Mark Anthony Kassab. IT 103, Section 005. March 2, Biometric Scanners in Airports

Size: px
Start display at page:

Download "Mark Anthony Kassab. IT 103, Section 005. March 2, Biometric Scanners in Airports"

Transcription

1 Mark Anthony Kassab IT 103, Section 005 March 2, 2011 Biometric Scanners in Airports By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on web site. Biometric Scanners in Airports 1

2 Introduction Technology is arguably one of the fastest growing fields in the world. It is amazing to think of the strides in technology when you consider that the first computer was made only about forty years ago. However, not all technology is set on a smooth sailing path, as there are many people who oppose new technologies. There are many reasons for this opposition, among them are often fear, frugality (not wanting to spend the money required to develop the technology), close mindedness, etc. One such recent development in technology is being met with opposition. However, it is not the technology itself that people are weary of, instead it is the way that is being implemented. I m talking of course about the recent implementation of full body scanners in airports. The biometric scanners in airports are a step in the right direction towards safer travel as they provide more comprehensive security checks than metal detectors and therefore have the potential of saving countless lives. In this paper I will identify what the biometric scanner is and evaluate the implementation of these machines from an ethical, legal, social, and security standpoint. What? What is a full body scanner? Simply put, it is what it sounds like. It is a machine that renders a full body image of a person without their clothes. The scanners fall under WBI technology. WBI of course stands for whole body imaging and can be done in various ways. In the earlier days, these machines would use what it is called backscatter which is simply very weak X-ray emissions that provide a two dimensional image (Cavoukian, 2009). However, the more recent technology Biometric Scanners in Airports 2

3 that is now being implemented is millimeter-wave which can render a three dimensional image. In the airport setting, the scanners have replaced metal detectors the primary method of security checkpoint. Why? Why has this technology suddenly appeared in what seems like overnight? The event that started the development of a security system using these machines was the tragedy of September 11(Cavoukian, 2009). After this infamous day, funding for airport security surged and people were commissioned to figure out more comprehensive ways to check air travel passengers. Certain systems were implemented before the biometric scanners actually took hold. For example, people who looked suspicious would be subjected to a strip search. Since the recent world events had put terrorists in everybody s nightmares, every terrorist attack that was caught and stopped in the U.S and in other countries only heightened the desire for a more advanced security checkpoint system thus leaving us with the current full body scanning system we have currently. Ethical Standpoint The biometric scanners can spark debate on all frontiers of thought and indeed have since their implementation. The fact that strangers will see you naked has cause unrest within the American people. From an ethical standpoint, people say no one holds the right to violate the privacy of the air travel passengers by seeing them naked. The main argument stating that these scanners will violate ethical boundaries is that the scanners are unconstitutional, specifically under the fourth amendment (Knudsen, 2010). The fourth amendment of course states that Biometric Scanners in Airports 3

4 people are protected against unusual search and seizures. Proponents of the scanners argue that times have dramatically changed since the time the fourth amendment was written and that new measures must be taken for the safety of millions of people (Knudsen, 2010). This is the main argument ethically. It is a straight forward yet almost insurmountable problem in further development of this advanced system as there are so many Americans with opinions on all areas of the spectrum (Knudsen, 2010). Other then this problem mentioned above, there isn t anything else on the ethical front. Legal Standpoint Legally, the implementation of this technology does not violate any laws. One argument from opponents that could bring up legal issues is that these scanners violate the fourth amendment as stated above. However, this argument has been dissolved. The specific wording in the amendment is unusual search and seizure. These searches are not deemed unusual as it has always been customary to screen passengers at airports (Knudsen, 2010). Although these scanners are becoming more accepted as 2/3 of the American population now favor them, many say that the alternative to getting scanned should in fact be illegal (Cohen, 2010). The alternative method of screening is a more comprehensive version of standard strip search. People who have received this method of screening say that it is more invasive than the machine and should therefore be halted. However, this issue has not become too much of a problem yet as an average of only three percent of travelers go through this method a day (Cohen, 2010). Social Standpoint Biometric Scanners in Airports 4

5 When examining this technology (or rather its implementation) from a social perspective, it is clear that it has caused quite a bit of social unrest, but what new and advanced technology hasn t at some point in its existence? Some citizens who oppose the implementation of these machines have started websites and written blogs advocating a boycott of their use by selecting pat downs instead. Although the pat downs are not preferred over the scanners, the object is to delay the flights and throw the airport off schedule. Fortunately no such boycott has been achieved yet (Cohen, 2010). The social unrest does not come from citizens alone. The pilots union is petitioning to not go through the scans. Instead they wish to have their identities verified by biometrics (finger print scans, facial recognition, retina scans) so they can pass through lines and security quickly and get ready for their flights (Strohm, 2010). Several design changes in the technology has been made in order to alleviate some of the social pressures. One major change was to install modesty filters. These filters lower the level of detail in the scans, which helps to put some of the unrest aside. Other measures taken by the TSA include producing a very low detailed image and highlighting areas that require additional searching, and prohibiting any archiving or distribution of the scans by the airport personnel (Cavoukian, 2009). Over all, most of the American population has reported that they are in favor of the new scanners as they are in favor of enhanced airport security after recent attempts by terrorists in the U.S and around the world. Security Standpoint When analyzing this technology from a security perspective there are two directions that can be taken. The first is that these machines are providing an excellent amount of security to air travelers by revealing everything under their clothes. However, Biometric Scanners in Airports 5

6 when analyzing security of this technology it is important to look at it from the other direction. The question mainly asked about the security of the technology is: Is it safe for people to be getting scanned by these waves? This worry stems from the fact that backscatter uses weak X-ray waves (Cavoukian, 2009). Although prolonged exposure to X-ray waves can cause cancer, these waves are too weak and people don t travel every day making the passing through these machines, for the most part, harmless. Even with this in consideration, it doesn t matter that much because the primary type of WBI being used is millimeter waves (Strohm, 2010). These waves are radio waves and therefore do not cause damage, especially when we consider that traveling isn t an everyday thing for ordinary people. Conclusion These biometric scanners have the potential to save the lives of millions of people. People resisting new technologies is merely a phase of cycle that accompanies the implementation of any new technology. It is better to implement this new security system now, have people resist it for a few years, and prevent numerous potential terrorist attacks, rather than suffering an attack and then wishing we had used it earlier. When looking at the technology from different perspectives, the main problem according to most Americans is that they don t want to be seen naked by strangers. This fear is legitimate, but is currently being corrected by lowering the detail of the pictures and requiring the immediate discard of all images. This is a promising technology that can change air travel safety forever and should at least be explored before disregarded as a potential choice. Biometric Scanners in Airports 6

7 Reference Page Ann Cavoukian. (2009). Whole Body Imaging in Airport Scanners: Activate Privacy Filters to Achieve Security and Privacy. (1-8) This is a journal article. It is a valid source of information because it explains the different types of whole body imaging technology. It also talks about possible solutions to the complaints of the opposition. It helped me structure my introduction. Chris Strohm, & Sara Sorcher. (2010). TSA, Pilots weigh Biometric System for Airport Screening. Retrieved from 2&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS= &clientId=31810 This is a journal article. It is a valid source of information because it gives the perspective of citizens as well as the perspective of the pilots. It also gives possible solutions proposed by the pilots themselves. It helped me structure my social perspective analysis. Cohen John, & Halsey Ashley. (2010, November 23). two thirds of americans support full body scanners. Washington Post. Retrieved from This is a newspaper article from the Washington post. It provided information on the thoughts of average Americans. This information helped me structure my ethical and legal perspective analyse.s Geoffrey Steinberg. (2008). Introduction to Computer Information Systems. United States Biometric Scanners in Airports 7

8 of America: Kendall/Hunt PublishingCompany. This is a book. In fact it is our textbook. I used the textbook so I could get some ideas of echnologies to use. It helped me settle on my topic by giving me a greater sense of computer systems and forcing to do additional research on recent technologies. Rob Stapleton. (2007). TSA to use new technology for passenger, baggage screening, 31(47), 8. This is a Journal Article that came out when the Scanners were first introduced. It is a valid source as it gave an excellent context of my topic. It helped me see the development of my topic from beginning to its current status Teresa Knudsen. (2010). Body Scanner, the Constitution, Ethics, and X-Ray. Retrieved from This is an article found online that discusses the constitutional implications of the new scanners. It was valid because it presented me with the most prevalent argument from the opposition of the implementation of this new system Biometric Scanners in Airports 8

Automated License Plate Recognition Technology: Social and Security Implications Jordan Nichols IT October,

Automated License Plate Recognition Technology: Social and Security Implications Jordan Nichols IT October, Jordan Nichols IT 103-001 October, 6 2013 By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/honor-code/. I am fully aware of the

More information

3D Bio printing. Nazrawit Mekonnen IT /29/15. "By placing this statement on my webpage, I certify that I have read and understand the GMU

3D Bio printing. Nazrawit Mekonnen IT /29/15. By placing this statement on my webpage, I certify that I have read and understand the GMU 3-D Bio printing 1 3D Bio printing Nazrawit Mekonnen IT-104-006 Professor Jayasree Jayaram 9/29/15 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code

More information

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard 1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/

More information

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper 1 Aakriti Endlaw IT 104-003 2/23/16 Artificial Intelligence Research Paper "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/

More information

An introduction to the use of Body Scanners, the science behind the technology, and the ethical implications of these devices.

An introduction to the use of Body Scanners, the science behind the technology, and the ethical implications of these devices. An introduction to the use of Body Scanners, the science behind the technology, and the ethical implications of these devices. Amanda Kay Dierickx June 2nd, 2010 Presentation for CS 305 This will be an

More information

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons www.breaking News English.com Ready-to-use ESL / EFL Lessons 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS The Breaking News English.com Resource Book http://www.breakingnewsenglish.com/book.html New

More information

To promote a stronger sense of mutual responsibility, respect, trust, and fairness among

To promote a stronger sense of mutual responsibility, respect, trust, and fairness among To promote a stronger sense of mutual responsibility, respect, trust, and fairness among all members of the George Mason University Community and with the desire for greater academic and personal achievement,

More information

Identifying Materials using Radio Frequency

Identifying Materials using Radio Frequency Identifying Materials using Radio Frequency Group Members: Cuong Trinh/ trinhcuonglouis@yahoo.com Chi Huynh/ chihuynh2005@yahoo.com Khanh Truong/ khtruong89@yahoo.com Advisor: Ray Kwok Date: December 07,

More information

Running Head: UP AND COMING AI TECHNOLOGY 1. AI Technology. Ben Holmes. IT-104 Section

Running Head: UP AND COMING AI TECHNOLOGY 1. AI Technology. Ben Holmes. IT-104 Section Running Head: UP AND COMING AI TECHNOLOGY 1 AI Technology Ben Holmes IT-104 Section 009 10-6-2016 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code

More information

Ethical Analysis of 3D Printing. John MacDonald IT February 10, 2017

Ethical Analysis of 3D Printing. John MacDonald IT February 10, 2017 Ethical Analysis of 3D Printing 1 Ethical Analysis of 3D Printing John MacDonald IT 104-001 February 10, 2017 By placing this statement on my webpage, I certify that I have read and understand the GMU

More information

RUNNING HEAD: Drones and the War on Terror 1. Drones and the War on Terror. Ibraheem Bashshiti. George Mason University

RUNNING HEAD: Drones and the War on Terror 1. Drones and the War on Terror. Ibraheem Bashshiti. George Mason University RUNNING HEAD: Drones and the War on Terror 1 Drones and the War on Terror Ibraheem Bashshiti George Mason University "By placing this statement on my webpage, I certify that I have read and understand

More information

Senior Design Projects: Sample Ethical Analyses

Senior Design Projects: Sample Ethical Analyses Senior Design Projects: Sample Ethical Analyses EE 441/442 Spring 2005 Introduction What follows are three sample ethical analyses to help you in the preparation of your senior design project report. Please

More information

Social Networks, Privacy, and Freedom of Association

Social Networks, Privacy, and Freedom of Association AP Photo/Gus Ruelas Social Networks, Privacy, and Freedom of Association How Individual Rights Can Both Encourage and Reduce Uses of Personal Information Peter Swire February 2011 www.americanprogress.org

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Comprehensive Rules Document v1.1

Comprehensive Rules Document v1.1 Comprehensive Rules Document v1.1 Contents 1. Game Concepts 100. General 101. The Golden Rule 102. Players 103. Starting the Game 104. Ending The Game 105. Kairu 106. Cards 107. Characters 108. Abilities

More information

Defining the Line of Personal Data Privacy

Defining the Line of Personal Data Privacy Defining the Line of Personal Data Privacy L. Joseph Pratt University of Tennessee Chattanooga CPSC 3610 Blurry is the line between private and public data. The internet is a new kind of public since one

More information

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ELECTRONIC PRIVACY INFORMATION CENTER 1718 Connecticut Ave., N.W. Suite 200 Washington, DC 20009 Plaintiff, v. Civil Action No. THE UNITED STATES

More information

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5

More information

WORKSHOP JOURNAL AND HANDOUTS The Motivation Equation: Designing Motivation into Deeper Learning COSEBOC conference, April 25, 2013

WORKSHOP JOURNAL AND HANDOUTS The Motivation Equation: Designing Motivation into Deeper Learning COSEBOC conference, April 25, 2013 WORKSHOP JOURNAL AND HANDOUTS The Motivation Equation: Designing Motivation into Deeper Learning COSEBOC conference, April 25, 2013 Presented by Kathleen Cushman, co-founder of What Kids Can Do For more

More information

RICHMOND Journal of Law and Technology

RICHMOND Journal of Law and Technology RICHMOND Journal of Law and Technology The first exclusively online law review. VOLUME XVII, ISSUE 1, FALL 2010 ARTICLES 1. Near Impossible to Enforce at Best, Unconstitutional at Worst: The Consequences

More information

Media and Information Literacy - Policies and Practices. Introduction to the research report Albania

Media and Information Literacy - Policies and Practices. Introduction to the research report Albania Media and Information Literacy - Policies and Practices Introduction to the research report Regional conference Novi Sad, 23 November 2018 This paper has been produced with the financial assistance of

More information

Graffiti Wall. school. Elementary, Middle, High school there was always a problem with tagging on

Graffiti Wall. school. Elementary, Middle, High school there was always a problem with tagging on Ayala1 Janelle Ayala Professor Ramser English 111-14 December 8, 2016 Graffiti Wall Graffiti has always been a problem in my neighborhood, since I have started school. Elementary, Middle, High school there

More information

STAGE 2 LEGAL STUDIES ASSESSMENT TYPE 1: FOLIO STUDENT RESPONSE (B- STANDARD)

STAGE 2 LEGAL STUDIES ASSESSMENT TYPE 1: FOLIO STUDENT RESPONSE (B- STANDARD) STAGE 2 LEGAL STUDIES ASSESSMENT TYPE 1: FOLIO STUDENT RESPONSE (B- STANDARD) Page 1 of 37 Performance Standards for Stage 2 Legal Studies Knowledge and Understanding Inquiry Analysis and Evaluation Communication

More information

Public Hearing on the use of security scanners at EU airports. European Economic and Social Committee. Brussels, 11 January 2011

Public Hearing on the use of security scanners at EU airports. European Economic and Social Committee. Brussels, 11 January 2011 Public Hearing on the use of security scanners at EU airports European Economic and Social Committee Brussels, 11 January 2011 Giovanni Buttarelli, Assistant European Data Protection Supervisor Speaking

More information

THE TOP STRATEGIES I VE USED TO BUILD SUCCESSFUL BUSINESSES ONLINE

THE TOP STRATEGIES I VE USED TO BUILD SUCCESSFUL BUSINESSES ONLINE 2 THE TOP STRATEGIES I VE USED TO BUILD SUCCESSFUL BUSINESSES ONLINE Hi, My name is Anthony Morrison and you re reading this short book because you ve found one of my amazing student s websites and requested

More information

GETTING TO KNOW GP:!! AN OVERVIEW! * * *!

GETTING TO KNOW GP:!! AN OVERVIEW! * * *! GETTING TO KNOW GP:!! AN OVERVIEW! * * *! PowerPoint Credits: RESEARCH & DESIGN Jill Pavich, NBCT RESOURCES Cambridge International Examinations CIE MATERIALS Sample Test handout PART 1: The GP Exam u

More information

MJ DURKIN 2016 MJ DURKIN ALL RIGHTS RESERVED mjdurkinseminars.com

MJ DURKIN 2016 MJ DURKIN ALL RIGHTS RESERVED mjdurkinseminars.com About MJ Durkin Known as North America s Prospecting Coach, MJ Durkin has travelled around the globe as a keynote speaker presenting at some of the world s largest conventions. He has trained hundreds

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/54809

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

--- ISF Game Rules ---

--- ISF Game Rules --- --- ISF Game Rules --- 01 Definition and Purpose 1.1 The ISF Game Rules are standard criteria set by the International Stratego Federation (ISF), which (together with the ISF Tournament Regulations) have

More information

Running Head: AI and Robotics 1. The Applications of AI: The Uses of AI in the Field of Robotics. Michael Lam IT Professor Richard Reo

Running Head: AI and Robotics 1. The Applications of AI: The Uses of AI in the Field of Robotics. Michael Lam IT Professor Richard Reo Running Head: AI and Robotics 1 The Applications of AI: The Uses of AI in the Field of Robotics Michael Lam IT 104 009 Professor Richard Reo 17 February 2017 Honor Statement: "By placing this statement

More information

RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN

RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN Reclaim Yourself Copyright 2016 by Bastiaan & Chantalle Blikman/ Want2Discover.

More information

CBP proposes to add the following question to ESTA and to Form I-94W:

CBP proposes to add the following question to ESTA and to Form I-94W: Comments of the World Privacy Forum To US Customs and Border Protection Regarding 81 FR 40892; Arrival and Departure Record, Nonimmigrant Visa Waiver Arrival/Departure, and Arrival/Departure, and Electronic

More information

Excelling. throughh life. Empathy for others

Excelling. throughh life. Empathy for others Global Citizen Excelling throughh life Enriching lives Empathy for others The Gl bal Citizenship Award Introduction The International Global Citizen s Award is a new programme which encourages young people

More information

Being in Care Being in Care

Being in Care Being in Care 1 Contents What if I don t understand the information in this booklet? 4 What promises have been made to children and young people in care in Hackney? 5-6 What is being in care? 7 11 Why am I in care?

More information

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI.

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI. MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI www.infosys.com/aimaturity The current utility business model is under pressure from multiple fronts customers, prices, competitors, regulators,

More information

Planning a Campaign Strategy

Planning a Campaign Strategy Planning a Campaign Strategy This is a brief write up of the How to Plan a Campaign Strategy workshop run in Friends of the Earth. It aims to represent the information given in the workshop but isn t a

More information

Thomas Jefferson High School for Science and Technology INTRODUCTION TO SCIENCE POLICY Program of Studies

Thomas Jefferson High School for Science and Technology INTRODUCTION TO SCIENCE POLICY Program of Studies Thomas Jefferson High School for Science and Technology INTRODUCTION TO SCIENCE POLICY Program of Studies Standards Benchmarks Indicators 1. Students will demonstrate an understanding of the fundamental

More information

INTRODUCTION. The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development.

INTRODUCTION. The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development. INTRODUCTION The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development. Our intention was to imagine a world 10 years from now where digital technologies

More information

The challenges raised by increasingly autonomous weapons

The challenges raised by increasingly autonomous weapons The challenges raised by increasingly autonomous weapons Statement 24 JUNE 2014. On June 24, 2014, the ICRC VicePresident, Ms Christine Beerli, opened a panel discussion on The Challenges of Increasingly

More information

Technologists and economists both think about the future sometimes, but they each have blind spots.

Technologists and economists both think about the future sometimes, but they each have blind spots. The Economics of Brain Simulations By Robin Hanson, April 20, 2006. Introduction Technologists and economists both think about the future sometimes, but they each have blind spots. Technologists think

More information

not social, spending most of one's time alone 4. a sum of money paid as a penalty or punishment 6. someone who studies and looks for answers 11.

not social, spending most of one's time alone 4. a sum of money paid as a penalty or punishment 6. someone who studies and looks for answers 11. Video Game Violence Pre-Reading A. Warm-Up Questions 1. Do you ever play video games? If so, how often? 2. Do you have children? Do they play video games, and if so, how often do they play? 3. What do

More information

THE OTB S AND LOCAL GOVERNMENT REVENUE REMARKS TO THE NEW YORK STATE ASSOCIATION OF COUNTIES 2006 ANNUAL FALL SEMINAR

THE OTB S AND LOCAL GOVERNMENT REVENUE REMARKS TO THE NEW YORK STATE ASSOCIATION OF COUNTIES 2006 ANNUAL FALL SEMINAR THE OTB S AND LOCAL GOVERNMENT REVENUE REMARKS TO THE NEW YORK STATE ASSOCIATION OF COUNTIES 2006 ANNUAL FALL SEMINAR THANK YOU FOR THE KIND INTRODUCTION. I NEED TO MAKE TWO CAUTIONARY STATEMENTS BEFORE

More information

Christina Narensky, Psy.D.

Christina Narensky, Psy.D. Christina Narensky, Psy.D. License # PSY 25930 2515 Santa Clara Ave., Ste. 207 Alameda, CA 94501 Phone: Fax: 510.229.4018 E-Mail: Dr.ChristinaNarensky@gmail.com Web: www.drchristinanarensky.com Notice

More information

20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF

20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF WITH CYNTHIA PASQUELLA-GARCIA 20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF (EVEN IF YOU DON T LIKE YOURSELF) W ORKSHEET {MISS EPISODE 002 WITH KAILA PRINS, ACCEPTANCE: WHY WE CAN DO BETTER

More information

The Getting-It-Right Scripts for Therapists

The Getting-It-Right Scripts for Therapists The Getting-It-Right Scripts for Therapists What to Say and When to Say It Copyright 2016 Tamara Suttle As a new solo practitioner, the one question that I dreaded dealing with more than any other was...

More information

Committee on Legal Affairs WORKING DOCUMENT

Committee on Legal Affairs WORKING DOCUMENT European Parliament 2014-2019 Committee on Legal Affairs 23.11.2017 WORKING DOCUMT on three-dimensional printing, a challenge in the fields of intellectual property rights and civil liability Committee

More information

Census Response Rate, 1970 to 1990, and Projected Response Rate in 2000

Census Response Rate, 1970 to 1990, and Projected Response Rate in 2000 Figure 1.1 Census Response Rate, 1970 to 1990, and Projected Response Rate in 2000 80% 78 75% 75 Response Rate 70% 65% 65 2000 Projected 60% 61 0% 1970 1980 Census Year 1990 2000 Source: U.S. Census Bureau

More information

Lesson 2: What is the Mary Kay Way?

Lesson 2: What is the Mary Kay Way? Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent

More information

(Children s e-safety advice) Keeping Yourself Safe Online

(Children s e-safety advice) Keeping Yourself Safe Online (Children s e-safety advice) Keeping Yourself Safe Online Lots of people say that you should keep safe online, but what does being safe online actually mean? What can you do to keep yourself safe online?

More information

Evergreen Patient Attraction and Practice Growth Workbook A 30-Day Action Plan. Keith Rhys

Evergreen Patient Attraction and Practice Growth Workbook A 30-Day Action Plan. Keith Rhys Evergreen Patient Attraction and Practice Growth Workbook A 30-Day Action Plan Keith Rhys Evergreen Patient Attraction and Practice Growth Workbook A 30-Day Action Plan Introduction Inside the pages of

More information

Getting the Best Performance from Challenging Control Loops

Getting the Best Performance from Challenging Control Loops Getting the Best Performance from Challenging Control Loops Jacques F. Smuts - OptiControls Inc, League City, Texas; jsmuts@opticontrols.com KEYWORDS PID Controls, Oscillations, Disturbances, Tuning, Stiction,

More information

Promising technologies to meet tomorrow s security challenges

Promising technologies to meet tomorrow s security challenges Kevin M. Panneton Professor Stephen Saravara Security Management 44.312.201 25 November 2009 Panneton 1 Promising technologies to meet tomorrow s security challenges Within the field of industrial and

More information

Violent Video Games First Amendment United States Constitution

Violent Video Games First Amendment United States Constitution First Amendment United States Constitution Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press;

More information

modified 2018 Frankenstein Culminating Activity Cloning / Genetic Engineering: Mad Scientists or Responsible Citizens?

modified 2018 Frankenstein Culminating Activity Cloning / Genetic Engineering: Mad Scientists or Responsible Citizens? modified 18 Frankenstein Culminating Activity Cloning / Genetic Engineering: Mad Scientists or Responsible Citizens? DUE: Mary Shelley s disdain for the New Science prompts us to think about similar issues

More information

16 WAYS TO MOTIVATE YOURSELF TO TAKE ACTION RIGHT NOW

16 WAYS TO MOTIVATE YOURSELF TO TAKE ACTION RIGHT NOW 16 WAYS TO MOTIVATE YOURSELF TO TAKE ACTION RIGHT NOW NOTICE: You DO NOT Have the Right to Reprint or Resell this Report! You Also MAY NOT Give Away, Sell, or Share the Content Herein Copyright AltAdmin

More information

MIDEL SAFETY INSIDE. The MIDEL Transformer Risk Report

MIDEL SAFETY INSIDE. The MIDEL Transformer Risk Report The MIDEL Transformer Risk Report November 2018 1 Foreword Transformers are critical components of our energy infrastructure, keeping the lights on and the energy flowing in everything from our schools

More information

Jeff Johnson Welcome To Video #2 In Today s Free Training Video I ll Be Revealing What Will Quickly Become

Jeff Johnson Welcome To Video #2 In Today s Free Training Video I ll Be Revealing What Will Quickly Become Jeff Johnson Welcome To Video #2 In Today s Free Training Video I ll Be Revealing What Will Quickly Become The Center Of Your Traffic-Getting And List Building Universe First Let s Do A Quick Recap Of

More information

HERE S WHAT I M GOING TO TEACH YOU

HERE S WHAT I M GOING TO TEACH YOU 2 HERE S WHAT I M GOING TO TEACH YOU Have you been struggling to find a way to build your very own business on the Internet? If you re like me (and countless other people around the world) you ve likely

More information

Technologies that will make a difference for Canadian Law Enforcement

Technologies that will make a difference for Canadian Law Enforcement The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,

More information

Finally, The Truth About Why Your Home Didn t Sell and Your Mad As Heck

Finally, The Truth About Why Your Home Didn t Sell and Your Mad As Heck Finally, The Truth About Why Your Home Didn t Sell and Your Mad As Heck Do you know the difference between passive selling and active marketing? Until you do, you won t even have a chance of selling in

More information

Creating a Character and Character Development

Creating a Character and Character Development Creating a Character and Character Development Beginning XP: All new characters begin with 36 General XP points. The Player is free to spend them in any way they wish. There are no classes or unusual races

More information

(Beijing, China,25 May2017)

(Beijing, China,25 May2017) Remarks by the Secretary General of the International Civil Aviation Organization (ICAO), Dr. Fang Liu, to the First Session of the 2017 China Civil Aviation Development Forum: New Opportunities for Aviation

More information

LESSON 8. Putting It All Together. General Concepts. General Introduction. Group Activities. Sample Deals

LESSON 8. Putting It All Together. General Concepts. General Introduction. Group Activities. Sample Deals LESSON 8 Putting It All Together General Concepts General Introduction Group Activities Sample Deals 198 Lesson 8 Putting it all Together GENERAL CONCEPTS Play of the Hand Combining techniques Promotion,

More information

Before the Federal Communications Commission Washington, D.C ) ) ) ) ) ) ) ORDER. Adopted: June 29, 2010 Released: June 30, 2010

Before the Federal Communications Commission Washington, D.C ) ) ) ) ) ) ) ORDER. Adopted: June 29, 2010 Released: June 30, 2010 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of Implementation of Sections 309(j and 337 of the Communications Act of 1934 as Amended Promotion of Spectrum Efficient

More information

Terms and conditions APPROVED DOCUMENT. Clear design Simple language

Terms and conditions APPROVED DOCUMENT. Clear design Simple language Terms and conditions APPROVED DOCUMENT Clear design Simple language Terms and conditions 1. Welcome to Marcus by Goldman Sachs 2 2. How to contact us 2 3. How your Marcus account works 3 4. When we might

More information

Game Theory for Safety and Security. Arunesh Sinha

Game Theory for Safety and Security. Arunesh Sinha Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work

More information

Stage 2 Legal Studies. Assessment Type 2: Inquiry

Stage 2 Legal Studies. Assessment Type 2: Inquiry Stage 2 Legal Studies Assessment Type 2: Inquiry Purpose You have the opportunity to demonstrate your civic literacy skills through the study of a contemporary issue related to an aspect or aspects of

More information

PAGES SAMPLE

PAGES SAMPLE Pablo PICASSO Spanish 1881 1973, worked in France 1904 73 Weeping woman 1937 oil on canvas 55.2 x 46.2 cm National Gallery of Victoria, Melbourne Purchased by donors of The Art Foundation of Victoria,

More information

Protecting Intellectual Property

Protecting Intellectual Property Protecting Intellectual Property Saturday, August 10, 2013 8:00 am - 12:00 pm Terlaje Professional Building, Hagåtña Why You Should Consider Uncopyright for Your Art A presentation by Leo Babauta ZenHabits.net

More information

Knowing Your Customers Action Guide

Knowing Your Customers Action Guide Knowing Your Customers Action Guide Copyright AgeInPlace.com and Empowering the Mature Mind 2015. Unauthorized use and/or duplication of this material without express written permission from AgeInPlace.com

More information

LESSON 2. Opening Leads Against Suit Contracts. General Concepts. General Introduction. Group Activities. Sample Deals

LESSON 2. Opening Leads Against Suit Contracts. General Concepts. General Introduction. Group Activities. Sample Deals LESSON 2 Opening Leads Against Suit Contracts General Concepts General Introduction Group Activities Sample Deals 40 Defense in the 21st Century General Concepts Defense The opening lead against trump

More information

Anti cheating guidelines for Arbiters

Anti cheating guidelines for Arbiters Annex 19B Anti cheating guidelines for Arbiters (These guidelines shall be included in the subjects and will be taught in all Workshops, FIDE Arbiters Seminars and Courses for International and FIDE Arbiters).

More information

1. WHAT AREAS OF LEARNING DOES THIS ASSESSMENT ADDRESS?

1. WHAT AREAS OF LEARNING DOES THIS ASSESSMENT ADDRESS? 11 Legal Studies TASK 1: The Australian Legal System Due Date: Friday 24 th March 2017 Date Distributed: Wednesday 1 st March 2017 Task Weighting: 20% Outcomes P1. identifies and applies legal concepts

More information

Focusing Software Education on Engineering

Focusing Software Education on Engineering Introduction Focusing Software Education on Engineering John C. Knight Department of Computer Science University of Virginia We must decide we want to be engineers not blacksmiths. Peter Amey, Praxis Critical

More information

Cleansing: Releasing Mental, Emotional and Physical Clutter

Cleansing: Releasing Mental, Emotional and Physical Clutter Cleaning out Clutter Our living space is probably the most important space we spend our time. We sleep, eat, bathe, and hopefully relax in our sacred domain. What does your home look like? Is it so cluttered

More information

Best of Booking & Party Questions

Best of Booking & Party Questions www.julieannejones.com Presents Best of Booking & Party Questions Study Guide 1 We re going to answer several of the best questions we ve had over the past four years pertaining to recruiting. What is

More information

DRAFT MINUTES OF THE BVAA/CEIR/VDMA MEETING - MACHINERY DIRECTIVE

DRAFT MINUTES OF THE BVAA/CEIR/VDMA MEETING - MACHINERY DIRECTIVE DRAFT MINUTES OF THE BVAA/CEIR/VDMA MEETING - MACHINERY DIRECTIVE 16 JULY 2015 Attendees (see signatures & business cards in Annex) Christophe Bochaton Martin Greenhalgh Thomas Kraus Alessandro Maggioni

More information

RF EMISSIONS FROM SMART GRID ELECTRIC METERS, HAN DEVICES, AND THEIR RELATIONSHIP TO THE FCC MAXIMUM PERMISSIBLE EXPOSURE LIMIT (MPE)

RF EMISSIONS FROM SMART GRID ELECTRIC METERS, HAN DEVICES, AND THEIR RELATIONSHIP TO THE FCC MAXIMUM PERMISSIBLE EXPOSURE LIMIT (MPE) RF EMISSIONS FROM SMART GRID ELECTRIC METERS, HAN DEVICES, AND THEIR RELATIONSHIP TO THE FCC MAXIMUM PERMISSIBLE EXPOSURE LIMIT (MPE) PREPARED FOR BY Gordon W. Hudson 20 th September 2012 Table of Contents

More information

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment. Title: Biometric Security and Privacy Handout for classes: Class schedule: Contact information and office hours: Prof. Bon Sy, Queens College (NSB A104) Phone: 718-997-3477, or 718-997-3566 to leave a

More information

An Exploration of How Technology Use Influences Outdoor Recreation Choices

An Exploration of How Technology Use Influences Outdoor Recreation Choices Ursidae: The Undergraduate Research Journal at the University of Northern Colorado Volume 3 Number 3 Article 3 January 2014 An Exploration of How Technology Use Influences Outdoor Recreation Choices Cassie

More information

We changed that. In November 2013, Council of Division head Bob Trumpbour and vice. times for programs you said you wanted.

We changed that. In November 2013, Council of Division head Bob Trumpbour and vice. times for programs you said you wanted. In Winter 2012, AEJMC held the last of its infamous chip auctions, in which several score people flew to a random place in early December and, after making deals about programming, literally threw poker

More information

U.S. Army veteran says mice drove her and her autistic son out of their apartment home

U.S. Army veteran says mice drove her and her autistic son out of their apartment home U.S. Army veteran says mice drove her and her autistic son out of their apartment home By Angela Woolsey May 25 th, 2018 When a U.S. Army veteran officially moved out of Arbor Park Apartments in Alexandria

More information

HOW TO MAKE MONEY ONLINE - Video 3 - The Process

HOW TO MAKE MONEY ONLINE - Video 3 - The Process HOW TO MAKE MONEY ONLINE - Video 3 - The Process So now we have addressed our mindset, let s now look at how you are going to make money online. There s a great saying that goes, systems work, its people

More information

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016 TABLE OF CONTENTS 1. PURPOSE OF THE POLICY... 2 2. RESPONSIBILITIES... 2 3. GENERAL PRINCIPLES OF SELECTION... 2 4. SPECIAL COLLECTIONS... 6 5. DONATIONS OF MATERIALS... 7 6. COLLECTION MAINTENANCE...

More information

United States Court of Appeals for the Federal Circuit

United States Court of Appeals for the Federal Circuit NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit 2006-3321 JUELITHIA G. ZELLARS, v. Petitioner, DEPARTMENT OF THE AIR FORCE, DECIDED: December 6, 2006 Respondent.

More information

CODE OF CONDUCT & GOOD PRACTICE GUIDE

CODE OF CONDUCT & GOOD PRACTICE GUIDE ` UK SPORTS ASSOCIATION FOR PEOPLE WITH LEARNING DISABILITY CODE OF CONDUCT & GOOD PRACTICE GUIDE FOR GB ATHLETES FOR ALL GB ATHLETES This document is to tell you what rules you should follow when you

More information

Get That Office Organized (Finally!)

Get That Office Organized (Finally!) Get That Office Organized (Finally!) All rights reserved. No part of this book may be reproduced or transmitted in any form or by any electronic or mechanical means, including information storage and retrieval

More information

What is the Law of Attraction?

What is the Law of Attraction? "You are what you think, not what you think you are." - Bruce MacLelland Where focus goes, energy flows. Tony Robbins What is the Law of Attraction? I m so glad to see you ve made it to Module 2. I hope

More information

Writing Constructed Responses

Writing Constructed Responses Writing Constructed Responses Step One: READ THE QUESTION!!! Make sure you read the question carefully. Make sure you understand what the question is asking. Example Question: With reference to the source

More information

Chapter 1. Why Is Report Writing Important? First Impressions

Chapter 1. Why Is Report Writing Important? First Impressions Chapter 1 Why Is Report Writing Important? Think back to when you first decided on a code enforcement career. What attracted you? Chances are it wasn't report writing. Inspectors frequently say that writing

More information

Hatchet Chapters 1, 2

Hatchet Chapters 1, 2 Name Hatchet Chapters 1, 2 1. Where is the plane taking Brian? Why? 2. How does the pilot treat Brian? 3. What was Brian s mother s gift to him when he left? How did he feel as he accepted the gift? Why?

More information

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2 Pi Privacy Introduction The World We Live In: Information collection, exchange, combination, and distribution easier than ever More information access less privacy Trade-offs Privacy vs. need for credentials

More information

Script Guide. 1. Prepare to Inspire. 2. Craft Your Conversation. 3. Scripts to Step Forward. 4. Create Curiosity. 5.

Script Guide. 1. Prepare to Inspire. 2. Craft Your Conversation. 3. Scripts to Step Forward. 4. Create Curiosity. 5. 1. Prepare to Inspire 2. Craft Your Conversation 3. Scripts to Step Forward 4. Create Curiosity 5. Handle Objections 6. Lead the Conversation through Questions 7. Refer to Your Team Leader 8. Script Summary

More information

BEFORE THE SCHOOL IN THE MATTER OF

BEFORE THE SCHOOL IN THE MATTER OF : BEFORE THE SCHOOL IN THE MATTER OF : ETHICS COMMISSION : : JOHN TALTY and SHARON KIGHT : Docket No. C18-05 and C19-05 BRICK TOWNSHIP : BOARD OF EDUCATION : OCEAN COUNTY : DECISION : PROCEDURAL HISTORY

More information

Bridge BG User Manual ABSTRACT. Sven Eriksen My Bridge Tools

Bridge BG User Manual ABSTRACT. Sven Eriksen My Bridge Tools This user manual doubles up as a Tutorial. Print it, if you can, so you can run Bridge BG alongside the Tutorial (for assistance with printing from ipad, see https://support.apple.com/en-au/ht201387) If

More information

Australian Airport Security The Use of Full Body Scanners

Australian Airport Security The Use of Full Body Scanners Australian Airport Security The Use of Full Body Scanners Reference: Aviation Transport Security Amendment (Screening) Bill 2012 Submission to Australian Government s Senate Rural and Regional Affairs

More information

MANAGING PEOPLE, NOT JUST R&D: FIVE COMPANIES EXPERIENCES

MANAGING PEOPLE, NOT JUST R&D: FIVE COMPANIES EXPERIENCES 61-03-61 MANAGING PEOPLE, NOT JUST R&D: FIVE COMPANIES EXPERIENCES Robert Szakonyi Over the last several decades, many books and articles about improving the management of R&D have focused on managing

More information

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC)

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC) Privacy, Ethics, & Accountability Lenore D Zuck (UIC) TAFC, June 7, 2013 First Computer Science Code of Ethics? [1942] 1. A robot may not injure a human being or, through inaction, allow a human being

More information

Let s Talk: Conversation

Let s Talk: Conversation Let s Talk: Conversation Cambridge Advanced Learner's [EH2] Dictionary, 3rd edition The purpose of the next 11 pages is to show you the type of English that is usually used in conversation. Although your

More information