Saturday, August 31, 2019
Child obesity Essay
Child obesity is a serious epidemic in America. One in every three kids in America is obese. Michelle Obama speaks at the launch of the ââ¬Å"Lets Moveâ⬠campaign. In front of cabinet member, senators, representatives and mayors, she discusses the campaignââ¬â¢s plans to fight obesity in America. Our best effort should be deployed to stop this epidemic that degrades the lives and future of our children by arming parents with the tools they need, equipping our school systems with healthier foods, making healthier foods available for our communities, and getting our kids to exercise more. Ms. Obama understands that not all parents have the necessary tools to make the right choices for their children. Even if the parents read a label on a food item, they may not understand what it means. The ââ¬Å"Task Force on Child Obesity â⬠movement will help to make food labels ââ¬Å"consumer friendlyâ⬠so parents can make better choices when buying food. The ââ¬Å"Task Force on Child Obesity â⬠will also help parents understand that they are responsible for building healthy habits in their kids, such as exercise . However, when the kids are at school the parents cannot control everything their children eat. Our schools do not serve healthy foods to our kids. Twice a day out kids eat unhealthy meals served at the schools. Ms. Obama said ââ¬Å"If our kids are not getting adequate nutrition, even the best teachers will not be able to teach them effectivelyâ⬠(Obama 331). The kids need more fruits and vegetables in their diet. The ââ¬Å"Child Nutrition Actâ⬠would give our school healthier standards. It would replace empty calorie meals with more fruits and vegetables, the fruits and vegetables they need for effective learning and brain functions. If the school are feeding our children unhealthy foods twice a day, it would undo the healthy eating habits learned at home. Once our schools begin to serve the healthy foods our kids need, the next step would be to ensure the parents have access to healthy food choices and not just fast food restaurants. Not all neighborhoods have grocery stores nearby to supply the community with healthy foods. If we invest 400 million dollars to build grocery stores around the country, we could eliminate ââ¬Å"food desertsâ⬠in our communities. Not only will it give the parents a healthier choice over fast food restaurants, but it will also create jobs. Once the children are getting the nutrition they require, at home and at school, the last step is to get them to exercise more. Motivating our kids to exerciseà can be done in various ways. Giving more ââ¬Å"Presidential Active Lifestyle Awardsâ⬠to kids who complete a specific exercise program is a great start. Hiring NFL, WMBA and other professional athletes is another way we will motivate our children to get more exercise. Child obesity is destroying the future of our children, but Ms. Obama outlines how we can stop it. By initiating the ââ¬Å"Task Force on Child Obesity â⬠, upgrading cafeteria food in schools, eliminating ââ¬Å"food desertsâ⬠, and motivating out kids to exercise we can stop this growing epidemic . Ms. Obama effectively communicates her concerns and solutions in her speech. She also gives great examples as to why the parents are not always aware to the problem or may not have the options to help the situation. Although her intentions are well placed, Iââ¬â¢m not convinced that her approach to solving child obesity is the most effective. Something should be done and if nothing else is being done about the obesity problem at least this will raise awareness.
Friday, August 30, 2019
Othello: Explain the important and effectiveness of ‘Act three, Scene three’
In the 17th century, Shakespeare found the plot for ââ¬ËOthello' in Giraldi Ginthio's collection of tales ââ¬ËHicatomithi' (1565). The play itself is set in the 16th century Venice and Cyprus. At the time of Shakespeare, Turks were considered to be barbarians as opposed to the Christians who represented civilization and morality. In the play there is a reference to a Turkish naval attack on the Venetian controlled land of Cyprus. It's because of this battle that most of the plot takes place in Cyprus. The third scene of the third act in the play is an intense and important scene, which displays the turning point of events that begun in the previous two acts. Such events as the migration of Othello, the moor, Desdemona, Othello's wife, Iago, Othello's ensign, Cassio, Othello's lieutenant, Roderigo, Iago's friend, and many Venetian men and women, from Venice to Cyprus. This change of location for the characters and the plot led to opportunities for later aspects of the play; in particular the evil plan created by Iago began to take shape as things fell to place in his favour. In act three, scene three, and the audience can witness Iago's newly found control over the general, Othello. Iago manages to convince Othello that Desdemona is having an affair and is a false woman. This definitely comes as a shock to the audience due to the good, loyal and trusting image of Othello that they saw at the start of the play. There is also a display of Iago's power of manipulation that allows him to use them in any way he wants, so he can achieve his goals. Othello is much changed in this scene; he believes that his wife is having an affair and starts to have doubts in the marriage he so strongly believed in. Othello shows signs to his more vulnerable and weaker side that makes the audience question his character. The events in this scene build up to a tragic ending that the audience can predict from the moment they realise Iago's evil plan and role in act three. Tragedy is inevitable and the audience can clearly see it, due to their understanding of Shakespeare's real intensions in the scene. In conclusion it can be said that in this central scene of the play, Othello begins to lose control of the situation and Iago takes possessions. Scene three is the turning point of events in the play. It's the point where Iago's plan starts to fall in place and the audience notice the power of Iago's words over Othello. But these events begun long time before this scene: At the start of the play we are introduced to Iago, Othello's ensign and advisor, Roderigo, Iago's friend that's in love with Desdemona. The audience learn the fact that Roderigo is paying Iago to get Desdemona away from Othello. From the first conversation, it becomes clear that Iago is evil, cruel and selfish. He talks of the fact that Othello made Cassio lieutenant instead of him and how much he hates and wants to bring down Othello. Iago's evil plan begun when he told Brabantio that Othello has secretly married and ran away with Desdemona, Brabantio's daughter. This caused for Othello to be taken to court and accused of using witchcraft on Desdemona. During this event Othello stays cool and calm while Iago was hoping for him to get angry and in more trouble. At the end of the act, Othello is sent to defend Cyprus from the Turkish attack. In act two, Othello, Desdemona, Iago, Roderigo and Cassio arrive in Cyprus. As Iago continues his plan against Othello, it becomes clear that it's not just Othello that will get hurt at the end. Iago decides to use Cassio in his plan by making him vulnerable; so he gets Cassio fired. With the intension of making things worse, Iago advises Cassio to meet with Desdemona and beg her to persuade Othello to consider giving him another chance. Cassio arranges to meet Desdemona in her house. At the start of act three, Iago plans for Othello to arrive at his house just to witness Cassio leaving and makes sure that Othello does not forget the sight of cassio by sounding suspicious of Cassio's appearance and suggesting that there is something going on between Desdemona and Cassio. Even though Othello doesn't accept any of this, he keeps the thought in his mind. The audience are now aware of Iago's plan and Othello's jealous mind and all they await is to see how far this would drive Othello and how it will affect the outcome of the play. At the end of the scene Othello loses control when he finds himself having to decide between his love for Desdemona and his trust of Iago's word. This shows Othello's weakness and foolishness to the audience. Shakespeare's intension is to prove that not everyone would fall for Iago's plan and that Othello was made vulnerable through out his life and was open to attack from Iago. Through out the play, the audience witness the rapid change of character in Othello and unlike Othello himself, they realise that Iago is responsible for most of it. Iago was the person that didn't seem very dangerous at the start of the play but as the events following up to act three, scene three took place, he showed his true colours by initiating his evil plan to destroy Othello, Desdemona and Cassio's life. Iago's hate for Othello started because of his despite for black people, his jealousy of Othello's fame and finally because of the fact that Cassio was made lieutenant instead of him. Iago felt betrayed and destroyed and decided to make life hell for Othello by acting as his friend but working secretly as his enemy. As time passed, things changed in his favour and all he had to do was to give them a push in the wrong direction and enjoyed the show as Othello's wonderful life went to ruins. It is very important to understand the tricks and skills used by Iago during the time which he brainwashed Othello. At first he tried to throw hints and ideas but Othello ignored them for some time. ââ¬Ë Cassio, my lord? No, sure, I cannot think it that he would sneak away so guilty like, seeing you coming' 3:3(38-40). He continued his manipulation by telling false facts and proving his points using any possible situation. But he still held back made his words sound like suggestions while Othello is taking in every word without being aware. ââ¬ËI speak not yet of proof, Look to your wife; observe her well with cassio' 3:3(194-195) Finally, he took his case to the extreme when he realised that Othello would not give in without proof. Iago told Othello about a made up event in which he witnessed Cassio having an erotic dream about Desdemona. Othello immediately believed this, which proved just how little he trusted his wife and how much he trusted Iago. â⬠In sleep I heard him say: ââ¬Ë sweet Desdemona, let us be wary, let us hide our loveâ⬠3:3(416-417) Iago talked to Othello about false acts done by cassio and other wrong men but most of the time the actions he spoke of are the same things he did and continued to do; while Iago and the audience were completely aware of that, Othello had no clue, making this an example of dramatic irony. ââ¬Ë O beware, my lord, of jealousy! The green-eyed monster, which doth mock the meat it feeds on' 3:3(164-165). Othello was introduced as a brave, understanding man, famous in the army, loved by his wife and respected by the court. After all the work done by Iago, Othello completely changed and did things he could not imagine before. By the end of act three, scene three Othello had gone past denial and just needed enough time and proof to be completely convinced and to make a tragic decision. In act one, Iago and Roderigo's description of Othello made him look like an evil man who kidnapped a girl and betrayed a friend; when Othello first made an appearance, everything changed due to the contrast between his good personality and the fake description. The audience thought of Othello as the good characters that wont change under any condition; it is clear that when Othello resorted so low to think false of his wife, he would be a disappointment to the audience. Iago's words and speeches had the worst effect on Othello and Shakespeare shows this through the weird and wild actions from Othello towards Desdemona and cassio, which eventually led to murder. Shakespeare demonstrated Othello's confusion and disturbed mind as he fought a battle in his head between suspicion and reality. Then there was the loss of control, which managed to bring down Othello and let him be consumed by jealousy created by no other than another man. At this point Othello acts and talks just like Iago with a mind of blood, hatred and vengeance; he starts to use animal imagery to describe woman and specially Desdemona. Was this fair paper, this most goodly book, made to write ââ¬Ëwhore' upon? What committed! ââ¬Ë 4:2(70-71) The audience didn't feel sorry for Othello anymore. He fell into a deep hole and cannot be rescued. They knew that there would be tragedy at the end of all this and they could guess it will be mostly Othello's doing, because Iago did his part already; Othello would roll down the hill by himself and hitting rock bottom is inevitable. A lot of tragic events take place in ââ¬ËOthello' that cannot be blamed completely on one person. On one side of the argument, there is Iago a racist, sexist and cruel man who is driven to the very edge by hate for others and selfishness. He manages to use everyone in order to complete his plan of ruining the lives of others. On the other side there is Othello the tough, likable and kind man who proved weak when put in the situation of choosing between false suspicion and his love and trust for his wife. He tried to fight the control of jealousy over him but due to the doubts he kept in his heart, it was no use; so he lost control of his mind, which drove him to his death. It is real hard to figure out whom Shakespeare wanted to blame for the tragedy as both characters played a big part in it. It's true that Iago started the whole issue and made it known by any means necessary but it was the Othello, the man meant to be better, that gave in to some words. Shakespeare wanted to make it clear that even though Othello made all the bad decisions but he didn't always have complete control over his conscience because of his past. It was made clear that at the time black people were not treated right by all. He lived most of his life as a slave and he was mocked and beat down by all kinds of people and it is obvious he lost self-confidence and trust but the fact that he made it from nothing to a famous and respected general is incredible. In some way it can be said that they were both to blame for the bad events. But then again Othello is the main character and the audience believed in him from the very start and he managed to ruin things for the one he most cared for. It is very important to keep in mind the effect that the racist society of the time had on him. Haply for I am black and have not those soft parts of conversation that chamberers have; or for I am declined into the vale of years. ââ¬Ë 3:3(260-264). In a deeper look at the scene there are many small details that helps a lot more into the understanding of the decisions made by the characters. In contrast to the previous two scenes, this scene is lengthy. Here we watch as Othello's mind is poisoned. Desdemona and Emilia offer cassio their assurance that Othello will soon restore him to favour. Desdemona insists that she will talk her husband ââ¬Ëout of patience' (line 23) until he agrees to reassign cassio. As they talk, Othello enters with Iago. Uneasy and ashamed, cassio leaves when Desdemona offers to plead for him until she is heard. Iago immediately sets to work, observing briefly that he does not like the manner of Cassio's leave-taking. Iago continues to suggest that he suspects him of false behaviour with Desdemona. He urges his master not to be jealous without telling him directly why he should be jealous. Othello insists that he is not given to jealousy, but his mind has clearly been moving in the very direction Iago intended because he then speaks of his wife's attributes and talents. He also brings up the subject of rivalry when he says ââ¬Ë she had eyes and chose me' (line 192). Iago knows he has ensnared his victim. He then offers Othello specific advice; watch Desdemona with cassio, remember that Venetian women are deceitful. Iago continues to twist the knife by pointing out things that he knows Othello would think about. Finally it becomes clear that the doubt is created in Othello's mind and heart when he says ââ¬Ë why did I marry? ââ¬Ë (Line 245). Iago is merciless so he returns to offer more wicked advise until Othello is completely under his control. After this long and important conversation, Othello and Desdemona go to dinner. Emilia comes back to find Desdemona's handkerchief that she dropped earlier; unaware of the importance of the handkerchief to both Othello and Iago, Emilia steals the handkerchief and hands it to Iago. Here we discovers that the handkerchief is a big part of Iago's plan; the handkerchief will be left at Cassio's lodgings to serve as proof of his secret affair with Desdemona. When Othello returns, he is absorbed with thoughts of his wife's treachery. He now seems absolutely convinced that desdemona is guilty of deceiving him and is tormented by the lack of evidence. He also regrets finding out about any of this; he says he was happier when he was ignorant of ââ¬Ëher stolen hours of lust'. Iago feeds othello's jealousy by telling him that it will be hard to get evidence and then he continues to give a description of an event in which he shared a bed with cassio and witnessed him having an erotic dream about desdemona in which he tells her to kiss and such. This drives Othello angry and he turns to violence and revenge but not as much Iago would've wanted. Iago then moves to his serious back up plan; he tells the general about the handkerchief that's been seen with cassio rubbing his beard with it. Othello is now utterly consumed by ââ¬Ëbloody thoughts' (line 460). They both kneel and vow to help each other and correct what's wronged. Othello asks Iago to kill cassio. Iago then receives the promotion he has been looking for; he is made lieutenant when he agrees to murder his ââ¬Ëfriend' (line 476). Othello always needs someone to completely trust and believe, so it can be said that Iago's devotion has replaced the harmony Othello received from marriage with Desdemona. This scene ends, as a new phase filled with hate, blood and vengeance, is about to start. In terms of characters, Iago is most to blame for the events in this scene that build up the road to tragedy for Othello. Following scene three, a short but funny moment takes place in which desdemona and a clown have a conversation. This to stop the tension built up in the previous conversation between Othello and Iago. This lighter start makes the audience forget about the tense events of the last scene and to get them to look forward to the outcome of the play. We see Othello very confused and angry with Desdemona regarding the missing handkerchief. Desdemona realises that her husband is acting like a different man as he shouts and accuses her of false actions. The audience can identify that the tense events of the last scene have definitely changed Othello for the worse. It is understandable that some people would feel sympathy for Othello even though he is being weak and stupid in believing Iago and loosing faith in his wife. But the sympathy can be described in different ways, some might feel sorry for him because they believe him to be a victim of racism and an evil, psychopath like Iago while others believe that Othello is partly to blame for the events of the play but still a victim. But no matter what kind of sympathy they have for him, they all know he was a victim to some extent because even though he denies it, he misunderstands women and doesn't give Desdemona a chance to explain herself. He believes that he is allowed to judge people and decide their fate. Through out his problems, he loses his pride and resorts to hiding and eavesdropping which results in even more jealousy that eventually leaves him shattered and vulnerable, in other words, a victim. Shakespeare's intensions are to put the audience in a situation where they can choose what they want to think of Othello. But he still wants them to feel the same thing about the plot when the play is over; Othello is responsible for a monstrous murder and then destroys himself in an act of self-slaughter. However the final response from the audience will be great sadness because of the moor's death and relieved and glad that his tormentor will be definitely tortured. Othello was a noble, compassionate and courageous black man that against all odds, served in a white man's society. He tried to be more than a soldier by loving his wife more than anything else in his life. Throught out his youth, he was tortured and broken down and just when he thought that he had found everything he's ever wanted, Iago turned up in his life. Iago tortured him, just by using the precise words at the right place and at the right time. The audience were constantly aware that he was directly under his ensigns' poisonous influence and was being pulled in many directions. The audience felt that his desire to revenge himself on cassio and Desdemona was the terrible result of Othello's attempt to combine his roles as soldier and lover. When he feared that his wife had betrayed him, he said woefully, ââ¬Ë Othello's occupation's gone! ââ¬Ë (3:3. 360); it is almost as if Desdemona was the prize he earned for his military victories; she had perhaps replaced his career as the source of his pride and honour; no wonder he felt her loss so keenly. In the final scene, before he killed himself, Othello reminded us of his previous services to the society and the man he was. Shakespeare wishes for us to know that Othello was a worthy man before he was ensnared by Iago. Othello heroically takes his own life as his punishment for killing his honest and loyal wife. In his final act and speech, he realised who he was and allowed the soldier inside him to kill the lover. But some might say that it was all too late for him, for Desdemona and for their beautiful life and marriage.
Thursday, August 29, 2019
Customer portfolio and Strategic Account Management 04256 Essay
Customer portfolio and Strategic Account Management 04256 - Essay Example Arguments made by Johnson and Selnes (2004), states that focus should be made on the wider managerial perspective that considers the companyââ¬â¢s entire customer portfolio rather than focusing on the few close customer relationship in order to maintain profitability, shareholderââ¬â¢s value and company growth. According to the authors Harri Terho and Aino Halinen (2007), customer portfolio analysis is an action by which a firm examines the present and the future customer values for building a balanced consumer structure through efficient allocation of resources to individual or customer group. The equilibrium of the customer portfolio can be considered as the vital goal of the customer portfolio analysis due to its explicit presence in all the proposed. Therefore the portfolio models earlier were based on mathematical optimization and have major focus on the formation of a favourable portfolio of products (Sackmann, Kundisch and Ruch, 2010). Ryals (2003) also stresses on the need to analyse the total relationships as an investment portfolio where the balance would be the consequence of the customer relationship related long term revenues and risks. The main focus of the customer base is to determine the significance of customer relationships to the company and differentiating between consumers of different worth. The analysis is the future outcome which is not restricted to the monetary value of the customers but also involves the varied consumer roles in providing present and future value for the company (Johnson and Selnes, 2004). The theory of customer portfolio study is related to the theory of segmentation but still varies considerably. Portfolio analysis centres on analyzing the existing value of customers as stated by H. Terho, A. Halinen in the Journal of Business Research (2007) from the main companys point of view whereas segmentation usually focuses on segregating the market into
Wednesday, August 28, 2019
Kristopher Scholl Essay Example | Topics and Well Written Essays - 500 words
Kristopher Scholl - Essay Example leaders have dazzling social intelligence, gusto for any change, and to crown it all, a vision that enables them to focus their sights on issues that really benefit the attention of the followers (Greenleaf & Spears, 1998). A higher authority is necessary for regulating and supervising other people as well as setting an example of a dedicated and a hard worker. Any effective leader should possess competence, courage, and compassion. Character as majorly discussed, is possibly the most significant characteristic a leader should have. An individualââ¬â¢s real character is who they happen to be when they are placed to face difficult scenarios. It is the morality and the decisions of a great leader that awards them the respectable character that other people seek to follow. Having character is essential for any leader since a leader requires that capability to see what others are unable to see, the needed sacrifices that should be made, even if it means that the sacrifices are of their own or a different individuals. Most of historical effective leaders are crowned charismatic; this may bring the need to define charisma, whether it is inborn or attained somewhere in life. At the same time if all charismatic leaders are generally effective. Basically, charismatic leaders are very skilled in their communication styles (Greenleaf & Spears, 1998). These are persons who are born verbally eloquent, at the same time they are able to communicate to most of their followers on an emotional, deep level. These are leaders who are capable of articulating a captivating or a compelling vision, and have the power to arouse very strong emotions in most of their followers. Charisma is basically a process. An interaction that takes place between the leader and the followers and the situation that calls out for the leader such as a need for change or settles a crisis. Most political leaders develop the needed skills to communicate to their followers or even convince the donors, this
Tuesday, August 27, 2019
Service Marketing Essay Example | Topics and Well Written Essays - 1500 words
Service Marketing - Essay Example Further, it has been observed that the annual sales of Apple have gone above the figure of $4,406 that does not take into account the online sales. These sales are much higher than the sales of jeweler Tiffany & Co. and therefore depict Appleââ¬â¢s success. Amongst its many operations, the back-end and front-end included, Apple believes in being spotless in every move so as to achieve success (Banker, 2011). With that in mind, Apple keeps a critical eye on the demands of its products. Comparing its operations with its rivals such as Best Buy, it has been observed that Apple has adopted a rather technical approach in the arena of service encounters and its related areas. It sells one brand that has comprehensible positioning, fewer products, and stores in hundreds as compared to the 4000 of Best Buy. The company believes that employees need to handle pressure to perform better customer service. However, with its increasing retail outlets, many of its employees have stated that the quality of its staff has been on a decline (Banker, 2011). Where it comes to meeting customer needs, from the design of the store to the post purchase behavior, every aspect has been responded creatively by Apple. Dividing its customers into various segments, Apple encounters some customers that are well aware of what they want. This segment immediately finds out the intended product they want to purchase, and pays for it. With the fast product selling process described earlier on one hand, the other hand has a group of customers who take it slow. More specifically, these customers browse and play with the products to decide their requirement. In order to tackle such a vast market, Apple therefore, follows a service design approach that consists of a floor plan and a genius bar that handles customer queries and gives them advice. Other than that, the design also consists of a check-out system for speedy service. For the layout of the outlet, an airy approach to associate to every ne ed of the customer is followed. It is therefore the creativity and innovation in service encounters that sets Apple apart from its competitors. This is so because if the customer experience is low, the overall perception of the brand is also reduced (Ofir et. al, 2008). 3. Analysis of managerial implications Analyzing it implication on the managerial roles, surveillance is one of the key tools needed. More specifically, with surveillance being constant in nature, the role of the managers must also be to continuously prepare for cost control preparations for the new product and market. The managerial roles must consider a need to identify low costs of the inputs and outputs in improvement measures. Other than that, the costs are also related to innovation, technology, and information. Moving further on the implication factor, it has been observed that with the new markets, new tools for maximizing incomes must be considered. In this scenario, both markets that are the fresh market an d the processed market, must be brought into the picture whilst the assessment. Moreover, buyer expectations in every situation need to be continuously monitored when alternatives are considered. To understand the cultivar selection and significance of the quality of the product is an important aspect in the discussion for managerial implications. It is important to understand that commitments to quality might be easier to change than the selection preferences. Where many customers consider service as a criterion before purchasing a product, addingà delivery, commitment by the supplier, the packaging, specification bonding, and quality with service would be able to win even those customers who prefer otherà things. The overall package provided will therefore be able to win the company loyal
Monday, August 26, 2019
Art History of 20th Century Research Paper Example | Topics and Well Written Essays - 1250 words
Art History of 20th Century - Research Paper Example Pollok made most of his painting on canvas rather than on the wall, and this was to make them more portable. Most of his works were a mixture of controllable and uncontrollable factors1. Lynda Benglis on her part is an American sculptor and visual artist majorly known for her wax painting and poured latex sculptures. She also used drip style to make her works. She was a professional photographer as she had studied artwork at a college. Given that most of her works were sensual in nature, they were ignored for a long time. à Given that Pollok paintings were made on canvas rather than on walls, which is common. His paintings were or portable and could easily move to the museum. This work is significant and, therefore, can be easily seen by those visiting the place. Their placement on the wall at points that it could be viewed easily by people of all heights since itââ¬â¢s not too high or too low. A group of viewers can as well look at it at the same as it is large and full2. Pollok believed that the size of his works had a direct relationship with how and to what extent viewers and he would bond and be part of the painting. Lynda Benglis, on the other hand, made a sculpture that could not be hanging but place on a flat surface for viewing. Her sculpture is smaller compared to the paintings of Pollok. It is only visible to a keen viewer who had the intention of looking for this particular artwork in the gallery. The location of Benglisââ¬â¢ sculpture Batt puts it out of sight and away from other artistic works with which they fall into the same category. The disadvantage to the painter and the lovers of their works as it takes longer to locate them thus according to them with little or no publicity. Ã
Sunday, August 25, 2019
English Essay Example | Topics and Well Written Essays - 1250 words - 18
English - Essay Example For example, the sibling rivalry in The Eye as Munro narrates her five year old self of how she disliked the idea of having another brother of which any young person with a sibling can relate. The book begun with the story ââ¬Å"To Reach Japanâ⬠which involved Greta and her husband Peter. The title actually alludes to a bottle in the sea coming from Vancouver and hoping that it will reach Japan. This story is engaging because it is full of allegory that one has to read between the lines. Munro may not be explicit in narrating that this marriage is about break except by hinting their differences that Greta is sentimental who like to romanticize things while Peter is a pragmatist (being an engineer). Munro was not direct that Greta will leave Peter except that we understand what she intends to do. In the train station, there was this scene that the people there are calling and waiting for her but someone is holding her back. This is basically an allegory of Gretaââ¬â¢s struggle to leave Peter. I find this story told in the allegory because there are several sub meanings in the narration that the reader had to read between the lines and not just read the text litera lly. This could be the reason why the novel is very engaging and enjoyable to the readers because there are multiple meanings in the texts. To Reach Japan is then followed by Amundsen which I did not exactly know what it meant until I read the story. It is actually a place associated with a new teacher at a tuberculosis ââ¬Å"sanâ⬠. It is a strange place because when people do not show up at work, it is expected that something horrible happened to them. Here Alice Munro told us the story of Vivien, Mary and Dr. Alister Fox. The story may sound morbid to me but nevertheless Munro showed her ability to put in stories with complex plot in such a small space of few pages. This may be the least of my
Saturday, August 24, 2019
Cover Letter Personal Statement Example | Topics and Well Written Essays - 250 words - 3
Cover Letter - Personal Statement Example In these two organizations, I used to give professional advises to the clients regarding insurance and financial; services. I have learned a lot during the working in these three organizations. In terms of leadership experience, I have founded maple Leaf Funds in which I worked as a President of the organization. I have recruited more than 400 volunteers to organize non-profit charity during my entrepreneurship. I have expertly managed allocated and deposited funds. I am very eager to work in your organization as a supply chain summer trainee. I have invited in global young leaders conference organized by UN. My entrepreneurship and leadership skills took the attraction of industrial leaders. In terms of personal skills, I am extravert and I have expertise in open minded communication process. In addition to these, I have proficiency in several analytical software applications. These experiences and my individual skills will help me to justify my request and your selection
Had I Been White Essay Example | Topics and Well Written Essays - 750 words
Had I Been White - Essay Example Diouna, a young Senegalese woman was working as a laundress for the Pouchet family stationed in Dakar. When the family decided to take a holiday in France, they took Diouna along with them on the mistaken assumption by Diouana that she has been employed as a governess to the children of the couple. The French couple took advantage of the innocence and the lack of literacy of the black girl that made her lose all her hopes and dreams in coming to France. The scheming way of Madame Pouchet in taking Diouna to France was clearly demonstrated in the story. ââ¬Å"In France when she hired a maid not only was the salary higher, but the maid demanded a day off to bootâ⬠(770). This was always the dilemma of Madame Pouchet whenever they had their holiday in France. ââ¬Å"She had conceived a plan for her next vacationâ⬠(770). Her plan was to hire an African girl because she knew that ââ¬Å"for three thousand francs a month, any young African girl would have followed her to the en d of the earthâ⬠(770). Madame Pouchet was set to put up her plan to success by praising the beauty of living in France and by showering Diouana with things such as old clothes and shoes that she knows would be of great necessity on the impoverished condition of Diouana and her family. Diouana fantasizes France as the land where her hope of becoming rich will come true. All she could think of was the ââ¬Å"beauty, richness, and the joy of livingâ⬠(770) in France. For Diouana getting rich would mean the ââ¬Å"freedom to go where she wished, without having to work like a beast of burdenâ⬠(770). This was the set of mind of Diouana that even an advice from Tive Correa, an old sailor who spent twenty years of his life in France, ââ¬Å"For Diouana, he predicted nothing but misfortuneâ⬠(772), was not given any consideration or thought. The youth should listen to the wisdom of experience of the old generation because they have been exposed to the realities of life and they are no longer blinded by their dreams. The courage of Tive Correa to counter the defense of Monsiuer Pouchet: ââ¬Å"Certainly. What young African doesnââ¬â¢t dream of going to France?â⬠(772) when the former announced that they did not force Diouana to come with them, was a manifestation of how knowledgeable he was on the real life of the Africans far from their native land. Diouana should have been more sensible when Tive Correa related how young Africans ââ¬Å"confuse living in France with being a servant in Franceâ⬠(772). It should have been an eye opener for Diouna when Tive Correa relates that in Casamance, ââ¬Å"we say that the darkness pursues the butterflyâ⬠(772) and not ââ¬Å"the light attracts the butterflyâ⬠(772). Realization on her real life in France dawned upon Diouana: ââ¬Å"Sold, sold. Bought, bought. Theyââ¬â¢ve bought me. For three thousand francs I do all this work. They lured me, tied me to them, and Iââ¬â¢m stuck her e like a slaveâ⬠(775). There is nothing more crushing to the spirit of one who is dreaming of a good life than knowing that he was deceived. Deceived up to the extent of losing oneââ¬â¢s identity ââ¬â ââ¬Å"The neighbors would say: ââ¬ËItââ¬â¢s the Pouchetsââ¬â¢ black girl . . .ââ¬â¢ She wasnââ¬â¢t ââ¬Ëthe African girlââ¬â¢ in her own right, but theirs. And that hurtâ⬠(775). It was a very sad state for a person to feel so alone, far from the family who would protect and love and feeling that all hopes are shattered. These conditions usually lead to self-incrimination and will lead to getting angry with oneself and blaming yourself for all the misfortunes. ââ¬Å"Her ignorance made her mute. It was infuriating.â⬠(775). The deception of Madame Pouchet was unmasked by Diouana and she detest being lured by her employers. Madame Pouchetââ¬â¢
Friday, August 23, 2019
Geopolitics as a Field of Knowledge Essay Example | Topics and Well Written Essays - 1000 words
Geopolitics as a Field of Knowledge - Essay Example It is at this point that geopolitics meets the requirements of a field of knowledge, being close to geography (Colledge 1). The relationship between geopolitics and geography is made clear through the following example: When choosing a region for establishing their state governors are likely to prefer an area which has ââ¬Å"natural barriers, such as mountains, so that its security costs are lowâ⬠(Lind 182). The specific phenomenon implies that an individual cannot take effective geopolitical decisions unless he is aware of the characteristics and potentials of a region in terms of geography. The relationship between geopolitics and geography, as explained above, reveals another dimension/ characteristic of geopolitics: the potential of this concept to have the form of a policy practice. In the example presented above, the policymaker has to be based on geographical data, as related to an area, in order to decide which region offers most advantages as a center of social and economic life. At this point, geopolitics interacts with the political theory. Reference is made especially to the ââ¬Å"republican security theoryâ⬠(Lind 182) which is based on the following perception: ââ¬Å"a democratic republic can survive only if its security costs are lowâ⬠(Lind 182). However, such target cannot be achieved unless particular methods are employed. Primarily, a military force that is able to protect the republic from its enemies needs to be organized (Lind 182). Such plan can be effectively developed only through the identification of appropriate methods; it is at thi s point that geopolitics shows its characteristic as a set of methods. The use of geopolitics in developing critical state decisions is understood through the example of Britain: British preferred to establish their state in a region that is surrounded by water so that enemies are discouraged from invading in British territory (Lind 182).Ã
Thursday, August 22, 2019
Effect of Eating Fast Food Essay Example for Free
Effect of Eating Fast Food Essay In the past, people in the Jakarta city always ate healthy and fresh food. But today, many people like to eat fast food such as pizza, hamburgers, and fried chicken. Many reasons why people prefer to consume fast food. This essay will explain some negative effects of fast food. There are several reasons why fast food grows quickly in Jakarta. The first reason is changing lifestyles in society. In Jakarta, many people are working in offices or companies. The workers do not have much time to search for food because the working hours are very solid. Advertising is another reason. Jakarta is a big city that through advertising always informs new products to society. For example, internet and television report every day about development of different types of fast food. All of these ads influence people to buy fast food. Moreover, price of fast food is very cheap. Therefore, every day many people buy Hamburger, Pizza and other fast foods. However, fast food has negative effects on the people of Jakarta. The greatest influence is the effect on health. It can be seen from many people in Jakarta became fat because of these foods. As a result, these people will become less productive and have a condition such as heart disease and diabetes. Another consequence of the fast food is losing tradition of eating together with family at home. Now, children and adults rarely eat together at home. As a result, parents and children seldom communicate each other. The next effect is on the economy. Fast food is not too expensive, more expensive when cooking at home; however, all fast food comes from foreign-owned franchise company, so the benefits of these foods for foreigners. In generally, I think that a lot of people consume fast food in Jakarta because of the lifestyle, the influence of advertising, and low prices. However, I believe that these foods have serious consequences in the community such as health problems, loss of traditional family meals, and economic problems. Therefore, people in Jakarta should leave fast food for a better life.
Wednesday, August 21, 2019
Using Computer Forensics to Investigate Employee Data Theft
Using Computer Forensics to Investigate Employee Data Theft Introduction Over 25 percent of employees steal proprietary data when departing a company or organization.[1] To that end, our experience shows that departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company. Ã Ã When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft of IP analysis in order to preserve electronic data and uncover important evidence. Using specialized software, the expert can reveal digital footprints such as: USB activity Files recently opened Cloud storage usage Files sent to personal email accounts Recently printed documents The results of the analysis can provide the foundation for legal action such as a temporary restraining order, permanent injunction, subpoena of personal devices, or other litigation to prevent the misappropriation of company data. When Employee Data Theft Is Suspected Employee data theft occurs most frequently just prior to, or immediately after, an individuals termination or resignation from an organization. Telltale signs that an investigation is warranted include unusual activity by the employee, such as: Plugging a personal USB thumb drive or hard drive into a computer Coming into work at odd hours or establishing remote desktop connections during off-hours Transferring large amounts of data on the company network Visiting file sharing sites like Dropbox or Google Drive Sending emails with attachments to personal accounts If there are concerns that a departing employee has stolen proprietary data, then it is important to take steps not to delete important electronic evidence located on his or her computer. If the computer is powered on, then leave it on, because important evidence may be stored on the computers random access memory and could be deleted if the computer is powered off. Also, ensure the computer cannot be accessed remotely by disconnecting it from the network. If the computer is already turned off, then place it in secure storage. Furthermore, confirm the employees login credentials are disabled or have been changed, but do not let the IT staff reinstall the operating system or reassign the computer to another employee. Such actions could destroy or overwrite any evidence of wrongdoing. Finally, resist the temptation to take a peek at what is stored on the computer by turning it on and accessing files because this could alter the data, thereby making the investigation more complex. If the suspected employee had a company-issued cell phone, then place it in secure storage as well. Smartphones hold an abundance of useful information such as text messages, emails, call logs, internet activity and more. The simple act of resetting the phone, however, can permanently destroy this data. IP Theft Investigations Preserving and Analyzing Electronic Evidence The first step in a theft of IP investigation is to forensically preserve the data on the employees device(s). The computer forensics expert will create chain of custody documentation, photograph the hardware, and verify the integrity of the preserved data, among other things. These steps ensure that the electronic evidence will be admissible in court. Once the data is preserved, the next step in the investigation is to perform an analysis to identify software and artifacts that may be indicative of IP theft. These areas on a typical Windows installation include: USB activity Files recently opened or deleted Cloud storage Personal email accounts Internet history report Printed documents USB Activity Analysis Many of todays USB devices, such as thumb drives and external hard drives, have enough storage capacity to save an entire copy of a users hard drive. As such, they are one of the most common tools used to steal data. The good news is that using a USB device leaves behind a trail of digital evidence that can prove invaluable to an investigation. Analyzing a users USB activity can reveal several key facts regarding what was connected to the computer and when. In most cases, forensic experts can determine the serial number and/or brand of the USB device, as well as the first and last time the device was connected to the computer. In some instances, they may also be able to verify each time a specific USB device was connected. Oftentimes, the analysis will reveal that an external USB hard drive or flash drive was connected for the first time during an employees last week of employment. While most analyses reveal a new USB connection, it is also possible that a device used throughout the duration of the suspects employment was never returned. A device such as this would likely contain numerous documents and files that were related to the employees day-to-day activities and could contain value to a competitor. If it is a requirement that employees return company-owned USB drives at the end of their employment, forensic experts have the ability to verify whether or not that policy was upheld. Files Recently Opened While confirming that a USB device was connected to a computer is significant, it is even more important to know what files were accessed and potentially transferred to the device. The Microsoft Windows operating system creates various artifacts when a user opens a file or folder. These artifacts indicate what was opened, when it was opened and where it was opened from. A classic red flag is if the employee was opening files during the last week of employment that were not related to the work being performing during that time. Another consideration is the organizations data access policy. If data access restrictions are not in place, then the employee may be able to access company files unrelated to current work that are stored on the network. The existence of these artifacts when combined with a USB activity timeline can indicate a high probability that data was copied off the system. Lastly, the artifacts can also contain specific information about where the file existed. If a file was opened from a USB drive, the artifact will indicate this, providing factual evidence that the suspect is in possession of a USB drive that contains specific files. For example, combining a USB analysis and files recently opened analysis could show that on October 7, 2016, at 7:22:08 a.m., a non-company-issued SanDisk thumb drive with serial number 851450 was plugged into the computer for the first time and a file titled Client Contact List.xlsx was opened. Cloud Storage If the analysis shows that certain files were accessed but no USB activity was detected, the next step in the investigation is to identify evidence that a cloud storage provider such as Dropbox, Google Drive or Microsoft OneDrive was accessed. The purpose of these applications is to share and sync data across multiple computers. For example, Dropbox may have been surreptitiously installed on the employees work computer as well as his or her home computer. Consequently, the simple act of syncing a company file to Dropbox will instantaneously also make that file available on the employees home computer. The good news is that cloud storage applications often have corresponding log files and databases that record what files the user accesses and what activities are performed. These logs can signify files have been uploaded to the cloud in the past even if they have already been deleted from the shared folder. Some of these applications even save deleted data in a separate hidden folder on the computer itself that users typically are not aware of. As a result, a theft of IP analysis may show that Dropbox was installed on the users work computer and that early in the morning on October 7, 2016, fifty files were deleted and the hidden folder reveals these were company files. Personal Email Accounts Some individuals may use their company email to send attachments to their personal email account such as Yahoo or Gmail. In these cases, forensic experts are able to perform a preservation of the employees work email to identify and document the evidence of misconduct. Internet History Report An Internet history report can be generated that shows, inter alia, recent Internet searches, web sites and pages visited, cookies from websites, and Internet downloads that occurred. Such information is helpful in establishing what an individual thought was important or even their state of mind. For example, analysts have discovered that individuals have searched on how to delete data or copy data surreptitiously and that they reviewed websites that were in essence how to manuals to perform certain deleterious acts. Paper Documents Finally, individuals who are a little less aware of more modern techniques to copy data will simply print the documents they wish to take out the door. In these cases, forensic experts are able determine the last known print date of Microsoft Office documents. Deliverables and Project Timeframe The turnaround time for a theft of IP analysis performed by an analyst is typically one week. Deliverables provided will be easy to understand in the form of spreadsheets, html reports, and written reports containing the findings of the analysis. A forensic expert should also spend time with the client either over the phone or in person to discuss the reports in detail so that they know exactly what a report contains and the assumptions and opinions of the forensic expert. If necessary, an expert will also provide depositions or expert witness testimony regarding the authenticity of the evidence and their findings. Authors Timothy M. Opsitnick, President, JURINNOV, LLC, Joseph M. Anguilano, Director of Operations, and Trevor B. Tucker, Forensic Analyst. JURINNOV, LLC, a wholly-owned subsidiary of Technology Concepts Design, Inc. (TCDI), is a technology company that provides cybersecurity and eDiscovery services. Cybersecurity consulting includes investigating accidental or malicious data breaches as well as providing security strategies and assessments to prevent such occurrences. eDiscovery consulting includes computer forensic investigations and ASP ESI hosting. JurInnov news and information is available at www.jurinnov.com. For over 25 years, TCDI has been providing technology solutions through partnerships with large corporations and law firms. These solutions include advanced litigation support software and services for electronic discovery, hosted review and production, and large-scale litigation case file management. TCDI news and information is available at www.tcdi.com. [1] Biscom, Employee Departure Creates Gaping Security Hole Says New Data, December 23, 2015; https://www.biscom.com/employee-departure-creates-gaping-security-hole-says-new-data/.
Tuesday, August 20, 2019
Role Of ICT In Research Information Technology Essay
Role Of ICT In Research Information Technology Essay Adoption of Information and Communication Technologies in teaching, learning and research has come a long way and so is the use of various web2.0 tools . The researchers need to change with changing times and need to understand todays fast changing knowledge base and its peculiarities. The article is written with an objective of finding out how is the academic researcher changed, helped, or hindered, by the use of ICTs in general and web2.0 tools in specific. ICT tools are mainly used by researchers for its ability to ease knowledge-gathering process and to enhance resource-development. Researcher in general value creativity and originality , thus the ICT tools which provide with the most open situations with great autonomy to the researcher can really help in identifying and solving research problems in the most creative ways. Some of web2.0 tools used for research related tasks are dealt in detail here to give a clear guidance to the researcher . The use of ICT is based on the indi viduals logical assessment of how various applications increase his/her effectiveness and efficiency in work and provide ease in communication with peers. Use of ICT tools for making research data and information available are plenty in numbers today , but the best use of ICT tools would be to improve cognitive skills and thus help discriminate , analyse and create information rather than simply accumulate ( Boyer Commission , 1996). As usually research process deals with large amount of complex information and requires a lot of skills to analyse and organize these well, any ICT tool which helps the researcher give meaning and precision along with adding value to the information generated would be rated above the ones which help in just gathering information. Generally, ICT tools help researcher in the following research related tasks identify appropriate information sources critically analyse information research effectively manage information use information to extend and communicate knowledge across subject fields search up to ten databases and electronic resources simultaneously receive results in a common format link to individual databases for more specialised searching select favourite resources and e-journals, save searches and records, and setup email alerts. The possibilities of conducting research with Internet and its virtual components by individuals and organizations are innumerable. While going thru the research papers among others, several authors have mentioned that ICTs support: instantaneous information exchange despite geographical distances , costless accumulation of data and documents, improvements in the precision of knowledge reproduction, innovative and more effective routines to design new products and conduct problem solving activities both at individual and organizational level. Now, lets look at the main steps that are usually taken to conduct a research. The first two steps in any research activity are 1. Identifying your own world view and situate your research for evaluation. 2. Problem Identification by Literature review and design of research questions Research starts with an idea that researcher has , and now to conduct a research , that idea needs to be converted into a proper research question . ICT has to come in first stage while the researcher needs to discuss the ideas with others to get better user involvement . Now lets consider some ways in which ICT tools can be used to find Research Topics and create bookmarks for later references. Search Engines A feature of the Web that enhances learning and research is the use of search engines. A search on the Web can be very effective in providing a context for an unknown quote or theory , in a timely manner. The use of search engines can save precious time in research. Research indicates that about 85% of Internet users use basic search engines and search services like google to find specific information. However, it is also found that users are not satisfied with the performance of the current generation of search engines for not giving focused results by way of providing articles and notes from personal blogs etc. along with quality research articles . so o rdinary search engines are helpful for researching business and popular culture, but theyre not very useful for finding academic research papers or scholarly journal articles. Journal articles are available in a variety of formats, ranging from citations or brief abstracts to full text delivered electronically or in hard copy. Some articles are provided free. Often, a fee is required, or access is restricted in some way. Searching the invisible web resources also can be very useful. The following are some of the useful search engines used for research activities , 1. www.ask.com -lists related searches ,2. www.base-search.net : a multi-disciplinary search engine for academically relevant web , 3. Bing Microsofts search engine lists related searches , 4. Google Scholar indexes scholarly research from many journals, books, papers, etc. across many disciplines ,and 5. Yahoo! Search originally a Web directory, it now features a reliable search engine. Metasearch engines allow to query various search engines simultaneously providing a single list of results. These can avoid duplication and provide additional ideas . Some of the very useful and popular metasearch engines are Clusty (Vivisimo) , Dogpile , Ixquick and Mamma.com. Subject Directories allow to browse Web pages by category , and are best used when there is a need to find a list of general Web sites pertaining to a topic . These are often compiled by human editors and provide annotated links pointing to reliable Web sites. Apart from the google and Yahoo Directory these are a few others worth consideration are the open directory www.dmoz.org and www.opendoar.org/search.php . Subject-specific search engines tend to focus solely on a topic and allow to narrow results and ensure that these are relevant . Many subject specific resources can be found listed by various University Library departments in the Library Research Guides. The following tools represent only a sampling Pinakes A Subject Launchpad , Infomine ,Scirus , Hakia, Education World and Business.com . Loading Social Bookmarking is tagging a website and saving it for later. Instead of saving them to web browser, we are saving them to the web. Having started out as a way to store browser bookmarks online so that they can be utilized on different computers and shared, social bookmarking has grown to such an extent that it can now be used to search the web instead of relying on traditional search engines. In fact, social bookmarking sites are being used as intelligent search engines. Most social bookmarking sites allow to browse through the items based on most popular, recently added, or belonging to a certain category like technology, politics, blogging, news, sports, etc. Examples of Social Bookmarking sites are Del.icio.us , Magnolia, Blinklist, esnips etc. Social News , another feature of web 2.0 is websites like Digg , Reddit and Propeller focus on social bookmarking of news-related items such as politics, sports, technology, etc. Social news sites are different from standard social bookmarking sites by focusing on specific articles and blog posts rather than websites. Because of this, they can be a great source of news, and they also offer the ability to participate in the discussion by leaving comments on popular news items. Evaluating and citing Web sites There are some words of caution while gathering information from web : 1. all types of information are not available on the Web, and especially not for free. 2. unlike traditional published sources, Web documents have not necessarily been evaluated hence the need to assess the quality of the documents is very crucial for a researcher. Information on the Web can originate from many different sources including individuals, organizations, governments, academic institutions and companies. It is therefore important to quickly assess the reliability of the sources found. The major points of check when evaluating a Web site are : Currency , Authority , Purpose and Point of view . 3. Design the study and develop your method(s) In this phase of research there has to be active Participant Involvement. The researchers has to have proper Survey Design , correct Sampling and have to sort out all Statistical issues for conducting Qualitative/Quantitative Research . In the following three ways ICT Tools can be used by researchers for qualitative research As a medium of communication ICT tools provide powerful communication channels mostly text based but increasingly enhanced with moving and still images and sound, thus competing fairly with the traditional medium of interaction. Researchers can log into any of these channels and practices , either for studying the way people use computer mediated communication in cultural context or can utilize these to interact with participants by initiating a discussion. As a network of computers -Internet , the most popular and powerful ICT tool, breaks all boundaries and makes physical distances between people disappear thus providing a platform like online communities, blogs and discussions forums to reach out to people all across the globe for collective and collaborative research with seamless possibilities for the researcher to utilize this space particularly for collecting information. As a context of social construction The web2.0 facilitates the researchers to witness and analyse the structure of conversation by either participating or simply observing , the social structures that emerge. This gives a good insight to the researcher while gathering data and then during analysis , how language builds and structures social reality. Regardless of the use of any of the above said framework that is used , a qualitative research can be conducted by utilizing Internet based other web2.0 tools for research on any social phenomenon at the same time a qualitative research can conducted on any of the web2.0 tools as a specific social phenomenon as well. 4. Collect and collate the data Data collection requires Collaboration . A word of caution to the researcher is to take care of Intellectual property related issues in advance before using Internet and web2.0 tools for data collection and storage . The qualitative research process starts with a Questionnaire / Survey Design . Survey can be created using ICT tools Web, Word Processors (WP), Spreadsheets and now most popular online tools like google-forms and surveymonkey.com, and can be distributed using email and discussion boards. The data collected using one or many such online tools needs a proper Database structure for storage and retrieval thus tools like relational databases ( SQL Server, ORACLE etc.) ; open sources databases using MySQL and Access, Flatfile database using Spreadsheet, wikis, GIS [Google earth, Google Maps, Flickr, Arcview/explorer]) can be used. Data Analysis is a an area where a lot of works is being done and a huge collection of open source tools are available for researcher e.g. for Relationship mapping techniques like Herring or fish bone mind maps, SWOT Analysis, PMI, Venn etc. software like Inspiration, kidspiration, smart ideas, Cmap, Mindmapper, freemind would be useful and also the opensource Online tools available at www.gliffy.com/, www.mindmeister.com , www.drawanywhere.com/ . An open source statistical software programming language like R is found very useful by researcher. For preparing Graph using Spreadsheet, digitizer , for typical data analysis using Calc or excel, preparing Checklist (any Word Processor , Spreadsheet) and Mashing tools like intel mash up is now very common . ICT in Qualitative Data Analysis The applicability of ICT based analytical tools in qualitative research is debated as it is argued, that the original meaning inherent in the data could be distorted or lost in the process of data analysis. Thus the employment of computer programs in qualitative data analysis is a practice that should be viewed with caution. Analysing qualitative material that is based on speech or texts derived from interviews and conversations must have regard for the context and the integrated whole. Computer based systems to aid with analysis are, often based on the natural scientific view of the world that sees social phenomena as reflections of the higher level ordering of an objective social structure. The ideal data type here is one which is amenable to quantifying and segmentation into discrete categories as this allows for numerical manipulation and analysis. Researchers who make use of these packages must remain alert to the need to preserve the integrity and context of the original materi al and not lose sight of this during the process of coding and subsequent analysis. 5. Reporting and dissemination The final step in the process of any research activity is Writing up Research by Research Reporting Guidelines advised using the wordprocessors. Disseminating Research : To make the research outcomes reach maximum numbers of stake holders proper planning for printing, mailing and/or posting on community forums plus translation is required . Making research results accessible to various audiences through website, Research Portfolio, Newsletter, and other Community reports is now a common practice. Presenting research at Conferences/ Seminars and thus making findings known to users should be planned. Events happening across the globe on the theme of research can be found out easily today through Internet. Bibliography : Web pages, as with journal articles, books, encyclopedias and other material consulted while researching , need to be properly cited in a bibliography, a reference list or a list of works cited. There are a lot of Citation Style Guides online which provide more information on citation. Thus , there are some innovative tools available today that support researchers in the entire research process i.e. researcher can get help to Search intelligently, assess the quality of search results, help in recording, organizing and producing information using online notecards , and also help in formatting the bibliography in MLA, APA, or Chicago/Turabian whichever style that is required. Bibliographic information of this paper: STÃâ°PHAN VINCENT-LANCRIN , What is Changing in Academic Research? Trends and Futures Scenarios , European Journal of Education, Volume à 41 ,à Issue à 2 , Pages169 à à 202à © 2006 The Authors. Journal compilation à © 2006 Blackwell Publishing Ltd Aitken, Wendy (2007). à Use of Web in Tertiary Research and Education. à Webology, 4(2), Article 42. Available at: http://www.webology.ir/2007/v4n2/a42.html accessed on 15/3/2010 http://www.weblens.org/scholar.html accessed on 29.4.2010 Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications, San Murugesan (Editor) http://www.igi-global.com/reference/details.asp?id=34850, Information Science Research, Hershey New York, October 2009, ISBN 978-1-60566-384-5 Understanding Web 2.0, San Murugesan, IEEE IT Professional, 2007, http://www.computer.org/portal/web/buildyourcareer/fa009 Use the Web to Find Research Paper Topics, Wendy Boswell, About.com Guide, accessed on 12/03/2010 Roberts, Kathryn A. Wilson, Richard W. (2002). ICT and the Research Process: Issues Around the Compatibility of Technology with Qualitative Data Analysis [52 paragraphs]. Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, 3(2), Art. 23, http://nbn-resolving.de/urn:nbn:de:0114-fqs0202234. Vaccaro, F. Veloso, S. Brusoni, The Impact of Virtual Technologies on Organizational Knowledge Creation: An Empirical Study, hicss, pp.352, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008 Andreas Hotho,Robert Jà ¤schke,Christoph Schmitz,Gerd Stumme, Information Retrieval in Folksonomies: Search and Ranking, Link http://www.springerlink.com/content/R8313654K80V7231 , accessed on 20.6.2010
Monday, August 19, 2019
Camden County Essay -- Social Issues, Drugs, Violence
Mobsters, drugs, and violence sounds like a plot for a 50ââ¬â¢s gangster movie but it is the everyday life for people living in Camden County, New Jersey. The city is portrayed as falling apart, over run with corruption and violence in Chris Hedges article ââ¬Å"City of Ruins.â⬠Soon Camden County will become a forgotten ghost town if they do not make drastic changes with the government, education system, and bring jobs back to the county. This article is about the city of Camden and how they went from being a thriving city to a city that is now in economic crisis. The city has a population of 70,390 and is the poorest city in the nation (16). Camden has an unemployment rate of 30-40% and has an average household income of 24,600 (16). In the past Camden was an industrial giant with several large companies like Campbellââ¬â¢s soup and RCA having factories there, which employed 36,000 people (17). Closing of the factories is one of the main reasons for Camden Counties' high unemployment rate. Over the past few years Camden has been forced to make ââ¬Å"$28 million in draconian budget cuts, with officials talking about cutting 25 percent from every department, including layoffs of nearly half the police forceâ⬠(16). With the lack of funds the counties education system is beginning to suffer with them having to cut the library rate by 2/3, now they have aââ¬Å"70 percent high school dropout rate, with only 13 p ercent of students managing to pass the stateââ¬â¢s proficiency exams in mathâ⬠(16).With all of the empty factories, empty houses, and vacant lots Camden is beginning to become a very unappealing and unhappy place to live. Living in Camden is becoming an unhealthy place to live. It has become over run with homeless people and ââ¬Å"the only white people visi... ...ys a better side to the situation waiting to be found ââ¬Å"Despite Camden's bleakness, despite its crime and its deprivation, despite the lost factory jobs that are never coming backââ¬âdespite all this, valiant souls somehow rise up in magnificent defianceâ⬠(18). The town of Camden is trying to rebuild the town by building new buildings like the aquarium and new law school but Hedges clearly states that nothing in this town will prosper if the mob does not want it to Camden County is a town in complete and total ruins. They are over run with corruption and violence. Hedges' article does a good job of portraying just how bad off the town truly is. The economy is suffering, the education system is lacking in several areas and the police force is a joke. If changes are not made soon Camden County, they will no longer be a town that ant one will want to live in or visit.
Sunday, August 18, 2019
Essay on Janes Search for Self-identity in The Yellow Wallpaper
Jane's Search for Self-identity in The Yellow Wallpaperà à à "The Yellow Wallpaper," written by Charlotte Perkins Gilman in the late nineteenth century, explores the dark forbidding world of one woman's plunge into a severe post-partum depressive state. The story presents a theme of the search for self-identity. Through interacting with human beings and the environment, the protagonist creates for herself a life of her own. Charlotte Gilman, through the first person narrator, speaks to the reader of the stages of psychic disintegration by sharing the narrator's heightened perceptions: "That spoils my ghostliness, I am afraid, but I don't care--there is something strange about the house--I can feel it" (304). The conflicting emotions of power and control versus loss of control are expressed in her reactions to her husband: "I get unreasonably angry with John sometimes. . . .so I take pains to control myself--before him at least, and that makes me very tired" (304). The progressive stages of the narrator's loss of reality are eloquently shown in these passages: I always... Essay on Jane's Search for Self-identity in The Yellow Wallpaper Jane's Search for Self-identity in The Yellow Wallpaperà à à "The Yellow Wallpaper," written by Charlotte Perkins Gilman in the late nineteenth century, explores the dark forbidding world of one woman's plunge into a severe post-partum depressive state. The story presents a theme of the search for self-identity. Through interacting with human beings and the environment, the protagonist creates for herself a life of her own. Charlotte Gilman, through the first person narrator, speaks to the reader of the stages of psychic disintegration by sharing the narrator's heightened perceptions: "That spoils my ghostliness, I am afraid, but I don't care--there is something strange about the house--I can feel it" (304). The conflicting emotions of power and control versus loss of control are expressed in her reactions to her husband: "I get unreasonably angry with John sometimes. . . .so I take pains to control myself--before him at least, and that makes me very tired" (304). The progressive stages of the narrator's loss of reality are eloquently shown in these passages: I always...
Drug Use Among Teenagers :: essays research papers
Drug Use Among Teenagers While I was conducting my research, I located the actual survey results and decided to include them with this essay. (I included them at the end of my essay). ~~~ The three main drugs that are used among teenagers are Marijuana, LSD, and a variety of inhalants. The use of these drugs seem to be of an astronomical amount according to the survey conducted by the University of Michigan. Marijuana is a green, brown, or gray mixture of dried, shredded flowers and leaves of the hemp plant (Cannabis Sativa). You may hear marijuana called by street names such as pot, herb, weed, boom, Mary Jane, gangster, or chronic. There are more than 200 slang terms for marijuana. Sinsemilla (sin-seh-me-yah; it's a Spanish word), hashish ("hash" for short), and hash oil are stronger forms of marijuana. All forms of marijuana are mind-altering. This means they change how the brain works. They all contain THC (delta-9-tetrahydrocannabinol), the main active chemical in marijuana. But there are also 400 other chemicals in the marijuana plant. LSD LSD is very potent: the effective dose is measured in micrograms (ug) -- however, the lethal dose is literally thousands of times that, making the drug essentially non-toxic. LSD can be administered a number of ways, the most common: orally through paper, sugar cubes, on a piece of gelatin, or by pill; intravenously; or intramuscularly. A standard dose with noticeable hallucinogenic effects is about 100-200 ug. The intensity of the trip is proportional to the size of the dose -- it is interesting to note, though, that the duration of the trip seems to stay the same at higher doses (Freedman, 1984). The initial effects begin 20-40 minutes with a sense of euphoria and dizziness. Hallucinations then begin to occur, with the trip peaking for 4-5 hours after about an hour since the drug is taken. Inhalants People use certain inhalants to obtain a "high." These inhalants could be anything from glue to certain fumes. Inhalation of dangerous and toxic substance is extremely dangerous and can cause serious health problems or death. The Reasons for Drug Use To Climb Among Teenagers Stupidity is one reason! There are many reasons why drug use continues to climb. The laws are not strict enough for teenage offenders. When a teenager, or any other person, is caught possessing Marijuana they receive a "slap on the wrist." They receive a fine or some sort of community service punishment and that is it. Another reason would be the idea that, "everyone else does it and nothing bad happens to them, I might as well do it too!" Teenagers see other people using
Saturday, August 17, 2019
Beta Case Study
25721 Investment Management BMC Case Study Student Name: Junwei Wang Student ID: 11516655 Class Time: 6 p. m. ââ¬â 9 p. m. Tuesday Lecturer: Wing Bui Table of content Q 1. 1 Q 2. 1 Q 3. 2 Q 4. 2 Q 5. 3 Beta Management Company I. Case Background Beta Management Company was founded in 1988 by Ms. Wolfe. Beta Management Company is a small investment management company based in a Boston suburb. Beta Management Company was successful in 1989 and 1990. This success had brought in enough new money to double the size of the company. However, Ms.Wolfe had lost some potential new clients who had thought it unusual that Beta Management used only an index mutual fund and picked none of its own stocks. Sarah Wolfe was considering Betaââ¬â¢s new goal and directions for coming year. II. A. Ms. Wolfe decided to follow ââ¬Å" indexâ⬠to adjust equity market exposure. This is a good strategy due to that at the beginning of the foundation of the company, the size of her account was small a nd there were no much money for her to take a risk. The strategy she followed was the lowest risky way. Ms.Wolfe kept a majority of Betaââ¬â¢s funds in no-load, low-expense index funds, adjusting the level of market exposure between 50% and 99% of Betaââ¬â¢s funds in an attempt to ââ¬Å"time the marketâ⬠. B. Ms. Wolfe now has decided to increase her equity exposure to 80% with the purchase of one of the California R. E. I. T. and Brown Group, Inc. While Ms. Wolfe wanted to extend her business, she found that some potential clients thought it unusual that Beta Management used only an index mutual fund and picked none of its own stocks, Ms. Wolfe was engaging her new strategy. Unlike before, Beta increase the equity exposure from 50% to 80%.Beta used to have 1% to 50% debt and 50% to 99% equity. Now, the portfolio will become as 20% debt and 80% equity. And also based on the performance of the two stocks, they are both unsteady stocks which mean that the risk of the Betaâ â¬â¢s portfolio will be increased. However, we can also found that the return will be much higher. C. Ms. Wolfe is a contrarian investor. Base on the performance of the two stocks, these two stocks were unsteady and the losses rate is much higher than the return rate. III. a. California R. E. I. T. was a real estate investment trust.Their stock had been badly damaged by the ââ¬Å"World seriesâ⬠earthquake of 1989. Base on the Figure 1, it is easily found that the performance of the stock is volatile. Although the trend is similar with the index trend, California R. E. I. T. was still in a bad position. b. Brown Group Inc. was one of the largest manufacturers and retailers of branded footwear, and had been undergoing a major restructuring program since 1989. The stock performed steady and positive. However, there was a significant drop in late 1989 and late 1990. IV. a. The average return of California R. E. I. T. is -2. 7% and the average return of Brown Group Inc. is -0. 67 %. The standard deviation of California R. E. I. T. is 0. 092307 and the standard deviation of Brown Group Inc. is 0. 081668. The standard deviation of S&P index is 0. 46036. Compare with SP500, California R. E. I. T. is more risker. b. In portfolio SPC, the standard deviation is0. 046526 and in SPB the standard deviation is 0. 046419. And the incremental risk of SPC and SPB over a portfolio with 99% in the SP500 and 1% in a risk-free asset are 0. 409504 and 0. 409611. From the data we can see that the California R. E. I. T. affect the portfolio more.The SP500 index is the safest stock and the California R. E. I. T. is still the risker stock. c. The regression of California R. E. I. T. ââ¬â¢s monthly return on index return was attached as Appendix 1. The coefficient is 0. 011856. The regression of Brown Group Inc. ââ¬â¢s monthly return on index return was attached as Appendix 2. The coefficient is 0. 013509. We can still find that the California R. E. I. T. is risker stock tha t affect the portfolio more. d. The return of SPC equals to 99%*E(Rindex)+1%*E(Rc) and the return of SPB equals to 99%*E(Rindex) + 1%*E(Rb) and the return of risk-free portfolio is 99%* E(Rindex) + 1%*E(Rf).The excess return for SPC is 1%*E(Rf) -1%*E(Rc) and the excess return for SPB is 1%*E(Rf) -1%*E(Rb). From the expression, we can find that the excess return for each unit is the difference between the expected return of risk-free asset and the expected return of the stock. V. Summary * If the size of account is small, the safer way to maintain and adjust equity market exposure is ââ¬Å"indexâ⬠. * Create portfolio smarter; do not invest all money in single area. * The excess return of the stock is difference between the return rates. * When investing, index will be a good indication to predict the stockââ¬â¢s future trend.
Friday, August 16, 2019
Enrollment system
Chapter 1: IntroductionThe computerized enrollment system process the way of the school transaction can work easier and better way how the implement for the enrollment system. It brought a new level of the enrollment transaction. The said system can lessen the time for processing time of transaction because it is quick and automated. The hardware equipments like desktop computers and printers can process the transaction in order to work for to be done faster.1.1 Background of the StudyThe group programmers develop a proposed software system to analyze the particular problems in the school. The processing time of the transaction might be minimized how to access the student records very quickly rather than the usual traditional manual system. Another benefit of the proposed system is the convenient way of the storing and retrieving student information made easy and for the future use. The Academia De Covina, Inc old practices may replace for the group programmerââ¬â¢s proposed syste m that will cut down the cost of the materials needed for manual processing of the enrollment and reduce much effort.1.1.1 HistoryAcademia De Covina Inc. is located to Blk. 5 Lot 51, Casmalia St. Ph 2 Covina Village Buhay na tubig . Imus, Cavite is taken from the named of the Subdivision ââ¬Å"Covina Villageâ⬠. Established on the year 2004-2005 and the persons involved about the management of the school is the Jacobo family. They started with 50 Students, 1 room and 3 Teachers only. After the whole year they build 2 buildings or castle (literally in structure) for Preparatory and Nursery Department. The Academia De Covina, Inc is a private Christian school with a affordable tuition fee. Year 2008, The school was approved by the DepEd Recognized the school. Through the years, the school changes their architectural structures because they know students will increase need to adjust the department and room occupying for their study.The maximum of the students per classroom is 20 a nd all the room is fully air-conditioned.1.1.2 Mission and VisionIn the mission and vision statement of the school ââ¬Å"The Academia De Covina, Incâ⬠stated that how to lead students in their support for academic and how to become a good example individual in community through teaching a Christian studies. The student will have been achieved their goal and dreams and prepared for the challenges they encounter.1.1.2.1 MissionThe global, national and local situation is characterized by unjust structures ââ¬â imbalance in the distribution of wealth and power, massive poverty and misery. Manââ¬â¢s greed and selfishness drives him to exploit others thus, debasing human dignity and values. Due to these prevailing conditions, we challenged for a commitment to personal and social transformation based on the teaching of Christ.In response to all these challenges and in solidarity with the Filipino people, Academia De Covina commits herself to be actively involved in establishin g a society that is free, just peaceful, and sovereign.1.1.2.2 VisionAcademia De Covina, Inc. Center for Early Childhood development Academics and Christian Education is committed to promote a nationalist education based on Christââ¬â¢s teaching and human values founded on LOVE, JUSTICE, PEACE and TRUTH. In the context of the present situation and in response to the needs of the times, it strives to become a critical and active catalyst of change.1.2 Statement of the Problem1.2.1 General Statement of the ProblemHow to create a Computerized-Enrollment System for Academia De Covina, Inc.? The school enrollment system seems to be slow and take much effort so what if they didnââ¬â¢t want try the computerized-enrollment system to optimize particular problem involving the school.1.2.2 Specific Statement of the ProblemHow to create an Online Admission Form through web for Academia De Covina, Inc.? The team provides a Registration form liked web based system for enrollment. The enroll ee can input necessary information and easy getting all the data collected by the School administrator.How to create a module to handle registration of students?The software system had a registration form liked inquiry systems for the school which can be manage by the School Administrator to input the data needed from the students.How to create a module for payments?The proponents build also a module for the payment transaction of the students. This kind of module can replace the school traditional computation using the software MsExcel. The Accounting staff head pain for the computing much fee would be relieved by this.How to create a module that will generate the student list?Upon enrollment, the system can process of entering and verify data of student to register on a school. And through this system, can be sure that all the information will be kept in a database for handling records so that the process can minimize some problems like loss of records.How to create a module for f ile maintenance?Another ability of the software system is the file maintenance or record manipulation of the student records. It also views a single record by just searching or filtering doesnââ¬â¢t need to go through on the storage of files of student to find this.How to create a security access of program using number combination?To avoid the access of unauthorized person not involving the school entities, the team assures that the team management or the employee only knows how to operate the program.1.3 Objectives of the Study1.3.1 General ObjectivesTo create a Computerized-Enrollment System for Academia De Covina, Inc. The team established a software-based system which to manage student records in any transaction. It relieves the user and staff management of the school head from the pain stacking task of going through bulky storage of files of students to find a single record.1.3.2 Specific Objectives(INQUIRYAND REQUIREMENTS)To create an Online Admission Form through web for Academia De Covina, Inc.The team acquired a Registration Form in the web which the enrollee has an opportunity to register outside the school they didnââ¬â¢t to fall in line for the registration transaction of the school. All new enrollees are required to pass the requirements; it must be pass at designated school in-order the student update their record.(REGISTRATION)To create a module to handle registration of students.The process of registration would be less of workload because it doesnââ¬â¢t require papers to get the needed data from the students; by just simply inputting all the necessary data of current or new student of the school, it would be registered and certified.(PAYMENTS)To create a module for payments.The proponents ensure that this payment module is to reduce the error and to manage correctly the billing of each student in the school. By this module the process of computation would be quick in time-processing and all the tuition and balances of the student is auto-updated. It also displays the student invoice and official receipt when the student is already paid. There are fixed price for the tuition and other miscellaneous fee and when the Accounting staff needs to update this entire price; she may proceed to the change/update fee.(ENROLLMENT TRANSACTION)To create a module that will generate the student list.For the reliable handling of the student master list, the proponents include a single software database for fast and easy to get student records by just simply filtering and searching data from the student. It also provides opportunity for the staff and teachers to store their student records and all the information in a transaction will be save through the database that can be viewed and edited anytime.To create a module for file maintenance.The program has ability to manipulate data of student records. We can view, add new enrollee, delete old students and update.To create a security access of program using number combination.The team decides to add new feature security to access the program. Once the program start loading, the image of school will be pop-up need to find the secret picture and if the users find this secret picture, the program is now accessible to anyone of the employee.1.4 Significance of the StudyThe computerized enrollment system is the must have system in the school which gives efficient approach for both managements and the students. The Users of the program performed a back-up record in the software system regularly to avoid losing any information. The computerized enrollment system designed to store data coming from the students every time the transaction happens. It can use by accounting and admin department because it is connected on a server in a one database. The Online Registration System Site that the team plans to make is like simple registration form needed to input and to get all the data from new or old students.1.5 Scopes and LimitationsThe Desktop Computer or Laptop is the one of the useful equipment for the software system. The computer is a machine instructed and operated only by human. There is an advantage and disadvantage of using the said system.1.5.1 ScopesComputerized-Enrollment SystemSecurityLog-In ModuleLog-in module will enable the user access their concern works for the safety management of records and confidentially purposes.Log-in AttemptIt limits the login during the trying to access of the account. After the program iterated 3 times if the needed password didnââ¬â¢t match given to the employee, this program temporarily block inability to access the program.Database FeaturesStudent Identification SystemThe Student may be identified by its unique number given by this system. The ID number is a more useful data can be attached in the student information because it can call easily coming from the database to view their personal information.Recycle Bin ModuleThe program had ability to restore any records which deleted without confirmati on. It helps the School Administrator manage without misplacing records.Other featuresPrintable Print-OutsThe program can print sample papers Into hardcopy which the program display the fixed print-outs (Official Receipts, Documents Forms and other Reports) if they didnââ¬â¢t want to edit in other software. One of the features added from the software ââ¬Å"Visual Basic.Netâ⬠.1.5.2 LimitationsComputerized-Enrollment SystemPower Generated System It is a computer based so we canââ¬â¢t manipulate or view the student records if the Computer not existed.Student Grades SystemThe proposed program is for enrollment transaction only and not for the student grades system since they have software used to generate the grades, the Microsoft Excel 2007.Online Payments via Credit CardThe team canââ¬â¢t make program to convert credit card into cash so the payment transaction is to be process inside the school. Enrollment System It is clear that the world has taken so many changes. Everything has changed because of the high technology people acquired now and these are the results of the studies made by the professional. They have come up with machines that are easy and convenient for the users. One of these is the computer.In a fast changing world, new emerging technology development has launched itself into the information market. Personal computer architecture evolves so fast that that that software engineering also adopts to cope with the change. School of whether private or public needs to specific software to automate work to lessen the hassle of scanning those old cabinet filed documents to find just a single record.Thus, most institutes nowadays have recognized the importance of computer to cope with the pressing demands of the market. Schools of today are using this technology in their daily transactions. Automated book monitoring system, studentââ¬â¢s information system are must to ensure accurac y and efficiently in every school transaction.This study is conducted in order to improve the recording of the enrollment of Lahug Christian School ( LCS ). The researchers chose this institution as their respondent because the said school is currently using a manual enrollment system in processing studentââ¬â¢s enrollment system.Problems are encountered using the manual system. It is the main reason why the researchers motivated to propose an Automated Enrollment System of Lahug Christian School ( LCS ). It will provide students and users a fast, reliable and more convenient way of acquiring information of the studentââ¬â¢s records. It alsoà helps the administration provide information in a short period of time.Consequently, the researchers aim to develop and design an Automated Enrollment System to their respondent which is the Lahug Christian School.
Thursday, August 15, 2019
Analysis on the characteristics and features of Facebook that promotes narcissism on the Filipino Youth Essay
ANALYSIS ON THE CHARACTERISTICS AND FEATURES OF FACEBOOK THAT PROMOTES NARCISSISM ON THE FILIPINO YOUTH THESIS STATEMENT: Although social networking sites open different opportunities for the users to socialize effectively, communicate faster and relatively cheap, and gatherinformation, the medium of communication promotes psychological incapacities, specifically narcissism. à Introduction With 93.3% of the nation signed up in Facebook in 2011, Philippines was named as the ââ¬Å"Social Networking Capital of the Worldâ⬠(Russel, 2011). Filipinos, as citizens of the country, are proud of this achievement, but everything has consequences. Although Social Networking Sites (SNS), like Facebook, open different opportunities for the users to socialize effectively, gather information, and communicate faster and in relatively cheap venues, the medium of communication promotes psychological incapacities, specifically narcissism. A narcissist view himself/herself in a positive but unrealistic self-concept. It also results in lack of interest in forming relationships, and a commitment in regulating oneââ¬â¢s self to ensure a positive view (Campbell & Foster, 2007). Narcissists tend to live with this style of life which is a result of wanting to be safe by living all by themselves, and to develop high self-esteem. Every SNS has its unique features that attract users. These features contribute to the increasing number of adolescents and young adult narcissists in the Philippines. Some SNSs have technical and functional features that allow the user to show his list of ââ¬Å"friendsâ⬠. Most SNSs require users to have a profile picture. Other SNSs have a feature that focuses on ââ¬Å"about meâ⬠of the user, some let the users tag photos, post photos and create status posts and updates. (Boyd & Ellison; Davenport, Bergman, Bergman, and Fearrington) SNS as web-based service allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection, and view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site (Boyd &à Ellison, 2007). In 1997 the first SNS, SixDegrees.com, was created and introduced to the public. SixDegrees.com created a feature that allows the user to communicate with ââ¬Å"friendsâ⬠by helping the user to connect and send messages.(Due to the increasing number of users, the website was shut down in 2002 because it failed to generate income for its maintenance (Boyd & Ellison). Since then, hundreds of SNS were created, and Facebook is one of them. Despite being called as ââ¬Å"social networksâ⬠, user activity on networking sites is focused on the self (Gentile, 2007). Gentile (2007) found out in her study that people present themselves in SNSs in a socially and desirable, but not realistic idealized self-view. History of Facebook Mark Zuckerberg created Facebook in 2004 as a local social networking site for Harvard students; it was first named as ââ¬Å"My Facebookâ⬠(The Social Network, 2010). Before signing in into the website, students need to have a harvard.edu email address. This requirement was a key to keep Facebook a private community. In 2005, when Mark Zuckerberg and his team started expanding ââ¬Å"My Facebookâ⬠to nearby universities, high school, corporations, and eventually to everyone, they changed its name to ââ¬Å"Facebookâ⬠and removed the initial requirement in signing up but changed it to a valid email. Facebook adapted SixDegrees.comââ¬â¢s unique feature of messaging, and like SixDegrees.com, the feature (messaging) and other new features (e.g. profile picture, microblogging, photo sharing, wall post, applications and etc.) attracted millions of users. Based on a model created by Ashwini Nadkarni and Stefan G. Hofmann in their research titled ââ¬Å"Why do people use Facebook?â⬠, Nadkarni and Hofmann discovered that people use Facebook for two primary needs: first is to satisfy their need to belong, and second, to satisfy their need for self-presentation. Baumeister & Leary (1995) said that humans are highly dependent on social support, and exclusion from a social group may have negative effects to oneââ¬â¢s self-esteem. Humans also cannot live without social interaction (Sullivan, 1957). These findings explain the first need of an individual why he/she uses Facebook; the need to belong. The second need of an individual for using Facebook, the need for self presentation, is motivated by the ââ¬Å"continuous process of impression managementâ⬠as stated by Nadkarni and Hofmann. Why Facebook and Youth? The research is focused on Facebook because it has over 1.1 billion users worldwide, almost 16% of the worldââ¬â¢s population. With this number of FB users worldwide, Facebook is considered as the most popular SNS in the whole world. In 2011, a research used Facebook usage as a measurement to determine the worldââ¬â¢s capital for social networking. Researchers concluded that Philippines has the highest percentage of SNSs users with 93.6%. Since almost 95% of the Filipinos use Facebook, it is the most effective SNS to use in this research paper. Another thing is that, 83% of Facebook users are young adults. Youth presents themselves online with different aspects of life, such as their real self, ideal self, and false self. With this modern world, they can present themselves using different medium, especially Facebook since most of its users are young adults. The Needs of a Narcissist and his/her way to compensate for it through Facebook. Narcissists regulate their self-presentation to ensure positive self-view, they also tend to lack in interest to form relationship. Unique feature and characteristic on Facebook is perfect to aid these traits of a narcissist. The unique features of Facebook are mostly technical features (e.g. applications, photo, news feed, friend list, poke, status, video, group, chat, and like), some of these unique technical features satisfy the needs of a narcissist for exhibition/self-presentation (e.g. friend list, status, photo and video). Another feature of Facebook is its unique way of adding friends. Narcissists are afraid of forming strong bonds; they are attracted to Facebook because they can create relationship with loose or ââ¬Å"weak tiesâ⬠. A person with high personal preference for exhibitionism/self-presentation feels free to take the center of the stage and to attract attention (Bulatao, et. al.). Exhibitionism is defined as calling an attention to oneself and leaving an impression (Hall. et. al.). SNSs, like Facebook, allow users to control their self-presentation. This unique characteristic attracts narcissist because they will have more opportunity to alter their appearance and personality in online SNSs than in face-to-face interaction. Given that users of SNSs have almost full control over information disclosure, they can be more strategic in managing self-presentation. Profile picture is the most important aspect or part of self-presentation because they represent the individual in most of his online actions and activity. To affirm their positive but unrealistic, idealized and inflated self-view, narcissists tend to make their profile pictures more attractive and self-promoting. They choose profile pictures where they look more physically attractive; they also edit and refine their photos to hide their flaws. In a research done by Laura E. Buffardi and W. Keith Campbell, they found out that narcissists post in their ââ¬Å"about meâ⬠section and status updates are mostly self-promoting. They do this by posting less entertaining but much more intelligent quotes. In the same research, they also found out that narcissistsââ¬â¢ photos are more attractive that those of the nonnarcissist. They also post photos in which they look more attractive and self promoting. Narcissists are also afraid of creating strong bonds. The unique ââ¬Å"Friend listâ⬠of Facebook creates ââ¬Å"weak tiesâ⬠since the friendship of the two individuals in Facebook is imaginary. It means that some of a narcissistââ¬â¢s friends may be friends in real life, but other, most likely most of the FB friends, relationship or bond is only on the online entity, or simply imaginary. In the same research by Buffardi and Campbell, they found out thatà narcissist have more Facebook friends than nonnracissistic individuals. Narcissists seek attention and approval, they do this to gain or maintain their self-esteem. In this world where SNSs dominate the lives of most people, especially the youth, it is not surprising to observe that narcissist fulfill their needs through SNSs, particularly Facebook. Conclusion Social Networking Sites, like Facebook, help people in many ways especially in communicating, but it also have consequences like promoting narcissism. Facebook promotes narcissism because its unique feature and characteristic stated in the body of this paper (e.g. SNSsââ¬â¢ giving the users almost full control over information disclosure, and Facebookââ¬â¢s unique ââ¬Å"Friend listâ⬠that create ââ¬Å"weak tiesâ⬠which a narcissist seeks) aid their needs for exhibition/self-presentation and formulating connection of weak ties to boost their self-esteem. This unique characteristic and feature of Facebook promotes narcissism of the Filipino youth. Limitation This paper only focuses on the Filipino youth. The findings in this research paper may not be plausible to other sectors. This may affect by the culture, etnicity, age, gender, and other external and internal factors. Bibliography Amichai-Hamburger, Y., Vinitzky, G. (2010). Social network use and personality. Computers in Human Behavior 26 (2010) 1289ââ¬â1295 Bergman, S.M., Fearrington, M.E., Davenport, S.W., Bergman, J.Z., (2011). Millennials, narcissism, and social networking: What narcissists do on social networking sites and why. Personality and Individual Differences 50 (2011) 706ââ¬â711. boyd, d. m., & Ellison, N. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13, 210ïâ |230. Buffardi, L. E., & Campbell, W. K. (2008). Narcissism and social networking web sites. Personality and Social Psychology Bulletin, 34, 1303ââ¬â1314. Bulatao, J.S.J. (1965). Personal Preference of Filipino Students. Symposium on the Filipino Personslity, p. 7. Carpenter, C.J. (2012). Narcissism on Facebook: Self-promotional and anti-social behavior. Personality and Individual Differences 52 (2012) 482ââ¬â486 Cheung, C.M.K., Chiu, P.Y., Lee, M.K.O. (2011). Online social networks: Why do students use facebook?.Computers in Human Behavior 27 (2011) 1337ââ¬â1343 Gentile, B., Twenge. J.M., Freeman, E.C., Campbell, W.K., (2012). The effect of social networking websites on positive self-views: An experimental investigation. Computers in Human Behavior 28 (2012), 1929ââ¬â1933. Hall, C.S., Lindzey, G. (1957). Social Physchological Theories: Alfred Adler. Theories of Personality. 116. Hall, C.S., Lindzey, G. (1957). Murray Personology. Theories of Personality. 157. Lima, E.N. (2007). The Association Between Narcissism and Implicit Self-Esteem: A Test of the Fragile Self-Esteem Hypothesis. The Florida State University DigiNole Commons Electronic Theses, Treatises and Dissertations, 6-25-2007 Mehdizadeh, S. (2010). Self-Presentation 2.0: Narcissism and Self-Esteem on Facebook. Cyberpsychology, Behavior, And Social Networking 13. Michikyan, M., Subrahmanyam, K., Dennis, J. (2014). Can you tell who I am? Neur oticism, extraversion, and online self-presentation among young adults. Computers in Human Behavior 33 (2014) 179ââ¬â183 Nadkarni, A., Hofmann, S.G., (2012). Why do people use Facebook?. Personality and Individual Differences 52 (2012) 243ââ¬â249 Ong, E.Y.L., Ang, R.P, Ho, J.C.M., Lim, J.C.Y., Goh, D.H., Lee, C.S., Chua, A.Y.K., Narcissism, extraversion and adolescentsââ¬â¢ self-presentation on Facebook. Personality and Individual Differences 50 (2011), 180ââ¬â185. Pempek, T.A., Yermolayeva, Y.A., Calvert, S.L. (2009). College studentsââ¬â¢ social networking experiences on Facebook. Journal of Applied Developmental Psychology 30 (2009), 227ââ¬â238. Russel, J. (2011). Philippines named social networking capital of the world . Retrieved 15.04.14. Sà ¡nchez-Franco, M.J., Villarejo-Ramos, A.F., Martà n-Velicia, F.A. (2011). Social integration and post-adoption usage of Social Network Sites: An analysis of effects on learning performance. Procedia Social and Beha vioral Sciences 15, 256ââ¬â262. Seto, E. (2012). Associations Between Self-Reported Narcissism, Self-Esteem, and Social-Emotional Functions of Facebook. Steinfield, S., Ellison, N.B., Lampe, C., (2008). Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. Journal of Applied Developmental Psychology 29 (2008) 434ââ¬â445 Winter S., Neubaum,G., Eimler, S.C., Gordon, V., Theil, J., Herrmann, J., Meinert, J., Krà ¤mer, N.C. (2014). Another brick in the Facebook wall ââ¬â How personality traits relate to the content of status updates. Computers in Human Behavior 34 (2014) 194ââ¬â202 Vazire, S., Naumann, L.P., Rentfrow, P.J.,Gosling, S.D. (2008). Portrait of a narcissist: Manifestations of narcissism in physical appearance. Journal of Research in Personality 42 (2008) 1439ââ¬â1447
Subscribe to:
Comments (Atom)