mobile host maintains its logical connections established via the host identity identifier while associating with different IP addresses when roaming between access networks. Conclusion: So what is a Virtual Private Network? As we have discussed, a VPN can take several forms. A VPN can be between two end-systems, or it can be between two or more networks. A VPN can be built using tunnels or encryption (at essentially any layer of the protocol stack), or both, or alternatively constructed using MPLS or one of the virtual router methods. A VPN can consist of networks connected to a service providers network by leased lines, Frame Relay, or ATM, or a VPN can consist of dial-up subscribers connecting to central

Friday, October 25, 2019

Reflecting on Religion in Literature Essay -- Religion Anthropology

I am a Religious Studies major; therefore, learning about religion is a genuine interest of mine. In addition, from my first anthropology class, Introduction to Anthropology 103, learning about different cultures and people who may or may not be different from myself became an interest. Anthropology of Religion provides me with the best of both worlds. Not only do I get the opportunity to learn about different religious practices such as Tiwah among the Ngaju but how to anthropologically examine snake handlers in the Appalachians. One issue remains concerning the definition of religion. The semester began with us using theorists and their theories to construct a definition of religion. However, due to how convoluted religion is we changed our mind. In an attempt to synthesize the work done this semester, I wish to form some sort of definition of religion base on the ethnographies we have studied. In order to create such a definition, I wish to go through the three major books that we read and make a conclusion as to the authors’ understanding of religion. In other words, in my own words, a conclusion on each authors’ take on religion. Afterwards, I wish to use all three to form an overall definition of religion based on the work we have done throughout the semester. The three books that I am referring to are Ann Schiller’s Small Sacrifices, Rane Willerslev’s Soul Hunters, and Dennis Covington’s Salvation on Sand Mountain. Ann Schiller’s Small Sacrifices explores religious change among the Ngaju in Borneo, Indonesia. She elaborates on the Indonesian government’s demand on the Ngaju to conform to one of the religions they deem acceptable. In conforming to Hinduism, however, the Ngaju lose their culture, eventually their identity,... ...the semester was how to define religion because it was so complex, but now I have come to understand that religion is better understood when we look at it from a few good books that shows the verities of religion. Therefore, at the end of this class I understand religion to be something that is difficult to define when expanded to include controversial systems of belief, but easy to understand when examined closely. Works Cited Covington, Dennis. Salvation on Sand Mountain: Snake Handling and Redemption in Southern Appalachia. 15th ed. Cambridge, MA: Da Capo, 2009. Print. Schiller, Anne. Small Sacrifices: Religious Change and Cultural Identity among the Ngaju of Indonesia. New York: Oxford UP, 1997. Print. Willerslev, Rane. Soul Hunters: Hunting, Animism, and Personhood among the Siberian Yukaghirs. Berkeley [u.a.: University of California, 2007. Print.

Thursday, October 24, 2019

Prison Violence Essay

Incarceration rates rose to unprecedented levels in the history of the U.S.’s imprisonment. Therefore, concern about social control of the incarcerated, that is, prisoners’ behavior, has increased. High inmate disciplinary infractions, especially violent infractions, are a threat to the safety of prison, of correctional staff, and of other inmates. Nevertheless, the issue of discipline in prison is important from an economic perspective, because an estimated average cost per infraction at a medium security prison is $970 (Jiang & Fisher-Giorlando, 2002). For these reasons, Jiang & Fisher- Giorlando conducted a research to help explain violent incidents, incidents against correctional staff and incidents against other inmates in prison. Identifying the risk factors of inmates to commit violent acts of misconduct is of great importance to prison administration. This type of research can assist in the classification process of inmates entering institutions as well as the o ngoing classification adjustments of inmates already in custody. This study will identify and investigate factors for violent institutional misconduct. These factors include; however, are not limited to race, age, education and employment, family ties, length of sentence, security level, prison environment and gender. The hypotheses of this study are: 1. Violent prison misconduct is more prevalent among African-American and Hispanic inmates than Caucasians or any other ethnic group. 2. Inmates who are residing in maximum-security facilities are more violent than inmates residing in medium or minimum-security facilities, especially towards correctional staff. Literature Review Race Several studies were conducted to examine the role of race in inmate adjustment process and prison misconduct, especially prison violence. There were indications that there is a direct relationship between race and violent prison misconduct. Those findings support theories such as prison adjustment and subculture of violence, which say that minority groups have higher rates of violence in prison society than white inmates (DeLisi et al., 2004; Griffin & Hepburn, 2006; Gillespie, W., 2005; Jiang & Fisher-Giorlando, 2002; Steiner & Wooldredge, 2009). According to Wayne Gillespie (2005), Caucasian inmates appear less likely to engage in most types of misconduct compared to African American and Hispanic inmates. Blacks are more likely than Whites to evoke protective violent responses to perceived dangerous situations or threats of physical injury by aggressive, violent behavior aimed at protecting self or preventing retaliation (Gillespie, W., 2005). Age Age and prison violence had an inverse relationship. The older inmates were, the less likely they were to be involved in violent prison misconduct. Younger inmates were significantly more likely to be involved in violent prison misconduct. This relationship was widespread throughout all the studies (Cunningham & Sorensen, 2007; DeLisi et al., 2004; Griffin & Hepburn, 2006; Jiang & Fisher-Giorlando, 2005; Ruddell et al., 2006; Sorensen & Cunningham, 2008). Education and Employment Research shows an inverse relationship between level of education and rates of prison misconduct. As level of education increased, involvement in violent prison misconduct decreased (Cunningham & Sorensen, 2007; DeLisi et al., 2004; Wooldredge et al., 2001). As stated by Wooldredge, Griffin, and Pratt (2001), inmates who were employed prior to incarceration were less likely to be involved in violent prison misconduct. This group was more invested in conforming because they had more to lose. Inmates who worked prior incarceration were more likely than other inmates to be concerned with going home and continuing employment. Family Ties Social and family support was inversely related to violent prison misconduct (Cunningham & Sorensen, 2007; DeLisi et al., 2004; Jiang & Fisher-Giorlando, 2005; Wooldredge et al., 2001). Inmates with less social and familial support committed significantly more acts of serious prison violence (DeLisi et al., 2004). Moreover, inmates who made and received more telephone calls from children were less likely to commit violent rule violations (Jiang, Fisher-Giorlando & Mo, 2005). According to Jiang and colleagues (2005) inmates with strong family ties had more to lose if they were involved in violent prison misconduct. Sources of family support included mail, telephone calls, and visitations. Rule violations could result in loss of visiting privileges, which is a strong source of strengthening family ties. Length of Sentence The relationship between length of current sentence that inmates are serving and violent prison misconduct is debatable. Inmates with shorter sentences were more likely to commit violent acts. Short term sentenced inmates were usually younger and they still possessed a street mentality. Inmates with longer sentences were usually older and appeared to better understand the need to co-exist with other inmates as well as correctional staff (Wooldredge et al., 2001). Security Level Several studies showed that security level is a predictor of rule violation (Camp et al., 2003; Jiang & Fisher-Giorlando, 2002; Steiner & Wooldredge, 2008). To be more specific, inmates residing in working cell-blocks and dormitories are less likely than are those in lock-down cell-blocks to commit violence and incidents against correctional staff (Jiang & Fisher-Giorlando, 2002). Prison Environment Prison environment exerts an influence on inmate misconduct, especially interpersonal violence (Blackburn et al., 2007; Camp et al., 2003; Steiner & Wooldredge, 2008). Research conducted by Camp et al., (2003) indicated that prison’s organizational factors influenced inmates’ behavior that led to violent misconduct. Furthermore, institutions with inexperienced staff had greater report numbers of inmate misconduct. Moreover, prison crowding, as one of the ecological factors, influenced inmate behavior because it produces intermediate psychological states, such as depression that then lead to misconduct (Camp et al., 2003). Gender Previous studies showed that gender was inversely related to violent prison misconduct (Blackburn et al., 2007; Camp et al., 2003; Wolff et al., 2009). Male inmates reported higher percentage of physical victimization perpetrated by staff, although percentage of inmate on inmate physical victimization was equal for male and female inmates (Wolff et al., 2009). This suggests gender-patterned interactions between inmate and staff in which male inmates compared to female inmates are more aggressive against authority figures. In summary, what is known from the literature reviewed is that some factors might influence inmates’ behavior. What is missing is the correlation between those factors and prison violent misconduct, which is addressed by my study. Key variables identified in the reviewed literature are race, age, education and employment, family ties, length of sentence, security level and prison environment, which are incorporated into the study’s methodology as surve y and focus group questions. Theoretical Review To explain inmate behavior in prison three major theoretical models have been proposed. They are the deprivation, importation, and situational models. A true explanation of violent inmate misconduct lies in a combination of those three theories. However, the importation model can be use as the most legitimate singular explanation of violent prison misconduct. The main focus of an importation model is on the influence of pre- prison socialization and experience of the inmate on his/her behavior while being incarcerated (Jiang & Fisher- Giorlando, 2002). According to Jiang & Fisher- Giorlando (2002) inmates’ behavior can be largely determine by their distinctive traits and social backgrounds. The importation model is a reflection of a pre- prison norms and beliefs system of an inmate rather than a result of incarceration in a facility (Irvin & Cressey, 1962; as cited in Jiang & Fisher-Giorlando, 2002). As importation model implies inmate behavior while being behind the bars is an extension of the antisocial behaviors that criminal offenders developed in the community (DeLisi et al., 2004). Research Design The research design that I used was the analysis of an existing database. I downloaded and analyzed an existing data source from the National Archives of Criminal Justice Data, which can be found at www.ICPSR.org. The data source that I downloaded and analyzed has number 24642 and the title of it is Census of State and Federal Adult Correctional Facilities. The principle investigator of this study is United States Department of Justice, Bureau of Justice Statistics, and the time period is January 1st, 2005 to December 30th, 2005. I chose this dataset because it contains the information needed to do my study on prison violence misconduct. The 2005 Census of State and Federal Adult Correctional Facilities is the seventh enumeration of State institutions and the fourth of Federal institutions sponsored by the Bureau of Justice Statistics and its predecessors. Earlier censuses were completed in 1974, 1979, 1984, 1990, 1995 and 2000. The facility universe was developed from the Census of State and Federal Adult Correctional Facilities conducted in 2000. In 2000, data were collected from 84 federal facilities and 1,584 non-federal facilities operating on June 30th, 2000. In 2005, each State’s Department of Corrections was contacted to identify new facilities and facilities that had been closed since June 2000. Telephone follow-ups were carried out during 2006. All but one respondent-State of Illinois- participated in the Census.My study determines if in a time period between January 1st, 2005 and December 30th, 2005, the correctional facilities used in existing dataset 24642 experienced physical or sexual assaults, misconduct against correctional staff and misconduct against other inmates. The response options for dependent variables have values such as: 1 which is label Yes, 2 which is label No, and 9 or 999 which is label Missing. This study aims to determine if independent variables such as race, age, education and employment, family ties, length of sentence, security level, prison environment and gender have a strong correlation with the dependent variables. Data Analysis For my analyses, I used SPSS Statistics program in version 18.0. I ran frequencies and descriptive tests on both dependent and independent variables. Moreover, I ran ANOVA and t-test to test how facility security levels and race/ethnicity of the inmates impact or don’t the amount of violence. Results Table 1: Age of the inmates residing in the facilities during the 1- year period of 2005 (Independent Variable). |Descriptive Statistics | | | | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Yes |475 |26.1 |28.6 | As seen in Table 2, during the 1-year period of 2005, 28.6 percent of facilities indicated that yes, there were physical or sexual assaults. The other 71.4 percent indicated that there were no physical or sexual assaults. As seen below in Table 3, during the same year period there was an average of just under 16 inmate-on-inmate assaults at facilities. I also ran a frequency table of staff deaths by inmates, but there were very few. Table 3: During the 1- year period of 2005 how many inmate on inmates assaults (Dependent Variable). | | | | | |N |Minimum |Maximum |Mean | | | | | | | |Y1_BETWEEN 1/1/2005 AND 12/30/2005 WERE THERE PHYSICAL OR SEXUAL ASSAULTS | The results in the above tables test my hypothesis about how facility security levels impact (or don’t) the amount of violence, using three different measures of the dependent variable: physical or sexual assaults; inmate deaths; and inmate-on-inmate assaults. I ran three ANOVA (analysis of variance) tests, and the results are shown above. Only the ANOVA tests for Y1 and Y3 were statistically significant. There was no difference by security level in the number of staff deaths by inmates, probably because those were low to begin with. However, in terms of physical and sexual assaults (Y1), these were highest at minimum and low-security facilities (mean =1.91). In terms of inmate-on-inmate assaults, these were highest Maximum/close/high facilities, with an average of nearly 34 assaults by inmates on other inmates in 2005. Table 7: Type of Violence by Race/Ethnicity | | |Y1_BETWEEN 1/1/2005 |Y3_BETWEEN 1/1/2005 | | | |AND 12/30/2005 WERE |AND 12/30/2005 HOW | | | |THERE PHYSICAL OR |MANY INMATE ON | | | |SEXUAL ASSAULTS |INMATES ASSAULTS | |X1_race_white |Pearson Correlation |-.391(**) |.341(**) | | |Sig. (2-tailed) |.000 |.000 | | |N |1631 |1665 | |X1_race_black |Pearson Correlation |-.453(**) |.392(**) | | |Sig. (2-tailed) |.000 |.000 | | |N |1625 |1657 | |X1_race_ethnicity_Hispanic |Pearson Correlation |-.290(**) |.202(**) | | |Sig. (2-tailed) |.000 |.000 | | |N |1450 |1479 | ** Correlation is significant at the 0.01 level (2-tailed). As seen above in Table 7, both White and Black race, as well as Hispanic ethnicity, were statistically significantly related to dependent variables Y1 and Y3. Y2 is not shown in the table format because neither race nor ethnicity was related to staff deaths by inmates. Again, this may be due to the small number of staff deaths. An odd pattern emerges: Y1 (number of physical and sexual assaults) was significantly and negatively related to all three race/ethnicity variables. On the other hand, Y3 (number of inmate-on-inmate assaults) was positively and significantly related to all three race/ethnicity variables. The reasons for this are not clear, but may have something to do with the meaning of the questions asked for Y1 and Y3. As for the size of the correlation coefficient, it is the highest for Blacks (r= -.453 and .392), next highest for Whites (r= -.391 and .341), and lowest for Hispanics (r= -.29 and .202). Discussion To return to my first original hypothesis that violent prison misconduct is more prevalent among African-American and Hispanic inmates than Caucasians or any other ethnic group I have to say that my findings only partially support that statement. According to my results violence among or by African- American inmates appears to be the highest, and is followed by violence among or by White inmates. However, violence by or among Hispanic inmates is the lowest comparing it to violence among or by other races. Moreover, my findings on the impact of security level of facility on prison violence were not exactly what I expected because they differ depending on a type of an assault. Therefore, they partially support my second hypothesis that inmates who are residing in maximum-security facilities are more violent than inmates residing in medium or minimum-security facilities, especially towards correctional staff. I found that counter to what I expected, super-maximum facilities are not the most dangerous correctional institutions but they have the highest inmate on inmate number of assaults. Findings from this study about how race impact prison violence partially support what I have found previously in the literature review. According to Wayne Gillespie (2005) and my findings White inmates less likely engage in most types of misconduct compared to African-American inmates but not Hispanic inmates. However, my results on the impact of security level of facility and prison violence are interesting because they do support the findings mentioned in the literature review. All the findings suggest that security level does affect the amount of in-facility violence, but that differs by the type of violence. Limitation of the Study While conducting my research by using existing database I had to face a few problems with it. First of all, the database I found had a lot of variables, which had a value that was missing. Second of all, when I ran the tests such as descriptive or frequencies it was hard to describe the results because they were confusing. I wasn’t sure in some cases if the results showed me the number of inmates or the number of facilities. I tried to go back and find the answers in the codebook, which didn’t really contain much more information than the database. Moreover, the meaning of the questions that were asked, especially for dependent variables, wasn’t clear and I believe it impacted somehow the results of the tests I ran. References Blackburn, A. G., Mullings, J. L., Marquart, J. W., & Trulson, C. R. (2007). The next generation of prisoners: Toward an understanding of violent institutionalized delinquents. Youth Violence and Juvenile Justice, 5(1), 35-56. Document ID: 1541204006295156. Camp, S. D., Gaes, G. G., Langan, N. P., & Saylor, W. G. (2003). The influence of prisons on inmate misconduct: A multilevel investigation. Justice Quarterly, JQ, 20(3), 501-533. Document ID: 434413761. Cunningham, M. D., & Sorensen, J. R. (2007). Predictive factors for violent misconduct in close custody. The Prison Journal, 87(2), 241-253. Document ID: 0032885507303752. DeLisi, M., Berg, M. T., & Hochstetler, A. (2004). Gang members, career criminals and prison violence: Further specification of the importation model of inmate behavior. Criminal Justice Studies, 17(4), 369-383. Document ID: 10.1080/1478601042000314883. Gillespie Wayne, (2005). Racial differences in violence and self-esteem among prison inmates. American Journal of Criminal Justice: AJCJ, 29(2), 161-V. Document ID: 972985931. Griffin, M. L., & Hepburn, J. R. (2006). The effects of gang affiliation on violent misconduct among inmates during the early years of confinement. Criminal Justice and Behavior, 33(4), 419-448. Document ID: 0093854806288038. Irvin, J., & Cressey, D. (1962). Thieves, convicts, and the inmate culture. Social Problems, 10, 142-155. Jiang, S., & Fisher-Giorlando, M. (2002). Inmate misconduct: A test of the deprivation, importation, and situational models. The Prison Journal, 82(3), 335-358. Document ID: 003288550208200303. Jiang, S., Fisher-Giorlando, M., & Mo, L. (2005). Social support and inmate rule violation: A multilevel analysis. American Journal of Criminal Justice, 30(1), 71-89. Retrieved from http://proquest.umi.com Ruddell, R., Decker, S. H., & Egley Jr., A. (2006). Gang intervention in jails: A national analysis. Criminal Justice Review, 31(1), 33-46. Document ID: 0734016806288263. Sorensen, J., & Cunningham, M.D. (2008). Conviction offense and prison violence: A comparative study of murderers and other offenders. Crime and Delinquency, 56(1), 103-125. Document ID: 0011128707307175. Steiner, B., & Wooldredge, J. (2008). Inmate versus environmental effects on prison rule violations. Criminal Justice and Behavioral, 35(4), 438. Document ID: 1455568521. Wolff, N., Shi, J., & Siegel, J. (2009). Patterns o f victimization among male and female inmates: Evidence of an Enduring Legacy. Violence and Victims, 24(4), 469-84. Document ID: 1825737261. Wooldredge, J., Griffin, T., & Pratt, T. (2001). Considering hierarchical models for research on inmate behavior: Predicting misconduct with multilevel data. Justice Quarterly, 18(1), 203-231. Retrieved from http:// proquest.umi.com

Wednesday, October 23, 2019

Stereotypes in the Classroom

â€Å"If Americans are to embrace diversity, the conscious and unconscious expressions of racism (sexism) within our society must be identified and done away with. † Teachers must prepare themselves and the children for the ever changing challenge of interacting and communicating with diverse races. Reduction of fear, ignorance, and personal detachment are possible benefits to a multicultural education ( (Wilson). Multicultural education is the potential catalyst to bring all races together in harmony. Educators today have a moral responsibility to move beyond the limits of racial context to a social context that embraces humanity without barriers and fear. The responsibility of teachers is to get to know the children and the families that will be entering the program. Classrooms need to reflect every child and every family in the class. Do not make assumptions of what a child’s ethnic background is. This is putting a stereotype as to what you think of that culture. Get to know the children so that you can respectfully and accurately reflect them, their families and their lifestyles in the classroom ( (York, 2003). Children should feel like they belong in the class. Teachers need to make sure that they greet each child by name as they enter the classroom at the beginning of the day and to say good bye at the end of the day. Teachers need to remember to stay away from commercial teaching materials. Cartoon imagines inaccurately portray human beings and human diversity (York, 2003). Multicultural children’s books can be used effectively as a means for coming to understand individual human stories, and the universal emotions and themes they contain. Teachers need to be careful when picking books to use in the classroom. A book may look good when you first look at it but it may contain one or more stereotypic images. Teachers need to be very critical in evaluating books that they want to use in the classroom. Make sure that authors are writing fiction for young children that authenticate a culture’s heritage.