Wednesday, November 27, 2019

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

The three fundamental concepts of security are availability, integrity, and confidentiality. These concepts are commonly referred to as CIA or AIC triad which form the main role of any security program.Advertising We will write a custom essay sample on Identifying Potential Malicious Attacks, Threats, and Vulnerabilities specifically for you for only $16.05 $11/page Learn More Confidentiality prevents unauthorized disclosure of company’s data and ensures secrecy of the company’s data and information. Confidentiality should be maintained at all times while data is within the company’s network or during transmission through the network to its destination (Parikka 2007). Threat sources associated with confidentiality include network Monitoring, monitoring key strokes or screen, stealing of password files, social engineering. Countermeasures are encrypting data during storage and transmission by using network padding, employing strict ac cess control mechanisms and data classification, training personnel on proper procedures. Associated threat sources include viruses, logic bombs and backdoors. Countermeasures include strict access control, intrusion detection and hashing. Availability ensures reliability and accessibility to data and resources to authorized individuals, malicious attacks and threats. There is a set of mechanisms used by firewalls to protect networks from unauthorized access and allowing access to the authorized once. Below is a figure of a firewall.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The company has two working firewalls, threats associated with firewalls, as software, include penetration, i.e. hackers being able to get into the companies machines (Ludwig 1996). This may be a result of a misuse of the software (Firewall) where the firewall is configured or modified by a person who doesn†™t understand internet security or it is turned off. As a result of malfunctioning of the firewall viruses, trojan horses, or worms, may gain access to the network causing serious damage or loss of data and information. In addition, computers may also be destroyed in case of such attacks. Firewall may also develop bugs and flaws leading to its malfunction. Unauthorized deletion is yet another threat to the company’s network as there will be no control of access. It is thus very important that we ensure firewalls of the company are well configured and updated often. Windows 2008 Active Directory Domain Controllers (DC) – These are servers that control access to the network resources. Domain controllers work with computers with Windows NT Operating system. The company has two DC. One is the main or primary DC that controls access to the network resource and the secondary DC which acts as a reserve just incase the primary DC fails or assists the Primary DC when busy e.g . during heavy network traffic. The main threat associated with DC is Password cracking by hackers (Ludwig 1993). A hacker is any unauthorized person trying or having gained an access to the network resources.Advertising We will write a custom essay sample on Identifying Potential Malicious Attacks, Threats, and Vulnerabilities specifically for you for only $16.05 $11/page Learn More Hacking in to the company’s network can be prevented by changing of passwords often, using strong passwords that are not easy to guess and lastly by ensuring that the company hires employees that are loyal and can’t disclose passwords to strangers. Web / FTP server – This is an application (.html) running the File Transfer Protocol. FTP is the protocol in which files are transferred through the internet, it also provides file security. These threats can be prevented by proper configuration of routers and the IP protocol and by ensuring that the company has a secure Sockets Layer (SSL) which is a protocol that ensures secure transfer of data between Web browsers and Web servers. File server – This is a computer on a network responsible for providing a location for a shared file access or shared disk access, i.e. shared storage of computer files e.g. photographs, movies, documents etc. The three file servers in the company’s network face the likelihood of attacks from Viruses, Trojan horses or worms in case there is no firewall or it is malfunctioned, these elements may cause serious damage to the storage devices of the file servers, thus affecting shared disk access by other computers in the network. Exchange E-mail server – It works hand in hand with MS- Outlook. It enables users in a network to safely access communications like e-mail messages, instant messaging, and text messages from their devices such as desktops and mobile devices or Web browsers. Wireless access point (WAP) – Wireless application protocol is a secure specification providing instant communication access for users with wireless hand held devices such as mobile phones etc.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The company’s wireless access point (WAP) faces the threat of eavesdropping which may expose the company’s confidential data and / or information to unauthorized people. Eavesdropping can be prevented by encrypting data packets sent from one device to another. The company’s wireless access point (WAP) is vulnerable to attacks from viruses, Trojan horses or worms that may cause difficulty or lack of communication in the company leading to serious problems and loss. To prevent attacks to the company’s Wireless access point (WAP), the firewalls must be in good working condition at all times. Network Intrusion Detection System (NIDS) –This is a system that detects unauthorized access to the network. It does this by monitoring the network traffic for signs of malicious activities. The company’s NIDS faces threats, such as denial of service attack tools such as firewalls that can block the malicious elements, programs or persons trying to access t he company’s network and cause destruction to the computers, alter the organization of data files or cause loss of data files leading the company incurring huge losses. To prevent such attacks and threats security measure needs to be put in place like ensuring that firewalls are installed and are working efficiently (Gunn 1984). Desktop / Laptop computers – A computer is an electronic device that accepts user’s data as input, processes it using special programs to more meaningful state that can be understood by the user as output called information. Computers face threats such as theft. This can be prevented by hiring guards and by ensuring that the computer rooms are burglar proofed. VoIP telephone system – VoIP stands for Voice over Internet Protocol. It is a digital telephone service that uses the public Internet and private backbones for call transport. VoIP calls can originate and terminate from regular telephones since support for the public switche d telephone network (PSTN) is also provided. Through VoIP telephone system the company faces the threat of eavesdropping which may expose the company’s confidential data and / or information to unauthorized people, resulting into exposure of confidential data to strangers (Hancock 1998). Eavesdropping can be prevented by encryption of data packets sent from one device to another. Proper implementation of security control should be put in place and adhered to for the company to be safe from the above attacks, threats, and vulnerabilities. These problems continue to make computer based operations difficult and unless proper measures are taken this problem will persist now and in the future. References Gunn, J.B. (1984). Use of virus functions to provide a virtual APL interpreter under user control. ACM SIGAPL APL Quote Quad archive (ACM New York, NY, USA), 14(4), 163–168. Hancock, B (1998). Steps to a Successful Creation of a Corporate Threat Management Plan. Computer Fr aud Security, (7), 16-18. Ludwig, M. (1993). Computer Viruses, Artificial Life and Evolution. Tucson, Arizona: American Eagle Publications, Inc. Ludwig, M. (1996). The Little Black Book of Computer Viruses. Tucson, Arizona: American Eagle Publications, Inc Parikka, J. (2007). Digital Contagions. A Media Archaeology of Computer Viruses. Digital Formations. New York: Peter Lang. This essay on Identifying Potential Malicious Attacks, Threats, and Vulnerabilities was written and submitted by user Kingston I. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Saturday, November 23, 2019

Why are we learning US history

Why are we learning US history Introduction Currently, there are numerous demands from the desire to live in the present and focus on the future. This has resulted from the countless uncertainties that people are faced with. As a result, many students may fail to understand the importance of studying early American history at this point in time when they are supposed to be taught about current issues and how to cope with future contingencies (Holt 76).Advertising We will write a custom essay sample on Why are we learning US history? specifically for you for only $16.05 $11/page Learn More This has made many opt to go for science subjects whose purposes they believe are easy to discern. It has to be noted that history is very important; in fact indispensable. Nevertheless, it results are hardly tangible and may not be seen immediately like those of other subjects such as engineering. Learners ought to know that history is very essential not only to individuals but also to the entire societ y. Understanding the society By studying American history, students are able to understand people and the society well. It is by looking at the history of a specific society that one can be able to unravel the mystery of why the society behaves in a specific manner. There are numerous scientific laws that have been put forward in an attempt to explain human behavior. These laws have only been made to stand their grounds by being based on past experience hence underlining the importance of history (Holt 89). Most of the present students have been born at the time when America has already seen civilization. Consequently, it is very hard for such students to understand that technological innovation has a greater influence in the society. It is only by studying the history of the specific society that they can be able to systematically understand the evolution the society has undergone. It is hard for one to solve current problems without knowing the origin of the problem. For instance, to counter a problem such as alcoholism, people have gone to the extent of investigating how alcoholism has been in the past years. Through this, they have been able to learn variations in rate of alcoholism and factors that have contributed to the variations (Holt pp. 124-132). History has greatly contributed in solving the problem of alcoholism in the society. This is because researchers have managed to predict its trend based on the historical trends. Low voter turnout is a major problem that currently affects the American. It is only by looking at the history of the voter turnout that Americans can come up with a lasting solution to the problem. Consequently, by learning American history, students are in a better position of educating the society on the importance of turning out in large numbers for such events (Stearns 256).Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More They can base their arguments on some of the challenges that were later experienced after elections and attribute them to low voter turnout thus encouraging voters to participate in elections. With every American looking forward for a healthy political environment, this can only be achieved by revisiting the history of its politics, look at the various changes that have emerged and how they have contributed towards improving it or ruining it. Despite a contemporary analysis of the political environment helping in highlight some of the problems; it can not effectively bring out all the problems affecting the American politics. History has to be leveraged for this to be achieved. Moral understanding and sense of identity History contributes to moral understanding and creating a sense of identity. By studying American history, students are presented with varied complexities and dilemmas that past heroes and heroines came across in the past and how they coped with them. As a result, they become inspi red by them thus working towards improving their standards in bid to be improve their identity and be associated with the past heroes and heroines (Stearns pp. 260-263). It is through studying history that students can understand their background. This would help them identify with a specific lineage and learn how their families have coped with historical changes. History helps in creating good citizenship History is a vital subject towards bringing up loyal citizens. This is one of the major arguments that been used in supporting inclusion of the subject in curriculum. One can not love his or her country without first understanding the hardships it has gone through to reach where it is as well as how and why various institutions have been established. By understanding these, one can gauge his or her country with others, acknowledge the achievements made and look for ways to make it better thus becoming a loyal citizen (Stearns 258). Further, studying history helps one learn how pas t, present and future changes that shape citizens’ lives occur or may occur and the impacts they are likely to have. It is through studying the American history that students will be able to develop mental habits that are important for responsible social conduct. Conclusion It is evident that history is indispensable. For some of the scientific theories to be formulated they have to base their arguments on past historical facts. Consequently, learning the American history helps in understanding the social fabrics of the Americans, how the country has evolved and related with its neighbours thus facilitating in molding students to be loyal citizens in future.Advertising We will write a custom essay sample on Why are we learning US history? specifically for you for only $16.05 $11/page Learn More Holt, Thomas C. Thinking Historically: Narrative, Imagination, and Understanding. New York: College Entrance Examination Board, 1990. Stearns, Peter N. Meani ng over Memory: Recasting the Teaching of History and Culture. Chapel Hill, N.C.: University of North Carolina Press, 1993.

Thursday, November 21, 2019

Samsung electronics Research Paper Example | Topics and Well Written Essays - 1000 words

Samsung electronics - Research Paper Example Notably, the company was founded in the year 1938 as a trading company. Samsung has since been manufacturing many electronic components. Some of these include lithium-ion, chips, hard drive, flash memory, and semiconductors for its major clients including Sony, Apple, Nokia, and HTC. However, in the recent years, Samsung electronics has since diversified its services into consumer electronics. Currently, Samsung is known as the largest mobile phones and smart phones manufacturer. This latest shift sparked the popularity of Samsung electronics’ Samsung Galaxy (Michell, 2011). Other than the phones, Samsung electronics is also a major tablet computers vendor particularly the Android powered Samsung Galaxy tab. Samsung also manufactures personal computers for commercial purposes. The figure below shows how the prices of the Samsung Galaxy smart phones, Samsung Galaxy tabs and Samsung personal computers have changed in the last two years (Russell and Cohn, 2012). Opportunity cost refers to an activity a firm can undertake as an alternative to its current line of business. For Samsung, two such examples include the motor vehicle industry and home furniture industry. Samsung is considered a firm that produces very high quality products. Consumers have trust in their products. If the firm was to start manufacturing motor vehicles, the same quality would be transferred. This good quality comes at an affordable price. This would mean that even the average consumer would buy a high quality vehicle at an affordable price (Russell and Cohn, 2012). The same case applies to the production of home furniture. Consumers would be willing to pay for getting good service. One scarcity issue faced by Samsung is the overwhelming demand for its products. In the year 2000, it had to issue licenses to various production companies worldwide to manufacture their products under their name. It is very possible to get a Samsung electronic device made in China and a

Wednesday, November 20, 2019

Seizing Computers and Obtaining Electronic Evidence in Criminal Essay

Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations - Essay Example The plain view exception indicates that the search warrant holders should seize evidence in plain view. No warrant is needed to seize evidence that is in view. However, in computer devices, this is not applicable. Courts have generally held that law enforcers are entitled to search the entire computing device for evidence in the case of a crime. The law enforcers are encouraged to look for information in the entire device by reviewing every file in the computer. This is major because of the ease with which files in a computer can be camouflaged or hidden in different kinds of names and extensions. Assume that the courts in your jurisdiction are considering requiring a judicially approved ‘search protocol’ before a judge will sign a search warrant authorizing a search of any computer device. Computers can be used to manipulate evidence and make it difficult for authorities to obtain the required information to prosecute or find evidence. Even though law enforcers are allo wed to carry out a search warrant if the courts deem it fit to curtail their mandate they would be forced to oblige, but at the risk of losing vital evidence. If courts restrict searches of computer devices up to the point when a judicial approval is received, suspects can manipulate their devices and do away with what can be incriminating. However, if the judicial approval is needed before a search warrant, then the law enforcers should be allowed to have the devices in their possession to eliminate the risk of the accused tampering with the evidence.

Sunday, November 17, 2019

Project Closure Plan Essay Example | Topics and Well Written Essays - 2500 words

Project Closure Plan - Essay Example The quality of system should aim to exceed the expectations of clients 13 The paper is aimed at describing the process of system development project management study for a proposed system design for the Steers Restaurant management staff to ease the operation of the business process within the company. The Steers Restaurant is also licensed to cook, serve and deliver food products. The Steers Restaurant and its chain of food stores have increased the choice of consumers to eat food at their favorite food take out joints, mostly the Steers Restaurants. Steers Restaurant is based on a quality management practice and years of experience in dealing with home cooked food products and beverages. Steers Restaurant is a limited liability company started in 2003 with the objective of dealing in foods and beverages and its delivery to consumers in a quality fashion. The company was started by its directors, using their own savings. The company wants to deliver high quality service to its clients via complete devotion to work by its business personnel and board of directors. The long-term goals set by the business are to outrival their competitors in the food provision and delivery industry via edging itself out using technological platforms. As a result it has led to a one stop purchase and delivery point that requires the use of an online based system to manage both the clients and management staff to promote better and fast service delivery for the company. This project document will explain the various modules entailed in the project management life cycle for developing the proposed system. The contents will highlight on the project charter, project, management plan cope statement, work breakdown structure, communication strategy and the risk management plan. The project charter highlights on the key elements of the system that can be used to convince the stakeholders to accept the idea of the system.

Friday, November 15, 2019

Sense of Community Among University Students | Research

Sense of Community Among University Students | Research The study is primarily aimed at identifying level of sense of community among students who enrolled in the psychology and social work programmes at Universiti Malaysia Sabah, Kota Kinabalu. It was also carried out to investigate whether there were relationships between a sense of community and altruistic behaviour, academic achievement, age, and students involvement in club or organizational activities. One hundred and fifty one students participated in this study. A questionnaire that comprised of three sections was adapted and further developed to measure the schools sense of community, altruistic behaviour scale, and demographic background of the sample. In this study, membership, influence, integration and fulfillment of needs, and shared emotional connection as proposed by McMillan and Chavis (1986) are the subscales for the measurement of sense of community. Rushtons (1981) Self-Report Altruism Scale (SRAS) was used to measure altruistic behaviour. Furthermore, the study attemp ted to compare the level of sense of community between programmes, gender, ethnicity, and year of study. Age was the only variable found to be correlated with a sense of community. There was no difference found between any of those variables studied. INTRODUCTION The aim of this research was to analyse the university students sense of community, or their perception towards their school community, which focused on issues pertaining to how much the students perceive the bond between them and the school and its surroundings. Further, the study aimed at identifying whether or not their perception correlated with altruistic behaviour. The concept of a sense of community as popularly cited in the literature stemmed from Saransons (1974) idea concerning the perception of similarity to others, an acknowledged interdependence with others, a willingness to maintain this interdependence by giving to or doing for others what one expects from them, the feeling that one is part of a larger dependable and stable structure. Saranson (p. 157) further adds that the psychological sense of community is one of the major basis of self-definition. Charvat (2004) states that a sense of community is a complex phenomenon because of the fact that the definitions vary from one individual to the next, and from time to time. For example, the Child Development Project at the Development Studies Center in Oakland has defined a sense of community as the students experience of being a valued influential member of a group committed to everyones growth and welfare (Schaps, 1998). This concept has been expanded into theories. Among them, McMilla n and Chaviss (1986) is so far the most prominent and have been applied by most researchers. McMillan and Chavis (1986) define a sense of community as: . . . a feeling of belonging, a feeling that members matter to one another and to the group, and a shared faith that members needs will be met through their commitment to be together . . . (in Dalton et al., 2001, p.193) McMillan and Chavis (1986) proposed that a sense of community is comprised of four elements: membership, influence, integration and fulfillment of needs, and shared emotional connection. Further explanations on each element are as follows: Membership There are five attributes in the dimension of membership, i.e., boundaries, emotional safety, sense of belonging and identification with the community, common symbol system, and personal investment. Boundaries refer to the necessity of defining the qualities, such as members way of dressing, language, and rituals, and even shared goals, that include and exclude non-members. Hence, boundaries are not necessarily clearly or obscurely marked, but the definition can be loose or rigid depending on the communitys need to protect its intimate social connection (Wright, 2004). Emotional safety refers to the feelings of security which may involve self-disclosure and group acceptance (Dalton et al., 2001). A sense of belonging and identification with the community looks at the acceptance of being a member of the community. A common symbol system helps to define or indicate membership boundaries and to strengthen the sense of integration among members that could be physically identified or seen , such as wearing the same logo-printed shirts. A symbol is very significant to a community as Nisbet and Perrin (1977, p. 47) quote, . . . the symbol is the beginning of the social world . . ., which carries the identity of the particular group. Meanwhile, personal investment relates to the long-term commitment to a community, such as devotion of time to activities run by the alumni of a varsity. Influence According to McMillan and Chavis (1986), influence refers to mutuality of influence in group. This is explained by the bi-directional relationships in a community, whereby members of a group must feel empowered to have influence over what a group does, and group cohesiveness depends upon the group having some influence over its members (Wright, 2004). However, those who obviously try to dominate the group are often isolated, and the more cohesive the group is, the greater is its pressure for conformity. Integration and fulfillment of needs McMillan and Chavis (1986) explain this dimension in two related concepts: shared values and satisfying of needs, and exchange of resources. Members share values which tend to facilitate their interactions and their ability to meet each others needs simultaneously (Charvat, 2004). Needs are not only understood as survival and the likes, but also include what is desired and valued in a particular community (Dalton et al., 2001). Shared emotional connection This element is also explained by the existence of a spiritual bond that is based on a shared history among members of the community which could be in the form of behaviour, speech, or any other cues that may not be related to behaviour. McMillan and Chavis (1986, p. 14) summarised shared emotional connection as, the definitive element for the true community. Past studies have shown that having a sense of community has brought several positive outcomes, especially to the community members involved. Positive subjective perception of well-being and participatory problem-solving are among the positive outcomes (Davidson Cotter, 1993; Chavis Wandersman, 1990). Empirical studies on a schools sense of community have brought significant impact to students academic achievement and social development (Charvat, 2004). The students experience of school as a community was found to be associated with prosocial behaviors, including concern for others, altruistic behaviour, and positive interpersonal behaviour, as well as democratic values, skill, and desire, and achievement motivation (Battistich, 2001; Schaps Lewis, 1999). From a review of 15 years of research in elementary schools, Charvat (2004) found positive correlations between a schools sense of community and good outcomes for both students and teachers. He added that students who feel a strong school sense of community tend to have more positive attitudes towards school and learning higher educational aspirations, greater trust in and respect for teachers, more prosocial attitude and better social skills. This is also related to teacher attitudes and the perception of school climate. These findings were similar to that of Solomon et al.s (2000) which suggested that teacher practices that emphasizes prosocial values, elicitation of student thinking and expression of ideas, encouragement of cooperation, warmth and supportiveness, and reduced use of extrinsic control, were related to student classroom behaviour. Such behaviour includes engagement, influence, and positive behaviour, which, in turn, were related to students sense of community (see also Schulte et al., 2003). Research on a sense of community has also been expanded to include a broad range of demographic characteristics. It was reported that a schools sense of community was associated with those who live in the campus, among students in private schools, those out of state, seniors, and females (Lounsbury DeNeui, 1995). Other findings reported that the people who came from small-sized campus and suburban area feel a stronger sense of community. In a more recent study, Fraering and Minor (2006) for example, have found that there was a positive relationship between age and a perceived sense of community among customers of financial services firms, and men perceive a greater sense of community than women. Research addressing such issues on a sense of community in Malaysia is still at its infancy. Measuring unity among ethnic groups in Malaysia and efforts in building up as well as promoting national identity perhaps are among studies that the authors can recall to have some connections to the study of sense of community. Looking at how important a sense of community can be in promoting students well being and development, prompted the undertaking of this research project. For a start, the authors use the sample from their school. Objectives of Research To identify the sense of community by various socio-demographic background. To identify the correlation between frequency of students involvement in clubs or organization run at school level such as academic achievement, age, and altruistic behaviour. Hypotheses 1. There is significant difference between sense of community with ethnic group, type of programme, and years of study. 2. There is significant relationship between sense of community with age group, involvement in school, academic achievement, and altruistic behaviour. METHODOLOGY Subjects One hundred and fifty one students from the School of Psychology and Social Work participated in the study. They were picked at random from each programme that comprised of 52 juniors, 61 sophomores, and 38 seniors. Design, Tools, and Measurement The study was designed in survey form. A set of questionnaires comprising of 3 sections was developed and adapted from original sources. Section A measures socio-demographic variables, Section B measures Sense of Community Scale (SOCS) which was adapted from McMillan and Chavis (1986). There are four subscales measured in SOCS as proposed by McMillan and Chavis (1986). While to measure altruistic behaviour in Section C, Rushtons (1981) Self-Report Altruism Scale (SRAS) was used. For SOCS, 40 items were developed, while SRAS contained 20 items. Both scales were measured through a four- and five-point Likert scales. Cronbach Alpha for both scales ranged between 0.82 and 0.89, indicating that they were highly reliable to be used in the context of this study. In terms of validity, subscales of SOCS significantly correlate to one another and to the whole scale. As for SRAS, it was used before by local researchers in a similar context of this study, and it was found to be valid. Procedure Questionnaires were administered to the subjects who were picked randomly from each programme with the help of fellow lecturers. They were allowed 15 to 20 minutes to answer the questionnaires. Data analysis To test the hypotheses, data were then analysed by one-way ANOVA and Pearsons correlation. Descriptive statistics were applied to see the distribution of the sample. RESULTS Background of sample Descriptive analyses indicated 67 males and 84 females participated in the study that comprised of 34.4 percent of first year students, 40.4 percent second year students, and 25.2 percent third year students. A total of 23.2 percent of them enrolled in the programme for Youth and Community Development, 20.5 percent in Industry and Organizational Psychology, 13.9 percent in Counseling Psychology, 19.2 percent in Child and Family Psychology, and 23.2 percent in Social Work Programme. The mean age of the subjects was 22.01 years. More than 60 percent identified themselves as Malay, 9.9 percent Chinese, 11.9 percent Kadazandusun, 4.6 percent Bajau and Pribumi of Sarawak respectively, and others, 5.3 percent. More than half of the subjects were members of clubs and organizations that were based in the campus, with about 40 percent holding position as committee members of the organizations or clubs. Almost 80 percent have been involved at least two times in activities run by the School. Mo st of the students stayed in hostels in the campus. In terms of academic achievement, the subjects can be categorized into three groups. A total of 22 percent are high achievers (with CGPA score of 3.00 and above), 57.3 percent moderate, and 20.7 percent low achievers. The mean score of SOCS was 120.09, indicating the subjects were in the category of moderately high. Table 1 presents some of the socio-demographic data of the samples. Hypotheses Testing Results The Pearson product moment correlation analyses showed no significant inter-correlation between a sense of community, altruism, involvement in school or programme activities, and academic achievement. Age was the only variable correlated significantly with a sense of community (r = 0.23, p Meanwhile, further analyses showed that there were no differences in the sense of community according to students year of study, type of programme, and ethnicity. Table 3 summarises the result of one-way ANOVA, while t-test analyses indicated that female and male subjects did not differ in a sense of community. Table 1: Socio-demographic background of the subjects __________________________________________________________________ Variables N % ______________________________________________________________________ Gender Male 67 44.4 Female 84 55.6 Ethnicity Malay 95 62.9 Chinese 12 7.9 Kadazandusun 18 11.9 Bajau 7 4.6 Pribumi of Sarawak 4 2.6 India 7 4.6 Others 8 5.3 Types of programme Youth and Community Development 35 23.2 Industry and Organisation Psychology 31 20.5 Counseling Psychology 21 13.9 Child and Family Psychology 29 19.2 Social Work 35 23.2 Year of study 1 52 34.4 2 61 40.4 3 38 25.2 ______________________________________________________________________ Table 2: Correlation results between academic achievement, year of study, age, and involvement in school or programme activities, altruism, and sense of community ______________________________________________________________________ Sense of community (r value) __________________________________________________________ Altruism à ¢Ã‹â€ Ã¢â‚¬â„¢ .08 Academic achievement .14 Age 0.23* Involvement in school activities 0.10 ______________________________________________________________________ *p Table 3: Mean differences in sense of community in terms of ethnicity, types of programme, and year of study ______________________________________________________________________ Variables Sum of Squares Mean of Square df F Sig. ______________________________________________________________________ Ethnicity Between group 2520.82 420.14 6 0.51 0.80 Within group 95723.20 818.15 117 Types of programme Between group 699.40 174.85 4 1.23 0.30 Within group 15059.52 142.07 106 Year of study Between group 703.26 351.63 2 2.52 0.09 Within group 15055.66 139.40 108 ______________________________________________________________________ DISCUSSION The findings showed that there was no difference in the sense of community between year of study, ethnicity, and type of programme. It was also found that students involvement in clubs or organizations, academic achievement, and altruism did not correlate with a sense of community. These results contradicted previous findings. The mean for SOCS was in moderately high group, suggesting that it was not strong enough to have connections to other possible phenomena, such as in this case, the academic achievement and altruistic behaviour, as much as for the socio-demographic variables to have some impact on differences of mean in SOCS. In other words, these findings indicated that the students sense of community could be promoted by other socio-demographic factors that were not studied here. Only age was found to be correlated with a sense of community. The older the students are, the more they felt attached to the school. Older students normally consisted of those who have faced difficulties in getting a place in a higher learning institution. They might have worked for a while and have experienced repeating national school examinations (referring to the Malaysian Certificate of Education and Higher School Certificate) and competed with other candidates who might have much better grades than they had to enter the university. Once they have the opportunity to enter university, they will make use of it and gain as much advantage as possible to enhance their academic and social development. These students are normally selected or elected as leaders, or at least take part seriously in school clubs or organizations, which inevitably contribute to the building of the schools sense of community. This study was only a beginning for the authors to understand the nature or level of sense of community among their own students. There are several limitations to this study. The results are applicable only to this sample. Hence, the findings are not expected to be generalized. Future studies are warranted to extend the findings to a larger scale, and to students in different disciplines. Secondly, this study only examined the relationship between a sense of community and altruistic behaviour, and differences among a few socio-demographic variables. For future studies, the authors also suggested that researchers examine causal relationship between variables. Perhaps, a longitudinal study could also be conducted to determine whether a sense of community is associated with time change. More studies are still needed to understand this phenomenon better, as community is not stagnant, and will always evolve. ACKNOWLEDGEMENT A preliminary draft of this paper was edited by Fadzilah Majid Cooke of the School of Social Sciences, Universiti Malaysia Sabah.

Tuesday, November 12, 2019

Youth culture

There is a distinctive kind of expression by which young people demonstrate which is generally different from the accepted culture of their community. These methods by which the youth express themselves and communicate are known as youth culture. (Wikipedia). It is said that young people have their own subculture that is unique to themselves. This was believed to have started because of the economic and political climate that was most dominant during the 20th century, after World War II (Wikipedia).Today’s youth are not entirely dependent on their parents for their knowledge and opinions. They have become more independent as time goes on. There are many changes that   they undergo and it takes extra effort to really understand all of their behavior (Taylor, Carl 2003). In most of the social problems encountered by today’s young adults, the critical factor is the role of parents and educational institutions in forming, molding and strengthening of children and young ad ults’ values.   This is best captured in one of the reflections given by a father in his encounter with his children. Just listening to his children, looking them in the eye, and getting himself into their minds and hearts establish a strong relationship of care and trust and openness. This paper maintains that smoking must be legalized at age 21, just as in drinking.Media’s influenceCigarettes are the most heavily advertised consumer product. Every year, tobacco  Ã‚  Ã‚   companies spend nearly $4 billion on cigarette advertising and promotion in the United States alone according to The Economist, published in May 16, 1992. Add to this the fact that young people rely on their peers for approval. When they do not feel that they belong, research sees the specific influence of family difficulties on adolescent depression that has been made linking it with smoking more and more cigarettes.The study was based on the clinical data summaries of children and adolescents w ho attended the Maudsley Hospital during the 1970s and 1980s. The study concluded that although depression is the largest single risk factor for teenage deviance such as smoking of cigarettes, family relationship difficulties make a significant independent contribution to this risk (Hollis, C. 1996). Thus, smoking cigarettes can be an outlet for these people who are of age to decide on their future.Psychology in raising the youthIn raising teens, Covey (1999, 100) highlights the importance of being sensitive to the tendency of the youth to reject. According to him, this tendency of teenagers comes from their fear of being rejected. Their rejection experiences make them â€Å"pull back into a kind of shell to protect themselves from being rejected again.† This could be aggravated by parents who refuse to look honestly at what their children are doing; even denying that there is a problem, making excuses for their child, or blaming the school, teachers, family, friends, or soci ety.   â€Å"Fixing† the child’s problems by giving in to demands, justifying rebelliousness is just a normal part of adolescence. Compromising the parents’ own values just to keep the peace at home or maintain a veneer of harmony is not an uncommon solution. If and when the worst situation comes up, the decision to intervene remains with the parents and not with the juvenile justice system.  Yet, parents are often at a loss on what best to do.Sensitive yearsAnother possible cause why more teenagers are smoking now is because adolescence is the transitional stage of development between childhood and full adulthood,   representing the period of time during which a person is biologically adult but emotionally not at full maturity. The ages which are considered to be part of adolescence vary by culture. In the United States, adolescence is generally considered to begin around age 13, and end around 24.   Adolescence can be a scary time, full of angst and ne w emotions.   It is also a time when the tremendous amount of energy of young people can contribute to many worthwhile projects.   The more parents and teachers can do to engage teenagers, the more likely it is that young people will have a successful transition to adulthood. Adolescence is a time of emotional turmoil, mood liability, gloomy introspection, great drama and heightened sensitivity. It is a time of rebellion and behavioral experimentation.Taylor (2003)   continues in his journal about the youth culture today that it is important that people realize that the youth must be also be equated with positive values instead of the stereotyped association of urban youth with criminality and juvenile delinquency. This is important so as not to establish a self-fulfilling prophecy about this.In most of the social problems encountered by today’s young adults, the critical factor is the role of parents and educational institutions in forming, molding and strengthening of children and young adults’ values.   This is best captured in one of the reflections given by a father in his encounter with his children. Just listening to his children, looking them in the eye, and getting oneself into their minds and hearts establish a strong relationship of care and trust and openness.In raising teens, Covey (1999, 100) highlights the importance of being sensitive to the tendency of the youth to reject. According to him, this tendency of teenagers comes from their fear of being rejected. Their rejection experiences make them â€Å"pull back into a kind of shell to protect themselves from being rejected again.† This could be aggravated by parents who refuse to look honestly at what their children are doing; even denying that there is a problem, making excuses for their child, or blaming the school, teachers, family, friends, or society.â€Å"Fixing† the child’s problems by giving in to demands, justifying rebelliousness is just a no rmal part of adolescence. Compromising the parents’ own values just to keep the peace at home or maintain a veneer of harmony is not an uncommon solution. If and when the worst situation comes up, the decision to intervene remains with the parents and not with the juvenile justice system.  Yet, parents are often at a loss on what best to do. All too often, parents seek counsels from all who could give professional, religious and forms of advice.They meet with their children’s teachers, and consult doctors, ministers or other respected adults or experts.   But solutions remain elusive as problems arise due to lack of cooperation, resistance or sheer evasiveness of the child. These results in more tension-filled homes making those affected withdrawn and torn as their own parents.  Separation and divorce become handy devises for parents. Adolescents are particularly vulnerable to the effects of stress as adolescence is in itself a complex developmental stage. Smokin g will provide a good alternative instead of possessing guns.  Besides there are a lot of factors that underscore the fact that the role of the family in providing a cushion for young people as they go through their adolescence. Resilience in youth can be built to create a positive mental health by the families and friends to which they belong. (Taylor, Carl 2003).Often, several youth cliques with similar norms and values coalesce into larger. More loosely organized aggregations. Not only do cliques permit adolescents to express their values and try out new roles as they begin their quest to forge an identity apart from their families, but they also pave the way for the establishment of other mature relationships (Brown, 1990).ConclusionYoung people today are defining themselves through hip-hop culture, new breeds of alternative music and a host of other methods. (Taylor, Carl 2003). Dr. Wharton eloquently deemed it â€Å"tribalism† and the young followers of today’s musical genres, whether they are devotees of Marilyn Manson or Marshall Mathers, The failure of generations of parents and other adults to attempt to understand and communicate with young people has lead to countless incidents of suffering throughout communities.Legalizing smoking may help youth in that delicate transition stage and even make him aware of the benefits of healthy living and make more firm resolutions for life. We must ask ourselves how many unfortunate circumstances and situations might have not occurred had the proper interventions been used with a young person throughout the years. Today we have the opportunity to begin a new method of thinking and engaging our young, for the betterment of our society and ourselves (Taylor, Carl 2003).WORKS CITEDCovey, Stephen R. Living the 7 Habits. (1999)Taylor, Carl. â€Å"Understanding Youth Culture.† Journal of Urban Youth Culture Introductory Editorial. February 2003Trends in Child Databank. (April 2005)   Retrieved Feb. 6, 2007 at: www.childstrenddatabank.orgâ€Å"Youth Culture.† Wikipedia Retrieved Feb. 6, 2007 at: http://en.wikipedia.org/wiki/Youth_culture

Sunday, November 10, 2019

How Does Browning Tell the Story in the Laboratory? Essay

Robert Browning’s poem â€Å"The Laboratory† is set in France before the French Revolution. The dramatic monologue is about the narrator herself and her plotting of revenge against her previous lover and his current mistress and it tells the reader how she plans on doing so. She believes her actions in the story are justified and reasonable. In the poem, the story’s tone is established with the setting, which also helps create vivid imagery for the readers, making it easier to put into context and understand. Browning uses the title to set the scene for the story, as â€Å"The Laboratory† is a place where scientific experiments take place. But oddly, in the poem it’s a place the narrator uses to tell her feelings and plot revenge. The poem is set around the time before the French revolution, which is indicated from the subtitle, â€Å"ancient regime† which was at a time of internal conflicts and civil wars, showing that it was at a violent time, which could be linked to why the narrator took such drastic measures. Furthermore, perhaps she felt more confident in committing such a crime because a single murder would be insignificant and probably â€Å"brushed under the carpet† in the context of the war period. The poem is situated mainly around the place in which the apothecary is working, where he is making the poison that will be used to kill the narrator’s adversary. The narrator is close by the apothecary, whilst he is making the poison as she watches it, â€Å"curling whitely†, showing she wants to be involved in the preparations and see it come together. This reveals a more menacing aspect behind her character. The rhyme scheme is regular, with an ABAC structure that makes each short stanza playful until the dramatic break in the last line. The voice of the narrator is delightfully captured, and we see that this woman is revitalised by more than just revenge; she is invigorated by the power that murder allows her to have. This is significant, as she may not have had very much power being a woman in those times. However, because she is able to purchase such an ominous potion, we may consider that she is actually an upper-class  lady. There are differing theories on the narrator’s social status. When she first mentions her untruthful beloved, she only mentions one woman, but a few stanzas later; she mentions both â€Å"Pauline† and â€Å"Elise† as targets. She is already being taken away with the potential to kill. While the rhyme scheme is regular, the enjambments stress that she is willing to lose a bit of control, letting this desire take over her. Additionally, if winning her husband or lover back were the only goal, she would perhaps not take so much joy in the prospect of causing painful death to the ladies and ethical torment to him. Her intense focus on the ingredients further confirms the elation she feels at suddenly giving herself over to this malice. That this scheme will cost the narrator her â€Å"whole fortune† only validates the choice. We get the sense that she will be forever defined by this act. In closing with â€Å"next moment I dance at the King’s,† the poem implies her intent to carry herself as a woman who has accomplished a great deed. Alternately, we can interpret her as being a prostitute and fearing public humiliation. Psychologically, her resentment could be motivated by class expectations. She considers herself a â€Å"minion,† which might be interpreted as a lady-in-waiting or some low-level servant, whereas her competitors are not as low in the social ladder. That her beloved is involved with them and that both expect that the speaker is grieving away in an â€Å"empty church† is the worst offence. She is considered less worthy than them, which only strengthens her resolve to demonstrate her superiority through the murder. One could argue that the speaker has never actually been involved with her beloved, since she gives no direct proof of a relationship. Further, as her lover and competitors all know that she is aware of the affair, it is possible that they do not even know they are offending her in any way. There is also, in the â€Å"empty church† line, the slightest indication that perhaps she was seeking guidance from God and she was commanded to murder her; similar to the story of Abraham in the Bible when God commands him to kill his son. Much can be drawn from Browning’s masterful subtly. Finally, sexuality is presented in this poem as something capable of great horror. In the same way that the bright, pretty poison will ultimately cause painful death, so does the allure of sexuality have a dark side. Sexuality is certainly behind whatever actions have led this woman to the apothecary, but it is important to keep in mind her willingness to use it on the apothecary in the final stanza, when she tells him, â€Å"You may kiss me, old man, on my mouth if you will!† Perhaps this poem should not be taken as a moral message but rather read it as his uses of values, which also surround their opposite. What drives men and women to celebrate life, or start it, can also cause that life to end.

Friday, November 8, 2019

How to Write a Research Paper

How to Write a Research Paper How to Write a Research Paper How to Write a Research Paper A research paper is not an essay that presents your own interpretation of evaluation of the argument.   While writing a research   paper, you need to integrate your personal knowledge and thoughts on specific problem with the secondary publications.   The initial aim of research paper writing is to gather enough information on specific case and critically assess it.   Thus, while writing a research paper you use your own thoughts and ideas, but also try to find out what experts know or say about the problem. Research paper writing is about locating the best possible information in the field of your investigation. The main point of the research paper writing is to learn more about a topic. Research paper writing requires refined research skills to write what you have learned in an organized, readable form. Writing a research paper involves reading what scholars and critics have said about a particular topic and evaluating it. Research Paper Writing Research paper is an individual study.  The success of the research paper depends on how well the student can conduct research, analyze and organize the information and present it clearly in a written form. Your essay may focus on analysis of the topic and its solutions, from both historical and current perspectives for example. You can take a stand on the topic and defend it against opposing points of view. Thus, your research paper should present arguments for and against. Research Paper Ideas First, you need to define a good research paper topic. Choose a topic which interests and challenges you, the one which is not widely discussed, the one which is thoroughly researched.   Second, find information, arrange your ideas and make outline. Once you know what you want to talk about and you have written your thesis statement, you're ready to write body of your research paper. While writing the central part of your research paper, keep thesis statement in mind and avoid presenting irrelevant information.   For example, if your topic is abortion legislation, avoid touching moral side of abortion issue because it is not relevant to your initial purpose of research paper writing.   All ideas should be supported with examples and evidence. It is very important to reference many articles to lead your reader through your ideas. Add linking sentences between the paragraphs and develop ideas either chronologically or thematically. There can be many different conclusions to the s ame research paper depending on who your readers are and where you want to direct them. The last task is proofreading. Check carefully spelling, grammar, sentence structure, punctuation. Custom Written Research Papers Why to order custom written research paper?   First, guarantees 100% plagiarism free essay delivery.   Second, we provide free plagiarism report.   Third, we are never late with research paper delivery.   Forth, our writers are educated and experienced, there is no topic we cannot research. Fifth, you can request unlimited number of revisions.   Place an order and get 100% plagiarism free custom written research paper prior to deadline!

Wednesday, November 6, 2019

Saying Could in Spanish Using Poder and Other Verbs

Saying Could in Spanish Using Poder and Other Verbs Although the English auxiliary verb could is typically thought of as the past tense of the verb can, it shouldnt always be translated to Spanish as a past tense of poder. Could usually can be translated as a form of poder (a verb typically meaning to be able), however. Following are some of the common ways that could is used in English and various ways the idea can be expressed in Spanish. Translating Could When It Means Was Able or Were Able Usually, you can use the preterite tense of poder if youre talking about a one-time event or a specific period in time, but the imperfect tense should be used if youre talking about an indefinite period. The miner couldnt leave the tunnel. El minero no pudo salir del tà ºnel. (The sentence refers to an ability that existed at a particular and limited time, so the preterite is used.)I couldnt leave the city more than once a year. Yo no podà ­a salir de la ciudad ms que una vez por aà ±o. (The sentence refers to a ability that existed over an indefiite time, so the imperfect is used.)We could always count on him for advice. Siempre podà ­amos contar con à ©l para sugerencias.After five hours I could finally do it. Despuà ©s de cinco horas por fin pude hacerlo.I thought I could do it better. Pensà © que yo podà ­a hacerlo mejor.Couldnt you see the solar eclipse?  ¿No pudiste ver el eclipse solar? Although the distinction isnt always a clear one, if by saying was able or were able you mean knew how to, the verb saber is often preferable, usually in the imperfect tense: Obviously, he thought I could drive. Obviamente, à ©l creà ­a que yo sabà ­a manejar.We could make fantastic sand castles. Sabà ­amos construir fantsticos castillos de arena. Translating Could as a Suggestion or Request In English we often use could as a substitute for can in order to be polite or to soften the tone of what were saying. You can do much the same thing in Spanish by using the conditional tense of poder, although often the present tense works just as well. For example, to say, You could come with me to fish for trout, you could say either Puedes ir conmigo a pescar truchas or Podrà ­as ir conmigo a pescar truchas. Translating Expressions Such as If I Could Expressions such as if I could usually use the imperfect subjunctive: If I could turn back time, I wouldnt have answered the telephone. Si yo pudiera regresar el tiempo, no habrà ­a contestado el telà ©fono.If he could eat cake instead of vegetables he would be very happy. Si à ©l pudiera comer el postre en vez de vegetales à ©l serà ­a muy feliz.If we could see it, we would buy it. Si pudià ©ramos verlo, lo comprarà ­amos. Discussing What Could Have Been A common way of saying that something could have been, but wasnt, is to use the preterite of poder followed by haber. If something might have occurred over an indefinite time, the imperfect might also be used. It could have been worse. Pudo haber sido peor.The team could have been much more aggressive. El equipo pudo haber sido mucho ms agresivo.With more time, we could have eliminated more of the mistakes. Con ms tiempo, pudià ©ramos haber eliminado algunos ms de los errores.They could have saved my son. Podà ­an haber a mi hijo. Translating Could in Expressions of Possibility Various expressions of possibility can often be used to translate could when it means that something is possible. Often the present tense of poder can be used as well. One way to translate sentences using could in that way is to think of an alternative way of expressing the idea in English, and then translating to Spanish. The following translations arent the only ones possible: They could be the same person. Es posible que sean las mismas personas. (Literally, it is possible that they are the same persons.)It could be my imagination. Posiblemente sea mi imaginacià ³n. (Literally, it is possible that it is my imagination.)I could leave now. Ahora puedo salir. (Literally, I can leave now.)If we want to, we could take a walk through the city. Si queremos, podemos dar un paseo por la ciudad. (Literally, if we want to, we can take a walk through the city.)

Sunday, November 3, 2019

Cold War Era and the Threats to American Families Essay

Cold War Era and the Threats to American Families - Essay Example For instance, when Cuba fell to Fidel Castro in 1959, they immediately got aid and support from the U.S.S.R.[Shermen, 2004, p. 17]. Likewise with a wide range of nations. In general, the Cold War became a situation where both the US and the USSR continued to expand their interests internationally, and in turn, grew their military power. Included in the growth of the military, was the expansion of nuclear arms. A nuclear bomb was first used by the US on Japan in the Second World War, and its effectiveness became the catalyst for developing these types of bombs in both the US and the USSR. The Cold War was thus synonymous with the 'arms race' [Westad, 2000, p. 207], which would eventually bankrupt the USSR. Explain the specific threats to American citizens. The US lived under the threat of nuclear bombs. These were not just in the USSR, but during that era, were the cargo for bombers constantly circling the world and also, located in allies of the USSR like Cuba. Thus, the US was under threat of being bombed and to a lesser extent, they felt they were under an ideological threat. One of the aspects of the Cold War, was the general fear that communism was expanding and within the US too.

Friday, November 1, 2019

Human Resources Management Research Paper Example | Topics and Well Written Essays - 3000 words

Human Resources Management - Research Paper Example Diverse workers are more like to indulge into dysfunctional interpersonal conflicts for the same reasons. In organizations with diverse workforce, human resource management frequently encounters the challenge of groupism and polarization. Workers belonging to the same community or those that can identify with one another because of a common basis or interest tend to have their own preferences and criteria that are different from those of the rest. In a vast majority of cases, this tendency of the diverse workforce functions against the interests of the organization as a whole. Such moves by the workers also distract others from taking the necessary measures to obtain the goals that are valued by the organization as others tend to be defensive and protect their own interests. This makes maintaining discipline in such an organization very difficult for the human resources management. In an organization with a diverse workforce, the organizational culture is so complicated that it is of ten very difficult to reach decisions with mutual consensus. Decision making is complicated substantially that leads to poor productivity and eventually lesser profitability of the organization. ... Racial polarization at the workplace can have dangerous implications on the organization. For example, one issue that racial polarization can pose for the recruitment is fair judgment of the skills of the candidates. In organizations with a diverse workforce, a monopoly commonly exists. Employees tend to be biased toward workers belonging to them because of one or more of these factors; race, ethnicity, nationality, culture, and religion. An organization needs highly talented workers in order to progress in the present increasingly competitive market. If the preference of the recruiters is to hire workers that they can identify with because of any of the aforementioned factors rather than skills, talent, and competencies of the candidates, it may have many negative implications for the organization as a whole. Sexual harassment Sexual harassment of workers is a potential issue in organizations that have a diverse workforce with respect to gender. Workers of one gender tend to be sexu ally offensive toward their colleagues, subordinates, and even bosses belonging to the other gender. Offense is made in a variety of forms ranging from inappropriate behavior, abuse, bullying, to proposal of sex. Most of the times, workers who are victimized are in a compromising position either because they lack the courage to bring the issue into the attention of the concerned authorities or they have no hope of getting justice. Many workers feel the risk of losing their jobs if they do not grant sexual favors to their seniors. Sexual harassment is tiring and stressful for the workers emotionally, physically, and psychologically. Sexual harassment is traumatic in effect