Tuesday, January 28, 2020

Refugee Children In Developing Societies

Refugee Children In Developing Societies The United Nations High Commissioner for Refugees (UNHCR) estimated there were over 9.6 million refugees living worldwide in 2003. That same year the Global IDP estimated that nearly 25 million people were internally displaced in approximately 50 countries. Most of these individuals were children, forced to live for months, sometimes years, in camps.  [1]  According to Grace Michel over 2 million children have died as a direct result of armed conflict. At least 6 million children have been permanently disabled or seriously injured, and more than 1 million have been orphaned or separated from their families.  [2]  . Although numbers are difficult to verifade because of the illegality of much of the cross-border movement of children, as well as lack reliable registration system of refugee children. These figures only account for those who are caught and repatriated but the majority of children go undetected. In addition many countries are unwilling to accept the scale and natur e of the problem. Refugee children And yet despite importance of the refugee children situation only in 1993 UNHCR introduce Guidkine on protection and care refugee children In order to improve and enhance the protection and care of refugee children, UNHCR has adopted a Policy on Refugee Children, endorsed by the UNHCR Executive Committee in October 1993. The UNHCR Guidelines on Refugee Children, first published in 1988, have been updated in the light of the new Policy and are presented in this document. At their core lays the realization of the need which children Refugee children definitely face dangers to their safety and well being than the average child. The brutal interruption of they family life and disruption of community structures by the conflict or natural disaster can deeply affect the physical and psychological well being. Children must also cope with the trauma of loss -of their family members, schools, neighborhoods and communities. In addition, millions of children have been forced to witness or even take part in horrifying acts of violence Sexual abuse and violence is another experience of many refugee children. Children are dependent on adults help, international organization and host countries generosity. Refugee children need to be providing with the basic needs like the nutrition, water and sanitation, suitable shelter and health care including health education. Also for many refugee children the basic need is accessing education to provide better future job opportunities. Many children especially on a first instance need f ood and urgent shelter, sleeping outdoors exposed to higher risks of contracting malaria or infections, not to mention the feeling of safety. They need safeguard against economic exploitation as they often are forced to work in fields belonging to host communities in exchange for food or low pay. Refugee children need a governments protection against ethnic and religion discrimination from host countries population and protection against sexual violence, especially refugee ophrense. . Finally Children need to help with tracking separated family. A number of children called for the authorities to stop abusing, imprisoning and repatriating them to their home countries, while others said they should be entitled to free education in the host countries. Southern Africa Child migrants tell all 29 April 2008 Integrated Regional Information Networks (IRIN), Southern Africa Child migrants tell all, 29 April 2008, available at: http://www.unhcr.org/refworld/docid/48200579b.html [accessed 3 December 2009] Health SUMMARY OF INTERNATIONAL TREATIES TO PROTECT CHILDREN IN ARMED CONFLICT Internet: http://www.unicef.org United Nations Childrens Fund UNICEF House, OPSCEN Health is the basic need very important aspect of refuge children well-being. First instance is to secure for refugee children to basic needs like access to clean water, nutrition, sufficient shelter, and access to medical services including hospitals and psychological and professional therapy assistance. I terms of water and shelter important is to organize a safety zone where children can fell comfortable and have access to food and clean water any time of the day and night. The emergency hospitals should provide necessary help in terms illness and injury and technical assistance for expectant mothers and maternity cases, and nursing mothers. More difficult cases should be direct to local hospitals. Good step in prevention of diesis, HIV/Aids spreads among children is health education. As well develop preventive health care and abolish harmful traditional practices, especial toward young girls comment among Africans tribes. The disruption and insecurity in refugee situations can harm childrens physical, intellectual, psychological, cultural and social development. In addition, children suffer or witness the torture or murder of family members or other forms of abuse or violence. Unaccompanied children are particularly vulnerable. First and foremost, the emotional well-being of children is influenced by the protection and care they receive from their families and communities. Adults often suffer greatly in refugee situations; this can Influence their ability to provide for their children. Sometimes parental distress results in child abuse, abandonment, family strife and other forms of family disintegration. During refugee situations, children face greater risks to their psychological development. Hardships in refugee situations are chronic. Children may be living in constant fear or anxiety; parents may be too stressed or traumatized to give good care; children may suffer from malnutrition and illness. Children are affected not only by what happens to them, but by what they are deprived of, for example missing out on developmental essentials such as play and school. Children need more than services which are directed just to them. Preschool play groups, for example, serve an important purpose, but if a parent cannot meet the childs emotional needs because the parent is too physically weak or emotionally stressed, then the childs greater developmental need is for the parent to receive help. First objective must be to restore normalcy, that is, to help the family function as normally as possible ensure existing a daily routine which increase they security and feeing of prediction. When life becomes stable, when they can rely on good things happening on a predictable basis, such as eating, going to school, playing, the sense of normalcy gives psychological security. Important from point of psychosocial well-being of refugee children is long assistance with information regarding they situation, rights and responsibilities as well as future possibilities. Education is a basic service which should be provide to all children, including refugee children. Unfortunately this service is less reachable for them despite fact that many young people believe that education is essential to their survival, protection and full recovery from their experience of armed conflict and disasters. They see in education the answers to their need for self-respect, economic and job opportunity and the voice in society. Education also represents an essential condition to peace and security of community and family. Yet, despite of central role in their lives, refugee children find quite often difficultly to access education. While the primary school education is more accusable for children, younger people find more difficult to get into higher education The major barriers to enter education can lay in sort of obstacles like is high cost of attending school and transportation problems, language and custom barriers, especially for girls. For example in Uganda, al though Universal Primary Education was instituted for all children including refugee, costs for materials and uniforms remained out of reach for most young people in the war-torn north. Non-tuition costs for primary school in northern Uganda averaged $120 per year, and secondary school costs were about $350 per year in a country where the estimated annual per capita income was $140 in 2001 Competing responsibilities are next major obstacles to enroll education. Teen parents, heads of households and orphans have particular difficulties obtaining education because, in addition to caring for themselves, they had the added responsibilities of caring for younger siblings and sometimes their own children. On the top of this obstacles there is the lack of facilities accommodate children and teaching staff, lack of flexible hours to accommodate work and family responsibilities and/or vocational and skills training linked to jobs . Sierra Leone is a good illustration of this problem where young people viewed education as a way to establish the peace, and said that access to education opportunities would help them feel less excluded from society, especially for demobilized soldiers who need to gain skills and access trainings to help them in job market. Educational opportunities and jobs are denied to girls who drown them into commercial sex work market or early marriages. The barriers can lay also in the host country policies. In Albania during the refugee crisis of 1999, Albanian Kosovars were welcomed to take refuge in camps and urban areas in Albania, but the government did not allow all young people immediate access to public education. Some refugees entered public schools, and some did not. Some refugees set up their own schools without initial external support and still others were attracted to schools opened by religious groups during the crisis. Girls situation is even more dramatic, despite commitments to gender equality in education. Girls dont have equal access to education, compared with their male refugee. For instance, 60 percent of girls in Sierra Leone were not attending primary school, and at least 76 percent did not attend secondary school, compared to 71 percent of boys. In northern Uganda, boys were more likely to complete primary school and did better on Primary Leaving Examinations than girls, and fewer girls went on to secondary school. Most girls and boys in each region agreed that, in general, parents valued boys education more than that of girls. Girls also said inadequate clothing, security and sanitary supplies kept many out of school. According to UNHCR approximately 1 million refugee children are enrolled in UNHCR education support program. 40 percent of enrolled are girls and adelnece women, 8 percent are enrolled at pre=school, 82% are attending primer school and 9 percent benefit from secondary school. Only 1 percent is attending higher education system. Page 7 Document Summary note on UNHCR s strategy and Activities Concerning refugee children Geneva may 2002 http://docstore.ingenta.com/cgi-bin/ds_deliver/1/u/d/ISIS/53779900.1/oup/reflaw/2003/00000015/00000001/art00149/08C6A8EBB1C9214B1259885548168C930EA581BF55.pdf?link=http://www.ingentaconnect.com/error/deliveryformat=pd The major solution to education problem is ensuring that all refugee children have access to primary and basic education and where possible secondary and professional education will help reduce the risk of exploitation. Special programs should be tailored to the needs of girls who have dropped out of school to reduce the risk of violence abuse. Children not only refugee should be educated on their rights. Various forms of social and life skills training will help young people to make better life choices and help them protect themselves from exploitation. Equal participation of girls in school should be actively promoted. The community also should be involved in recruiting and managing teaching staff and educators whom they feel they can trust, as teachers can also be sexual abusers. Cancellation of school fees or low cost of education should be placed. Furthermore, the clubs and counseling after school offering support and relax. Ensure Access to Education SPECIAL CONSIDERATIONS FOR REFUGEE CHILDREN Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Sexual and Gender-Based Violence against Refugees, Returnees and Internally Disp Important is to mention of education for disable refugee children who quite often safer isolation from community due to their conditions. Children with disabilities often do not get any support and services they need like physical rehabilitation, specialized education and social integration are sometimes neglected. Some times families, health workers and teachers have not understood the importance of including disabled children in normal patterns of activity. In some refugee situations, rehabilitation services are not provided because nationals do not have access to such services but still teachers should be encouraged to include disabled children in their classes whenever possible. Clear guidelines should be given on the physical needs of children with various types of disabilities. A positive attitude towards children with disabilities must be encouraged. SPECIAL CONSIDERATIONS FOR REFUGEE CHILDREN Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Refugee children, particularly unaccompanied and separated from families children often can find them at risk of sexual abuse and violence. Their limited ability to protect themselves and limited protection or lack of protection from the law of the host countries and international institution make them varounable to sextioal explotaion. In many cases, trafficking may involve payment to child family or even child themselves Child abuse and exploitation within the family is much more complex challenge as sexual violence within the family is almost always seen as a private matter that should not involve outsiders; as a result, an abused child may be blamed for the incident and be further victimized. Also the abuse is cared by the person responsible for protecting and caring for the child. The teenage mothers especially described pitiful and harsh lives: I have to sleep with so many men to make 1500, so that I can feedmyself and my child. They pay me 300 each time, but if I am lucky and I get an NGO worker he can pay me 1500 at one time and sometimes I get 2000 (girl mother in Guinea) or I sleep with different men but mostly NGO workers because I have to eat and feed my child (girl mother in Liberia) Guinea Its difficult to escape the trap of those [NGO] people; they use the food as bait to get you to sex with them. (refugee child) page 17 Protecting children from the protectors: lessons from West Africa by Asmita Naik 15 october 2002 Force Migration review Displaced children and adolescents: challenges and opportunitiesPer Protecting Children in Emergencies Escalating Threats to Children Must Be Addressed VOL.1, NO.1 SPRING 2005 Safe the Children SC-glob-apr05.pdf Although numbers are difficult to estimate because of the illegality of much of the cross-border movement of children, as well as lack relaible registration refugee children. These figures only account for those who are caught and repatriated but the majority of children go undetected. In addision many countries are unvilling to accept the scale and nautre of the problem The children who told their stories in the book called for better protection in host countries, teaching children and communities about the dangers of travelling to and living in foreign countries, and for a halt to the abuse, imprisonment and forced repatriation often inflicted on them. Refugees from armed conflicts worldwide increased from 2.4 million in 1974 to more than 27.4 million in 1996, with another 30 million people displaced within their own countries. Children and women make up an estimated 80 percent of displaced populations.* Children are affected by war in many ways, but one of the SUMMARY OF INTERNATIONAL TREATIES TO PROTECT CHILDREN IN ARMED CONFLICT At any one time, more than 300,000 children worldwide are fighting as soldiers with government forces or armed opposition groups,13 accounting for 10 percent of the combatants in ongoing conflicts.14 Children under the age of 18-some as young as seven-are actively participating in hostilities in 27 countries worldwide.15 Since 1990, over 2 million children have died as a direct result of armed conflict. At least 6 million children have been permanently disabled or seriously injured, and more than 1 million have been orphaned or separated from their families. 1 Graca Machel, The Impact of Armed Conflict on Children, delivered September 2000, www.unifem.org/index.php?f_page_pid=97, accessed 11 March 2005. In 2003, the United Nations High Commissioner for Refugees (UNHCR) estimated there were over 9.6 million refugees living worldwide.24 That same year the Global IDP Project estimated that nearly 25 million people were internally displaced in approximately 50 countries.25 Most of these individuals were children, forced to live for months, sometimes years, in camps. When disaster strikes, families suffer multiple and severe disruptions: not only do they lose their homes and livelihoods, but they often lose their autonomy, livelihoods, and dignity in the camps that are supposed to provide humanitarian relief and protection. Protecting Children in Emergencies Escalating Threats to Children Must Be Addressed VOL.1, NO.1 SPRING 2005 Safe the Children SC-glob-apr05.pdf http://www.reliefweb.int/rw/lib.nsf/db900sid/OCHA-6BCNE8/$file/SC-glob-apr05.pdf?openelement SUMMARY OF INTERNATIONAL TREATIES TO PROTECT CHILDREN IN ARMED CONFLICT Internet: http://www.unicef.org United Nations Childrens Fund UNICEF House, OPSCEN In the past decade, two million children have been killed in armed conflict. Three times as many have been seriously injured or permanently disabled. Armed conflict kills andmaims more children than soldiers. Civilian fatalities in wartime have climbed from 5 percent at the turn of the century to more than 90 percent in the wars of the 1990s. Refugees from armed conflicts worldwide increased from 2.4 million in 1974 to more than 27.4 million in 1996, with another 30 million people displaced within their own countries. Children and women make up an estimated 80 percent of displaced populations.* Children remain susceptible to the physical dangers, as well as to the lasting psychological and social effects of war, once a conflict has ended. Children are vulnerable to physical dangerfrom millions of existing landmines and unexploded ordnance. Children must also cope with the trauma of loss -of their family members, schools, neighborhoods and communities. In addition, millions of children have been forced to witness or even take part in horrifying acts of violence. One UNICEF survey in Rwanda found that nearly 80 percent of the children had lost immediate family members and more than one-third of these had actually witnessed their murder. Children have become targets, not incidental casualties, of armed conflict. War violates every right of a child -the right to life, the right to be with family and community, the right to health and education, the right to the development of the personality, and the right to be nurtured and protected. It is a basic need of children to be protected and cared for when conflicts threaten, and the implementation of international human rights and humanitarian law addresses these needs. A number of international treaties exist to provide for the legal protection and care of children. Too often these treaties are ignored, and the world community must do everything possible to see that these treaties are complied with in all areas of the world. * Education is a basic service which should be provide to all children, including refugee children. Unfortunately this service is less reachable for them despite fact that many young people believe that education is essential to their survival, protection and full recovery from their experience of armed conflict and disasters. They see in education the answers to their need for self-respect, economic and job opportunity and the voice in society. Education also represents an essential condition to peace and security of community and family. Yet, despite of central role in their lives, refugee children find quite often difficultly to access education. While the primary school education is more accusable for children, younger people find more difficult to get into higher education The major barriers to enter education can lay in sort of obstacles like is high cost of attending school and transportation problems, languge and custom barriers. especially for girls. For example in Uganda, alt hough Universal Primary Education was instituted for all children including refugee, costs for materials and uniforms remained out of reach for most young people in the war-torn north. Non-tuition costs for primary school in northern Uganda averaged $120 per year, and secondary school costs were about $350 per year in a country where the estimated annual per capita income was $140 in 2001 Competing responsibilities are next major obsticuls to enroll education. Teen parents, heads of households and orphans have particular difficulties obtaining education because, in addition to caring for themselves, they had the added responsibilities of caring for younger siblings and sometimes their own children. On the top of this obticols there is the lack of facilities accommodate children and teaching staff, lack of flexible hours to accommodate work and family responsibilities and/or vocational and skills training linked to jobs . Sierra Leone is a good illustration of this problem where young people viewed education as a way to establish the peace, and said that access to education opportunities would help them feel less excluded from society, especially for demobilized soldiers who needs to gain skills and access trenings to help them in job market. Educational opportunities and jobs are denied to girls which drow them into into commercial sex work market or early marriages. The barires can laiy also in the host country policies. In Albania during the refugee crisis of 1999, Albanian Kosovars were welcomed to take refuge in camps and urban areas in Albania, but the government did not allow all young people immediate access to public education. Some refugees entered public schools, and some did not. Some refugees set up their own schools without initial external support and still others were attracted to schools opened by religious groups during the crisis. Girls situation is even more dramatic, despite commitments to gender equality in education. Girls dont have equal access to education, compared with their male refugee. For instance, 60 percent of girls in Sierra Leone were not attending primary school, and at least 76 percent did not attend secondary school, compared to 71 percent of boys. In northern Uganda, boys were more likely to complete primary school and did better on Primary Leaving Examinations than girls, and fewer girls went on to secondary school. Most girls and boys in each region agreed that, in general, parents valued boys education more than that of girls. Girls also said inadequate clothing, security and sanitary supplies kept many out of school. According to UNHCR approcimetly 1 million refugee children are enrold in UNHCR education support program. 40 precent of enlode are girls and adelnece women, 8 pecent are enrold at pre=school, 82% are attending primeryschool and 9 precent benefict from secondary scholl. Only 1 precent is attending higher education system. Pade 7 Document Summary note on UNHCR s strategy and Activities Conserning refugee children Geneva may 2002 http://docstore.ingenta.com/cgi-bin/ds_deliver/1/u/d/ISIS/53779900.1/oup/reflaw/2003/00000015/00000001/art00149/08C6A8EBB1C9214B1259885548168C930EA581BF55.pdf?link=http://www.ingentaconnect.com/error/deliveryformat=pd The majjoir solution to education problem is ensuring that all refugee children have access to primary and basic education and where possible secondary and professional education will help reduce the risk of exploitation. Special programmes should be tailored to the needs of girls who have dropped out of school to reduce the risk of vailence abuce. Children not only refugee should be educated on their rights. Various forms of social and life skills training, will help young people to make better life choices and help them protect themselves from exploitation. Equal participation of girls in school should be actively promoted. The community also should be involved in recruiting and managing teaching staff and educators whom they feel they can trust, as teachers can also be sexual abusers. Councelation of school fees or low cost of education should be placed. Furthermore, the clubs and counseling after school offerring support and relax. Ensure Access to Education SPECIAL CONSIDERATIONS FOR REFUGEE CHILDREN Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Important is to mention of education for disable refugee children who quite often saffer isolation from community due to their conditions. Children with disabilities often do not get any support and services they need like physical rehabilitation, specialized education and social integration are sometimes neglected. Some times families, health workers and teachers have not understood the importance of including disabled children in normal patterns of activity. In some refugee situations, rehabilitation services are not provided because nationals do not have access to such services But still teachers should be encouraged to include disabled children in their classes whenever possible. Clear guidelines should be given on the physical needs of children with various types of disabilities. A positive attitude towards children with disabilities must be encouraged. Futhermore access to secondary school was nearly impossible for most young people in Sierra Leone and northern Uganda, virtually guaranteeing that they would not have the skills necessary to contribute to the economic development of their communities over time. While young refugees from Kosovo attended secondary school more often over all, they still faced major barriers. Fearing overcrowding, the Albanian government delayed entry into secondary school, and mandated that a summer school program be set up for refugee adolescents seeking to enter secondary school in the fall-a policy decision that left many young people idle. Later, Albanians returned to normal secondary schools in Kosovo after years of participating in a parallel school system, but the schools were in bad condition. Many young people in rural areas, especially girls and minority Romas, could not complete or move beyond primary school. Under very difficult security constraints, many Serb young people separated from fam ily members in order to complete their secondary education. Internally displaced young people often face even higher barriers to education than do refugees. For example, some young Sudanese refugees in northern Uganda fared better than Ugandan internally displaced youth because the refugees had help from UNHCR. By contrast, no international agency was charged with the protection and care of all IDPs. Less than 30 percent of school-age children in IDP camps were enrolled on a full-time basis, compared with the 93 percent primary school enrollment rate in other parts of Uganda. Despite the same security constraints, 77 percent of refugee students in northern Uganda were enrolled in primary school in one settlement that also benefited local Ugandan children. At the same time, both IDPs and refugees had equally poor access to secondary school. Young people who were able to attend school said it was difficult to learn. Their classrooms were often overcrowded and broken down or even witho ut walls and a roof. In the Achol Pii refugee settlement in northern Uganda, each teacher served a class of 110 children in their primary school. In all areas, paper, pens and books were lacking. Many teachers had been killed or had taken other jobs for their own economic survival. Those who remained, according to young people, were often unsupportive and badly prepared. Young people disliked teachers talking at them and called their methods old-fashioned and boring. Young people asked for more participatory approaches to teaching and for more opportunities to learn practical and vocational skills. They also asked for more support to help teachers. One young person said, We bring our teachers lunch, so that they will come back to us eac YOUTH SPEAK OUT: New Voices on the Protection and Participation of Young People Affected by Armed Conflict Womens Commission for Refugee Women and Children January 2005 SPECIAL CONSIDERATIONS FOR REFUGEE CHILDREN Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Sexual and Gender-Based Violence against Refugees, Returnees and Internally Displaced Persons Refugee children often can find themselves at risk of sexual abuse. Their limited ability to protect themselves and limited protection or lack of protection from the law of the host countries law and international institution make them varounable to sextioal explotaion. Refugee children, particularly unaccompanied and separated from families children often can find them at risk of sexual abuse and violence. Their limited ability to protect themselves and limited protection or lack of protection from the law of the host countries law and international institution make them varounable to sextioal explotaion. In many cases, trafficking may involve payment to child family or even child themselves Child abuse and exploitation within the family is mauch more complex challenge as sexual violence within the family is almost always seen as a private matter that should not involve outsiders; as a result, an abused child may be blamed for the incident and be further victimized. Alsow the abuse is cared by the person responsible for the protection . since the person who is responsible for protecting and caring for the child, in many cases a male relative, is doing neither. Sexual violence within the family is almost always seen as a private matter that should not involve outsiders; as a result, an abused child may be blamed for the incident and be further victimized The teenage mothers especially described pitiful and harsh lives: I have to sleep with so manymen to make 1500, so that I can feedmyself and my child. They pay me 300 each time, but if I am lucky and Iget an NGO worker he can pay me 1500 at one time and sometimes I get2000 (girl mother in Guinea) or I sleep with different men but mostly NGO workers because I have to eat and feed my child (girl mother in Liberia) Guinea Its difficult to escape the trap of those [

Monday, January 20, 2020

Salinity Changes :: science

Salinity Changes I chose to experiment with the effects of salinity changes on the polychaete, Nereis succinea. Along with the other members of the group, Patty and Jeremy, I was curious to see whether the worms would engage in adaptive behavior when placed in a tank of water of foreign salinity, or whether they would simply continue changing osmotically until they reached equilibrium with the environment. The first step in our experiment was to simply observe the worms and get a "feel" for the ways in which they act. We did this on Wednesday, May 7, 1997 from 9:30am to 10:30am. Also on this day we learned how to mix and measure salinity, practiced weighing the worms, and deciding our exact schedule as far as when we would come in and for how long, etc. From what I observed, the polychaete is a salt-water worm that has adapted to live in estuaries. We kept the control tank at 20 parts per thousand to 24 parts per thousand, and the worms seemed very content and healthy at that level. The worms on which we experimented ranged in size from approximately four inches to approximately six inches. They weighed from 1.8 grams to 4.6 grams at the beginning of the experiment. They have a pinkish, almost salmon color to them, and on two opposite sides, they have these crimson hairs lined up in a row, stretching the entire length of their bodies (the hairs are less than an eighth of an inch long). If we were to call the two lines of hair "east and west", then on the "north and south" sides, there were dark lines that also stretched the entire length of their bodies. These were their primary blood vessels, and though we tried to locate the pulse that is supposed to conspicuously travel up and down this vessel, we were not able to locate it, exce pt once on one worm for less than 30 seconds. Also I often was not able to tell the difference between the head and the tail. Their actions were very basic. They seemed to like to stay still for the most part, hiding underneath the little bit of seaweed we put in the tank. We also put a glass tube at the bottom of the tank, thinking that they might try to crawl in there for safety, but we never saw them in there.

Sunday, January 12, 2020

Most Violated School Policies Essay

â€Å"The formation of character is one of the most important features of the educational system at the University of Baguio. For this reason, the imposed discipline, while observant to the rights and feelings of others, is firm, especially when the reputation of the student body and institution is at stake. Students are expected to manifest both within and outside the University, the respect for order, morality, personal honor, and rights of others, which is required of God-fearing men and women.† (UB student handbook, Article XIV: 2010 Edition) Schools have policies that are being implemented for the general welfare of its constituents. These policies provide a set of rules that the students, teachers, etc. should follow. These rules are necessary for the order and uniformity of the students within the school premises. Even with the presence of these rules, some of the students violate them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. Defined as a definite course of action adopted for the sake of expediency, facility, etc.; an action or procedure conforming to or considered with reference to prudence or expediency. (http://dictionary.reference.com/browse/policy) Educational policies are significant because these are rules that are used in schools to discipline students. These rules determine how effective and efficient the school is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies can help students in school on their day to day activity. For a policy to become effective, it must have a well-pronounced outcome, assumptions should be clear and explicit, linkage to organizational direction must be present, due process in the development has to be observed, the priority should be on the public interest, expectations have to be made, the policy must be both efficient and effective, results should be stated in measurable terms, evaluation of results should be capable, funding and allocation of resources must be appropriate, accountability should not be vague, it should be lawful and administered, it must be based from history, ideas have to be verified before implementation, and the policy results should be well stated. (http://manuals.ucdavis.edu/resources/coordinators.htm) One of the factors why students violate school policies can be explained through their different behaviours. Behaviour is the manner of behaving or conducting oneself; the aggregate of all the responses made by an organism in any situation. (http://dictionary.reference.com/browse/behavior) Based on Operant Conditioning of B.F. Skinner â€Å"All behaviour caused by external stimuli and all behaviour can be explained without the need to consider internal mental states or consciousness.† It means that the actions done by students are responses to its environment. (http://www.learning-theories.com/behaviorism) Another type of behaviourism is Radical Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In order to resolve this problem the group found out that the best solution is the use of Biometric identification systems which can be grouped based on the main physical characteristic that lends itself to biometric identification. There are different kinds of biometric system in which the fingerprint biometrics is the commonly used one. There are also other biometric identification systems such as the hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. There are biometric systems that are composed of more than two physical characteristics to be identified. Statement of the Problem 1) What are the reasons why these students violate such policies? 2) What are the most common policies that are violated by the violators? 3) How can the proposed biometric ID system control students from violating the wearing of ID? Scope and Delimitation This proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities. Significance of the Study With the help of this proposal, the University of Baguio would be able to control every entrance and exit of the school. The act of not wearing IDs for the students would no longer be possible because they will not be able to enter the school without their IDs. The biometric ID system would strengthen the security of the academe for the safety of the students. The time when the students would enter and leave their classes would be monitored. The system would be able to determine if the students will skip their classes. Also, the entry of thieves and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernized system to be established in the University, all of the students and personnel of the school will benefit from it. FRAMEWORK The leniency of the marshals in checking the ID’s and proper wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the school’s vicinity are the reasons why the researchers proposed an ID Biometric System. The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. Some students just wanted to violate such policies because they thought that it was a fun and interesting thing to do. If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitoring of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the data that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers foresee that this would be able to control the reoccurring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal. DEFINITION OF TERMS * Biometric – pertaining to, noting, or using a person’s unique physical and other traits for the purpose of identification and security. * Coincide –to occupy exactly corresponding or equivalent positions on a scale or in a series * Identification – psychological orientation of the self in regard to something (as a person or group) with a resulting feeling of close emotional association. * Implementation – the act of implementing, or putting into effect. * Policy – a definite course of method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal – An act of putting forward or stating something for consideration. * Scanner – a device sensing a recorded data. * System –a group of devices or artificial objects or an organization forming a network especially for distributing something or serving common purpose. * Units – a piece or complex apparatus serving to perform one particular function ASSUMPTION The group assumed that if the proposal is to be approved by the Board of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane place to study. CHAPTER II REVIEW OF RELATED LITERARTURE I. EXECUTIVE SUMMARY In the millennial years’ rapidly advancing technological world, the issue of security is becoming a more and more pressing matter. Computer crimes and identity theft related crimes are becoming more rampant and apparent, requiring better solutions to cope with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometrics. Biometrics defined simply in its regard to security matters is any method or technology which uses biological measurements to facilitate authentication for verification or identification of a particular user. Although still in major phases of development, biometrics is seen as a highly valuable initiative to one day replace present day security authentication practices due to its ideal concept of being virtually risk free and non-inaccurate. This paper will analyze all aspects concerning biometrics including its overall concept, how a biometrical authentication system works, controversial issues concerning its implementation, its current uses in technology, business, and governmental agencies and its future developments. II. CONCEPT OF BIOMETRICS IN SECURITY A. TWO CATEGORIES Biometrics can be subdivided into two main categories. These include physiological and behavioral categories of specific measurements. Physiological measurements include biological characteristics inherent to individual human beings. Some of these would include facial structure, fingerprints, hand structure, iris and DNA structure of a particular person. Behavioral measurements measure dynamics in individual behaviors. Some of these would include keystroke behavior, signature and voice recognition. B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS FACE: Facial recognition involves technology which scans the face and interprets the data as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to identify people they come into contact with, but it is not an easy method to duplicate for identification on a biometric system. This is due to changes such as plastic surgery, weight gain or weight loss which can cause the results to be inaccurate. Another emerging method of collecting biometric information involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted through the skin. FINGERPRINT: Fingerprint analysis has been around for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint analysis involves examining the ridges on an individual fingerprint in order to match them to a specific owner. HAND: Hands can be analyzed and measured in a few different ways. Aside from fingerprints, another way to use hands in biometrical analysis is through hand geometry which measures and compares the different physical characteristics of a person’s hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a person’s hand and measure the complexity of the vein patterns within that person’s hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and difficult to be counterfeited by an illegitimate use r. EYES: Eyes can be used in two different ways as a part of a biometrical scrutiny process. Iris scanning involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina scanning involves analysis of the capillary blood vessels located in the back of the eye. DNA: DNA verification uses analysis of genetic information found within a specific person’s DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying paternity of a person’s child or in forensic crime investigations as a evidence for convicting individuals for crimes such as murder or rape. ODOR & SCENT: Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled â€Å"individual odor theory.† This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE ANALYSIS: Voice analysis involves analyzing of the pitch, tone, cadence, and frequency of a particular user’s voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but also the way that person speaks is also a unique and measurable trait. SIGNATURE: Signature analysis analyzes the way a person writes his/her signature as a basic means of identification. Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE: Keystroke analysis measures the dynamics of a person’s typing rhythms to facilitate authentication of a particular person. Keystroke analysis may be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer session even after the access control point has been successfully passed by the user. GAIT: Another new developing biometrical technique is one which measures gait which is a person’s particular way of walking and facilitating motion. Gait can be used effectively to recognize people coming in from a distance. COGNITIVE BIOMETRICS: Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer database as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses. C. PARAMETERS Given the various methods for collecting biometrical data, each of these techniques must pass a set of parameters to a degree in order to be considered as a viable method for integration within a biometrical system. These parameters include: UNIVERSALITY: The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. UNIQUENESS: The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE: The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery. COLLECTABILITY: The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more sanitary methods are more ideal for a viable biometrical system. PERFORMANCE: The performance principle is concerned with the accuracy, speed and the strength of the technology used to authenticate the user. ACCEPTABILITY: The acceptability principle is related to the degree of social approval for use of the technology as a means for collecting biometrical data. CIRCUMVENTION: Circumvention involves, the biometrical system’s ease of adaptation to a substitute should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS (Based on the Comparison of Various Biometric Technologies table by A.K. Jain, et. al. 2004) FACE: Facial scanning has a high level of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning scores low in its level of uniqueness due to the fact that it can be difficult to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning scores a medium ranking under the permanence factor. This is due to the fact that although a person’s actual facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning scores a high mark due to the fact that, going along with its high level of universality , every living human-being does have a face which is easy to locate on a human body. Facial scanning is low in performance because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also scores high in acceptability as a comfortable and accepted way people would want to collect their biometrical data, but it scores low in circumvention because it doesn’t have an easy substitute which can replace it. Facial thermograph scores high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and medium in performance. FINGERPRINT: Fingerprinting scores medium in its level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be damaged via rare skin diseases or through loss of fingers, abrasions, etc. Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% failure to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND: Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability, and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability; but it scores hi gh in circumvention. The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to live without them. EYES: Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a better choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performance, and circumvention; receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA: DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention. Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR & SCENT: Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and lotions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS: Voice analysis scores medium in its universality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system. This is because not only does a person’s voice change throughout time, but people can knowingly change their voice or use technology to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE: Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person. This is because a person’s handwriting can change depend on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE: Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously authenticate a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be easily changed if a person learns to type in different ways. GAIT: Gait scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data. III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM A biometrical system although seemingly complicated, has only two main steps, regardless of the methodology or the technology used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart card which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database. In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the system’s objective is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the system’s intention is to authenticate the user only on the basis of the biometrical data alone. The goal of this function is to identify the user according to the closest match within the allowable limit of the system. B. PERFORMANCE MEASUREMENTS The performance of a biometric system’s technology can be broken down into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Rate. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un-authorized user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal error rate stands for the rate at which FAR and FRR are equal. This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating characteristics deals with the system’s accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FTE- FTE stands for failure to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use. C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS The three most susceptible areas of vulnerability for attack of a biometric system are: 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) Replay attacks- where perpetrators obtain valid templates from the original user and then use them to directly dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones. IV. ISSUES WITH BIOMETRICS A. IDENTITY THEFT ISSUE Although the ideal goal of biometrical authentication is to have ultimate prevention of identity theft, the issue of an illegitimate user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a person’s identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system. The main problem concerning this issue is in the fact that if an individual’s identification is stolen by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate user’s existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does become compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original user’s biometric data can be used to replace it. B. PRIVACY ISSUE Privacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individual’s movements can be tracked preventing anonymity. Safety of the legitimate users can become compromised, if malevolent individuals choose to target that person in order to obtain their goal. Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse user’s biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals. C. SENSOR OBSTACLES Different types of technology (hardware & software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat. D. FAILURE TO MEET PARAMETERS Another issue concerning implementation of biometrics is in the issue of a system’s failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery. V. CURRENT USES OF BIOMETRICS Although the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including private industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include: 1) Walt Disney World: Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union: First Tech Credit Union is an Oregon based credit union which utilizes keystroke recognition technology for authentication of users on its online website. 3) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Children’s Clearinghouse: A West Virginia based organization entitled Missing Children’s Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank Singapore: Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases. 6) Coca Cola: Coca Cola uses hand scanning machines to replace time cards for employees in order to document worker time keepinsg records. 7) Welfare crack-down: New Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) Notebooks: Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the identity of the user. 9) Prisons: Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners. VI. FUTURE DEVELOPMENTS IN BIOMETRICS Since the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 billion dollars annually by 2020. Emerging trends for future uses of biometric technology seem to lean more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and Naturalization Service may begin implementing biometric technologies to identify illegal immigrants. Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones. VII. CONCLUSION Although not that long ago, the concept of having biometric technology as a part of our mainstream society may have been seen as a science-fictional impossibility, technological innovation has grown to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer confidence and innovation within the biometric industry is also expected to improve. Although no single biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day. CHAPTER III METHODOLOGY There was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the â€Å"mandos† and â€Å"magnas† can easily enter the school’s premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school. Regarding this matter, the group came up with an idea for a topic for their action research. Before they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. After the interview, the group determined that the rules which are commonly violated are: a) wearing of I.Ds inside the school campus; and b) wearing of uniforms on the designated days. The group then convened and finalized their topic that would focus on â€Å"A proposed Biometric ID system to control the reoccurring violations by University of Baguio students.† Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group prepared communication letters addressed to the deans of the different schools of the University and respondents likewise with the survey questionnaire. Upon approval of the deans of the different schools, the group administered the questionnaires to the respondents. The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school. The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most likely be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By the time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study. CONCLUSION In light of the findings, the following conclusions are hereby presented: Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this attitude most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs. The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred fifty thousand pesos. In such case the University of Baguio can still afford this system since it does not only help the students but it can also secure their safety With the help of this proposal it will lessen the burden of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints. RECOMMENDATION Drawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gates should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the ID’s loss. BIBLIOGRAPHY BOOKS * Addiction Today, Sept. 27, 2008. â€Å"Prisons Use Biometrics to Manage Methadone.† * Germain, Jack M., Sept. 11, 2003. â€Å"Beyond Biometrics: New Strategies for Security. * New York Times, Nov. 15, 2008. â€Å"Technology and Media, a Surge in the Demand to use Biometrics. * Osborn, Alice, Aug. 17, 2005. â€Å"Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. â€Å"Biometrics: The Future is Now. * Technology and Human Values Senior Seminar, 2008. â€Å"Biometrics. * Tilton, Catherine J., Feb. 2006. â€Å"The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. â€Å"Biometrics.† ONLINE * http://www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http://www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http://query.nytimes.com/gst/fullpage.html?res=9F06E0DB163EF934A25751C1A9679C8B63&sec=&spon=&pagewanted=1 * http://www.video-surveillance-guide.com/future-of-biometrics.htm * http://www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124&Category=1240 * http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf >. * http://en.wikipedia.org/wiki/Biometrics#cite_note-jain_short_article-20 >.

Friday, January 3, 2020

Chapter 1 The Story Of Alaynas Tale - 1084 Words

Customarily, it was unprecedented for a woman who was promised to another to share more than one dance with the same partner. It could reflect poorly on both her house and the house of her betrothed. However, Alayna could hardly care less about prosperity in this case because she was in the arms of the man she wanted. To hells with what others thought of her. Alayna felt a blush bloom on the apples of her cheeks as she glanced down at his breast plate, â€Å"It’s probably been ages since you’ve had a proper tilt.† â€Å"Truly.† The Dornishman agreed, â€Å"The last tourney I went to was the tourney at Storm’s End held in honor of Lord Steffon.† â€Å"I’d wager you’re itching to redeem yourself against our dear prince.† She smirked, recalling how Griff had†¦show more content†¦Touching where his lips had touched her, she watched on wistfully as the scene unfolded before her as King Aerys called the newly knight Jaime Lannister to stand before the congregation. Two familiar presences found her causing Alayna to grip both Ashara and Griff’s hands. The trio observed as Jaime’s fate was sealed as he swore the oaths of the Kingsguard. Ordinarily, Alayna would’ve been as ecstatic as the rest of the spectators as they cheered once Jaime’s white cloak was clasp to his armor and he was presented to the crowd. But Alayna felt no elation her eyes finding Arthur, the man who could never be hers because he too had swore to hold no lands or titles, take no wife, or father any children. It was a lifetime appointment only completed when death came. Sorrowful tears pricked at the corner of her eyes as she wished for a different life. Alayna put the finishing touches on her favor for Arthur. A handkerchief embroidered with a lilac rose; a combination of his house’s colors and her sigil. A physical symbol her heart belonged to him even if they couldn’t be together. She smirked as she tied off the last stitch, admiring her handy work. For once the sewing lessons her Septa had forced her to sit through paid off, not that Alayna would ever admit it aloud. She had a reputation to uphold. Making her way through the bustling