Get help from the best in academic writing.

Embry Riddle Aeronautical Airport Landside Information Systems Case Study

Embry Riddle Aeronautical Airport Landside Information Systems Case Study.

Hi,Here are the instructions for this case study:OVERVIEW:In this module, you will continue in the same airport information system project scenario that began in Module 1. To refresh your memory, please review 1.4 Video Project: Airport Management Information System.In this activity, you will first review a scholarly paper on the
topic of security threats to airport supervisory control and data
acquisition information systems. Next, you will conduct in-depth
research on the topic of a real-life airport landside information system
security breach. Once you have gained knowledge relating to the attack
and gathered sufficient information, you will present a case in a
scholarly APA style paper detailing the incident and describing how the
vulnerability-associated risk and subsequent attack perpetrated by the
threat could have been prevented.
Review the SCADA Threats in the Modern Airport (ProQuest/Hunt Library) (Links to an external site.) scholarly paper.

Conduct research relating to an airport information system security breach.

Survey the data presented on the Module 2 Readings and Resources page to collect your data. You may use the ERAU Hunt Library EAGLEsearch tool (Links to an external site.) and Subject Guides, (Links to an external site.)Links to an external site. as well as the Internet to obtain any additional material you might need.

In your case study paper:
Provide the airport’s location, size, and other associated data.Describe the information system that was maliciously attacked.Identify the risks that made the airport information system vulnerable to the attack.Describe the methodologies and tactics that were subsequently implemented as a result of the incident to prevent future attacks.
To receive a high-level grade in this assignment, you must put
forth a considerable amount of time and effort. You will be graded on
the scholastic quality of your paper and the fulfillment of the
requirements stated in the Requirements section. Please proceed to the Requirements section. REQUIREMENTS:Review the Writing Style Guide.Review the rubric below the assignment data for detailed grading criteria before beginning your work.Use your own words to demonstrate a clear understanding and comprehension of the subject matter.Copying and pasting one direct quote after another without
presenting a majority of the data in your own words will result in a low
assignment grade.Support your personal opinions, feelings, and observations with meaningful scholarly data obtained from primary sources.SUBMISSION:Submit a scholarly paper that addresses the following:Utilize Microsoft Word.Title Page (Page #1).Body of the text (4-5 pages) to include:
Centered title of the paper.Introductory paragraph.ConclusionIn-text citations for direct quotes or paraphrased data from primary sources.
Reference List Page (Page #6 or #7).Times New Roman 12-point fontDouble-spaced lines.APA Style 7th EditionUtilize the APA_Style_7th_Edition Template.docx. Edit the template to remove the informational notes and add your data. Select Enable Editing immediately below the Microsoft Word toolbar to be able to edit the document.Be sure to proofread the data thoroughly before submitting it for evaluation and grading.Be sure that you save your paper in a DOCX format with the following
naming convention: First name Last name Assignment number.docx. For
example, Abe Lincoln 2.3.docx.Your paper will be evaluated through Turnitin when you submit your assignment in this activity.Your instructor will use the rubric at the bottom of the page for evaluating and grading your submission.Rubric
MGMT 494 Assignment 2.3 Case Study & Research Paper Rubric

MGMT 494 Assignment 2.3 Case Study & Research Paper Rubric

Criteria
Ratings

Pts

This criterion is linked to a Learning Outcome
Analysis & Content

55.0
pts
Excellent
– A THOROUGH analysis of the topic was provided AND a minimum of FOUR
FULL pages of double-spaced text was submitted in the body of the text.

45.0
pts
Very
Good – A THOROUGH analysis of the topic was provided AND a minimum of
THREE FULL pages of double-spaced text was submitted in the body of the
text.

40.0
pts

Satisfactory
– A THOROUGH analysis of the topic was provided AND a minimum of TWO
FULL pages of double-spaced text was submitted in the body of the text.

35.0
pts
Near
Failing – A BASIC analysis of the topic was provided AND a minimum of
TWO FULL pages of double-spaced text were submitted in the body of the
text.

0.0
pts
Failing – A minimum of TWO FULL pages of double-spaced text was NOT submitted in the body of the text.

55.0 pts

This criterion is linked to a Learning Outcome
Conclusion & Recommendations

15.0
pts
Excellent – The conclusion was sound AND the recommendations were ENTIRELY appropriate.

13.0
pts
Very Good – The conclusion was sound AND the recommendations were MOSTLY appropriate.

11.0
pts
Satisfactory – The conclusion was sound AND the recommendations were SOMEWHAT appropriate.

9.0
pts
Near Failing – The conclusion was NOT sound OR the recommendations were NOT SOMEWHAT appropriate.

0.0
pts
Failing – A conclusion with recommendations was NOT presented.

15.0 pts

This criterion is linked to a Learning Outcome
Style & Mechanics

10.0
pts
Excellent – ALL sentences were properly structured AND the data was ENTIRELY free of spelling, grammar, and punctuation errors.

9.0
pts
Very Good – ALL sentences were properly structured BUT there were SOME spelling, grammar, OR punctuation errors.

8.0
pts
Satisfactory – SOME sentences were NOT properly structured AND there were SOME spelling, grammar, OR punctuation errors.

7.0
pts
Near Failing – SOME sentences were NOT properly structured AND there were MANY spelling, grammar, OR punctuation errors.

0.0
pts
Failing – MANY sentences were not properly structured AND there were MANY spelling, grammar, and punctuation errors.

10.0 pts

This criterion is linked to a Learning Outcome
Scholarly Research

10.0
pts
Excellent
– Scholarly research was conducted utilizing a minimum of TWO outside
primary sources (excluding the textbook) AND terminology from the source
materials was presented.

9.0
pts
Very
Good – Scholarly research was conducted utilizing a minimum of TWO
outside primary sources (excluding the textbook) BUT terminology from
the source materials was NOT presented.

8.0
pts
Satisfactory
– Scholarly research was conducted utilizing a minimum of ONE outside
primary source (excluding the textbook) AND terminology from the source
materials was presented.

7.0
pts
Near
Failing – Scholarly research was conducted utilizing a minimum of ONE
outside primary source (excluding the textbook) BUT terminology from the
source materials WAS NOT presented.

0.0
pts
Failing – Scholarly research was NOT conducted utilizing a minimum of ONE outside primary source (excluding the textbook).

10.0 pts

This criterion is linked to a Learning Outcome
APA Style

10.0
pts
Excellent
– ALL of the following APA style components were provided AND there
were NO format errors: Title Page, Page Header with Page Numbers,
Introductory Paragraph AND Conclusion Section in the Body of the Text,
Reference List Page.

9.0
pts
Very
Good – ALL of the following APA style components were provided AND there
were SOME format errors: Title Page, Page Header with Page Numbers,
Introductory Paragraph AND Conclusion Section in the Body of the Text,
Reference List Page.

8.0
pts
Satisfactory
– SOME of the following APA style components were NOT provided AND
there were NO format errors: Title Page, Page Header with Page Numbers,
Introductory Paragraph AND Conclusion Section in the Body of the Text,
Reference List Page.

7.0
pts
Near
Failing – SOME of the following APA style components were NOT provided
AND there were SOME format errors: Title Page, Page Header with Page
Numbers, Introductory Paragraph AND Conclusion Section in the Body of
the Text, Reference List Page.

0.0
pts
Failing
– SOME of the following APA style components were NOT provided AND
there were MANY format errors: Title Page, Page Header with Page
Numbers, Introductory Paragraph AND Conclusion Section in the Body of
the Text, Reference List Page.

10.0 pts

Total Points:
100.0

Embry Riddle Aeronautical Airport Landside Information Systems Case Study

Miami Dade College Responsible Parenting Discussion.

Raising children today is not easy. Their health is impaired by diet, lack of exercise, environmental toxins, and stress. They are subject to bullies in school, negative influences in the media, and they are pressured to grow up too fast. Technology has exposed children to so much more than they used to be exposed to. Given all of these impacts, discuss the factors that lead to raising healthy children. What would you do to raise your children to be well-adjusted physically and emotionally? How would you handle the attraction of technology in your household? 
Miami Dade College Responsible Parenting Discussion

PHILO 101 The Ethics of Belief and The Will to Believe Questions.

I’m working on a Philosophy exercise and need a sample draft to help me learn.

read the two articles: (1) The Ethics of Belief by W.K. Clifford https://human.libretexts.org/Bookshelves/Philosophy/Book%3A_Philosophy_of_Western_Religions_(Levin_et_al.)/01%3A_THE_BASICS_OF_RELIGIONS_AND_THE_NATURE_OF_BELIEF/1.05%3A_The_Ethics_of_Belief_(W.K._Clifford) (2) The Will to Believe by William JamesThis article is right after the Clifford article on the same website, or athttps://en.wikisource.org/wiki/The_Will_to_Believethen answer the questions below 1. At first, the ship owner has doubts about whether or not his ship is in good enough shape to be safe to sail. What causes him to change his mind and be confident the ship will is safe?2. What happens to the ship? (Last sentence of the first paragraph)3. Clifford says (in the second paragraph) that the ship owner believed the ship would sail safely. You might think that, consequently, he can’t be blamed for the fact that the ship sank and its passengers died. But Clifford says that the ship owner is blameworthy and responsible for the tragedy. Why is the ship’s owner responsible?4. What if the ship had not sunk- would the ship owner still be blameworthy, according to Clifford? Why or why not?5. Next, Clifford describes an “island in which some of the inhabitants professed a religion teaching neither the doctrine of original sin nor that of eternal punishment.” In other words, this island community is not Christian. Because the inhabitants of this island are not Christian, they seem strange to members of a Christian community, and the members of the Christian community accuse the island inhabitants of abusing the children on the island. Since they have no evidence to back up this accusation, Clifford says the accusers are worthy of blame. But what if the accusations turn out to be true- that the island community does abuse its children- then are the accusers worthy of blame according to Clifford? Why or why not?6. Clifford is arguing in favor of the view that it is always wrong to believe anything when you don’t have sufficient evidence indicating that your belief is true. He just gave two examples (the ship and the island community) to support this conclusion. He next considers the objection that it is okay to have beliefs without any evidence; only actions that follow the belief are blameworthy. So, for example, I might believe that a student in my class is a murderer even though I have no evidence for this. According to Clifford, it is wrong for me to believe this because I have no evidence. According to the objection, though, it is okay for me to believe the student is a murderer, as long as I don’t engage in any actions based on this belief (for example, I might ruin this student’s reputation by telling everyone that he is a murderer). How does Clifford respond to this objection?7. Clifford then says “Belief [is a] sacred faculty which prompts the decisions of our will, and … is desecrated when given to unproved and unquestioned statements, for the solace and private pleasure of the believer.” Can you give an example of what Clifford means? (By the way, this statement is directly opposed to the thesis William James will maintain in The Will to Believe.)8. Who has a duty to question their beliefs, according to Clifford?9. Clifford makes two more arguments in favor of his thesis that it is always wrong to believe anything without sufficient evidence. He calls a person who has unjustified beliefs “credulous.” So, it is wrong to be “credulous.” You might think that sometimes it doesn’t do any harm to be “credulous” because your unjustified beliefs don’t harm anyone. Clifford compares unjustified beliefs that do no immediate harm to ??????? that does no immediate harm.10. How does Clifford state his thesis near the end of the article?The Will to Believe by William James11. In this essay James says he will defend everyone’s right to __________________________.12. Do most of James’ students at Harvard agree with his view or do most disagree?13. What is the difference between a “live hypothesis” and a “dead hypothesis”?14. James defines a “genuine option” as an option that has three characteristics. What are the three characteristics?15. James points out that many, perhaps most, or our beliefs are not beliefs that we choose. What are two examples he gives of beliefs that are not a matter of choice?16. Next, James describes a famous argument called “Pascal’s Wager.” In one sentence, try to express why you should believe in God, according to Pascal’s Wager.17. Is James convinced by Pascal’s Wager? Why or why not?18. At the end of section II, James has said (a) whether we believe something or not is usually not something we can choose and (b) even when we can choose to believe something without evidence, people like Clifford say that it is immoral to do so. James will argue that sometimes we can choose (use our Will) to believe, and it is morally acceptable to do so. There’s no question to answer here…19. James says “Our reason is quite satisfied, in nine hundred and ninety-nine cases out of every thousand of us, if it can find a few arguments that will do to recite in case our credulity is criticised by some one else.” a. What does this mean? b. Does James have lots of confidence in evidence and rationality or not much confidence in evidence and rationality?20. State James’ thesis as he expresses it here.21. Suppose the evidence for “Jack murdered Jill” is 50% and the evidence that “Jack did not murder Jill” is also 50%. Is the most rational thing to do in this situation to believe neither (that is, to suspend belief), according to James?In this section James says that humans are all “absolutists by instinct.” He means that we can question things and remain skeptical in the moment, but as we proceed through our , we are absolutely confident that our beliefs are correct. 22. We will see (or did see) that in the Second Meditation Descartes says that we only know one thing for sure. What is the one thing we know for sure, according to James? Is this the same as Descartes or different?23. At the beginning of this section James says “But now, since we are all such absolutists by instinct, what in our quality of students of philosophy ought we to do about the fact? Shall we espouse and indorse it? Or shall we treat it as a weakness of our nature from which we must free ourselves, if we can?” James’ answer(s) to this (these) questions is not easy to understand; I think the text is difficult. But try to summarize his answer to this (or these) question(s).
PHILO 101 The Ethics of Belief and The Will to Believe Questions

Cyber Attacks. Help me study for my Communications class. I’m stuck and don’t understand.

Reply for below 4 posts with 75-100 words each
APA format
Cite references
1.
For this final week of discussion, we are asked to examine the broad subject of response. When researching this category, there are two main differences in this approach. According to our text, these categories fall into pre-attack response and post-attack response (Amoroso, 2012). Simply put, these categories distinguish between responses to known attacks and resources configured to collect the necessary information and data to respond, and reactive measures taken against threats that are unknown. The text outlines these as Front end loaded prevention and back end recovery processes (Amoroso, 2012). Each category has its place within the security posture and is usually determined by the amount of resources and capitol an organization has available.
The text continues to discuss the importance of National infrastructure warnings and indicators and how they may differ between the specific needs of each agency and environment (Amoroso, 2012). It is clear from this research that a clear definition between the two categories is essential for securing the Nation’s critical infrastructure. Each scenario is unique, and it is the role of security stakeholders to develop robust, strategic policies and procedures to combat both known and unknown attack vectors (Johnson, 2019). Understanding how to protect and respond to known threats as well as how to identify and categorize unknown threats can make the difference between losing critical assets and successfully deterring attacks. To continue to support the text’s research on incident response teams, research from a journal on incident response team creation, supports the evaluation of how to create the proper incident response team. According to the author Johnson, The computer security incident response teams (C.S.I.R.T.) function is to react in a timely fashion, to intrusions, types of theft, denial of service attacks and many other events that have yet to be to executed or considered against their company (Johnson, 2014). The role of this team is extended to encompass many duties across the organization relating to threats. The team can be called into action in response to a particular threat or during a discovery of an unknown threat. The research continues to outline the following recommendations for successful incident response:
• Provide a comprehensive view of attack methods, vulnerabilities, and the impact of attacks on information systems and networks; provide information on
incidents and vulnerability trends and characteristics
• Build an infrastructure of increasingly competent security professionals who respond quickly to attacks on Internet-connected systems and are able to
protect their systems against security compromises
• Provide methods to evaluate, improve, and maintain the security and survivability of network systems
• Work with vendors to improve the security of as-shipped products
The main theme of this research revolves around defining the proper mission statement and understanding how to communicate effectively (Johnson, 2019.
In respect to the knowledge gained in this chapter as well as the entire course, the research and material provided within this course has equipped me to better understand threats on various levels. Whether I am developing software for the Federal government or working with third party vendors to facilitate development processes, the tools and understanding have helped me to identify areas where there is a need for concern. In respect to National Infrastructure, this course has helped me to understand security policies on a larger platform and how they might affect the Nation as a whole. Throughout my educational career, a main theme that has helped my studies and applies directly to each category of business is knowledge. Learning the concepts and being equipped with the knowledge to understand the major themes has increased my ability to use expanded themes in the real world. I especially enjoyed the topics surrounding the EPA as I work directly for this agency but have not been exposed to the larger security policies surrounding this agency.
In response to the learning platform and discussion board, I believe that the online learning platform is a great way to learn and expand on topics. Diversity is key to understanding difficult subject matter, and the diversity within this course and platform allows for various perspectives that come from all walks of life. The research provided to our posts in the discussion boards allows a topic to be dissected and transformed into detailed subject matter. The only pitfall I see is that you get out of this style of learning what you put in. It takes extra effort to add valid research and expand on the critical subjects discussed throughout the course.
I have enjoyed this course greatly and I thank all members of the class for their participation. I also thank Dr. McFarland for his guidance throughout this course.
Best Regards,
Ricardo Scarello
References
Amoroso, E. (2012). Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. Amsterdam, Netherlands: Elsevier.
Johnson, L. R. (2014). The Security Incident Response Team Members. Computer Incident Response and Forensics Team Management, 37-46. doi:10.1016/b978-1-59749-996-5.00004-2

Johnson, L. R. (2019). Information technology. Security techniques. Information security incident management. doi:10.3403/30268878
2.
Threats and Countermeasures for Cyber-Attack
In the weekly reading, I learned about various means in which one can mitigate threats in the systems in case of a cyber-threat. These processes are essential as they will help me protect my organization’s greatest asset, which is information. When data from the organization is well protected from the outsiders, an organization can conduct its daily business effectively leading to better business performance.
I learned about situational awareness. This a process that will help me able to detect the various threats across my organization systems. Thus, situational awareness will help me in decision making regarding matters of cybersecurity (Rajivan & Cooke, 2017). The procedure would help me achieve better outcomes through prioritizing cybersecurity thus provision of reliable security and performance. For instance, if I am a data analyst in a certain organization, my obligation would be harnessing data from both external and internal systems. I will be able to accomplish this through the use of situational awareness.
Also, I learned about the most common attacks in the organization’s systems. They include illiteracy among my work colleagues in matters related to cybersecurity, phishing, web-based attacks, malicious insiders, viruses, malware among others (Bendovschi, 2015). When search activities are subjected to the organization systems it is likely to be affected leading to poor organizational performance. Thus, the knowledge I gained from the weekly readings will enable me to counter such activities that can lead to my organization’s downfall.
Lastly, I gained knowledge about cybersecurity policies that I can use in the organization to better information and data protection. This includes training the employees in digitalized companies. This ensures that they understand the cybersecurity risks and ways to avoid them.

References
Bendovschi, A. (2015). Cyber-attacks–trends, patterns, and security countermeasures. Procedia Economics and Finance, 28, 24-31.

Rajivan, P., & Cooke, N. (2017). Impact of team collaboration on cybersecurity situational awareness. In Theory and Models for Cyber Situation Awareness (pp. 203-226). Springer, Cham.
3.
It is very difficult for organizations to plan effectively and to understand the type of responsiveness to cybersecurity incidents they need or the level of support they need. Since many organizations adopt different perspectives in practice, there is no common understanding of what a cybersecurity incident is, with a wide variety of interpretations without a common definition. This increases both the efficiency and effectiveness of your efforts to respond to incidents while avoiding common mistakes; because it can dramatically increase the negative impact of an incident because companies face many pitfalls that help them manage a cybersecurity incident. Each incident is unique and complex to provide comprehensive advice on response and recovery; while these tricks and high-level practices can help manage a crisis. It significantly reduces the impact of a major cybersecurity incident about your business and deters opportunistic threats and slow down determined opponents; when the preparation and execution of a well-planned response, the operational cost of an attacker may increase. Administrative access to enterprise computer systems is compromised by the management of a major incident of cybersecurity for organizations that integrate the plans/recovery after exercise existing disaster; because an incident can range from a minor impact to a major incident that affects the confidentiality, integrity, or availability of the organization’s information resources and assets. When the CISO and CTO are informed, the response plan to incidents of violation of privacy is activated, as indicated by the details of the potential violation; it conducts a preliminary analysis of the facts and assesses the situation to determine the nature of the incident (info.microsoft.com, 2019).
Fraud or identity theft for a customer or an employee of our organization can result in harm or inconvenience to the person; because that incident response plan describes the steps that our organization will undertake during the discovery of unauthorized access to personal information about an individual. It provided that personal information would not be used or subject to subsequent unauthorized disclosure of data; because the personal information provided by an employee or agent of our company for commercial purposes does not constitute a violation. An incident demands IT service desk applications to enable incident response plans in case of an alleged violation of privacy; because in case of breach of confidentiality affecting the personal information of an employee who has been activated for a data breach of an individual. All organizations should consider using the services of one or more third-party providers specialized in responding to cybersecurity incidents for at least some activities; because, in the current design of the network, there may be an unmanageable amount of attacking surface when it comes to virtually managing a sophisticated cybersecurity attack. This has a significant impact on the company’s business with a growing number of cybersecurity incidents occurring regularly; because organizations of all types are struggling to effectively manage cybersecurity incidents (media.kasperskycontenthub.com, 2019).
References
info.microsoft.com. (2019). INCIDENT RESPONSE REFERENCE GUIDE. Retrieved from, https://info.microsoft.com/rs/157-GQE-382/images/EN-US-CNTNT-emergency-doc-digital.pdf

media.kasperskycontenthub.com. (2019). Incident Response Guide. Retrieved from, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07171449/Incident_Response_Guide_eng.pdf
4.
Emerging threats and countermeasures short semester help me to learn about various advanced threats and vulnerabilities in this cyber world. I had exposed to different cybersecurity measures to be taken in this course study.
Confidentiality, Integrity, Availability, and Accountability are the standard security attributes of emerging threats and vulnerabilities caused in Information technology and critical infrastructures. Confidentiality refers to restriction towards confidential information of organizations. Integrity ensures valid data and can be accessed or modified through authorization. Availability refers to accessibility all the time to the system and information through cloud technology. Accountability is the monitoring and tracing the activities on the system includes tracking of erased data and denial (Alwakeel, 2019).
I gained much knowledge from the situational awareness class. Internet of things (IoT) the system is becoming a part of every technology which are connected to computer devices and data transfers through the internet. Cyber attacks through IoT networks are increased in various industries in information technology, critical infrastructure, and healthcare industries. Threats identification stages include identifying the threat model, Identifications of possibilities of the attack, Intrusion identification scenario, vulnerability scenario computation, Decision making. Situational awareness should be developed in the individual and employees of the organization. Awareness of the latest threats and protective measures should be known and decision-making capabilities should be developed to mitigate the threats (Park, 2019).
Cyber physical system with IoT increased security for SCADA systems. SCADA is a process of collecting data and monitoring the automation process. Different types of attacks like Man-in-Middle attacks, replay attacks, Denial of service (DoS) attacks are increased on SCADA. Authentication and encryption, ownership, risk management, data integrity and privacy technologies are developed to mitigate cyber-attacks (Sajid, 2016).
Online class discussions help me to learn effectively through participation every week with enough timeline to go through the video classes and participate in discussions. Responding to the others post make me learn more things and comments to my post developed me to write effectively and follow the APA formatting throughout the course.
References
Alwakeel, A. M., Alnaim, A. K., & Fernandez, E. B. (2019, April). Analysis of threats and countermeasures in NFV use cases. In 2019 IEEE International Systems Conference (SysCon) (pp. 1-6). IEEE.
Park, M., Oh, H., & Lee, K. (2019). Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective. Sensors, 19(9), 2148.

Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-1384.

Cyber Attacks

i have ​matlab assignment and i need help with. i will list the assignment requirements

i have ​matlab assignment and i need help with. i will list the assignment requirements.

This project will focus on Automatic Character Recognition using Principal Component Analysis (PCA) is a simple method of identifying the principal components of a dataset, then aligning characteristics of test sequences to one of many classes. The results of this project are important! If you do well on this project, you will have about 20% of the Final Project complete as well. The goal is to introduce students a very basic form of machine learning using a familiar tool in MATLAB. Students may use Python if they are comfortable with it, though it is not required.Dataset: Chars74K DatasetThis is a database of handwritten characters. It includes both English Characters, and Kannada Characters. This project will focus on English Characters only.36 Classes (0-9, A-Z)55 Samples of EachConsists strictly of PNG imagesOriginal Paper: T. E. de Campos, B. R. Babu and M. Varma. Character recognition in natural images. In Proceedings of the International Conference on Computer Vision Theory and Applications (VISAPP), Lisbon, Portugal, February 2009.Project Steps: These are the High-Level Steps for This ProjectThe intent for these steps is to provide students with a High-Level roadmap for successfully completing this project. As a general guideline, completing one part each week is a pretty good pace for completion on time.Part 1: Convert the data to a usable form for performing PCA.Part 2: Isolate training data from testing data. Generate the Principal Components.Part 3: Project the testing data onto the Principal Components to determine the most similar classPart 4: Collect Statistics and show results.Project 1 DeliverablesPresent all files in a SINGLE zip file.Should include all MATLAB code used to execute the project.Final PresentationUSE THE TEMPLATE GENERATED AS PART OF HW 1!Required Sections:Problem IntroductionTechnical Solution ApproachImplementation and ResultsConclusionThe presentation should be about 10 slides, though length may vary.
i have ​matlab assignment and i need help with. i will list the assignment requirements

country analysis paper

custom writing service country analysis paper.

Selected Country: Tunisia Selected Product: Dry Wheat Task Description Each team member should look into any political, legal or economic/financial, technological/infrastructure issues related to entry in his/her country. Each team member should look at elements that would make that country particularly attractive such as economic growth, per capita GDP or size of the middle class..a suggested, but by no means inclusive list appears at the end of this document. Please note that your individual country investigations should be conducted such that when you proceed to your Week 5 assignment that you are comparing apples to apples. Some points to consider for your individual paper for Week 4: Host Country Issues to Consider Political stability: Is the country likely to remain politically stable? If not, a direct investment could be a very risky approach. Do not automatically equate democracy with stability. Many companies are doing very well operating in communist countries such as China or Vietnam or oligarchies such as Saudi Arabia and the United Arab Emirates. Legal protections: Is the legal system developed and open? Could you count on fair treatment if you had contractual disputes with local entities or partners? Your obligations to employees may also differ, adding significant costs to layoffs, for example. Openness to FDI: Does the government place restrictions on ownership? In some markets, you may have to have a local partner in order to be allowed to operate in the country, hence a wholly-owned subsidiary and complete control will not be possible. Even if a forma restriction is not in place, often governments will be more “welcoming” if there is some local ownership which can facilitate operations. Economic stability (including currency risks): Is the economy in a period of growth, is there runaway inflation, and is the currency likely to rise or fall in value which could negatively affect your costs and profits? Also verify that it is possible to repatriate your profits back out of the country. Economic development: Can the market actually afford to purchase your product? Per capita GDP and size of the middle class can give strong clues as to market potential for consumer goods. Social development: Are there educated and skilled workers available in the country? Would a caste or class system possibly inhibit your human resources flexibility? Cultural issues: Would your product be “culturally acceptable” to the market place? How could you find out if the subject matter of your product is not socially acceptable in your market? Products you take for granted, such as large refrigerators, wouldn’t sell in countries in which consumers prefer to shop almost daily for fresh foods. Technology issues: Is your product too advanced to be technically supported in the new market? Would a “de-featured” product be more appropriate, for example? Developed markets normally want more features and functions, but without a service network in place, a less sophisticated product may have less faults and serve market needs better. Infrastructure Issues: Is there the infrastructure in place to allow for manufacturing, distribution, and promotion? Without a viable road, rail, or air network, how can you distribute your product? If the communications infrastructure is weak, how would you communicate with the home country when your business communications is Internet and telecommunications dependent? Market Issues to Consider Size of your market: Try to estimate the potential size of the market so you can verify that the venture could generate sufficient revenues and profits. Local competition: Are there local firms already competing in your market sector? Are they well-entrenched with strong brand awareness and loyalty? Foreign competition: Are your global competitors already in the market? Would they have first mover advantage, or could you effectively compete? Deliverable Each team member will upload a 4-5-page country analysis paper in APA format assessing the relative attractiveness of his or her country for the project, including a summary of the risks and the potential benefits of launching the team’s selected product into his or her country. Value: 10 individual Points
country analysis paper

Cinematography in Peter Bogdanovich’s, Mask

Peter Bogdanovich’s, Mask Section 1. If you can for a moment, try picturing yourself entering junior highschool as a larky, lonely, out of place kid, trying to find his way around in a new school. Your clothes match that of a roughed-up biker gang, your hair is long, red, yet neatly combed. You produce a smile that can sink a thousand ships. Sounds normal, right? What if we throw in one missing theme: Craniometaphyseal Dysplasia, “a rare bone disorder of unknown etiology characterized by overgrowth of the skull base and abnormal remodeling of the metaphyses of the long bones. (Kim, Young Ho) In non-scientific lingo we present, “lionitis”, the look of a lion. Yet, you are not an animal. You’re a 13-year old young male, discovering his place among the normal looking kids. Rocky Dennis, is an amazing young man whom overcame many obstacles in his life, transformed what such a disease could do, and made us realize that his disfigurement was all but unnoticeable once you got to know his kind hearted spirit. I chose Mask for one simple reason; my cousin Patron suffered this same fate that Rocky Dennis did. A disease since birth, that robs you of your sight, ability to feel normal, and your hearing. I would venture on a self-discovery that love has no boundaries and help educate a large school system that often-shunned kids with such alignments, thinking they were better presented for special education schooling. I learned how doctors, nurses, and medical staff are kind people whom truly care about your loved one and genuinely want to help you. I learned how cruel children can be; but came to understand they are just really scared and curious when being introduced to something they are unfamiliar with. Family is everything; they are in it for the long run. Rocky Dennis is an amazing young man whom captures your heart in the first scenes of Mask. The real Rocky Dennis is no different. His warm heart and acceptance of how he was born, would serve as no barrier in living his life to the fullest. Behind the makeup in the film Mask, his disfigurement all but disappears in your mind. (Washington Post) You are captivated by his spirit. He is a typical teenager whom collects Dodger baseball cards, succeeds highly in his academics, and fantasizes about taking a motorcycle ride all over Europe. Rocky was just 17 when he would lose his life to this awful disease. My cousin Patron was 16. Rocky was told at the age of 2 and half, he would not live long. My cousin Patron was told by doctors he would be lucky to see 18 months, never walk, talk, or be able to understand at a five-year old level. Director Peter Bogdanovich’s commitment and unvarnished reality of what life was like for Rocky, is remarkable. Though Rocky had a disease, he had a perspective. He was friendly, sensitive, and loved Bruce Springsteen. What touched me about most about Mask, was how we look at loneliness from the outside, and how it naturally comes from being on the outside. Bogdanovich does an excellent rendition conveying these motifs in this work of art. Section 2 After re-watching Mask, I was re-introduced to the stares, the isolation my cousin suffered in the school cafeteria, and the firsthand trauma of newness, that both my cousin Patron and Rocky Dennis would experience. This is what made the film so strong. It’s achievements sought to stir out our memories, bringing us up close and personal with the issues that Rocky dealt with on a day to day basis in our educational systems, when we do not fit the upper-class straights of society. I was now able to apply so many skills I learned in Dr. Matza’s cinema class. Bogdanovich does an excellent portrayal of mother and son, which pulls our emotional strings into highs and lows through-out this work of art. Bogdanovich displayed passion and criticalness to “Mask”. According to Eric Stoltz, whom played Rocky Dennis, Bogdanovich invited him, Laura Dern, and other young actors to his house, where they screened old classics and would later elaborate in great detail about them. “Of course, he would point out scenes that related to the film that we were making, but it was a phenomenal learning experience for the entire crew, that ignited the love of the film.” (Stoltz) This is what made Bogdanovich so unconventional in his narrative. “When Mask came along, we were very tight on money, I was asked if I wanted to direct it, I really didn’t want to get into it, the more I did, the more I found it interesting. I really found that I had something to say and convey to my audience.” (Bogdanovich) Bogdanovich wants us to see Rocky as himself in the beginning of the film. He decided against shooting straight to the school scenes, as suggested by Producer Martin Starger, instead giving us a personal point of view appearance at Rocky doing what he loved most; pinning the map of places in Europe he so passionately wanted to venture using his motorcycle. Bogdanovich gives us many themes of his POV in Mask. Bogdanovich drew his imagination on how he exactly wanted both the music, his close-ups of characters, and even art direction to guide the audience in. We notice this in the opening scenes of bikers, Bob Seager music, and messages of a normal kid trying to be just that, normal. Bogdanovich perfects us to see Rocky through “his eyes”, a normal kid, going to school, and living life, like no handicap exists. What exactly gave Bogdanovich his inspiration for “Mask”? His girlfriend at the time, the late Dorothy Stratten. While in NYC they both attended a Broadway show about the Elephant man. She became so fascinated with this real-life character, that they both would later visit a book store and purchase a book on the real Elephant man. During the film’s documentary, Bogdanovich stated, “this is what gave me the inspiration for the start of this great work of art.” (Bogdanovich Mask Documentary) The biggest theme I felt was in the film, was the theme of bikers and the closeness of how they protected Rocky. This was conveyed craftfully when Rocky is taken to his new school for the first time. When Rocky enters the school building one of the students asks him to take his mask off, it’s not Halloween. His biker Uncle Dozer, runs to his aid and scares the kids off. Bogdanovich does an exceptional message of family strength and Rocky’s own personal strength, to overcome these transgressions, that hardly seem to affect him. Bogdanovich specializes in close-up shots to convey the scenes with Masks actors. Bogdanovich, whom had a rocky relationship with Cher, would often use close-ups, to show the sadness in Cher’s eyes, that themed so well with the film. When Rocky attends camp and leaves his mother all alone, she breaks down, uses drugs to numb her pain, and loses control. The shots Bogdanovich conveys in moments of sadness and stress, matched perfectly with Cher’s ability to turn so quickly into character and use the sadness of her eyes to bring the audience into such emotion, that you almost felt you were the actress. This was the trick of the performance according to Bogdanovich. To get close, so the eyes convey the real meaning of the scene. (Bogdanovich) Through-out the film, you will notice many scenes being used with mirrors. These mirrors represent the pain and life Rocky endures. In one scene while at the carnival, Rocky enters the Funhouse ride and appears in front of the three-way mirrors that changes your appearance. In the center mirror, Rocky is conformed into a teenager that looks “normal”. He shouts out to his mom and they share a tender moment on what Rocky’s appearance might have been, if he were not born with such an infliction as “lionitis.” We encounter one scene, where the bikers, bikes, music, and lighting perfect the mise-en-scene. Bogdanovich used over 100 fake motorcycles to carefully craft this mise-en-scene, to make the audience feel like there was a biker overload. (Mask Film Documentary) Sound was super important to Bogdanovich. Sound promotes the natural feel that builds the story around it. Without his knowledge or approval, the movie soundtrack was switched from Rocky Dennis’s idol, Bruce Springsteen, to Bob Seger. “The thing that is so frustrating says Bogdanovich, is that the critics tell me that they love the picture, yet, they never got to see my complete and full version of it.” (Bogdanovich) Bogdanovich insisted that Springsteen’s music was integral to the film’s texture and overall structure. Since Rocky was a huge fan of Bruce, he felt Bruce’s music was a very eloquent statement of Rocky’s true hopelessness in his life. (Bogdanovich) Many lawsuits would follow between Bogdanovich and Universal along with Columbia records. Though there were many conflicts on screen between Bogdanovich and producer Starger, and Cher, the messages were not hindered by these issues. The director felt like it was a constant negotiation between him and Starger. “Remove this and we will give you this.” (Bogdanovich) Cinematography was superb in Mask. Laszlo Kovacs provided exemplary work as the film’s cinematographer. Kovacs explained, “when I’m lighting, I like to feel that every light has a dramatic logic and function in the composition.” (Kovacs) The cinematographer has to be a strong leader according to Kovacs. The aesthetic heart of his work shows in many scenes throughout Mask. In one particular scene where Rusty is high on drugs, she is shown throwing the baseball with her dad on the coach. You can feel the intensity in the room. The lighting reflects perfectly opening up Cher’s eyes, making you feel her lack of empathy to her father, and the quickness of the photography as the ball is thrown, reflects so vividly back to the father. Kovacs photography in the bar scene with Rusty and the prostitute she wants to hire for her son Rocky, once again brings to life the characters and their actions. Here Kovac used hard lighting and soft-tones to convey his message of eagerness on the Actors end. The cameras ability to move quickly and provide the close-up, low angel shots, really benefits the scene. What made Kovac and Bogdanovich such a forceful team, was the classic Hollywood style they both conveyed; discreet tracking shots, invisible editing in scenes, no camerabatics, no emotional up-close tears of blackmail action, but raw talent, with raw acting. (Kovac) Masks themes continue to supply us with a sturdy, disposable feel to its messages. Love, family, pain, intolerance, drug abuse, and coming of age, all wrapped perfectly. When questioned about the color of the film and its unusual brightness and sunny aurora to it, Bogdanovich explained, “the color was all wrong. Laszlo and I worked harder than ever, trying to maintain a certain depth of focus with color.” While Bogdanovich was angry and fighting the music issues of the film, the producer went to Technicolor lab and alerted them to print the picture five points brighter throughout the film. “This color mishap ruined everything. Vincent Canby wrote that the makeup didn’t look convincing. I said, you are damn right, that is why everything looks so out-of-focus in the background.” (Bogdanovich) This one particular scene is when Rocky is with Laura Dern at the horse ranch. You can see the makeup is portrayed to bright and seems wax like. The film according to Bogdanovich was to appear much darker. More like Daisy Miller. Many people actually felt the color of the film made it more TV like and not so much film like. There is no denying that Mask takes on a visceral effect with its music and makeup. Due to the music lawsuits, Bogdanovich felt the emotional impact of the film was damaged. One scene you notice this type of mix up is when the truck is pulling up to the cemetery, in which the song should be playing “Born in the USA” on the radio, to let the audience know it was not Rocky’s funeral. Instead, it was a Bob Seger track. The depth of the field was another important factor both Bogdanovich and Kovac needed. Film speed is much faster now so it easier to do in today’s filming, but back then, you really had to use your depth of field wisely. Barbara Ford, the daughter of distinguished filmmaker John Ford, was a perfect choice for the film editor in Mask. There is no denying that one reason Mask was so successful, was the standup perfection of Ford’s development in editing. “By doing over audience screening events with over 150 people, you really get the feel with what lacks and doesn’t stand out in your films.” (Bogdanovich) You see many glimpses of Ford’s success in editing during the round up meeting at night in the hills. Here the bikers, Rocky, Rusty, all gather, singing songs and being united as one. The film has aged well over the years. Sadly, bullying and acceptance are still a long way off in the mainstream. Rocky would likely encounter just as many issues with attending school as he did back in the 80’s. Many schools are now using sensitivity training and collaborating with parents of students with disabilities. These allowed students to build productive relationships with students’ families. Within the first 20 minutes of the film, we see Cher take on clueless school officials and insensitive doctors. There is still a huge gap to close in educating the school system on children with disabilities, especially those similar to Rocky and my cousin Patron. The film has grossed over 48,000 million. According to Bogdanovich, it easily would have grossed over 100 million if the Springsteen would have been the original soundtrack like he intended. (have bolstered his film. Section 3 How was the film made? Bogdanovich’s issues with budget constraints, music lawsuits, color not matching, scene deletions without his consent, all played a role in the film’s total success. Bogdanovich never let this dampen his film and its outlook, but there is no denying his harsh feelings of resentment on the film’s changes. In an interview with Film Quarterly, Bogdanovich explains the music being changed, the color, and lack of consultation on the producer’s part, limited his dream of the perfect film. (Bogdanovich) Universal Films produced the film with great success. There is no denying how successful the acting chemistry was for Mask. According to Sam Elliott, whom played Gar, Rusty’s on and off again lover, “Rusty is Rocky’s one true story, one of courage, achievement and hope.” (Elliott) I loved Cher, stated the actor. “She’s one of the most outrageous people I’ve ever spent time with, and she’s wonderful to work with. It was just a glorious period of time making Mask.” (Elliott) The acting of singer/songwriter Cher brought the character to life of Rusty. She was impeccable in her approaches, close-ups, and empathy she shared with her son, Rocky Dennis. Though it was no secret that both Cher and Bogdanoich had a rocky relationship. Cher felt he choreographed her every move. He would go in great detail over how she played in every scene. Often, Cher would ignore him and do it her way. Cher stated, “Bogdanovich was my worst”. (TCM) According to the documentary on the director’s cut of Mask, Bogdanovich tells us Stoltz was the perfect actor to play Rocky. He offers an amazing variety to the set, his humor, and absolute lack of self-pity that draws Rocky the way he does in spirit to the audience. (Bogdanovich) Bogdanovich would later explain that Stoltz would often eat lunch with over 14 layers of makeup and broken teeth prosthetics. All, while in a 100 degree weather. To prepare for his role as Rocky, Stoltz would wear the mask of Rocky riding LA Metro public buses, to obtain the reactions from people. This drew Eric into the character and enabling him to understand what Rocky must have endured when being confronted in public. The challenge of the role is obvious- one layered with 14 covers of makeup, without being able to express much emotion. Eric had to rely on his keen talents of physical acting, to the bouncy walk, that innates Rocky’s good sense of humor, even the flipping of his wrists, when he bolts through the door, often asking Rusty what is to eat. Eric is so successful in driving the audience beyond the disfigurement of Rocky and uplifting his presence through his spirit. Mask would never be an academy award winner for best makeup without the artistic genius abilities of Michael Westmore and Zoltan Elek. While many people will never likely encounter the disorder, makeup artist Michael Westmore took his magic to another level. He brought the condition of “lion disease” to the attention of the public. (Haithman) The mask made for Eric Stoltz was molded using three separate pieces of foam latex, applied to Stoltz’s face and blended over and over with makeup. Stoltz wore dentures to simulate Rocky’s deformed teeth. (Haithman) Rocky’s eyes were forced about 3 ½ inches apart in reality; while Stolz’s mask had to be reduced to 1 ½ inches so the actor would be able to see. The hard work won the Oscar for best makeup. Mask would not have been so successful without the exceptional work of Laszlo Kova’s intuitive, fluid camerawork and zest for photography; Michael Westmore’s impeccable and flawless makeup design; Norman Newberry’s art direction, which perfectly opens the oppressiveness of a biker home, filmed to close to traffic, and Eva Gardo and Barbara Ford’s nicely systematic and rhythmed editing. Rocky was an amazing young man, whom stood up to adversary and took on his disease with a strong left hook. He never once let his disease defy him, or limit his capabilities for the life he was dealt. And like my cousin Patron, he zoomed with so much love and passion, never once letting the actions of others, bring him down or wish he were born differently. Rest in Peace Rocky and Patron, and while you are at it, play some Boss up in heaven, riding bikes through-out Europe. Citation Benson, Sheila. “MOVIE REVIEW :

Street Arts: Arguments on it as a Form of Expression

Street Arts: Arguments on it as a Form of Expression. Street Art, A Form of Expression Art is defined in the dictionary as the expression or application of human creative skill and imagination, typically in a visual form such as painting or sculpture, producing works to be appreciated primarily for their beauty or emotional power. Creating art seems to become an issue when the word “street” is added in front of it. In my modest opinion, street art should be continued and expressed for it is a way that someone shows their ideas and creativity. Individuals believe street art should be banned and consider it as vandalism. In addition, civilians say that street art is trashy and makes their communities look uninviting. On the other hand, some argue that street art is expressive. Activists, regarding matters beyond measure, even say that street art is a form of commentary on societal issues. The list goes on. The issue that arises most, is that street art is simply just vandalism. Street art is created mostly on side-walks, buildings, and tunnels. Not all street art is done by painting. Methods such as yarn bombing are used, which involves covering surfaces in knitted patterns. It can also be expressed through stickers and stencils to make a statement. Street art is usually shown in urban areas, and yes, it falls within the lines of graffiti to an extent. This type of art usually is created with the intent of conveying a message. The intent of one’s act is the distinguishing factor regarding graffiti vs. street art. Both acts are a form of expression that aren’t always done with permission. This is where the issue of vandalism comes into play. Graffiti is usually done with the intent of giving a message to an individual or specific group; no intent of public understanding. Whereas, street art provokes discussion and calls for a reaction. An issue proposed, is that graffiti and street art are the same thing, however, that topic is debatable. From my perspective, graffiti is the rebellious and care-free act of expression, usually done with the intent of little to nothing. In addition, artist who perform graffiti, have no consideration of property or the law. Street art is a form of creative expression with the intent of portraying one’s feelings or perspective on matters they feel are important to share. The legality of the two seems farfetched, since some cannot determine the differences between street art and graffiti. In this light, I can understand the concern and problems that may arise. For example, when does art become too expressive or even out of hand? Who determines what is significant enough to be “acceptable”, by means of street art. However, who are we to determine what is important to someone or not? What exact harm is being done? As more questions emerge, I believe that it is an issue of respect and acceptance. Art is made to project and express feelings. It is a form of therapy, communication, and even an act of connecting with people. The point of street art is not to diminish or destroy buildings and the community, but to make it a community where voices and points can be made without regulation or fear. Also, most street art is not made to take away from the already, “beautiful building”. Artists aren’t doing their works to take away from the picture, but to enhance and promote ways of change; in a positive way. Some things are too vast and wonderful to confine! Contrary to my beliefs, Heather MacDonald, a contributing editor of City Journal, says street art is vandalism. MacDonald stated that “Graffiti is something that one celebrates, if one is juvenile enough to do so, when it shows up on someone else’s property but never on one’s own (“Graffiti Is Vandalism”). To my understanding, I do not believe that McDonald is an open minded individual when it comes to the realm of art. I make these assumptions based off multiple reasons. The editor makes several comments on the invasion of privacy. “If your home were tagged during the night without your consent, would you welcome the new addition to your décor or would you immediately call a painter, if not the police” (MacDonald). She explains that graffiti and street art isn’t art at all. Although I can understand her point regarding one’s personal property, it seems like she has no understanding of self-expression. Artists are not going to individuals houses involuntarily, especially with a goal to harm. Most artists do think about the place in which they are using. MacDonald focuses more on the negative aspects of street art, and not the true meaning of what it is. The argument proposed is that graffiti is not artistically compelling and that it is a crime. In Heather Macdonald’s perspective, she sees street art, graffiti, and tagging as the same. Tagging is the practice of ownership by writing your name or a group on surfaces. Again, street art does not aim at ownership, but more so creating a message. Although this is one’s property, there are laws that protect the performance of street art. The Copyright Act is a law that gives artists the rights to their expression, “criminal acts”, AND freedom of choice. The law imposes, “… the sole right to produce or reproduce the work or any substantial part thereof in any material form, to perform the work or any substantial part thereof in public, or if the work is unpublished, to publish the work or any substantial part thereof…” The Copyright Act also states, “to produce, reproduce, perform or publish any translation of the work; to reproduce, adapt and publicly present the works a cinematographic work; to communicate the work to the public by telecommunication, to present at a public exhibition, for a purpose other than sale or hire.” This means, regarding street art, that it is legal to display, produce, and commercialize these works. Regardless if the work is anonymous or not, the work lies in the hands of the creator. Although there are rights that protect property, The Copyright Act still protects these artists. As mentioned before, street artists do not create their works with the intention of vandalism. Most artists consider where they are creating their masterpieces; the placement of art contributes to how the art is presented. MacDonald mentions a politician named John Lindsay, who “declared war on graffiti” in 1972. To the politicians understanding, he associated graffiti with disorder and law-breaking. The point proposed, is one criminal act being accepted implies that other criminal acts are also accepted. Some examples include stealing, assault, and drug usage. MacDonald uses Lindsay’s theory to justify her own, by pulling unrelated criminal acts into the picture. Macdonald associates street art, “vandalism” in her mind, as the beginning of unlawful acts. It is almost as if MacDonald associates these criminal acts towards a specific group of people. The editor’s understanding and mindset seems to be extremely minuscule, regarding street art. Instead of looking at it as forms of communication and self-expression, she associates it with criminal activity. To my understanding, MacDonald is solely focused on her own self and her property, as if artists will specifically choose her as a subject. MacDonald looks at vandalism, street art, and graffiti as one, and believes it is a juvenile act. This means MacDonald sees anyone who practices the art, as an adolescent and childish. In conclusion, we can see that Macdonald lacks understanding of what street art is and why it is practiced. Although there are individuals strongly against street art, there are still people who are highly supportive of this medium. Urban art specialist, Mary McCarthy, believes that street art is a tool for change. McCarthy states that street art speaks as a form of spiritual survival and starts at a place of rebellion. “It was often the only tool of the poverty stricken, the disenfranchised, to communicate their stories, their sense of place” (“Street Art as A Tool for Change”), says McCarthy. The Urban specialist explains that when you have little to nothing, being able to “claim” something as yours, gives you ownership of your community, or place. Street art is a mark of identity and serves as a medium for the future. McCarthy believes that the Street Art Movement has gone beyond all art movements to date. “Stylistically, politically, and socially it has inspired, challenged and changed people’s lives positively across the world” (“Street Art as A Tool for Change”), implies McCarthy. She notes that artists are now using their environments as canvases, and that street artists create their works “from walls to railings, from wood to metal, from buildings to vehicles”. McCarthy describes this act as unprecedent. Like other supporters of street art, she agrees that it has a political affect. With the streets as a medium, individuals can express their opinions and broadcast their voice. In agreeance with McCarthy, this type of communication has an influence on rhetoric and opinion; throughout the community to the people. The Urban specialist uses many examples to show how influential street art can be. One example given, is Shepherd Fairey’s “Hope” image, that was reproduced across the world by pro Obama supporters. When the voices of individuals are expressed through street art, places across the globe transform. Mary McCarthy does a wonderful job at capturing the true purpose of street art; influencing change and making a statement. The activist takes Miami for an example. The Goldman family, from a dangerous part in the city, changed their community greatly. McCarthy explains that the Goldman’s “good hearted” (Street Art as A Tool for Change”) program, encouraging street art, has been transformed. As a result, the once dangerous area, is now an “international tourist attraction and affluent neighborhood in its own right”. Finally, another influential example of street art is JR’s artwork in the favelas. Mrs. McCarthy sees this as an “encouraging sense of pride” within disenfranchised residents of Rio. Mary McCarthy not only appreciates the art, but clearly has done her research. Many people may think that not everyone can relate or understand street art, so it proposes the question; what is the point? McCarthy put into words, “One of the main reasons why this art has been so accessible and popular is the artist’s ability to relate to the here and now- to live in the moment and to express a personal, a social and a political rhetoric “(“Street Art as A Tool for Change”). Pursuant to her belief, this is a rhetoric that can be understood and relates to all. The streets give an artist a canvas that all can see. An example given, is Banksy’s Mobile Lovers. McCarthy explains that Mobile Lovers had a double impact on the community; where it took place and the message. The artist of this work points out that modern technology distracts us from our company. Banksy’s artwork was done in a dark doorway at the end of a dead-end street. McCarthy emphasizes the usage of glow-in-the-dark spray paint, which she claims, “added weight to the idea that this piece is intended to be only ‘half seen’” (“Street Art as A Tool for Change”). The artwork was done behind a club in Bristol. In later findings, I was shocked McCarthy knew Banksy. She was responsible for the sale of Mobile Lovers, with permission, that had a powerful impact in Bristol. Broad Plain, a Rugby Football Club, purchased Banksy’s artwork and its proceedings went to the club where the art was located. Banksy spent most of his time in this club and was ecstatic when he found out that his artwork helped it from foreclosing! McCarthy concludes that this is a prime example of how street can affect many people in various ways. Street art is a form of expression and communication across the world that has both negative and positive effects. It is becoming more popular in our modern-day society and is becoming a voice regarding political, social, and personal issues. Street art has the power to change society, people, and even the energy within places. Although some opinion may differ, through street art, we are all heard! Works Cited MacDonald, Heather, “Graffiti Is Always Vandalism.” The New York Times, (2014) https://www.nytimes.com/roomfordebate/2014/07/11/when-does-graffiti-become-art/graffiti-is-always-vandalism McCarthy, Mary, “Street Art as A Tool for Change.” Huffington Post, (2017) https://guce.oath.com/collectConsent?brandType=euStreet Arts: Arguments on it as a Form of Expression