Wednesday, July 31, 2019

A Gathering Of Old Men: Importance Of Standing Up For Oneself

â€Å"If you fell down yesterday, stand up today†. This quote by H. G. Wells is seen in the novel A Gathering of Old Men. The novel, taking place in the 1970s, was in a time in which African-Americans still suffered heavy discrimination. After years of taking this abuse, when an incident comes in which a white man lays dead at the hands of a black man, which would eventually call for a lynching, the discriminated unite. They show that despite their tortured past, they still possess their bravery, power, and pride.This dramatic novel by Ernest J. Gaines, A Gathering of Old Men, written in a critical tone employs the use of characterization, flashbacks, and symbolism to express the theme that there comes a time one must stand up for him or herself. In the book, a character named Mathu is one who does not falter in up keeping his pride. From the very beginning, he never let anyone insult him because of his African-American heritage. He always stands up for himself, even facing a white man, and never faltered, even when he was sent to jail.Because of this attitude, Mathu was respected even by some white men like Mapes who â€Å"knowed Mathu had never backed down from anybody, either. Maybe that’s why he liked him† (Gaines 84). Mathu was like a strong rock, the attempts of others at making him submit were but pebbles against his overpowering pride and dignity. A character that Mathu attempted to instill some lessons on becoming a man was Charlie. Charlie, despite his mild character was a large man towering at 6feet 7inches and weighing 275 pounds.Beau Boutan, Charlie’s boss and some others often ridiculed him with names like â€Å"Big Charlie† and â€Å"nigger boy† because of his mild character (Gaines 187). Charlie however, after observing Mathu’s strong pride and refusal to let anyone step over that pride, eventually gained some courage to stand up for himself. After he killed Beau and ran away, he came back and was ready to atone for his deed. Gaines used this event in the novel to show that even though people might be insulted and beat down, they can still gain enough courage to stand up for themselves.When Charlie did stand up for himself, and became, in his eyes, a man, that eventually led to his death. Gaines’s killing off of Charlie after he started standing up for himself was alluding to the idea that when people make a stand, they must be careful not to overdo it, like Charlie did, or there might be unfavorable results. Another character of interest is Candy. Candy is the owner of the place in which all the men gather, and the organizer of the gathering. At first, Candy seems to be genuinely worried about the people in Marshall, saying â€Å"’No I won’t let them harm my people’†¦ ‘I will protect my people.’† (Gaines 19).However, as the story progresses Gaines shows that Candy’s motives may not have been as good-natured as firs tly suggested. It’s eventually revealed she does not care much for the other men gathered in Mathu’s yard, but only for Mathu himself. While she showed little emotion when the other men were called up to Mapes and hit, she was quick to react when Mathu was called. Gaines also showed Candy’s true nature in the event when Clatoo wanted to talk to the men inside Mathu’s house, without Candy.At this point, Candy threatened to have all the men who followed Clatoo kicked out of the Marshall place, their only home. Gaines portrayed Candy in this way to show in this time, the idea of oppressing people still existed in the minds of even those who seemed good-natured. Finally, Gaines creates a complex character out of Mapes. Mapes is a character who experiences a change during the story. When he first arrives at the site of Beau’s death, and the gathering of the old men, he acts with the same mindset of the Cajuns in that time.His first response to the scene is violence. He attempts to gain information from the old men by hitting them. Eventually, when he realizes violence will produce no results, he lets them tell their stories. The prominent change in Mapes is shown at the time Luke Will and his crew arrive with the intent of hanging Beau’s killer. Mapes attempts to protect Charlie and the rest of the men, saying â€Å"’Go home, Luke Will’† after Luke Will demanded he hands Charlie over to him (Gaines 195).When Luke Will ignored Mapes and started a shoot out between his crew and the old men, Mapes resigned control of the situation to the old men and Charlie. Gaines used this to show that the mindset of people can change for the better. In the instance that Mapes trusted the old men and Charlie with the situation, he recognized them not as people of a lesser racer, but respectable and trustable men, showing that old men’s attempt at standing for themselves was able to change a man.Gaines also employs the use of flashbacks in the novel. The main role the flashbacks play is to show the hardships and discrimination the African-Americans faced in that time. When Uncle Billy, one of the old men who gathered to finally stand up for himself after many years, was asked by Mapes the sheriff his reason for killing Beau, as all the old men claimed to have killed Beau, he recalled an event that happened years before. â€Å"’What they did to my boy’†¦ ‘The way they beat him.They beat him till they beat him crazy†¦Ã¢â‚¬â„¢Ã¢â‚¬  (Gaines 80). Gaines introduced this flashback to show the brutality suffered by the blacks at that time, and that it spared no one, not even a child. Another flashback was by Johnny Paul, who remembered back to a time when they had all lived as a community, till Beau and his tractor came to plow it all up. Johnny Paul was referring to this time when he confused Mapes by saying â€Å"’But you still don’t see. Yes, sir, wh at you see is the weeds, but you don’t see what we don’t see. ’† (Gaines 89).Johnny Paul was talking about how the weeds and rotting houses had replaced what was once a place of happiness, and brotherhood among the black families living there. Gaines uses this flashback to show what was taken from the African-Americans in the novel, to better explain their need to stand up for themselves. Tucker, one of the old men, goes into a flashback of his own. He remembers a time his brother and two mules, beat a white man and a tractor. The white man and his friends however said Tucker’s brother had cheated, and beat him with canes.Gaines adds this flashback to portray the obvious distinction between whites and blacks in that time. African-Americans were thought to be less of people than the Cajuns, so for this lesser person, Tucker’s brother Silas, to beat the supposedly superior white man was unthinkable. Like Tucker said, â€Å"’†¦and b ecause he didn’t lose like a nigger is supposed to lose, they beat him’† (Gaines 97). In that situation a scared Tucker didn’t stand up for his brother, and they beat him to his death.Gaines uses this flashback to show the results of the old men being walked over by the Cajuns, and doing nothing about it. Gable also reminisces about his unfortunate past. He remembers the Cajuns sentencing his sixteen year old son to the electric chair, â€Å"on the word of a poor white trash† (Gaines 101). He remembers the indifference the Cajuns displayed in killing his son, watching his death, and leaving as though it was a â€Å"card game† (102). Through this flashback, Gaines shows again how the cruelty of the Cajuns didn’t spare any ages.He also shows how little the word of a black man counted over that of a white man or woman. When his son was being sent to electric chair, Gable couldn’t do anything but beg the Cajuns. Gaines then ties thi s back to the importance of the men standing up to their tormentors, hinting such events could possibly have been avoided if they had stood up to their oppressors. Finally, Gaines utilizes symbolism in his novel to express the theme. Throughout the novel, a constant symbol that repeatedly came up was the tractor.The tractor was what Beau Boutan was riding when he came after Charlie. The tractor was also what drove many of the African-Americans on the plantation out of work and away from their homes. Finally, the tractor was what the Cajun, Felix Boutan, rode when he was beat by Tucker’s brother, Silas, which led to Silas being beat to death. The tractor symbolizes one of the main tortures of the African-American community in Marshall. It drove them out of work, drove them out of their homes, and eventually led to their death, in the case of Charlie and Silas.Gaines added the tractor and all it symbolized to be another motivator to the old men to make a stand. Another symbol w as the shotguns that the old men had. The shotguns’ empty shells in the beginning symbolized the weakness and ineffectiveness the old men had at the start of the story. In letting themselves to be walked over, and offering no resistance, they were as useless as the shotguns with empty shells they held in their hands. However, as the story progressed, when it came time to fight, the men had fully loaded shells and were ready for war.This symbolizes the change they went through. From being old useless men with no impact, they were able to make a difference, and have an impact. By standing up for themselves, they displayed their power and pride, which eventually even affected Luke Will, who â€Å"looked worried, real worried† when he realized their conviction (Gaines 205). Concluding, with the use of characterization, flashbacks, and symbolism, Ernest J. Gaines expressed the theme that there comes a time one must stand up for him or herself throughout the book.This theme was expressed through the characters Mathu, who always stood up for himself, Charlie, who learned to, and Candy and Mapes who were characters that were a motivator to the old men standing up for themselves. Gaines used the flashbacks to better portray the importance of the African-Americans in the area standing up for themselves, and he used symbolism to show one of the major torments of the people, and the change the old men went through. By standing up for themselves, the old men not only displayed their power and pride, but also seized hold of their future for themselves and their generations to come. A Gathering of Old Men: Importance of standing up for oneself â€Å"If you fell down yesterday, stand up today†. This quote by H. G. Wells is seen in the novel A Gathering of Old Men. The novel, taking place in the 1970s, was in a time in which African-Americans still suffered heavy discrimination. After years of taking this abuse, when an incident comes in which a white man lays dead at the hands of a black man, which would eventually call for a lynching, the discriminated unite. They show that despite their tortured past, they still possess their bravery, power, and pride.This dramatic novel by Ernest J. Gaines, A Gathering of Old Men, written in a critical tone employs the use of characterization, flashbacks, and symbolism to express the theme that there comes a time one must stand up for him or herself. In the book, a character named Mathu is one who does not falter in up keeping his pride. From the very beginning, he never let anyone insult him because of his African-American heritage. He always stands up for himself, even facing a white man, and never faltered, even when he was sent to jail.Because of this attitude, Mathu was respected even by some white men like Mapes who â€Å"knowed Mathu had never backed down from anybody, either. Maybe that’s why he liked him† (Gaines 84). Mathu was like a strong rock, the attempts of others at making him submit were but pebbles against his overpowering pride and dignity. A character that Mathu attempted to instill some lessons on becoming a man was Charlie. Charlie, despite his mild character was a large man towering at 6feet 7inches and weighing 275 pounds.Beau Boutan, Charlie’s boss and some others often ridiculed him with names like â€Å"Big Charlie† and â€Å"nigger boy† because of his mild character (Gaines 187). Charlie however, after observing Mathu’s strong pride and refusal to let anyone step over that pride, eventually gained some courage to stand up for himself. After he killed Beau and ran away, he came back and was ready to atone for his deed. Gaines used this event in the novel to show that even though people might be insulted and beat down, they can still gain enough courage to stand up for themselves.When Charlie did stand up for himself, and became, in his eyes, a man, that eventually led to his death. Gaines’s killing off of Charlie after he started standing up for himself was alluding to the idea that when people make a stand, they must be careful not to overdo it, like Charlie did, or there might be unfavorable results. Another character of interest is Candy. Candy is the owner of the place in which all the men gather, and the organizer of the gathering. At first, Candy seems to be genuinely worried about the people in Marshall, saying â€Å"’No I won’t let them harm my people’†¦ ‘I will protect my people.’† (Gaines 19).However, as the story progresses Gaines shows that Candy’s motives may not have been as good-natured as firs tly suggested. It’s eventually revealed she does not care much for the other men gathered in Mathu’s yard, but only for Mathu himself. While she showed little emotion when the other men were called up to Mapes and hit, she was quick to react when Mathu was called. Gaines also showed Candy’s true nature in the event when Clatoo wanted to talk to the men inside Mathu’s house, without Candy.At this point, Candy threatened to have all the men who followed Clatoo kicked out of the Marshall place, their only home. Gaines portrayed Candy in this way to show in this time, the idea of oppressing people still existed in the minds of even those who seemed good-natured. Finally, Gaines creates a complex character out of Mapes. Mapes is a character who experiences a change during the story. When he first arrives at the site of Beau’s death, and the gathering of the old men, he acts with the same mindset of the Cajuns in that time.His first response to the scene is violence. He attempts to gain information from the old men by hitting them. Eventually, when he realizes violence will produce no results, he lets them tell their stories. The prominent change in Mapes is shown at the time Luke Will and his crew arrive with the intent of hanging Beau’s killer. Mapes attempts to protect Charlie and the rest of the men, saying â€Å"’Go home, Luke Will’† after Luke Will demanded he hands Charlie over to him (Gaines 195).When Luke Will ignored Mapes and started a shoot out between his crew and the old men, Mapes resigned control of the situation to the old men and Charlie. Gaines used this to show that the mindset of people can change for the better. In the instance that Mapes trusted the old men and Charlie with the situation, he recognized them not as people of a lesser racer, but respectable and trustable men, showing that old men’s attempt at standing for themselves was able to change a man.Gaines also employs the use of flashbacks in the novel. The main role the flashbacks play is to show the hardships and discrimination the African-Americans faced in that time. When Uncle Billy, one of the old men who gathered to finally stand up for himself after many years, was asked by Mapes the sheriff his reason for killing Beau, as all the old men claimed to have killed Beau, he recalled an event that happened years before. â€Å"’What they did to my boy’†¦ ‘The way they beat him.They beat him till they beat him crazy†¦Ã¢â‚¬â„¢Ã¢â‚¬  (Gaines 80). Gaines introduced this flashback to show the brutality suffered by the blacks at that time, and that it spared no one, not even a child. Another flashback was by Johnny Paul, who remembered back to a time when they had all lived as a community, till Beau and his tractor came to plow it all up. Johnny Paul was referring to this time when he confused Mapes by saying â€Å"’But you still don’t see. Yes, sir, wh at you see is the weeds, but you don’t see what we don’t see. ’† (Gaines 89).Johnny Paul was talking about how the weeds and rotting houses had replaced what was once a place of happiness, and brotherhood among the black families living there. Gaines uses this flashback to show what was taken from the African-Americans in the novel, to better explain their need to stand up for themselves. Tucker, one of the old men, goes into a flashback of his own. He remembers a time his brother and two mules, beat a white man and a tractor. The white man and his friends however said Tucker’s brother had cheated, and beat him with canes.Gaines adds this flashback to portray the obvious distinction between whites and blacks in that time. African-Americans were thought to be less of people than the Cajuns, so for this lesser person, Tucker’s brother Silas, to beat the supposedly superior white man was unthinkable. Like Tucker said, â€Å"’†¦and b ecause he didn’t lose like a nigger is supposed to lose, they beat him’† (Gaines 97). In that situation a scared Tucker didn’t stand up for his brother, and they beat him to his death.Gaines uses this flashback to show the results of the old men being walked over by the Cajuns, and doing nothing about it. Gable also reminisces about his unfortunate past. He remembers the Cajuns sentencing his sixteen year old son to the electric chair, â€Å"on the word of a poor white trash† (Gaines 101). He remembers the indifference the Cajuns displayed in killing his son, watching his death, and leaving as though it was a â€Å"card game† (102). Through this flashback, Gaines shows again how the cruelty of the Cajuns didn’t spare any ages.He also shows how little the word of a black man counted over that of a white man or woman. When his son was being sent to electric chair, Gable couldn’t do anything but beg the Cajuns. Gaines then ties thi s back to the importance of the men standing up to their tormentors, hinting such events could possibly have been avoided if they had stood up to their oppressors. Finally, Gaines utilizes symbolism in his novel to express the theme. Throughout the novel, a constant symbol that repeatedly came up was the tractor.The tractor was what Beau Boutan was riding when he came after Charlie. The tractor was also what drove many of the African-Americans on the plantation out of work and away from their homes. Finally, the tractor was what the Cajun, Felix Boutan, rode when he was beat by Tucker’s brother, Silas, which led to Silas being beat to death. The tractor symbolizes one of the main tortures of the African-American community in Marshall. It drove them out of work, drove them out of their homes, and eventually led to their death, in the case of Charlie and Silas.Gaines added the tractor and all it symbolized to be another motivator to the old men to make a stand. Another symbol w as the shotguns that the old men had. The shotguns’ empty shells in the beginning symbolized the weakness and ineffectiveness the old men had at the start of the story. In letting themselves to be walked over, and offering no resistance, they were as useless as the shotguns with empty shells they held in their hands. However, as the story progressed, when it came time to fight, the men had fully loaded shells and were ready for war.This symbolizes the change they went through. From being old useless men with no impact, they were able to make a difference, and have an impact. By standing up for themselves, they displayed their power and pride, which eventually even affected Luke Will, who â€Å"looked worried, real worried† when he realized their conviction (Gaines 205). Concluding, with the use of characterization, flashbacks, and symbolism, Ernest J. Gaines expressed the theme that there comes a time one must stand up for him or herself throughout the book.This theme was expressed through the characters Mathu, who always stood up for himself, Charlie, who learned to, and Candy and Mapes who were characters that were a motivator to the old men standing up for themselves. Gaines used the flashbacks to better portray the importance of the African-Americans in the area standing up for themselves, and he used symbolism to show one of the major torments of the people, and the change the old men went through. By standing up for themselves, the old men not only displayed their power and pride, but also seized hold of their future for themselves and their generations to come.

Has the Time Come to Legalize Drugs? Essay

Legalization of drugs — long an issue championed mainly by fringe groups — is rapidly moving to the mainstream in Latin America. Last week’s surprise statement by former Mexican President Vicente Fox in support of â€Å"legalizing production, sales and distribution† of drugs made big headlines around the world. Fox, a former close U.S. ally who belongs to the same center-right political party as President Felipe Calderà ¯Ã‚ ¿Ã‚ ½n, rocked the boat at home by indirectly criticizing the very premise of Calderon’s all-out military offensive against Mexico’s drug cartels, which has cost 28,000 lives since 2006. Calderon immediately responded that he opposes legalization of drugs, although he has opened a dialogue with political parties about the future of his country’s anti-drug policies. The left-of-center Party of the Democratic Revolution announced that it supports â€Å"de facto legalization† of drugs. Fox’s statement, first published Saturday in his blog, went far beyond a 2009 joint declaration by former Presidents Fernando Henrique Cardoso of Brazil, Ernesto Zedillo of Mexico and Cesar Gaviria of Colombia. In that statement, the three former leaders questioned the effectiveness of the U.S. war on drugs and proposed de-criminalizing possession of marijuana for personal use. While the three centrist former presidents’ proposal amounted to not prosecuting people for consuming marijuana, Fox’s proposal calls for legalization of all major drugs — the whole enchilada. In an extended interview, Fox told me that he is making his proposal because drug-related violence in Mexico has reached intolerable levels, and because the experience of other countries such as the Netherlands has shown that allowing drug sales has not significantly driven up drug consumption. â€Å"Prohibitionist policies have hardly worked anywhere,† Fox told me. â€Å"Prohibition of alcohol in the United States [in the 1920’s] never worked, and it only helped trigger violence and crime.† Since possession of small amounts of marijuana has already been decriminalized in Mexico, what’s needed now are bolder steps, such as legalizing drug production and using the taxes it generates to fund anti-drug education programs, he said. â€Å"What I’m proposing is that, instead of allowing this business to continue being run by criminals, by cartels, that it be run by law-abiding business people who are registered with the Finance Ministry, pay taxes and create jobs,† Fox said. Fox called for a reversal of Calderà ¯Ã‚ ¿Ã‚ ½n’s decision to send the army into the streets to fight the drug cartels because â€Å"the army is not prepared to do police work, and we are seeing day to day how the army’s image is losing ground in Mexico† as a result of this war. Why didn’t you come out with this proposal when you were president? I asked. Fox responded that legalization was often discussed in Cabinet meetings during his presidency, but that the urgency of such a measure has increased since â€Å"because of the extraordinary cost we are paying in a drop in tourism, a drop in investments and a lack of attention to education and health.† In a separate interview, White House drug czar R. Gil Kerlikowske told me that drug legalization is a â€Å"non-starter† in the Obama administration. Kerlikowske disputed the idea that alcohol prohibition drove up crime in the United States in the 1920s, arguing that there were no reliable crime statistics at the time. And he rejected the notion that there has been no major increase in drug consumption in the Netherlands. â€Å"In the Netherlands, consumption did go up. In fact, the Netherlands has been in the process of closing down hundreds of the marijuana cafes that had been in existence because of the problems that are occurring,† he said. My opinion: I’m not convinced that a blanket legalization of drugs would work because government regulation of the cocaine and heroin businesses in countries that already have high corruption rates would result in greater official corruption. On the other hand, it’s clear that after four years of Calderà ¯Ã‚ ¿Ã‚ ½n’s U.S.-backed war on drugs, the cartels are smuggling more drugs, killing more people and becoming richer. Perhaps the time has come to take a step-by-step approach and start a serious debate about passing laws that would regulate legal production of marijuana, alongside massive education campaigns to discourage people from using it. Then, we could see who is right and consider what to do next. (c) Miami Herald. Miami Herald content is the intellectual property of Miami Herald. Any copying, republication or redistribution of Miami Herald content is expressly prohibited by federal law. Miami Herald shall not be liable for any errors or delays in content, or for any actions taken in reliance thereon. Source: http://www.miamiherald.com/2010/08/12/1772336/has-the-time-come-to-legalize.html Commentary Number 1 The question raised in this article is a complex one. Mexican President Felipe Calderà ¯Ã‚ ¿Ã‚ ½n’s hesitancy at enforcing drug-legalization policies is understandable, as the legalization of drugs in a drug-war-torn country such as Mexico can be beneficial or adverse from an economic point of view. One might argue that such measures would bring about a series of negative externalities on the public such as harmful health effects. A majority believes that the legalization of drugs will increase crime rates; most people under the influence of narcotics are prone to violent crimes. However, the reasons ex-President Vicente Fox has for de-criminalizing drugs appear to outweigh the adverse effects. The law of demand states that as price falls, the quantity demanded rises, and as prices rise, quantity demanded falls. This illustrates that legalization of drugs will reduce the profit criminals make. Every time the government takes hold of a drug dealer and the products he is selling, supply of the drug to the illegal drug market is reduced. If there is a reduced supply, there is an increase in price of the good. Drug-addicts are helpless, and thus they will buy the drug for the higher price, giving the criminal dealer more profit. Every time the government thinks it is winning its drug war, it is actually losing; the illegal state of these drugs aids the dealers, harming the government. Figure 2 Price elasticity of demand of a good is a measure of the extent to which the quantity demanded of a good changes when its price changes. As is illustrated on Figures 1 and 2, due to the fact that drugs are a necessity to drug-addicts, they are willing to buy pretty much the same quantity of the drug at any price, thus making the price elasticity of demand of drugs inelastic (when the quantity demanded remains similar as the price changes). If drugs are legalized, the government can benefit from its demand price inelasticity by taxing on drugs, and thus making more profit that can be allocated accordingly. Drug consumers will not care whether they are paying more than they should be and will buy the legal drug at the price it is sold legally. Other people will notice why the drug is inelastic, and will avoid them due to its addictive dangers. Thus, the absence of undercover drug dealing will show people the dangers of drugs and lead to consumers and producers providing less of the drug once the government starts taxing, thus leading to a smaller population using them. The most beneficial aspect of drug legalization in Mexico would be taxing on the drug. As demand for drugs is inelastic, the tax revenue raised will be large. Additionally, the deadweight loss (fall in total surplus consumers and producers make) will be smaller as the consumers will not consume less at first even though producers will produce at a less quantity. These are shown on Figure 3. The consumers will pay more taxes as they desperately need to buy the drug, and eventually will try and consume less when they become financially diminished. They will seek rehabilitation, and thus shrink the market for drugs. If the government correctly uses the revenues raised by taxing on drugs to promote healthcare and drug rehabilitation, the Mexican economy can cause a decline in overall drug sale and use. Figure 3 In conclusion, Mexico’s ex-President Vicente Fox should proceed with convincing the government to legalize drugs, as this measure will not only reduce consumption and production of these harmful products, but also promote society and the economy by raising revenue to enhance health and other aspects of the economy that need betterment.

Tuesday, July 30, 2019

Automobile and Large Mass Essay

There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † â€Å"Pollution? What’s pollution? † asked Lewis, waiting intrigued for his father’s answer. â€Å"Well, for example, it’s that grey smoke you can see above our cars. Cars that run on petrol or diesel give off gasses into the atmosphere, which are very bad for all living beings and the planet too. Today you can see a lot of the grey smoke because it hasn’t rained for a long time,† answered his father. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † â€Å"Pollution? What’s pollution? † asked Lewis, waiting intrigued for his father’s answer. â€Å"Well, for example, it’s that grey smoke you can see above our cars. Cars that run on petrol or diesel give off gasses into the atmosphere, which are very bad for all living beings and the planet too. Today you can see a lot of the grey smoke because it hasn’t rained for a long time,† answered his father. There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a There was once a little boy of 6 years old called Lewis. One day, as he was looking out of the car window on his way to school, he discovered that a large mass of grey smoke was forming just above his dad’s car. Somewhat alarmed, Lewis looked at the other cars on the road to find out if they too had a cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † â€Å"Pollution? What’s pollution? † asked Lewis, waiting intrigued for his father’s answer. â€Å"Well, for example, it’s that grey smoke you can see above our cars. Cars that run on petrol or diesel give off gasses into the atmosphere, which are very bad for all living beings and the planet too. Today you can see a lot of the grey smoke because it hasn’t rained for a long time,† answered his father. cloud of grey smoke chasing them. To Lewis’ surprise, all the cars travelling on the motorway had the grey smoke hovering around them. So Lewis asked his father: â€Å"Dad, what’s that grey smoke above our cars? † Lewis’ father was a little surprised by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † â€Å"Pollution? What’s pollution? † asked Lewis, waiting intrigued for his father’s answer. â€Å"Well, for example, it’s that grey smoke you can see above our cars. Cars that run on petrol or diesel give off gasses into the atmosphere, which are very bad for all living beings and the planet too. Today you can see a lot of the grey smoke because it hasn’t rained for a long time,† answered his father. d by the question, but answered: â€Å"Well, Lewis, it’s called pollution. † â€Å"Pollution? What’s pollution? † asked Lewis, waiting intrigued for his father’s answer. â€Å"Well, for example, it’s that grey smoke you can see above our cars. Cars that run on petrol or diesel give off gasses into the atmosphere, which are very bad for all living beings and the planet too. Today you can see a lot of the grey smoke because it hasn’t rained for a long time,† answered his father. Lewis spent a while pondering on this, and began to put two and two together. If the grey smoke was bad, and it was all because of cars, then why were there so many cars on the road? â€Å"Dad,† said Lewis slowly, â€Å"If the grey smoke is pollution and is bad for us, why are we going to school in a car? † â€Å"So I can get to work on time, son. The bus or metro would make us late,† answered his father. It was Spring. As soon as the cold weather went, it came back again. The sun seemed ashamed to show his smily face for more than the odd morning. To top it all, loads of people were sick. A spectacular chucking-up bug was going around the school. If anyone looked so much as a bit pasty in class, the teacher would grab an empty litter bin and tell them to hold it close by. Minutes later the school secretary would be calling Little So and So’s mother and telling her to get over quickly and collect her sick child. The bug even got poor Isis, who was NEVER off school. Like everything else about her, Isis’s attendance record was usually perfect – but not this week, because there was no way she could come in. She texted Katie: â€Å"Poor me, I feel so rotten! Chucked up 6 times. Is that a world record? † Katie had so far escaped the bug. She was very careful about washing her hands and not going near anyone who coughed or spluttered. She asked her mother what could be done for Isis, and she suggested an ancient witch’s remedy made from mint leaves and mandrake’s root. ‘Sounds great,’ said Katie, â€Å"Why don’t witches cure everyone? ’

Monday, July 29, 2019

Ou are expected to select a company in one of the selected sectors Essay

Ou are expected to select a company in one of the selected sectors defined by the International Standard Industrial Classifica - Essay Example The company appeared on the public listings of Dubai Financial Market in 2005 under ARMX trade shares. Currently, Aramex Inc. employs more than twelve thousand workers across sixty countries with strong world-wide network (Aramex Inc, 2011). Service delivery enterprises are normally anchored on key assumption that management, information and communication technology are important aspects and ingredients which are very crucial for success to be realized. However, all employees are required to embrace the use of information technology since it forms crucial part of a qualified member within any supply chain. This ensures efficient monitoring and delivery of intended goods and services to consumers (Kotler and Keller, 2007). Service deliveries ensure that all members of the society are reached with the intended product or services at the right time. Such companies usually operate on a designed conceptual model taking into account economic, social and political forces that determine reso urce allocation and management within companies from every region. The leadership structure is another important aspect of the supply chain (Mentzer et al, 2001). Critical Analysis of Operations Transformation Process for Products/Services Supply chain of Aramex Inc can be described as the core of the company’s organization’s operational efficiency. ... Aramex Inc. combines use of technology in delivering internationally standardized services that avails comprehensive solutions to requirements within supply chain and logistics. The company enjoys the services of its largest logistics and transportation networks in the world hence providing cost-effective services within the supply chain (Aramex Inc, 2011). Aramex Inc. Partner with Zubair Corporation (Z-Corp) headquartered in Oman for the purposes of offering businesses with integrated services such as warehousing and distribution through every means including sea, air and ground transportation. Z-Corp also offers such services as freight forwarding and customs brokerage to wide range of industries such as telecommunications, military and Information Technology related companies. Aramex Inc. also acquired Berco Express (Pty) Ltd to assist in logistics and transportation issues within South Africa and other regions. The company has significant share of South Africa’s freight an d logistics market and has over fifteen operating branches within South Africa (Aramex Inc, 2011). Aramex’s transportation network covers wide region from Middle-East to United Kingdom through to Caribbean countries. Such land networks are utilized by trucks fitted with Modern GPS-tracking system and also advanced technology involving scheduled services and strategic locations for their various terminal offices (Aramex Inc, 2011). This creates a cost-effective service preferred by most companies as compared to shipping services. The company is involved in receiving shipments from defined points taking charge of all clearance procedures to the delivery points of the products. Aramex Inc is capable of providing different modes of transportation depending on customer requirements. Such means

Sunday, July 28, 2019

Multinational Human Resource Management Essay Example | Topics and Well Written Essays - 1750 words

Multinational Human Resource Management - Essay Example However, many HR managers in multinational companies face complex issues in business operation because culture changes from one business environment to another. One of the cultural frameworks that remain widely used across the global is Hofstede’s cultural framework. This framework is significant for multinational companies, but it also creates complex issues to managers in the process of policy implementations and practices. Culture impacts the role of HR managers when they attempt to address the issue of cultural differences on HR system change. 3Ghemawat and Reiche argue that the greater cultural distances among host and home companies, the complexity in the change process. Many companies employ the approach of Hofstede of national cultural differences, which include power distance, individualism, masculinity, uncertainty and Confucian dynamism in establishing a relationship and various outcomes. Managers use high performance work system practices in relation to Hofstede cu ltural dimensions in various ways in order to create organizational transformation. However, the national cultural differences vary from one country to another; hence, they impact effective organizational performance from multinational companies. The legal and regulatory environment varies from one state to another in which these multinational companies are situated. Labor union is one of the institutional factors that impact beliefs and organizational norms within the associate companies. Many countries have varied laws that protect employees who participate in unions in order to support employment stability and compensation practices. For instance,... This paper stresses that foreign corporations seeking to execute policies and practices of western management approaches often face diverse personal issues . This results due to a different context of institutional regulations and cultural aspects where companies operate. Companies employ conceptual framework that emphasizes on HR management practices and the main issue related to adaptation of diverse policies at the national context. For instance, China is one of the countries that face varied issues in an attempt of using western managerial approach especially in recruiting are training employees with suitable or professional qualifications. Companies in varied nations differ with respect to their human resource management policies and practices. This essay makes a conclusion that cultural difference is one of the critical elements that have restricted HR managers in multinational companies from achieving their stated objectives. They force multinational companies to alter their trade practices and strategies in environment they operate. Labor union is one of the institutional factors that impact beliefs and organizational norms within the associate companies. The determinant of human resource transfer by multinational companies is high rooted to a larger extent in current institutional theory. Managerial values, leadership roles and managerial behaviors vary across nation cultures and institutions; thus, they can impact the performance for multinational companies.

Saturday, July 27, 2019

Use of Old and New Media Simultaneously Research Proposal

Use of Old and New Media Simultaneously - Research Proposal Example Through new media, you can chat with your friends with whom a telephonic conversation would not make much sense. But the use of both the media together takes the main idea behind connecting. For example, many people watch TV or read newspapers while they chat with their friends online (Borsch, 2010). Here, the attention is divided between the two. Neither the friend you are chatting with gets your full attention nor the TV program or the news that you are reading. So in the end, you do not exactly know what you read on the paper or what you watched on the TV. Neither did you have a quality conversation with your friend? Hence, the use of both forms of media here is a disaster. Movies are a great way to relax and immerse yourself in a whole new world. In the past, movies meant complete disconnect with the real world. Movies were the most enjoyable media for many. But with the advent of mobiles, people now use their mobiles even in theatres distracting themselves and also those around them. This takes away the whole essence of watching a movie in the theatre. You pay to enjoy a movie but are distracting yourself by thinking about the message on your mobile. Also, it is very annoying for those around you. This is because you are loosing on quality time that you can spend with your loved ones. People by using both old and new media at the same time assume that they are getting more done at the same time. This is not always true as it can be seen in the above examples. In most cases, it turns out that you only do not do either of the jobs completely or with full attention. The purpose of new media is to make work easier, effective and entertaining (Chun & Keenan, 2006). But when new and old media is used together, this purpose is not served. For examples, when you read a newspaper and listen to music on your iPod simultaneously you are not doing either one of them with full attention. Finally, it would just be a waste of time.

Friday, July 26, 2019

Research Paper Example | Topics and Well Written Essays - 2250 words - 3

Research Paper Example The most recent statistics related to cyber bullying have pointed to a very worrying social trend that is associated with the social media usage. According to the 2014 cyber bullying statistics, 70% of the youths globally are being bullied through social media, while 37% of them are experiencing highly frequent bullying (Bullyingstatistics.org, n.p.). Additionally, according to a recent report released by the joint task force of the Department of Education and Skills (DES) and the National Office for Suicide Prevention (NOSP), the victims of social media bullying are increasingly showing signs of poor peer relationships, increased anxiety, poor academic performance, psychological instabilities, self-harm tendencies and suicidal thoughts (Gleeson, 5). Nevertheless, it is not only the victims who are negatively affected, since the cyber bullies are increasingly showing behavioral anomalies. The statistics on the effects of social media bullying are even running from alarming to totally terrifying. For example, the recent data on the implications of social media bullying, such as the one reported by the Megan Meier Foundation, indicated that 29% of the social media bullying victims, and 38% of the frequently cyber-bullied victims reported either suicidal thoughts or suicidal attempts (Megan Meier Foundation, n.p.). The stroke that breaks the camel’s back is the evidence that suicide ranks as the third leading cause of death for young people between the age of 15-24 years (Megan Meier Foundation, n.p.). It is when such realities start to dawn on the society that the society finally realizes that a tool that was first meant to enhance social welfare, can turn into a destructive social weapon, which eats the society from within , in a manner that cannot be easily mitigated. At this point it becomes necessary to pause and ask; why is social media bullying such and pandemic for the modern society? The answer to this question is that statistics

Thursday, July 25, 2019

CASE 1 MGT- 412 Developing and Enforcing ADA Policy Essay

CASE 1 MGT- 412 Developing and Enforcing ADA Policy - Essay Example uideline for the company for my new employee handbook (ADA Policy Review Urged In Light of EEOC Enforcement Actions 2011).The procedures incorporated are, the position statement, Nature, and Scope of policy, systems, and the role of ADA committee. The policy also includes the role of the employee, part of the job and the employee records. North America midway entertainment perceives and bolsters the norms put forward in Section 504 of the Rehabilitation Act of 1973. And the Americans with Disabilities Act of 1990, as amended, and comparative state laws (from now on "applicable law" or "law[s]"). These laws are intended to eliminate oppression on qualified people with disabilities. Disabilities may incorporate physical or mental debilitations, which substantially confine one, or more an individuals significant life exercises, and which require alterations to the offices, projects, or administrations of the Company As noted in the Position Statement, North America midway entertainment perceives and bolsters the benchmarks put forward in Section 504 of the Rehabilitation Act of 1973. Also the Americans with Disabilities Act of 1990, as changed and is focused on making sensible facilities for employees and workers with qualifying incapacities as needed by these laws. Since the Company’s Position and Policy are expected to be concurrent with the prerequisites of pertinent laws, nothing in this strategy is planned to give less substantive advantages or procedural protections than are needed by these laws. In like manner, nothing in this approach is proposed to give more prominent substantive advantages or procedural assurances that are needed by these laws. North America midway entertainment has received the accompanying two-stage process for making sensible carnival rides to advance the openness of its projects for employees. Before registration, every conceded employee gets a Special Needs Identification Form. Every employee asking for employment must finish this

CLA L10 Essay Example | Topics and Well Written Essays - 500 words

CLA L10 - Essay Example Helen of Troy left her homeland and moved to a new land with a male Paris. Medea crossed boundaries with Jason. Paris takes Helen from her husband Menelaus and travels from Sparta to Troy with her. This abduction causes the Trojan War. The contest between the goddesses and the judgment of Paris points out the cause of Helen’s abduction; Aphrodite promises to Paris that he could have Helen as a prize (Steiner, 2011). By traveling to Troy, Helen abandoned her home, her husband, and her child and broken the social boundaries of marriage. The result is disastrous for Trojans and Greeks, ten years of war, involving bloodshed and suffering, to bring Helen home from Troy. Helen’s movement destroys all Trojan husbands and perverts the wedding rituals of the Trojan women. Medea is a maiden who leaves her homeland willingly to travel over geographical boundaries to aid her hero that she fell in love with on her quests. She helps Jason to win the Golden Fleece. In Colchis. Aphrodite influenced Medeas falling in love with Jason. Medea betrays her father Aeetes and aids Jason. Like Helen, Medea is influenced by the gods. Aphrodite influences their decision to cross boundaries. Hera convinces Aphrodite to make Medea fall in love with Jason so that Jason can obtain Fleece, as Hera’s motive to eventually ruin Pelias for dishonoring her. Like Helen’s act of crossing boundaries, Medea’s traveling with Jason was also characterized by bloodshed. Medea and Helen’s movement to new lands results in the death of others. Medea murdered her brother Apsyrtus. While traveling from Colchis on the Argo, Medea aided the voyagers by killing Talos. In Iolchus, Medea kills the ruler of the city, which she is foreign to and destroys family bonds. When Jason forsakes Medea in Corinth, she kills both the princess and her father Creon in vengeance. Medea is cruelly smart than Helen and goes

Wednesday, July 24, 2019

Microsoft Essay Example | Topics and Well Written Essays - 750 words - 3

Microsoft - Essay Example The product’s analysis will also be conducted considering its attributes as well as diffusion. The paper will then describe its pricing strategies, the channels of distribution and the strategies of promotion that is proposed to enable it have a larger market especially for students and the teachers. Promotion analysis will involve conducting an analysis to determine the promotion strategies that Microsoft office 365 should use. The target market focused in this analysis is tertiary students and the teachers. Promotion will ensure that the potential as well as current customers are made aware of the availability of Microsoft office 365. The customers through promotion will also be persuaded to see that Microsoft office 365 is the best product compared to google apps and think free office. In determining the best promotion method, there is need to consider several factors including nature of the product, competition, target market, nature of the product and the stage of the product in the lifecycle. The different promotion methods that Microsoft office 365 might consider using are advertising, personal selling, public relations, sales promotion and direct marketing (Pride et al, 445). The first step will include the determination of the most appropriate promotion mix. This will include the various methods of promotion that the will be appropriate. The promotion mix for Microsoft office 365 will include advertising and public relations. Advertising will include creating awareness of the Microsoft office 365 product through the media. This will help to create the product’s awareness to both the existing and potential customers and in this case the targeted group being students in the tertiary level and the teachers. It will involve some budget allocation to ensure that the advertising process is well financed. Considering that the target market for this product is students in

Tuesday, July 23, 2019

Histologic Technician Research Paper Example | Topics and Well Written Essays - 1500 words

Histologic Technician - Research Paper Example HTs and HTLs slice, stain and cover slip atomic tissue sections on microscope slides to discover signs of illness, disease, or malignancies within the patient’s body. It is apparent that histologic technicians have a broad selection of practice settings (Carson & Hladik, 2009). Hospitals, clinics, for-profit laboratories, and public health amenities form the broad space that these technician can further their career following completion of the course. Other chances for histologic technicians are in manufacturing study, marine biology, forensic pathology, and veterinary pathology. The main or core duty of a histology technician is to prepare the tissue, slices it, fix it to slides, apply applicable stains, and wrap slips the slides for analysis by a pathologist. In brief, histology is the study of cytology, tissue, and in general the study of cells thus allows and fine needle aspirations and pap smears, which are what cytology technician operates with. The relationship between a HT and cyto technician is that a histology technician analyzes cells and prepares tissue for the cyto technician to interpret on slides (Gartner, Hiatt & Gartner, 2011). The study is broad as it involves analysis of the microscopic anatomy of tissues and cells of animals and plants (Gartner, Hiatt & Gartner, 2011). It is normally performed by studying tissues and cells through sectioning and dyeing, followed by assessment under an electron microscope or light microscope (Carson & Hladik, 2009). Histological analysis or training may be conducted via tissue culture, where live tissue or cells can be separated and sustained in a proper environment exterior the body for diverse research projects. The capability to imagine or differentially recognize microscopic components is normally enhanced through the employment of histological stains. This study is an essential instrument of medicine and biology and thus making histologic technician very important member of the

Monday, July 22, 2019

Tale of Two Cities Character Analysis Essay Example for Free

Tale of Two Cities Character Analysis Essay The sacrifice of one’s own life for the person they love is by far the ultimate sacrifice any human being can make. In A Tale of Two Cities, by Charles Dickens, Sydney Carton, a despondent and inebriate man, did exactly that. Through his sacrifice, he became the most memorable and dynamic character in this book. Sydney Carton was an unmotivated alcoholic who transformed his wasted and useless life by performing a selfless act of heroism. I am a disappointed drudge. I care for no man on earth, and no man on earth cares for me, (Page 71). That was Sydney Carton’s abridged explanation for his disposition when he meets Charles Darnay. In the beginning, Carton is a lazy, alcoholic attorney who cares about nothing in life. He is self-undermining in that he has no confidence or volition and believes his life is an extreme waste. He is crude, frequently drunk, and melancholy. He feels he is stuck in the disappointed course of his once promising life, and has nothing worth giving anymore. Around the middle of the book, Sydney Carton makes a remarkable transformation into a man of profound merit. He professes his love to Lucie saying, For you, and for any dear to you, I would do anything. I would embrace any sacrifice for you and for those dear to you, (page 128). This scene marks a vital transition for Carton and lays the foundation and foreshadows the supreme sacrifice that he makes at the end of the novel. Lucie was the only one who thought there was a good person in Carton, and inadvertently succeeded in transforming him from depressed and dejected into a caring and altruistic man. Sydney Cartons promise to Lucie took him to the guillotine at the end of A Tale of Two Cities. He died for Darnay, which he believes is the greatest thing he could do to make his life significant. His death lets the woman he loves be happy. He quotes a verse from the bible saying, I am the resurrection and then life, saith the Lord; he that believeth in me, though he were dead, yet shall never die; and whosoever liveth and believeth in me, shall never die. This verse becomes almost his theme of the rest of Carton’s changed outlook of life. Sydney Cartons resurrection from his concealed life by his love for Lucie is gained by giving up his life for her happiness. He goes to death with the satisfaction of knowing that his life now has meaning, which is what Carton was searching for throughout the novel. During his life he was unable to act in his own self-interest, but, paradoxically, he’s completely willing to sacrifice his own life so that another man may live to please the one he loves. Sydney Carton sacrificed his life for Lucie, the only person who made him feel his life had meaning—just like he had promised to her. He began as a drunken man with no purpose, but only in the sacrifice of his life did Carton establish his greatest worth. Essentially what makes him the most memorable and dynamic character of A Tale of Two Cities is this predominant resurrection. In that all that was good in him and his love for Lucie lives on in Darnay, and he is now defined not for what he was, but by his single greatest act.

Sunday, July 21, 2019

Water Scarcity in Singapore: An Overview

Water Scarcity in Singapore: An Overview Abstract Singapore is a no more farmland country so that mean cant save more water. First I will write about Singapore fresh water information, second I will write about the government solution for the water scarcity issue, after that I will discuss the which solution is good for reduce fresh water scarcity and write some of my opinion for solve this issue. In the last I will conclusion the answer and give some suggest. When you want to know the detail information, in the last page I will give some source web site. Introduction Singapore is a famous poor water country and it most water come from another country provid. This report I will talk about Singapore how to reduce fresh water scarcity. Well we know the fresh water is very important to biome because the body have high per cent work from the water and it can help you eating, poop and transport energy. From the research the body have seventy per cent make for the water and when miss fifteen per cent it will meet died danger, so for the research the water is very important for our life. In global have fresh water scarcity problem, some scientist research some solution to reduce this trouble for example in seawater join some special energy can make it become fresh water. We know technology improve our life, most country have water recycle system. I think in the future each house have own small water recycle system. Methodology Before the researchà ¯Ã‚ ¼Ã…’I find the Singapore water come from the nearly country and rain. Although precipition is high than another country but it no more land so it is poor water country. From the internet I find the Singapore how to collect the rain and the water used for. I think the chemistry system is very important for reduce fresh water scarcity because in Singapore is very careful for water. In my opinion this information is very important because it provide me more detail and it is good background befor the article. Findings Singapore is an island and urban city state and not hence so it have high per cent water on Malaysia supply. For the terrain reason, the Singapore cant save more water although it rain high than another country. In early because technology grow up quick and government not very care about industry, so most industry have most pollution and local person use groundwater so in after this country meet drink problem. In beginning the government to put forward buy the water for Malaysia and recycle pollution water. Then it carry out most plan desalt seawater to drink water, develop Newater plan, this plan objective is bring waste water that better than public water. I think they best plan is build impoundments and reservoirs, it can college most rain water and reduce water loss so in Singapore have most this building and most fresh water is come from here. The government dont want fresh water go to sea so they build barrage separate the sea and reservoir, when reservoir cant save more rain w ater it can help it ejectment the more water and it can save the low lying area. In my opinion the government can calculated each family use how much water, when it used more can suggest when they not hear can require pay more money and they also can reward use water less family, it can make everybody save the water and government donate little money to reward save water very well company. Discussion From the finding, we can see the Singapore have big water problem and they also take more measure to reduce fresh water scarcit. So I think my hypothesis is true, my hypothesi is in the future, each house have small water recycle sickle. from the technology grow up quick and the global fresh water scarcity issue to become more serious, we must have save water mentality and now most family have water purifier, it erasure people want to drink health and clean fresh water. In the future, the water recycle sickle have good change, it become not expensive and big, the government will subsidy it. All in all the Singapore do most action is want to solve fresh water scarcity issue. I think solve this issue is not only government work because we cant leave the water, and the water useful for our, so we must have save water mentalit. Well actually the government most action is want to reminds people have save water mind. We know in global have most country have fresh water scarcity issue and t he population become more and more, human most careful about fresh water issue, so I think most country should study Singapore method. Conclusion All in all the government proposed is want to reduce fresh water scarcity and they also want to reminds people to save water. Reference https://www.ukessays.com/essays/environmental-sciences/the-issues-of-fresh-water-in-singapore-environmental-sciences-essay.php

Factors Influencing the Technical Defensive Measures on Spyw

Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl Factors Influencing the Technical Defensive Measures on Spyw Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl