Thursday, October 31, 2019

People's History Essay Example | Topics and Well Written Essays - 750 words

People's History - Essay Example In this specific book, Zinn unfurls the early times when Christopher Columbus stumbled across the lands of current America while searching for the riches of Asia. Assuming to have reached the prosperous lands of Asia, Columbus tried in vain to uncover the non-existent riches from the barren lands. His failure to do so brought the unjustified wrath of the investors and Columbus himself befalling on the innocent and naive natives of the region. The bloodshed and series of wars that followed resulted in the loss of innumerable lives. According to a report, by 1650, none of the natives remained alive. (Zinn). The book holds elaborate accounts of how Columbus, revered as a discoverer of America, and other colonists waged wars against the natives, eliminating their existence from their very own lands. Zinn does not excuse the manslaughter and â€Å"genocide† that occurred; instead he focuses on all historical aspects to relieve the history of the distortions that have now been embed ded in it. Furthermore, the book talks about the mass imports of slaves from Africa which ranged from 10 to 15 million people. This brought about the establishment and acceptance of slavery. Racial and complexion biases were practiced ruthlessly. The resisting masses of â€Å"blacks† were forced into their places as slaves, not allowed to mix with the white people. This marked the â€Å"Drawing (of) the color line† (Zinn) as the title of the second chapter suggests. Moreover, the book develops the idea of social classes with extreme rapidity. Social classes were formed almost immediately thereof, establishing distinct living standards for all. The residents of England enjoyed the top-most tier of the social classes, followed by the elites in United States of America, then the frontiersmen who mainly consisted of white rebels against the tyranny of slavery, and

Tuesday, October 29, 2019

What is Innovation and can businesses encourage it Essay Example for Free

What is Innovation and can businesses encourage it Essay Innovation in business is the application of new ideas in any business process. This includes the products produced and the firm’s processes. It is therefore important for business to encourage innovation to enable them to be sustainable in the market in the long run CITATION Mar98 l 1033 (Mark, 1998). Marketing Research One of the key themes of marketing is for an organization to efficient, timely and customer-centered care and allows customers to easily make the right decisions. Marketing places emphasis on organizations sharing information with each other and working together in secure areas. It also provides updated information on highly specialized matters that are to be delivered immediately to the right place. Marketing is the source for all information for step-change in service delivery. Fairness is a key theme of the legal and ethical frame works of marketing. It proposes that consumers will likely compare their situations with other customers to ensure fairness. Fairness enables marketers to predict the responses of consumers to marketing actions. Marketers should able to differentiate between procedural and distributive justice to understand how consumers perceive fairness. Making fair decisions requires marketers to have forethought and intelligence to make a sale. It is wise to develop the moral fibers of fairness, because ethical problems often bite into profits CITATION She07 l 1033 (Shelton, Epstein, Davila, 2007). For example it is unethical to sell a product or service to consumers at different prices, with an aim of gaining financial advantage. When conducting a marketing transaction, it is unethical to charge an unreasonable price to a consumer. Every consumer expects to be treated fairly as this reflects on the overall corporate image of an organization. Ethical marketing efforts and decisions should suit and meet the needs of consumers, business partners and suppliers. Competitive analysis is essential in marketing as it helps a company to access any competitive threats to its development and penetration of the walk-in market. The organization is bound to enjoy a significant competitive advantage over any competitor who would try to penetrate the walk-in market. This assessment which is based upon  the company’s source of competitive edge stems from extensive customer list, qualified management personnel, in-depth knowledge and expertise of the marketing industry. An example of t his is the marketing research conducted by Apple Inc. before the rolling out of their products into the global market. They conduct thorough research on the consumers and come up with innovative products for the customers CITATION Jas09 l 1033 (Jason, Kenneth, Greg, 2009). Research and Development Marketing mix-promotional strategies also contribute to successful implementation with the right marketing delivered to the right consumers at the right time. Marketing has to be on-going to strengthen interest and promotional and multi-level to draw attention to progress of the company. Success of a company will depend on the support and contributions the partner organizations that are involved. The contribution and support succeeds if the individual partner companies feel they have benefits from the collaboration. Target Market is a key deliverable in marketing that can be used by Apple Inc. to establish an appropriate market for each segment. For maximum effectiveness, marketing to their clients should be targeted carefully to suit each of them comfortably. It must also be a frequent, consistent and on-going process throughout the lifecycle of the zoo. The available information has to be up-to-date and reliable. Apple can segment its market by focusing on the demographic variables of its clients. These include social class, gender, income, age and family lifecycle. This will give them competitive advantage since there will be a wide variety of data that will make it possible to measure consumer preferences for the activities in the zoo. Segmenting the target market based on demographic variables, will have a direct impact on the interests of the clients in zoo services CITATION How10 l 1033 (How is Google innovative? , 2010). The mechanisms for target marketing should be selected from the zoo sources depending on the audience and objectives each marketing piece. This will give the marketing team at Apple Inc. a thorough understanding of how often and how their clients use their services. Apple Inc.’s target market should be based on social class. This will ensure maximum effectiveness which is important since it reinforces the value of the benefits and gaining additional support. The using social class as their target market is to effect information sharing and to develop an effective collaborative model that can be replicated across its diverse services. Target marketing will allow the marketing team to maintain the effectiveness of its services through transition and influence clients of their target market to participate through the forums and avenues provided. Staff Benefits There are several benefits of innovation to the staff of any business. Of particular importance is the freedom of expression where the staffs are allowed to be creative and offer some of their ideas to the management. In the process of doing so it makes the staff motivated as it makes them part of the process of creation of ideas in the business. Google Inc. for instance allows its employees and staff to participate in the innovative process hence the creation of some of its successful products. In conclusion this essay explore the importance of innovativeness in any business and how it propels the business to unlevelled heights of success as seen in the example of Apple Inc. and Google CITATION She07 l 1033 (Shelton, Epstein, Davila, 2007). References Forrant, R. (2011). Approaches to Sustainable Development: The Public University in the Regional Economy. Massachusetts : Univ of Massachusetts Press. How is Google innovative? . (2010). Retrieved 2014, from Netease: http://money.163.com/10/0331/10/633K6P9700253VNE.html Jason, D., Kenneth, L., Greg, L. (2009). Who captures value in a global innovation network? : the case of Apples iPod. Mark, R. (1998). The definition and measurement of innovation Report No. 10-98. Melbourne: Melbourne institute working paper. Shelton, R. D., Epstein, M. J., Davila, T. (2007). The Creative Enterprise. New York: Greenwood Publishing Group. Thomas, H. (2008). Reverse Engineering  Google’s Innovation  Machine. Source document

Sunday, October 27, 2019

Impact On Motivation At Times Of Change

Impact On Motivation At Times Of Change This study focuses on a research topic Impact on motivation at time of change on individual, on the basis of the theories of Research Methodology for Business. The outline of the project will cover: Chapter 1 provides the background of the study underlining main objectives, questions and hypothesis of the study. Chapter 2 focuses on general definitions. Models and theories related to motivation, leadership style influencing motivation at time of change and consultation process methods and models will be reviewed and described. References 1.1 Background In topical times, organizations are marked by constant changes taking place in its orientation, strategies and even structural set up. The workers need to constantly adapt themselves to such changes. This often cause stress on their mindset and affect their work quality. At this juncture it is important to shove away any misconception or doubts and bring back the trust, which is extremely essential for the organizational success. In order to achieve this, internal communication needs to be strong and effective. There is a possibility the motivation in the workforce might be restored through successful communication within the organization. Information Technology provides several options for this. E-mails, intranets and other innovations help in meeting the high demand of communication during such time of alteration within the organization (Wojtecki and Peters, 2000). Face to face communication also might help a lot to sort out the differences. There have been mostly separate studies about leadership and grapevine communication. According to McKenna (2000), leadership is an art that can get the optimum work required for the organization. The leader also communicates the organizations goals to his team members. He does not discuss about the communication that is more important between the leader and the team and the effectiveness when such communication occurs in an informal way that leads to more interaction and hence develops a bond with each employee and all together leads to commitment. Most of the studies so far have taken the formal side into consideration. In Contemporary issues in management and organizational behavior (Peter, Poole and Jones, 2005), the whole cycle of Team-leadership has been portrayed in analyzing group decision- making and learning. Later, a global perspective has been given. According to Robert E. Hoskisson, Organisational Structure specifies the firms formal reporting relationships, procedures, controls, and authority and decision making processes. (Hoskisson, 2008, p.100) This accrues to the basic framework of assigning roles, allocation of resources and provides a basis for cooperation, coordination and communication among the organizational hierarchy. (Hoskisson, 2008). Harris and Hartman discuss the problems of Grapevine. According to them, it is not a dependable source and cannot provide full information and maybe distorted. (Harris Hartman, 2002). In the article, Heard it through the grapevine: for communicating during change, facts and tips by Baxter-Southward, an extensive study has been done about grapevine communication- the negatives and the positives, and how to deal with this in organizations. However the right answer can be provided by a proper survey of the opinions of managers and workers. Whether such communication actually restores the faith and motivation is the area to be explored in this research. 1.2 Objectives, research questions and research hypotheses The objective of this study is to deal with the issue relating to organizational behavior and organizational development. This study is to analyze whether the successful communication by the organization to its employees at the time of change will result in the motivated workforce. Additionally, the research will analyze the effectiveness of good leadership and managerial as a means to improve productivity, employee job satisfaction and commitment. The core objectives of the study are: To understand the reaction of workforce to organizational change (qualitative and quantitative analysis) To understand the measures normally adopted by the managers under such circumstances (qualitative analysis; from the questions asked during survey). To find out whether communication within the organization help in motivating workers (quantitative analysis). Based on objectives, conceptualizing structure for this research has been developed. The main variables are evidently showed through coherent analysis in the structure. Based on this structure, the null and alternative hypotheses are developed as the followings: The reaction of the workforce is positive or negative at the time of change Managers can or cannot influence the motivation and hence the productivity of employees. Successful internal communication affects or does not affects the motivation within workforce at times of change. 1.3 Scope Change is inevitable. Whether an employee is at the top or the bottom of an organization, one thing employee can count on in the future is that there will be change. In this turbulent environment it is important for the managers to react quickly. Motivation of employees at the time of change via successful communication will be described. Moreover, it will be analyzed whether communication can or cannot bring a motivated workforce. Further more, the current research will be focused on essence of good leaders in motivating employees and increasing productivity. . 2.1 Change and Change Management Success is not just for survival it must be achieved in a world of intense competition, continued globalization, and rapid technology change (Schermerhorn, 1996). Currently change has become the part and parcel of every organization to predict future trends and to forecast the changes that need to be encountered. Change is an ongoing process in every organization and for the organization to be successful and survive in a dynamic environment, it is important to have effective management of human resources(Mullin, 2005). People are the major resource of any organization (MULLINS, 2005). The efficiency of staff, their commitment towards the aims of the organization, and the skills and attitudes they bring to stand on the quality of service offered will undoubtedly affect the overall success of an organization (MULLINS, 2005) So in order to achieve success, it is vital for the organization to develop communication processes, motivation processes and a working environment that will help to ensure that individuals will deliver results in accordance with expectations of management. 2.1.1 Core Principals that revolves around change: According to Bernstein (2003) over 70 % of all organizational change efforts fail to meet expectation and delivered planned results. Before implementing change in an organization it is very important for the leader to understand the difference between the change and the transition process. Additionally, a leader should keep in mind that the success of change implementation process is a key driver of how organization will deal with changes, how changes are directed and administered by the leader. According to Barons Greenberg (1990) there several principals about change: People perception about change Individual barriers to change: Economic insecurity Fear to Unknown Threats to social relationship Habits Failure to recognize need for change Additionally Barons Greenberg (1990) listed the following organization barriers to change: Structural inertia Work group inertia Threat to existing balance of power Previously unsuccessful change efforts According to Bennis, Benne, Chin, R. (1985) there are several key drivers to change: Nature of workforce Competition Technology Economic Shocks Changing social trends World politics 2.1.2Types of change Fig1 Types of changes Ackerman (1997) has distinguished between three types of change Type of Change Description Developmental Planned or emergent; incremental. It is change that enhances or corrects existing aspects of an organization, often focusing on the improvement of a skill or process. Transitional Episodic, planned, seeks to achieve a known desired state that is different from the existing one. It is and second order. Transformational Radical or second order in nature. It requires a shift in assumptions made by the organization and its members. Source: http://rmc.library.cornell.edu/EAD/htmldocs/RMM06299.html 2.1.3 Organization Change Management Model Kurt Lewin proposed a three stage theory of change commonly referred to as Unfreeze, Change, Freeze (or Refreeze). Theory was originally presented in 1947, but the Kurt Lewin model is still extremely relevant. Unfreezing Changing Refreezing Fig 2 Stages in Change Process Stages Description Unfreezing Old ideas and practices need to be cast aside so that new one can be learned. Changing New ideas and practices are learned. This involves helping an employee think reasons and perform in new ways. Refreezing It means what ever has been learned is integrated into actual practice. Source: http://www.change-management-coach.com/kurt_lewin.html Based on Hayes (2002) research of the most effective and commonly applied change, most change management processes contain the following three phases: Preparing for change (Preparation, assessment and strategy development) Managing change (Detailed planning and change management implementation) Reinforcing change (Data gathering, corrective action and recognition) (Shown in figure 3) Fig 3 Change management process phases Source: http://www.change-management.com/tutorial-change-process-detailed.htm 2.1.4 Phases in change Process People perceive change processes in seven typical stages (IPA, 2001). For successful implementation of change processes, it is important for managers to analyze that in which phase they can anticipate what type of troubles and situations. The seven stages are: Shock and Surprise Denial and Refusal Rational Understanding Emotional Acceptance Exercises and Learning Realization Integration Mainly flourishing organizations are those that are able to alter themselves to new environment rapidly. This requires planned learning and training processes that lead to better organizational efficiency. In an ideal world, employees are able to reflect their own behavior in relation to the organizational context (e.g. processes, products, resources, customers). Fig 4 Perceived Competence vs. Time Source: http://hr-horizons.blogspot.com/ Fig 5 Description of Phases Phase Description Shock and Surprise Confrontation with unexpected situations. This can happen by accident (e.g. losses in particular business units) or planned events (e.g. workshops for personal development and team performance improvement). These situations make people realize that their own patterns of doing things are not suitable for new conditions any more. Thus, their perceived own competence decreases. Denial and Refusal People activate values as support for their conviction that change is not necessary. Hence, they believe there is no need for change; their perceived competency increases again. Rational Understanding People realize the need for change. According to this insight, their perceived competence decreases again. People focus on finding short term solutions, thus they only cure symptoms. There is no willingness to change own patterns of behavior. Emotional Acceptance This phase, which is also called crisis is the most important one. Only if management succeeds to create willingness for changing values, beliefs, and behaviors, the organization will be able to exploit their real potentials. In the worst case, however, change processes will be stopped or slowed down here. Exercising and Learning The new acceptance of change creates a new willingness for learning. People start to try new behaviors and processes. They will experience success and failure during this phase. It is the change managers task to create some early wins (e.g. by starting with easier projects). This will lead to an increase in peoples perceived own competence. Realization. People gather more information by learning and exercising. This knowledge has a feedback-effect. People understand which behavior is effective in which situation. This, in turn, opens up their minds for new experiences. These extended patterns of behavior increase organizational flexibility. Perceived competency has reached a higher level than prior to change. Integration People totally integrate their newly acquired patterns of thinking and acting. The new behaviors become routine. Source: CA Carnall 2007 Managing Change in Organization Pearson Education 2.1.5 Resistance to Change Fig 6 Resistance to change Resistance to change consists of any employee behavior designed to discredit, delay or prevent the implementation of work change. According to Kotter (1996) resistance to change is the action taken by individuals and groups when they perceive that a change that is occurring as a threat to them. Most of actions that are taken to manage change fail due to improper planning and implementation (Coriat, 2002). There are three different types of resistance among employees (Newstrom Davis, 1993): 1. Logical Resistance 2. Psychological Resistance 3. Sociological Resistance Fig 7 Types of Resistance Type of resistance Description Logical Resistance Time required to adjust Extra effort to relearn Possibility of less desirable condition Economic cost of change Questioned technical feasibility of change Psychological Resistance Fear to unknown Low tolerance of change Dislike of management or other change agent Lack of trust in others Need for security Sociological resistance political coalitions opposing group values Parochial, narrow outlook Vested interest Desired to retain existing friendship Source: http://www.cipd.co.uk/subjects/corpstrtgy/changemmt/chngmgmt.htm According to Kotter Schlesinger (1979) there are four main reasons people in an organization resist change: Parochial self interest Misunderstanding Low tolerance to change Different assessment of the situations Fig 8 Reasons for change Reason for Change Description Parochial self interest People are more concerned about the effect of change on themselves rather than its consequences on the success of business. Misunderstanding Communication Inadequate information Low tolerance to change People are more interested in doing one kind of work because of security and stability in their work. Different assessment of the situations Different people have different opinion for the reason for change. Some consider it as advantageous and others disadvantageous. Source http://www.valuebasedmanagement.net/methods_kotter_change_approaches.html Kotter Schlesinger (1979) suggested ways to deal with the changes: Education and communication Participation and involvement Facilitation and support Negotiation and Support Manipulation and co-option Explicit and Implicit coercion Fig 9 Reasons for overcoming resistance to change Reasons for Overcoming Description Education and communication Educate people about the change effort in advance by giving them trainings so they can understand the logic behind the change. Participation and involvement When employees are actively involved in the change they are most likely to buy into change rather than resist them. Facilitation and support When people are trying to adjust with the situation, managers plays an important role by giving employees full support they require during the transition period. Negotiation and Support When someone loose out into change the managers can combat resistance by offering incentives to employees so that they do not resist changing. Manipulation and co-option It involves the patronizing gesture in bringing a person into a change management planning group just for sake of appearance rather than substantive contribution. Explicit and Implicit coercion Managers can implicitly and explicitly force employee to accept change by making them clear that resisting changing can lead to losing jobs. Source:http://www.valuebasedmanagement.net/methods_kotter_change_approaches.html 2.2 Motivation The level of performance of employees relies not only on their actual skills but also on the level of motivation each person exhibits (Burney et al., 2007). Motivation is an inner drive or an external inducement to behave in some particular way, typically a way that will lead to rewards (Dessler, 1978). Over-achieving, talented employees are the driving force of all firms so it is essential that organizations strive to motivate and hold on to the best employees (Harrington, 2003). In a turbulent environment where changes take place very often, therefore it becomes important for managers to analyze the level of motivation of each employee. Every individual have their own set of reasons to get motivated. Some individuals are motivated by financial factors while others are motivated by non financial factors illustrated in Figure 10. Motivation can be classified as external or internal motivation. Finishing deadline on time is an example of external motivation. The fear of loosing a job in case of uncompleted task is an example of internal motivation. Both the external and internal motivation is equally powerful. Figure 10 Financial Non financial motivators The four most powerful type of motivation that can influence an individual are listed below: Figure 11 Types of motivation Type of Motivation Description Intrinsic motivation Satisfaction in the work itself (pleasure, stimulation, learning etc) Extrinsic motivation Rewards for doing the work (money, promotion, perks etc) Personal motivation Individual values (a love of knowledge, power, security, self-expression etc) Interpersonal motivation The influence of other people (competition, collaboration, commitments etc) Human beings are complex in nature, and are usually motivated by a combination of four elements. Figure 11 illustrates 4 types of motivation, which come together to produce four key areas for the managers to focus on when trying to motivate their employees. Figure 11 Four key elements of motivation Source : http://www.wishfulthinking.co.uk/2009/02/11/motivation-during-a-recession/ 2.2.1 Major Theories of Motivation Motivation is not only in a single direction i.e. downwards. In the present scenario, where the workforce is more informed, more aware, more educated and goal oriented, the role of motivation has left the boundaries of the hierarchy of management. The Figure below shows the major theories of motivation that can be applied in the working environment as well on the employees to see the impact of motivation on the organization as a whole. Figure 12 Theories of Motivation 2.2.1.1 Need Approaches Maslows Hierarchy of Needs Figure 13 Shows Maslows Hierarchy of Needs By applying Maslows theory of motivation, modern leaders and managers find way of employee motivation for the reason of worker and workforce management. According to Maslow the humans are motivated by unsatisfied needs and the needs which are at low level should be satisfied initially and then the higher order need should be looked upon. As given in Figure 13 there are five general needs of the humans that should be satisfied before the human start behaving unselfishly. Therefore, in a real work time scenario it becomes important for the leader to understand which needs is currently active for an individual employee motivation. Alderfers ERG Theory Figure 14 Clayton Alderfers ERG Theory Needs Source:http://www.envisionsoftware.com/es_img/Alderfer_ERG_Theory.gif According to ERG theory, leaders must identify that employees have multiple desires to satisfy at the same time. In addition, if the employee is not given enough chance for development, the employee can go back to relatedness needs. So it becomes important for the managers to recognize this situation so that deliberate steps can be taken on relatedness needs until the employee is able to follow the way towards growth again. Herzbergs Two Factor Theory Figure 15 Hygiene and Motivation Factors Source:http://www.biomedcentral.com/content/figures/1472-6920-9-49-1.jpg The psychologist Fredrick Herzberg asked the questions from employees in the year 1950s and 60s for understanding employee satisfaction. The results of its finding revealed that there are some factors of a job which are constantly connected to job satisfaction, while dissimilar factors are linked with job dissatisfaction. The hygiene and motivation factors are illustrated in Figure 15. To apply Herzbergs theory, managers need to take up a two stage process to motivate people. Firstly, managers need eliminate the dissatisfactions the employees are experiencing and, secondly, managers need to help them find satisfaction. McClellands Learned Needs Theory McClelland theory of human motivation also known as three need theory or learned theory, segments the needs as follow; Need for achievement Need for power Need for affiliation Each of these needs will differ from one person to another. If the manager is able to recognize the significance of each of these needs to an individual, it will help the managers to determine how an individual can be influenced. Summary of Need Approaches Figure 16 Comparison of Need Theories 2.2.1.2 Cognitive Approach Expectancy Theory Figure 17 Expectancy Theory According to expectancy theory, every person has their own set of different goals and they can be motivated if they have certain level of expectation. Vrooms expectancy theory is based on three variables i.e. valence, expectancy and Instrumentality valances. Figure 18 Valence, Expectancy Instrumentality Equity Theory/ Social Comparison Theory Figure 18 Equity Theory Source: http://www.businessballs.com/adamsequitytheory.htm Equity theory states that employee always tend to compare the situation (Outcomes) they get while working in relation to what they invested (Inputs). Additionally they also willing to compare what are the ratio between what they get from what they put in. Moreover people also attempt to compare their input and outputs with their coworkers as illustrated in Figure 19. Figure 19 Equity Comparison Source: http://www.businessballs.com/adamsequitytheory.htm Goal Setting Theory of Motivation Figure 20 Goal Theory Source: http://faculty.washington.edu/janegf/goalsetting.html This theory aims to recognize the kind of goals that are most competent in producing high level of motivation among the workers. Moreover, if employees have goals to aim for, under this circumstance the employee will perform better. Therefore it becomes important for the managers to analyze which goals can motivate which employee. In order for the managers to understand while setting goals for the individual, the managers should set the goals that are: Clear (not vague) and understandable Challenging Achievable. 2.2.1.3 Reinforcement Theory Reinforcement theory of motivation overlooks the internal state of individual, i.e., the inner feelings and drives of individuals are ignored by Skinner. This theory focuses totally on what happens to an individual when some actions are taken. External environment of the organization must be designed effectively and positively so as to motivate the employee. This theory is a strong tool for analyzing controlling mechanism for individuals behaviour. Figure 21 Types of Reinforcement Types of Reinforcement Description Positive reinforcement This implies giving a positive response when an individual shows positive and required behavior. Negative reinforcement This implies rewarding an employee by removing negative / undesirable consequences. Both positive and negative reinforcement can be used for increasing desirable / required behaviour. Extinction It implies absence of reinforcements. In other words, extinction implies lowering the probability of undesired behaviour by removing reward for that kind of behaviour. Extinction may unintentionally lower desirable behaviour Punishment It implies removing positive consequences so as to lower the probability of repeating undesirable behaviour in future. In other words, punishment means applying undesirable consequence for showing undesirable behaviour. Source: http://www.managementstudyguide.com/reinforcement-theory-motivation.htm 2.3 Leadership Style and Communication Leadership style is the manner and approach of providing direction, implementing plans, and motivating people (Kurt Lewin,1939). Leadership Style influences the level of motivation of employees. Different Leaders have different style for managing the employees working under them. Fig explains the style of leadership influencing the motivation of employees. Figure 22 Leadership Style Vs motivation Source: http://www.motivation-tools.com/workplace/leadership_styles.htm There have been mostly separate studies about leadership and grapevine communication. According to McKenna (2000), leadership is an art that can get the optimum work required for the organization. The leader also communicates the organizations goals to his team members. He does not discuss about the communication that is more important between the leader and the team and the effectiveness when such communication occurs in an informal way that leads to more interaction and hence develops a bond with each employee and all together leads to commitment and motivation.

Friday, October 25, 2019

Themes in Raymond Carvers Literature Essay -- Papers Carver Short Cut

Themes in Raymond Carver's Literature In Short Cuts, by Raymond Carver, characters experience trials and problems in their lives, whether extreme such as in " A Small, Good Thing" and "Lemonade" or nominal such as in " Vitamins". They all seem to depict these struggles as uphill battles which the characters cannot and mostly do not overcome. The characters throughout Carver's "Short Cuts" struggle through their lives in private desperation, often to ultimately realize that they are bound to the truth of who they really are, which is shown in the story "Neighbors." In "Neighbors", Bill and Arlene Miller are a couple with menial jobs who give credence to the saying "the grass is greener on the other side of the fence". They are dissatisfied with their own lives and look to the lives of their neighbors to find happiness in their own. Once a happy couple, they often feel that "they alone among their circle had been passed by somehow (13)." They did not discuss how they could change their own lives, but merely compared their lives with the Stones. "They talked about it sometimes,...

Thursday, October 24, 2019

Hamlet, The Metamorphosis, and Frankenstein Essay

Familial relations are often strained in the world of literature, especially between fathers and sons. However, these strains grow when traditional notions of fatherhood are altered or circumvented; so Hamlet has a difficult time dealing with an uncle-turn-father, and Gregor Samsa’s father is unable to truly be a parent to a gigantic cockroach. Even Victor Frankenstein is unsure how to treat his creation—as a son to care for and provide for, or as an out of control science experiment gone awry. Each of these texts shows traditional notions of father and son relationships breaking under the strain of unconventional fatherhood. Hamlet, perhaps, provides the most telling example of these strains of convention—Hamlet’s primary difficulty is his inability to be a good son to both of his fathers. To be a good son to King Hamlet means avenging his alleged murder by murdering Claudius; to be a good son to Claudius means ignoring the pleadings of his ghostly father. Prince Hamlet sees his role as son to Claudius as essentially void, due to the marriage of Claudius and Gertude being (at best) â€Å"damned incest† and, at worst, a politically-contrived accessory to the murder of the king. This is what fuels Hamlet’s odd confrontation with Gertrude—he sees his plan to murder Claudius as a way of returning the family to the way it was. Of course, Hamlet fails to freshen up what is â€Å"rotten in the state of Denmark†Ã¢â‚¬â€he merely added to the decay via the pile of bodies at the end of the play. Of these three tales, it is a morbid irony that the father/son relationship between a man and a giant cockroach of a son may, in fact, be the most conventional one. This relationship is highlighted by a kind of brutal utility—Gregor is useful to his father for as long as he is able to provide for his father. In this sense, the most profound change in the story in the eyes of the eldest Samsa is not his son into an insect, but his son changing from a provider to one who needs to be provided for. This sparks anger, outrage, and ultimately, abandonment. This brutal utility is highlighted by the end of the story, in which the family hopes to find a young man for Greta, essentially scheming to replace one provider with another. Gregor, in turn, feels his death is the best thing for the family: while dying, â€Å"he remembered his family with deep feelings of love. † Victor Frankenstein’s relationship with his creation is a mockery of traditional father/son relationships, just as Frankenstein’s actions are a mockery of God’s abilities. Victor wants his â€Å"son† to be a walking, talking example of his own genius. However, this focus on his own achievements means that he is unable to provide for his son—as he says, his focus is on â€Å"treading in the steps already marked, I will pioneer a new way, explore unknown powers, and unfold to the world the deepest mysteries of creation. † His son, unable to experience the love of a woman or a father, is left to feel like he is â€Å"miserable and the abandoned† and â€Å"an abortion, to be spurned at, and kicked, and trampled on. † The phrasing is very apt: the monster feels like he is merely the discarded and abandoned tissue that his â€Å"father† never wished to claim as a son. Three disparate tales—Hamlet, The Metamorphosis, and Frankenstein—prevent father and son relationship that are outside the bounds of normality. In this sense, the tales are normative, as they illustrate what a normal father/son relationship is by clearly exhibiting what one is not. Audiences are left to ponder whether they will treat family members differently when their family changes; whether shifting relationships means they, themselves, must change; and whether children from alternative circumstances are somehow worth any less of a parent’s love.

Tuesday, October 22, 2019

Improving democratic boundaries through the internet Essay

Introduction The internet has changed the way many things are done. The traditional methods have been scrapped and newer more efficient and effective means are constantly being offered through and on the internet. The unique ability of the internet to render geographical boundaries obsolete allows anyone to access an almost infinite pool of information and to also share that information without regulation or control (Kalir 2002). The speed with which this information and exchange of ideas is facilitated by the internet makes it a potent medium for democratic plans. Given these benefits and advances that the internet has offered, it comes as no surprise then that the internet has also allowed democratic boundaries to improve by allowing for better communication and exchange of ideas. This discourse on the effect of the internet on improving the democratic boundaries will therefore attempt to show that the ability of the internet to bypass traditional boundaries and barriers to a free exchange of ideas and information has improved democratic boundaries despite the attempts of government to restrain or control this medium. Bypassing Traditional Boundaries As mentioned previously, the internet allows any person to access information from any place and also access any information available online. The ability of this medium to encourage the free exchange of ideas between people of any race or culture makes it easier to cross and overcome whatever boundaries may have been set in place traditionally (Lessig 2000). â€Å"Digital Democracy† which is the â€Å"use of digital communication technologies to enhance the democratic process by, among other things, making the process more accessible, increasing and enhancing citizen participation in public policy decision making, and increasing government transparency and accountability† plays a vital role in bypassing these traditional boundaries and improving the existing democratic boundaries by inviting democratic participation (Lim 2006). One of the reasons why the internet has been so successful at bypassing and improving these barriers is because of the fact that through the internet, â€Å"convergence† is achieved at a relatively low cost (Mitchell 2002). This means that people from all walks of life are not necessarily constrained by finances and such as to hamper or inhibit them from participating in the democratic process or in digital democracy. This in effects allows for a more mixed lot of participants and allows for a richer exchange of ideas and a greater participation from a wider demographic base (Lim 2006). Put simply, the relatively low cost of access to the internet at the present allows for more people to participate and also increases the amount of information available that is vital to the success of â€Å"digital democracy:† The greater scope for freedom, autonomy, creativity, and collaboration that the internet provides makes it a successful tool in bypassing the traditional boundaries and constraints that have prevented people in participating in the democratic process and thus by providing for such the existing democratic barriers are improved. Free Exchange of Ideas and Information Governments realized that as the internet was maturing there would be a need to control and regulate access to the internet as well as to control the content of the information on the internet (Simon 2001). Most of the regulations however have proven to be ineffective as more and more people were able to find means to bypass them (see bypassing traditional boundaries) and thus led to the formation of â€Å"social movements† on the internet which is a key to the improvement of democratic boundaries (Lim 2006). Social movements are broad social alliances of people who are connected through a shared interest in blocking or promoting social change (Trippi 2004). On the internet, with the amount of information available and the number of people participating, it is but a natural result that people who share similar beliefs form their own â€Å"societies† or those who do not have any firm beliefs are able to find something which they do subscribe to. According to Lim, â€Å"The ability of the internet to provide many people access to forums for deliberation on a range of public issues and the involvement of decision-makers in online forums assure participants that their voices will be heard. Their efforts contribute to building a new public sphere where rationality rules, citizen voices are heard, and public officials heed the demos. (Lim 2006)† By allowing more people to participate and exchange ideas freely, support for proper movements to improve the democratic situation of any state, can quickly be generated thus ensuring the success of the democratic process. Yet as pointed out by one writer, the limitations of such actions are still determined by the effective sphere of influence and control of the government over the geographical and political terrain (Barlow 2001). Improving Democratic Boundaries As shown by the arguments above, the internet indeed improves democratic boundaries and presents the opportunity to eventually create a world democracy. The boundaries that have traditionally existed to bar or hinder any interaction between peoples has been bypassed by the internet and thus allowing more people to interact with each other and to mobilize despite the geographical distances of each other. The convergence that this allows makes the generation of any support necessary to improve the democratic process easier and also allows for access to a larger support base. Another factor which has led to the success of the internet in improving democratic boundaries is the fact that it allows for faster and more exchange of information. This then allows more people to interact with each other and also form â€Å"social movements†. These social movements allow people to voice out their ideas collectively and thus improving the chances that their rights are not suppressed and that their voices are heard. The future of democracy on the internet is bright indeed. With the number of people and countries that have access to internet increasing, it is guaranteed that the democratic process will survive despite attempts of certain governments (China) at regulating this medium (Longworth 2001). Still, time and again, it has been shown that whatever controls and regulations governments attempt to set in place have always been bypassed thus ensuring that the future for democracy lies in the internet, in cyberspace. References: Barlow, J. (1996). A Declaration of the Independence of Cyberspace. Retrieved November 2, 2006, from http://www. eff. org/~barlow/Declaration-Final. html. Davis, S. , Elin, B. and Reeher, G. (2002). Click on Democracy: The Internet’s Power to Change Political Apathy into Civic Action. Boulder CO: Westview Press. Kalir, E. and Maxwell, E. (2002). Rethinking Boundaries in Cyberspace. The Aspen Institute: Communications and Society Program. Lessig, L. (2000). â€Å"Innovation, Regulation, and the Internet. † American Prospect 11, no. 10. Retrieved November 2, 2006, from http://www. prospect. org/print/V11/10/lessig-l. html Lim, M. and Kann, M. (2006). Democratic Deliberation and Mobilization on the Internet. Annenberg Center for Communication University of Southern California. Longworth, R. (2001). â€Å"Government Without Democracy. † American Prospect 12, no. 12. Retrieved November 1, 2006, from http://www. prospect. org/print/V12/12/longworth-r. html. Mitchell, W. (1995). City of Bits: Place, Space, and the Infobahn. Retrieved November 2, 2006, from http://cyber. law. harvard. edu/people/reagle/inet-quotations-19990709. html. Simon, L. (2001). Democracy and the Internet: Allies or Adversaries? Woodrow Wilson Center Press. Trippi, J. (2004). The Revolution Will Not Be Televised: Democracy, the Internet, and the Overthrow of Everything. Regan Books. â€Å"Political Influentials Online in the 2004 Presidential Campaign. † (February 5, 2004). Institute for Politics, Democracy and the Internet, Graduate School of Political Management, George Washington University.

Being Too Skinny †A Personal Essay

Being Too Skinny – A Personal Essay Free Online Research Papers To have healthy body, fair skin, sharp features and cuteness- key elements towards which boys used to open their responses for girls, when I was in 9th grade in late 80s. â€Å"Dating† wasn’t openly allowed and common at that time in Indian culture but the idea was there of liking some one and sneaking around secretly. None of the above elements were in my account though- combination of very thin body, average look, and wheatish skin- that was ME. I had few ideas to create new skin and little bit beautiful face with make up but I was totally empty when had to deal with my skinniness eighty pound, butt less, skinny and full of visible bones containing body. Many times my closest friend Neel had expressed her feeling saying â€Å"Dolly, You got to put some extra kgs fat on your bones or else you will have to dig out for stick figure husband†, which insisted me to realize the reality of being extremely skinny. I used to be nervous sometime thinking about my tiny body but being very studios and sincere student- studies, future goals had caught me tightly enough so my thiness didn’t bother me much at that time though all of my girl friends had boyfriends secretly which made me feel bit uns uccessful for not catching any boy’s eye on me. Some three years ran over and final year of school came up. l. One day when I reached at school Neel-my best friend jumped towards me with mixed feeling of anger, surprising and happiness â€Å"Dolly, what have I heard about you I didn’t expect this from you, I ‘m your closest friend and you even didn’t care to tell me about all these, I’m so mad at you†. I some how felt scared as I had little idea about what might be in her mind but I ask her with act of knowing nothing about the situation â€Å" Neel, What happened, what have you heard about me?, just calm down and let’s talk†- Then I settled down the issue with her anyways. The secret was hidden in my chest successfully since last two years disclosed suddenly that day in school some other scattered comments spilled on me that day â€Å"Dolly, What is going on? Is it really true? â€Å", â€Å"Dolly, wow you have made a history†. Yes, world came to know the biggest secret o f my life that I had an affair with most eligible, desirable and hot favorite boy in our batch- Annie, who is currently known as my dear husband. Many students including me had one question – Why he chose me? , the skinniest girl in the school though he was able to get any damn beautiful girl around him? My fatless body became a topic and always teased , whenever family and friends got an opportunity. My dearest uncle- Jaimy said to me once â€Å"It seemed that hollow matchstick was flying in the air, when you were dancing†. We all were attending my cousin’s pre- wedding dance party and uncle Jaimy made a big confusion – Was his comment on my dancing skills or my skinny body? People are so crucial some time that they make comment which doesn’t have straight meaning. I spent enough time in my life to scrutinize people’s attitude towards me of being so bony when I was in India during my 20’s. I was landed recently from India, totally unaware of body structures of white and black people It was first day at work in USA at near by convenient store, surrounded by black people’s residents. My vision was so surprised by seeing each customer coming and leaving that store, every one was so called â€Å"healthy†-guys were showing off puffed muscles by tattooing them and each female looked like a factory of lump sum fat. I wondered â€Å"what must be the difference between my size and their, I was wearing one size so I guess they must be belong to 16-18 or 20? ,do they need to customize the size? as I had never seen such kind of giant clothes in my home country. That day went by and I got chance to develop some happiness of being skinny. My skinny body was worth of many great comments that day like â€Å" Hey pretty girl, you are so lucky to have this kind of body , you don’t have to check calories count on back of every food wrapper† , â€Å" hey be autiful, can we switch our bodies as I ‘m carrying huge one and have been dreaming about skinny one like yours? God, I was so happy that night which made me to ask that secretive question to my husband Annie- Why he chose me? , He laughed at me, hugged me real tight and said â€Å" Dolly, I love you so much all it matters so go to sleep and I will reveal that secret some other time†. That was the day when I felt happiness of being slim because I was liked and loved the way I was, none compromised made. But some how I middle of that night I felt â€Å" there would me nice If I can put up little more weight and make myself more beautiful though I don’t want to be a giant or huge one.† I had new goal of my life -to make more fat tissues for myself. I started eating cheese and butter with each bite of my day, gained few pounds on my bones which helped me to feel beautiful without any make up but specially India people around me never stopped bothering me about my skinniness .I was introduced to one of our community member through my friend Sheetal recently â€Å" Hey , this is Dolly-one of my good friend, I was talking about†. That lady carrying 150 pound on her bones looked at me and said â€Å"Hey Dolly, you are lot skinnier than Sheetal desctibed you earlier, do me a favor –can you take few pounds from me?† I was shocked after getting this kind of comment at first introduction. I was confused about her concern, was she complaining about her being so fat or about me being so flat by idea of giving up some pounds to me. I was little bit angry as she pointed out my characteristic at first sight. Anyways I smiled at her and replied humorously that â€Å"I do get that offer many times†. I could take pr ide of being the way I was when I was surrounded by American people but it sucked when I had to face my own community. Many years went by I had always got comments, complements, humors and advices. I was passing through my mid thirties. One incident made me to think about my lanky characteristic. I was in my English class; teacher had asked us to write an essay on â€Å"impact of any personal characteristic on our life†. I decided â€Å"my thinness† without any further thinking. When we classmates and teacher discussed our thoughts and topic of the essay teacher made a comment about my topic â€Å"You are so lucky to be like this thin as you will get reward in your 40s†. It wasn’t a huge complement but yes, I never thought what it would be in my 40s before. She certainly opened new thoughts for me of being skinny. Well, because of essay I had to dig out my past experience and outcomes of being svelte. The same night I was discussing about my English class assignment with my husband and he laughed at me and said â€Å" you have been always so concern about your body, now l eave it alone and enjoy your life† I picked up his mood and asked him to go out for dinner as it was our 9th wedding anniversary. â€Å"Hey honey, today is the day you can tell me your little secret, it’s a perfect time, please tell me what made you to marry me?† we both were enjoying our romantic dinner at my favorite restaurant ‘P.F. Changs’, I hold his hand and gave him soft look . He replied â€Å" Dolly, you have always thought that your bones don’t have enough fat but when we were in school many boys were mad for you as you were most sophisticated, reliable, loyal and sincere girl but no one ever dare to come to you because of your straightforwardness. One more thing Dolly, if you remember I was also a thin boy so I always dreamed about thin girl like you. Finally I decided to take that risk and asked for your companionship for life time†. I cried and thank god of â€Å"being thin†. Research Papers on Being Too Skinny - A Personal EssayStandardized TestingPersonal Experience with Teen PregnancyThe Spring and AutumnHarry Potter and the Deathly Hallows EssayHip-Hop is ArtEffects of Television Violence on ChildrenMarketing of Lifeboy Soap A Unilever ProductThe Hockey GameThe Masque of the Red Death Room meaningsMind Travel

Sunday, October 20, 2019

Free Essays on Livvie

â€Å"Livvie†, A Celebration of life Eudora Welty’s â€Å"Livvie†, is a great story on how life should be celebrated. The story is about a young woman , who marries and old man, that in a since imprisons her. The young girl gets a second chance at life when a younger man (someone her own age) enters her life and the older man is about to die. The theme Welty is trying to get across is live life to the fullest. Welty shows the theme through the character, setting, and symbols. Characters played a big role in the story. First, Solomon who is the husband of young woman. His name kind of explains what type of man he is going to be in the story. Solomon was the king of Israel and in the story Welty provides information that Solomon is playing a king type role. Welty says Solomon had a bed â€Å"like a throne† (511). â€Å"Solomon had never let Livvie go any farther than the chicken house and the well. (515). Welty shows the control Solomon has over Livvie (the young girl). Another sign of control that Welty shows in the story is, â€Å"Solomon would not have let Livvie look at them, just as he would not let her look at a field hand or a field hand look at her† (512 about cosmetics, Livvie gets so excited about the color of the lipstick. It must remind her of something in life. Cash’s youth attracts Livvie. The setting also plays a signi... Free Essays on Livvie Free Essays on Livvie â€Å"Livvie†, A Celebration of life Eudora Welty’s â€Å"Livvie†, is a great story on how life should be celebrated. The story is about a young woman , who marries and old man, that in a since imprisons her. The young girl gets a second chance at life when a younger man (someone her own age) enters her life and the older man is about to die. The theme Welty is trying to get across is live life to the fullest. Welty shows the theme through the character, setting, and symbols. Characters played a big role in the story. First, Solomon who is the husband of young woman. His name kind of explains what type of man he is going to be in the story. Solomon was the king of Israel and in the story Welty provides information that Solomon is playing a king type role. Welty says Solomon had a bed â€Å"like a throne† (511). â€Å"Solomon had never let Livvie go any farther than the chicken house and the well. (515). Welty shows the control Solomon has over Livvie (the young girl). Another sign of control that Welty shows in the story is, â€Å"Solomon would not have let Livvie look at them, just as he would not let her look at a field hand or a field hand look at her† (512 about cosmetics, Livvie gets so excited about the color of the lipstick. It must remind her of something in life. Cash’s youth attracts Livvie. The setting also plays a signi...

Saturday, October 19, 2019

Marketing and the Health Care System Research Paper

Marketing and the Health Care System - Research Paper Example The utilization of the healthcare services of Maryland General Hospital could be assessed by the healthcare service provider in order to analyze the current situation of usage of healthcare services. A proper analysis of the field reports is helpful in designing the ways in which the decision of the healthcare recipients could be influenced. Research Objectives The scope of this research includes a study of Maryland General Hospital. The research objectives for this study are to examine the direct impact of marketing for Maryland General Hospital, to determine a strategy to find the utilization of products and services of the hospital, and to design a marketing strategy for Maryland General Hospital. Research Methodology The impact of direct marketing of Maryland General Hospital and strategies to determine the current utilization of healthcare services of the community that it caters have been determined with the help of the secondary method of research. The data collected for the s tudy are secondary. The data have been obtained from secondary sources such as the electronic websites of the health care provider, journals, etc. The data obtained from the official website of Maryland General Hospital are reliable. The healthcare service activities have been studied from these secondary data sources. The information has been analyzed to design a marketing strategy for Maryland General Hospital and also to determine ways by which the decision of the healthcare recipients could be influenced for wider spread of the healthcare services. Analysis and Findings Maryland General Hospital is located in the city of Baltimore, Maryland, United States. The hospital serves majorly Afro-American citizens and lies in a medically underserved area of Baltimore. The hospital has been awarded a score of 38.6 for the medically underserved area, and any score below 62 requires medical services to a higher extent. This has raised the scope of direct marketing for the hospital which im pact has been analyzed below. The hospital has engaged its consultants and internal committees for conducting surveys and direct marketing of its healthcare products and services. As a result, Maryland General Hospital has been able to understand the needs of the community through direct interaction with the members. The health care needs of individuals and their families could be identified and the cost of the healthcare services could be customized in order to serve the medically undeserved area of Baltimore. The direct marketing of healthcare services provides a clear picture of the demographics, income level and the barriers to access healthcare by communities (Maryland General Hospital, 2009). It has been found that about 16.2% of the population in the city of Baltimore are below the federal poverty line and cannot afford the primary healthcare service due to transportation barriers and financial constraints. The direct marketing of the healthcare services of Maryland General H ospital helps the organization to outreach to the people who need basic healthcare services. The strategies that could be adopted by Maryland General Hospital for assessing the utilization of the products and services of the organization are through the conduct of a survey using paper questionnaires and survey questionnaires through the Internet. The hospital could also conduct meetings with the religious leaders and school

Friday, October 18, 2019

Car Buying Assignment Research Paper Example | Topics and Well Written Essays - 1250 words

Car Buying Assignment - Research Paper Example Present Value Annuity of 5% for 10 years =12.578(use a financial table for PVA, Tapiero, 2010) = ($180 12.578 (PVA 5%, 10 years) = $2,264.04 SOLUTION 4 Amount saved=$ 3,800 Time =5 years Rate=7% Present value annuity of 7% for 5 years=2.624(use a financial table for PVA, Tapiero, 2010) = ($3800 x 2.624(PVA 7%, 5yrs) =$9,971.2 SOLUTION 5 Cash cost=$60 Credit cost = ($60+ ($34for 24) =$876-$695= $181 Home Buying Assignment Grading Rubric Table Comparing Data for the Two Homes Particulars For each home in terms of: 1942 San Ysidro Drive Beverly hills’, CA 18737 Gledhill Street Northridge, CA Price $1,195,000 $579,000 Age 57 years 59 years No. of bedrooms 3 3 No. of bathrooms 2 2 Square footage 2310 1670 Lot size 0.29 0.21 Price per square foot $517 $347 Comparison of the Particulars of the Two Homes The essence of using the two zip codes is to try and locate the appropriate region for buying a particular home so that it can be convenient in terms of reaching to your work station (Lucier, 2005). This can also determine the accessibility of resources and services conveniently for places such as schools, hospitals, church. Therefore, the two zip codes are logically used so as to enable the person interested in buying a home be able to determine the right location of the home with regards to accessibility of various services. In addition, an individual should also consider the shipping factor especially if most times they will be receiving goods through shipment, then a convenient and a strategic location would be a better choice. Considering the total prices for the two homes it is realized that the Beverley hills home is more expensive as compared to that in Northridge both in California. The above table shows that the home in 1942 San Ysidro Drive Street in Beverly is costs $1,195,000 while that along 18737 Gledhill Street costs $579,000. This also proves that those who stay in this area are financially capable (Lucier, 2005). This information would enable t he home buyer to know how to prepare and plan within the limits of his or her budget. After receiving prior information the buyer will plan and ensure that his objectives are precisely met. An individual can therefore make a good decision by comparing the prices of the two homes and knowing which among the two will be within his financial ability before any transactions are made. The price per square foot for the first home in Beverly is about 517 dollars while that along the Gledhill Street in Northridge is about 347 dollars. This comparison illustrates that land as a property is highly valued in Beverly than in Northridge especially for constructed buildings. In this, the price per square foot shows the value of the house especially by using a square foot that is equated to a given price which helps in determining how much money can be paid, alternatively, if an individual wishes to buy the whole home (Lucier, 2005). T

Personal statement Essay Example | Topics and Well Written Essays - 250 words - 12

Personal statement - Essay Example hough deeply religious, he has the modern outlook and he has paved way for participation of women, in the nation-building projects and I wish to be a part of the process actively through those endeavors. Personally, I am deeply interested in the subject of political science and my grandfather is my role model in this area. I am sure to have his guidance and blessings in my chosen career. He was a practicing politician and that provided the strength to our family. He was a great man of political integrity and character and we, the family members have imbibed his virtues. As for my academic credentials, I hold the bachelor’s degree in library science and information. I have three years’ experience as a librarian in a business school and that gave me a unique opportunity to be friends with the latest business management books. I am a voracious reader and have read and studied the autobiographies of famous leaders like Abraham Lincoln, Joseph Kennedy, Winston Churchill, Kar l Marx, Mahatma Gandhi, Mao Tse Tung etc. besides many leaders of Saudi Arabia. I am seeking admission to Master in Political Science to strengthen my theory knowledge of the subject of Politics. Your benign consideration of my application for admission at this important juncture in my life will be the deciding factor for my future goals and career

Paraphrase the words which ever are highlighted in yellow..refrences Essay

Paraphrase the words which ever are highlighted in yellow..refrences should be same as mentioned in the - Essay Example The history of sport can’t be considered separately from the history of sports journalism that started already in 850 BC when Homer wrote about the victory of Ajax and Odysseus. Homer’s poetry is already considered to be the first sports journalism, notwithstanding that the real development of it began in 1800s when many sport events were fixed in written form. After the Olympics was held in 1908, the job of sports editor became popular (Andrews, 2005). Already in 1930 newspapers started offering vacancies of sports editors whose job was to create the content for sports news. The appearance of Associated Press in 1945 also contributed greatly to the popularity of sport as it published sports news on the front page that was never done before. Television also greatly influenced the development of sports journalism, particularly in the field of baseball and football (Andrew, 2005). The area of sports journalism underwent many changes after 1954. These changes were caused b y the creation of illustrated magazine, where sports issues were covered (Smith, 2008). The evolution of technology makes the area of sport always available even for those who do not go info sports but are still fond of sports competitions. These people can trace the results of their favorite sportsmen and teams on TV (Smith, 2008). The given paper will discuss the area of sports journalism. It will describe the organizational structure of the field as well as everyday life and the job of sports journalists. The work will also consider the future development of the field, and the issues sports journalists are currently facing. 1.1. The main task of sports journalist What does the job of sports journalist mean and what does it give to us? The main task of the sports journalists is to explain latest sports events. This literature is very popular among sport fanatics but for those people who are not interested in sport it represents common news, which they may hear every day but do not focus their attention on. The specialists in the area under consideration usually prepare informative articles and broadcasts about sports competitions and the participants. They present fanatics with interesting interviews they make with sports stars. The articles and broadcasts prepared by sports journalists are not just informative but also analytical as their task is not only to present the information about the sports event, but also the analysis of it. â€Å"In Champion leagues, Saturday’s final against Chelsea, the Bavarians did everything they could to avoid wining: after months of effort, it was as though they didn't want the trophy. A lack of sharpness in every way characterized their game, from putting just seven of their 35 attempts on target to conceding possession again and again in midfield. All the hallmarks of their game: the precision in finishing, the crisp, assured distribution in midfield, were abandoned† (Myson, 2012). This is an example of the r eport prepared by sports journalists, the review with commentaries they provide. The task of sports journalists is to present us with deep analysis of the sports event and the explanation why these or those participants failed or succeeded. They have to analyze the reasons of failure or success of sportsmen. There are many controversial events in the sports history and for now the most controversial is Zidane header to Matterazi in 2006 (Alexis 2012). IN order to prepare interesting

Thursday, October 17, 2019

Social Marketing CS1 Essay Example | Topics and Well Written Essays - 500 words

Social Marketing CS1 - Essay Example There are four main principles of social marketing. The first principle is product. In the social marketing plan products can be sub-divided into tangible and intangible products. Tangible products comprise of vaccines, condoms, and oral contraceptives among others. Contrarily, non-tangible products include addictions, behavior, and attitudes. The second principle is place. The products need a platform where they can be located or distributed to reach the consumers. Place is the environmental and societal context in which health behaviors and decisions are carried out. The place is supposed to be visible to the consumer, such as, public places, shopping malls, and media. Third, price refers to the consumers’ investment. The price may be in non-monetary form such as time. The product needs to be sold at lower cost. Lastly, promotion determines the quantity of the products that will be sold. Promotion entails creating visibility of the product. Promotion can be done through prin t media (newspapers, coupons) and electronic media (Internet, e-mail, TV, and radio) (Patane, 2011). Social marketing provides a model which systematizes organizational responses to address public health challenges. Social marketers are now using commercial techniques , for instance, tailoring messages, analyzing the target audiences, establishing the objectives of the targeted behavior, and using strategies like branding to promote the adoption as well as maintenance of health behaviors. To promote healthy behavior, the social marketer can use mass media with the target audience in minds such as a HIV prevention campaign for high risk, sexually active African-American adolescents. This helps to reduce HIV incidences in the target group (Daniel, Bernhardt, & Eroğlu, 2009). The segmentation strategy purposely addresses social norms in addition to the desires of the cultural

Minorities in the UK Essay Example | Topics and Well Written Essays - 750 words

Minorities in the UK - Essay Example However, there are several factors which seem incomplete in the overall claim on the part of the locals. The first one is that the identity of C is known which does not violate the same point in the Act. In this vein, 187B of the 1990 Town and Country Planning Act Part 3 states: Rules of court may provide for such an injunction to be issued against a person whose identity is unknown.1 This is why the local authority made a huge mistake at imposing an illegal breach of planning toward the identified person in keeping strictly with the law. On the other hand, the fact that C bought that piece of land is more than just weighty. She must get through a host of different executive bodies to make it her private property. Thus, if the local authority disregards the fact of purchasing land, then it disregards and sincerely blames the work of officials responsible for selling land to C. All in all, it is a provoking point addressed to the overall executive branch of power. It also does harm to the democratic freedoms proclaimed and shared by the British government. As a result, it is a serious violation of the law. Regardless of the fact that C is of Roma decent, she is an owner. By and large, there is a universal norm on justifying the gist of private property and rights of individuals, namely: â€Å"Property rights† is an index of the degree to which the government enforces laws that protect private property.2 Thus, the eviction is not permissible. To say more, the case is all about some discriminatory nature nurtured highly on the part of the local authority. C wants to station her caravans in order to provide her children with suffice healthcare and education which is within easy reach. This is the next hallmark of the discussion. Once again, here is the fact of straight-forward discrimination toward Roma people in the UK. In this respect the High Court should take it into account since it would be a blame for EU and the UK, in particular. Equality in rights i s needed to keep the social equilibrium. However, it is a case for EU, as the British government lobbied on issues concerned with equal access to education, employment and housing for Roma people.3 This is why the case of C should be considered in terms of international commission on the human rights and the right for housing, in particular. What is more, the fact that C could buy the piece of the land in the London Green Belt makes it possible to suppose that she has a host of other rights. According to the ECSR and the Committee on Human Rights in Europe, the right to housing permits the exercise of many other rights – civil and political as well as economic, social and cultural rights.4 Hereby, C is eligible in taking her part while solving the issue of stationing her caravans near the local school and healthcare facilities. Roma people and other indigenous ethnical groups living in the UK are also protected by the OSCE conventions on their sustainable integration.5 Hence, it is another standpoint to think of by the High Court while considering the merits of the case. Along with the undeniable fact of purchasing and owning the land, C is allowed to share the rest of the amenities as declared by the Council of Europe’s Framework Convention for the Protection of National Minorities which the UK belongs to.6 Thus, the UK government cannot disregard a set of obligations based on the international

Wednesday, October 16, 2019

Paraphrase the words which ever are highlighted in yellow..refrences Essay

Paraphrase the words which ever are highlighted in yellow..refrences should be same as mentioned in the - Essay Example The history of sport can’t be considered separately from the history of sports journalism that started already in 850 BC when Homer wrote about the victory of Ajax and Odysseus. Homer’s poetry is already considered to be the first sports journalism, notwithstanding that the real development of it began in 1800s when many sport events were fixed in written form. After the Olympics was held in 1908, the job of sports editor became popular (Andrews, 2005). Already in 1930 newspapers started offering vacancies of sports editors whose job was to create the content for sports news. The appearance of Associated Press in 1945 also contributed greatly to the popularity of sport as it published sports news on the front page that was never done before. Television also greatly influenced the development of sports journalism, particularly in the field of baseball and football (Andrew, 2005). The area of sports journalism underwent many changes after 1954. These changes were caused b y the creation of illustrated magazine, where sports issues were covered (Smith, 2008). The evolution of technology makes the area of sport always available even for those who do not go info sports but are still fond of sports competitions. These people can trace the results of their favorite sportsmen and teams on TV (Smith, 2008). The given paper will discuss the area of sports journalism. It will describe the organizational structure of the field as well as everyday life and the job of sports journalists. The work will also consider the future development of the field, and the issues sports journalists are currently facing. 1.1. The main task of sports journalist What does the job of sports journalist mean and what does it give to us? The main task of the sports journalists is to explain latest sports events. This literature is very popular among sport fanatics but for those people who are not interested in sport it represents common news, which they may hear every day but do not focus their attention on. The specialists in the area under consideration usually prepare informative articles and broadcasts about sports competitions and the participants. They present fanatics with interesting interviews they make with sports stars. The articles and broadcasts prepared by sports journalists are not just informative but also analytical as their task is not only to present the information about the sports event, but also the analysis of it. â€Å"In Champion leagues, Saturday’s final against Chelsea, the Bavarians did everything they could to avoid wining: after months of effort, it was as though they didn't want the trophy. A lack of sharpness in every way characterized their game, from putting just seven of their 35 attempts on target to conceding possession again and again in midfield. All the hallmarks of their game: the precision in finishing, the crisp, assured distribution in midfield, were abandoned† (Myson, 2012). This is an example of the r eport prepared by sports journalists, the review with commentaries they provide. The task of sports journalists is to present us with deep analysis of the sports event and the explanation why these or those participants failed or succeeded. They have to analyze the reasons of failure or success of sportsmen. There are many controversial events in the sports history and for now the most controversial is Zidane header to Matterazi in 2006 (Alexis 2012). IN order to prepare interesting

Tuesday, October 15, 2019

Minorities in the UK Essay Example | Topics and Well Written Essays - 750 words

Minorities in the UK - Essay Example However, there are several factors which seem incomplete in the overall claim on the part of the locals. The first one is that the identity of C is known which does not violate the same point in the Act. In this vein, 187B of the 1990 Town and Country Planning Act Part 3 states: Rules of court may provide for such an injunction to be issued against a person whose identity is unknown.1 This is why the local authority made a huge mistake at imposing an illegal breach of planning toward the identified person in keeping strictly with the law. On the other hand, the fact that C bought that piece of land is more than just weighty. She must get through a host of different executive bodies to make it her private property. Thus, if the local authority disregards the fact of purchasing land, then it disregards and sincerely blames the work of officials responsible for selling land to C. All in all, it is a provoking point addressed to the overall executive branch of power. It also does harm to the democratic freedoms proclaimed and shared by the British government. As a result, it is a serious violation of the law. Regardless of the fact that C is of Roma decent, she is an owner. By and large, there is a universal norm on justifying the gist of private property and rights of individuals, namely: â€Å"Property rights† is an index of the degree to which the government enforces laws that protect private property.2 Thus, the eviction is not permissible. To say more, the case is all about some discriminatory nature nurtured highly on the part of the local authority. C wants to station her caravans in order to provide her children with suffice healthcare and education which is within easy reach. This is the next hallmark of the discussion. Once again, here is the fact of straight-forward discrimination toward Roma people in the UK. In this respect the High Court should take it into account since it would be a blame for EU and the UK, in particular. Equality in rights i s needed to keep the social equilibrium. However, it is a case for EU, as the British government lobbied on issues concerned with equal access to education, employment and housing for Roma people.3 This is why the case of C should be considered in terms of international commission on the human rights and the right for housing, in particular. What is more, the fact that C could buy the piece of the land in the London Green Belt makes it possible to suppose that she has a host of other rights. According to the ECSR and the Committee on Human Rights in Europe, the right to housing permits the exercise of many other rights – civil and political as well as economic, social and cultural rights.4 Hereby, C is eligible in taking her part while solving the issue of stationing her caravans near the local school and healthcare facilities. Roma people and other indigenous ethnical groups living in the UK are also protected by the OSCE conventions on their sustainable integration.5 Hence, it is another standpoint to think of by the High Court while considering the merits of the case. Along with the undeniable fact of purchasing and owning the land, C is allowed to share the rest of the amenities as declared by the Council of Europe’s Framework Convention for the Protection of National Minorities which the UK belongs to.6 Thus, the UK government cannot disregard a set of obligations based on the international

Personal Wellness Paper Essay Example for Free

Personal Wellness Paper Essay Personal Wellness Project I decided to choose stress reduction for my personal wellness project. I chose this topic because it hits home base extremely hard. I want to definitely reduce my stress intake and be able to cope with challenging situations. I want to be at least eighty percent in control of my life. I find myself getting stressed when unexpected things happen, and I am not prepared for it. I also want to improve my way of handling circumstances which make me stress. Reducing my stress will make me a better person as a whole. When I reduce my stress level, it may lengthen my life by _____ years. I will also be able to function in an everyday atmosphere that requires me to have a clear head. My attitude will be more pleasing and I will become extra attractive. Stress reduction will help in many ways, as mentioned above. Therefore, less stress, makes me live a healthier life. When my stress level is reduced, I can take care and groom myself properly. I feel this behavior change is significant to me because of the environment I am in. At this moment right now, I am a student, worker, and tenant. I have many obligations, and if I am stressed, things will not flow right. I know I would not be able to organize and function what so ever. Being less stress might even bring along important people into my life. No one likes to be around someone who is steaming and on the edge on the time. When I am in control and calm, I can enjoy the simple things in life. Some strategies known to help with reducing stress is exercising. Exercising helps release endorphins, which improves moods and their overall wellness.

Monday, October 14, 2019

Techniques of Spoofing Attacks

Techniques of Spoofing Attacks Spoofing is sending fake address of a transmission to gain entry which is illegal into a secure system. It is creates fake responses or signals in order to keep the session alive and prevent timeouts. It captures, alters, re-transmits a communication stream that can mislead the recipient. Hackers use it to refer especially to the TCP/IP packets of addresses in order to disguise a trusted machine. The term spoofing has spread all over the world. The term spoofing refers to stealing the passwords and personal information of a particular person from the internet. The word spoof came into existence by the British comedian Arthur Roberts in 1852.In the 19th century, Arthur Roberts invented the game spoof and thus the name. This game had the use of tricks and non-sense. The first recorded reference to this game in 1884 refers to its revival. Very soon the word spoof took on the general sense of nonsense and trickery. The word spoof was first recorded in 1889.[4] TYPES: Types of Spoofing covered are as follows: 1. E-Mail Spoofing 2. Caller ID Spoofing 3. SMS Spoofing 4. Website Spoofing 5. DLL Spoofing 6. IP Spoofing 1.1.1 Definitions: 1) E-Mail Spoofing: Basically email spoofing is of the type in which the sender address and other parts of the email are altered so that it appears as if it is sent from a different source 2) Caller id Spoofing: Caller id is the way of making fake calls to other people wherein the number of the sender appears as if he/she is calling from another number. 3) SMS Spoofing: SMS Spoofing allows us to change the name or number of the text messages appear to come from. 4) Website Spoofing: Website Spoofing is a method of misleading the people or perhaps the readers that the website has been made by some other organization or by some other known person. 5) DLL Spoofing: DLL code runs in the context of its host program, it inherits the full capabilities of the programs user with spoofing. 6) IP Spoofing: IP spoofing is the way in which the sender gets unauthorized access to a computer or a network by making it appear that a certain message has come from a trusted machine by spoofing the IP address of that machine. SECTION 2 EMAIL SPOOFING 2.1 INTRODUCTION: This is considered to be one of the most used techniques of spammers and hackers. They spoof their return e-mail addresses. That makes it look as if the mail has come from some other person. This is a form of identity theft, as the person who sends the email acts to be someone else in order to distract the recipient to do something. 2.2 OBJECTIVE: The objective of spoofed mail is to hide the real identity of the sender. This can be done because the Simple Mail Transfer Protocol (SMTP) does not require authentication. A sender can use a fictitious return address or a valid address that belongs to someone else. The mails that are spoofed can be very annoying, irritating and at times dangerous. Having your own address spoofed can be even worse. If the sender or probably the hacker uses our address as the return address, then our inbox may fill with receivers complaints as well as they might report us in the spammers as well. This type of spoofing can be very dangerous. 2.3 MOTIVES: These might be the possible motives of an attacker: 1. This is spam and the person who sends doesnt want to be subjected to anti-spam laws 2. The e-mail constitutes threatening or harassing or some other violation of laws. 3. The e-mail contains a virus or Trojan and the sender believes you are more likely to open it if it appears to be from someone you know 4. The e-mail requests information that you might be willing to give to the person the sender is pretending to be, as part of a social engineering. 2.4 PHISHING: Phishing is associated with Email spoofing. Phishing is the practice of attempting to obtain users credit card or online banking information, often incorporates e-mail spoofing. For example, a phisher may send e-mail that looks as if it comes from the banks or credit cards administrative department, asking the user to log onto a Web page and enter passwords, account numbers, and other personal information. Thereby obtaining the users confidential information.[2] 2.5 WORKING: This is the most easily detected form, in e-mail spoofing it simply sets the display name or from field of outgoing messages to show a name or address other than the actual one from which the message is sent. Most POP e-mail clients allow you to change the text displayed in this field to whatever you want. For example, when you set up a mail account in Outlook Express, you are asked to enter a display name, which can be anything you want, as shown in Figure 2.1. Fig 2.1:ÂÂ  Setting the display name in your e-mail client The name that we set will be displayed in the recipients mail program as the person from whom the mail was sent. We can type anything you like in the field on the following page that asks for your e-mail address. These fields are separate from the field where you enter your account name assigned to you by your ISP. Figure 2.2 shows what the recipient sees in the From field of an e-mail client such as Outlook. Fig.2.2ÂÂ  The recipient sees whatever information you entered When this simplistic method is used, you can tell where the mail originated (for example that it didÂÂ  notÂÂ  come from thewhitehouse.com) by checking the actual mail headers. Many e-mail clients dont show these by default. In Outlook, open the message and then clickÂÂ  View | OptionsÂÂ  to see the headers, as shown in Figure 2.3. Fig 2.3:ÂÂ  Viewing the e-mail headers In this example, you can see that the message actually originated from a computer named XDREAM and was sent from the mail.augustmail.com SMTP server. 2.6 PREVENTIVE MEASURES: Although legislation may help to deter some spoofing, most agree that it is a technological problem that requires a technological solution. One way to control spoofing is to use a mechanism that will authenticate or verify the origins of each e-mail message. The Sender Policy Framework (SPF) is an emerging standard by which the owners of domains identify their outgoing mail servers in DNS, and then SMTP servers can check the addresses in the mail headers against that information to determine whether a message contains a spoofed address. The downside is that mail system administrators have to take specific action to publish SPF records for their domains. Users need to implement Simple Authentication and Security Layer (SASL) SMTP for sending mail. Once this is accomplished, administrators can set their domains so that unauthenticated mail sent from them will fail, and the domains name cant be forged. SECTION 3 CALLER ID SPOOFING 3.1. INTRODUCTION: This type of spoofing is all about changing the Caller ID to show any desired unidentifiable number on the persons caller id who receives the call [1]. Caller id spoofing is a way of calling someone without them knowing who actually the person is, by hiding the phone number from their caller id. It is also known as the practice of causing the telephone network to display a number on the recipientsÂÂ  Caller id displayÂÂ  which is not that of the actual originating station. Just asÂÂ  e-mail spoofingÂÂ  can make it appear that a message came from any e-mail address the sender chooses, Caller ID spoofing can make a call appear to have come from any phone number the caller wishes. Because of the high trust people tend to have in the Caller ID system; spoofing can call the systems value into question hence creating problems for various parties associated with it. NAMES OF COMPANIES THAT PROVIDE THE CALLER ID SPOOFING FEATURE: SpoofCard Phone Gangster StealthCard TeleSpoof 3.2 WAY TO MAKE TEXT DISPLAY ON CALLER ID DISPLAY: With the help of the Spoof Card, Stealth Card, TeleSpoof and many more we can make the text show up on the caller id display instead of number. We have to choose some text from the huge list of funny caller id text phrases and that text will be displayed as our phone number. Some texts are shown below in the image. Fig 3.1 Text that can be shown in the caller-id display 3.3 USES: Caller-id spoofing can be used in the following places: Doctor needing to disguise home number so that he doesnt get unwanted calls on his home number Worried spouse wanting to find the truth Calling back an unknown number to find out the unknown identity without revealing original number Hiding your location 3.4 METHOD: Caller ID can be spoofed in many different ways and with different well advanced technologies. The most popular ways of spoofing Caller ID are through the use ofÂÂ  VoIPÂÂ  orÂÂ  PRIÂÂ  lines. Other method is that of coping theÂÂ  Bell 202ÂÂ  FSKÂÂ  signal. This method, calledÂÂ  orange boxing, uses software that generates the audio signal which is then coupled to the telephone line during the call. The object is to deceive the called party into thinking that there is an incomingÂÂ  call waitingÂÂ  call from the spoofed number, when in fact there is no new incoming call. This technique often also involves an accomplice who may provide a secondary voice to complete the illusion of a call-waiting call. Because the orange box cannot truly spoof incoming caller ID prior to answer and relies to a certain extent on the guile of the caller, it is considered as much aÂÂ  social engineeringÂÂ  technique as a technical hack. 3.5 MOTIVES: Sometimes, caller-id spoofing may be justified. There are necessary reasons for modifying the caller ID sent with a call. These can be the possible places where caller-ids are spoofed: Calls that come from a large organization or company, particularly those companies that have many branches, sending the main number is a good option. Consider this example. A hospital might have the primary number 777-2000, and around 250 lines functioning inside the main building, and another 200 at the clinic that is located around 50 miles away. I t may happen that most of the numbers will be in the form of 777-200XX, but it might also happen that many of them have an unrelated and unidentifiable numbers. Therefore if we have all calls come from 777-2000, it lets the call recipients identify that the incoming call is a hospital call. Most of the calling-card companies display Caller IDs of the calling-card user to the call recipients. Many Business owners and dealers use Caller ID spoofing to display their business number on the Caller ID display when they are calling from a place outside the office premises (for example, on a mobile phone). Skype users have an option of assigning a Caller ID number for preventing their outgoing calls from being screened by the called party (Skype Caller ID in the USA is 000123456). Google application Google VoiceÂÂ  displays its users Google Voice number when the users make calls from the service using their landline numbers or mobile phones. Gizmo5ÂÂ  sends the users Gizmo5 SIP number as outbound Caller ID on all calls. Because Gizmo5 IDs are in the format 747NXXXXXX, it is possible to confuse calls made from Gizmo5 with calls made fromÂÂ  area code 747. Fig 3.2. Software for Caller id Spoofing SECTION 4 SMS SPOOFING 4.1 INTRODUCTION: SMS Spoofing allows us to change the name or number of the text messages a recipient would appear to receive. It replaces the number from which the text message is received with alphanumeric text. This type of spoofing has both legitimate and illegitimate applications. The legitimate manner would be setting your name or company name or the product name for or from which the text message is sent. So thereby the text message received will display the name or the company name or the product name and the purpose in the case for e.g. a product (publicising it) would thus be served. The illegitimate way would be when a person or a company would use the name of some other person or name or a product with the intentions of causing losses to the concerned. 4.2 MOTIVES: SMS Spoofing takes place when the user from sending end changes the address information so as to conceal the original address from reaching the user at the receiver end. It is done mostly to impersonate a user who has roamed onto a foreign network, needs to be submitting messages to the home network. Generally these messages are addressed to destinations that are beyond the range of home network with the home SMSC (short messaging service centre) being hijacked hence causing messages to be sent to other network 4.3. IMPACTS: Following are the impacts of this activity: 1) Due to the hijacking of the home SMSC, The home network can bring in termination charges caused by the delivery of these messages to interconnect partners. This is termed as quantifiable revenue leakage. 2) These messages can be of concern to the partners involved. 3) It is possible that it comes under the notice of the customer that he is spammed and the message sent maybe of personal, financial or political importance to the concerned person. Therefore, there is a risk that the interconnect partners might threaten to stop the home network from functioning until and unless a suitable remedy is found and properly implemented. Hence, the consequence of this would be that the Home subscribers will be unable to send messages into these networks. 4) While fraudsters generally use spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. This implies, that genuine subscribers may be billed for roaming messages they did not send and if this situation does arise, the integrity of the home operators billing will be under scrutiny, with potentially huge impact on the brand itself. This is a major churn risk. 4.4 USES: A person sends a SMS message from an online computer network for lower more competitive pricing, and for the ease of data entry from a full size console. They must spoof their own number in order to properly identify themselves. A sender does not have a mobile phone, and they need to send an SMS from a number that they have provided the receiver in advance as a means to activate an account. 4.5 THREATS: An SMS Spoofing attack is often first detected by an increase in the number of SMS errors encountered during a bill-run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to by-pass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services. SMS Spoofing is a serious threat to mobile operators on several fronts: 1. Mischarging subscribers. 2. Being charged interconnects fees by the hubs. 3. Blocking legitimate traffic in an effort to stop the spoofing. 4. Assigning highly trained and scarce resources to tackle the problem 4.6 EXAMPLES: Messages sent from Google are sent with the Sender ID Google. Skype sends messages from its users with the mobile number they registered with. Note that when a user attempts to reply to the SMS, the local system may or may not allow the replying message to be sent through to the spoofed origin. A user who does not have a mobile phone attempts to sign up for a Foxy tag account, which requires an SMS from a phone number that the user registers with. A dynamically assigned number from an anonymous SMS service will not work because the user is not given the dynamic number in advance to register with. Fig 4.1 this picture above shows the process of sms spoofing. SECTION 5 WEB SPOOFING 5.1 INTRODUCTION: Website spoofing is a type of spoofing which creates a website or web pages that are basically run with the intention to mislead users into believing that the particular website is created by a different group or a different person. Another form of website spoofing is creating false or fake websites that generally have the same appearance and layout as the original website and tricking people into sharing their personal or confidential information with the false Website. The fake websites can have a similar URL as well. Another technique associated with false URL is the use of Cloaked URL.This technique uses methods of domain redirection or URL forwarding which convincingly hides the address of the actual website. Website spoofing is often associated with Phishing. It can also be carried out with the intention of criticizing or making fun of the original website or the website developer or fraud as well.[3] 5.2 CONCEPT: So we can say that web spoofing basically enables an attacker/spoofer to create a shadow copy of the entire World Wide Web. Accesses to this fake Web are monitored through the attackers system, which helps the attacker to keep a watch on all of the victims web-activities. These activities include passwords and personal information (bank account numbers). It can also happen that in the victims name, the attacker sends certain information to the web servers or send any kind of information to the victim in the name of any Web server. Basically, the spoofer controls everything The victim does on the Web. 5.3 CONSEQUENCES: As the spoofer or the attacker has complete control(observing capability as well as modifying capability) over any data that is transmitting from the victim to the web servers and also all the data transactions from the servers to the victim , the attacker can misuse this in many ways. Some of the misusing ways are surveillance and tampering. 5.3.1 Surveillance: The attacker can conveniently spy on the traffic, registering which pages and sites the victim visits or surfs as well as the content of those pages. For example, when the victim fills out a particular form on a particular site, the entered details are transmitted to a server. The attacker can record all these details, along with the response sent back by the server. And as we know, most of the on-line commerce is done using forms; this information can also give the attacker -the account passwords and other valuable data of the victim. This is highly dangerous. Surveillance can be carried out by the spoofer even if the victim has a so called secure connection to the web-server. So basically, even if the victims browser shows the secure-connection icon (usually an image of a lock or a key) . It can be possible that the attacker is still successful in his Surveillance. 5.3.2 Tampering: Surveillance is basically just observing and registering confidential data of the victim. The spoofer can also MODIFY any of the data that may be travelling in either direction between the victim and the servers. This is called Tampering. If there are any forms submitted by the victim to the web servers, the attacker can bring about changes in the data entered. For example, if a person is purchasing a certain product on-line, the spoofer can change the product details, product number, shipping address etc. The attacker can also change the data returned by a Web server, for example by inserting misleadingoffensive material to trick the victim or to cause problems between the victim and the server. Misleadingoffensive material to trick the victim or to cause problems between the victim and the server. 5.3.3 Using the Web: It is not really difficult to spoof the entire World Wide Web, even though it might seem to be difficult. The attacker does not really have to store all the contents of the Web. The Web in its entirety is available on-line; so the spoofers server just has to fetch the required page or pages from the real Web whenever it needs to provide a copy of that page on the false Web. 5.4 Working of the attack: For this attack to work, the main duty of the attacker is to sit between the victim and the rest of the Web. This arrangement of sitting between the victim and the web is called a man in the middle attack. 5.5 Method: One of the most frequently used methods for web spoofing is URL Rewriting. 5.5.1 Url Rewriting Once the attacker fetches the real document, the attacker rewrites all of the URLs in the document into the same special form by same spoofing technique. Then the attackers server provides the rewritten page to the victims browser. This is how URL rewriting is used for spoofing. 5.6 Protection: Web spoofing is one of the most dangerous and undetectable security attacks that can be carried out in the web-world today. But of course, there are certain preventive measures that can be taken: 5.6.1 Short-term protection: These are the steps to follow for short term protection: a) Disable JavaScript in your browser so the spoofer wont be able to hide the evidence of the attack; b) Your browsers location line should always be visible; c) Observe URLs displayed on your browsers location line, and make sure that the URLs always point to the server you think youre connected to. 5.6.2 Long-term protection: There is no fully satisfactory long-term solution to this problem. But few things that can be done: a) Changing browsers can help, so they always display the location line. But the users have to know how to recognise the correct URLs. b) Using improved Secured-connection indicators. Fig 5.1.The picture above gives an idea of how web spoofing is done SECTION 6 DLL SPOOFING Dynamic Link Libraries or DLL are software object modules, or libraries, linked into a program while it is running DLLs are a feature that allows programs to share common codes so as to help developers to make programs easily and efficiently.DLLs are extensively used in newer versions of Windows. Fig 6.1.This picture above is hardware id DLL 6.1 INTRODUCTION: DLL code runs in the context of its host program, it inherits the full capabilities of the programs user with spoofing. The DLL spoof causes a legitimate program to load a DLL with a Trojan horse instead of legitimate DLL. DLL spoofing can occur even if the legitimate DLL is beyond the attackers reach. Since when a program loads DLLs it searches through a sequence of directories looking for the required DLL. Spoofing occurs when the attacker succeeds in inserting the infected DLL-file in one of those directory in such a way that program finds it before it finds the legitimate DLL of the same name. Hence even if the file is write-protected or the attacker doesnt have access to the directory which contains the legitimate DLL then also he can attack the program. Whenever a user runs a program there occurs a linking algorithm which is used to find the file that holds the DLL. Usually it is the one with DLL suffix. Linking algorithm searches through three different categories: 1. Programs directory: It is the directory which holds programs file. 2. System directory: Contains a series of entries. As we have discussed earlier to spoof the user only needs to insert an infected or malicious DLL file into the working directory. If the infected DLL file has the same name as the legitimate DLL then the algorithm will link the fake DLL file to the otherwise trusted program. The infected DLL can then create a new process. It runs in the full capabilities of the user who runs the, it perform the task and request the original DLL file as asked by the user so as not to arouse suspicion. With the help of fake DLL the attacker can now do whatever task he want which is under the capabilities of the fake DLL. Among the three above mentioned directories, the program directory and the system directory are most vulnerable as the location is predefined. But in the case of working directory this task is hard to perform as the directory is set by the program only and hence its directory is unknown to the user. Fig 6.2 dependency walker 6.2. WORKING OF ATTACK: This is where the social engineering skills come into play. The attacker tries to convince the user to open a simple file. This simple file can be a image too and can be located at any remote place like http://. Now the victim (in this case our user) tries to open that file (in this case the image) through a preinstalled software on his machine like a image viewer. Now this image viewer is vulnerable by the binary planting attack. Now the image viewer may require a DLL file to load dynamically. As the full path name gas not been specified before hand, image viewer will give instructions to Microsoft Windows to search for the required DLL file in a particular order. Directories in order: Working directory The system directory The 16-bit system directory Windows directory Current directory Directories which are listed in PATH environment variables Usually Current directory is the directory in which the image viewer file is stored. Now the attacker has control over one of the directories which windows search for, and hence he will be able to place a malicious copy of the dll in that directory. In such a case the application will load and run the malicious DLL without verification. And now the attacker has gained full control of the affected machine, and now he will be able to perform all the unwanted actions on the machine such as hack into the existing account, create a new account, access important files on specific directories and more. In such a case web securities like firewall has become an essential instrument to block and prevent the downloading of such malicious files from a remote network location. 6.3 TARGETS: The easiest and the most obvious targets for DLL spoofing are the machines running on windows. As here the registry has not been properly updated with a safe-search order for loading DLLs. The safe-search order is not an issue for the PCs running on XP as there are few infectious program and registries which point to fake DLLs or the DLLs which do not even exist. Such program or entries are the real cause of spoofing in the case of XP. Trojans, web caches and email are some of the ways in which codes are placed in the file system. Since obviously having a misconfigured programs or the search path does not mean that the machine will start running malicious code. As we know this breach is more harmful then the DLL spoof as ordinary user can easily place malicious file in the current folder like in Shared Documents. So when another user with privileged rights opens the document in the same directory, then this directory will become the Current Directory for the machine it will search for the DLLs before the system directory and hence allowing the ordinary user to operate the machine with privileged rights. Now one may ask that simply placing the DLL in the shared directory or a web cache will not allow it to be loaded, for the DLLs to be loaded they must be kept in either of system directory, the application directory or a path provided by the application that tries to load the DLL. So the answer is that being able to write to system and application file space already implies administrator privileges so there would be no need for DLL spoofing. Hence it arises the need of online security against the spoofing and accessing to administrator privileges. Now one may ask that simply placing the DLL in the shared directory or a web cache will not allow it to be loaded, for the DLLs to be loaded they must be kept in either of system directory, the application directory or a path provided by the application that tries to load the DLL. So the answer is that being able to write to system and application file space already implies administrator privileges so there would be no need for DLL spoofing. Hence arises the need of online security against the spoofing and accessing to administrator privileges. 6.4 PROTECTION: Microsoft Windows install auxiliary services like FTP server, telnet and web server which are not critical. If those services which are not needed by the administrator are removed then the threat is reduced at once. Microsoft, which we already know seems to have greatest problem with spoofing, tries to solve this problem using their Microsoft Authenticode Certificates. Well Microsoft needs to update DLLs continuously as outdated DLL could be dangerous in this world of hackers.Now the question arises that how we know that this DLLs are updated. Microsoft solved this problem with Microsoft 2000, by digitally signing the drivers by Windows Hardware Quality Lab(WHQL) tests. The drivers that passed were given a Microsoft digital signature. As mentioned earlier, in the present time this signing is done with Microsoft Authenticode Certificates. An authorized signer is used for these purpose which is known as thwarted. In present time many designers came up with a variety of tamper resistance. They concluded that even though a particular approach may seem effective, only Microsoft would have the resources, scope and platform control to make it practical . Here are two concepts which contain handling of drivers: Protected Path: Specifically known as PVP (Protected Video Path) and PUMA (Protected User Mode Audio). These are the mechanism used to support DRM (Digital Rights Management) rules about safe content presentations. Protected Environment: It is a kernel mechanism to ensure that kernel-mode drivers are safe for protected contents. These drivers should be signed by Microsoft and must implement specific security functions. All the kernel-mode drivers should be signed to ensure there safe origin and also that they are not tampered with. New mechanisms like OCP (Output Content Protection) are used in the versions after Windows Vista. Though at higher level OCPs Protected Path and Protected Environment make sense but it includes great complexity, management process and supporting infrastructure. Also implementation of OCP means device drivers get numerous new security responsibilities. Going back to DLL, a new complexity is revocation. Authorization is not useful unless it can be revoked when a compromise is discovered. For this Microsoft runs a revocation infrastructure that distributes a Microsoft Global Revocation List to identify no longer authorized driver software. Software revocation is problematic because of potential effect on users who may suddenly be unable to play content through no fault of their own. So revocation is likely to occur well, only after updates are distributed. So we have seen that after all the measures used by Microsoft, there is a long window of content vulnerability SECTION 7 IP SPOOFING 7.1 INTRODUCTION: IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the p