Wednesday, July 31, 2019

Smart Phone

Smartphone Security Survey of U. S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute © Research Report Smartphone Security Survey of U. S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones.In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above.We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure such sensitive information. We also recommend that security policies state these precautions and ensure they are enforced. Following are the most salient research highlights: ?Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of business and personal usage means much more sensitive and confidential data is at risk and suggests that the smartphone is with them most of the time. Sixty-six percent admit they keep a moderate or significant amount of personal data on their smartphones. Such personal data include email address, name, contact lists, photos, videos, anniversary and personal dates, music, Sixty-seven percent of consumers surveyed say they are concerned about receiving marketing ads and promotions.However, less than half (44 percent) are concerned about having a virus attack on their smartphone when it is connected to an insecure Internet network. In addition to using it as a phone, 89 percent use their smartphone for personal email and 82 percent use it for business email. A smaller percentage of consumers use their smartphones for financial transactions including payments. In fact, 38 percent of consumers use the smartphone to make payments and 14 percent use it for banking. Sixty-six percent of consumers have paid at least once for an item using their smartphone.In addition, 12 percent of consumers say they have experienced a f raud attempt vis-a-vis a mobile payment scheme. Despite this fact, only six percent say they check their mobile bill or statement every month and eight percent check the statement when the bill is higher than usual. Fifty-eight percent of consumers say that based on how they used the smartphone for purchases, Internet browsing and location they were targeted by marketers. Accordingly, 67 percent say they are very concerned or concerned about aggressive or abusive marketing practices. ? ? ? ? ? Ponemon Institute © Research Report Page 1 ?Despite security risks, less than half of consumers use keypad locks or passwords to secure their smartphones. In addition, only 29 percent of consumers said they have considered installing an anti-virus product to protect their smartphone. Forty-two percent of consumers who use social networking apps say they allow smartphone versions of well-known social networking applications such as Facebook to access the same key chains, passwords and log-ins that they use of their desktops, laptops or tablet. Only 10 percent of consumers say they turn off Bluetooth â€Å"discoverable† status on their smartphone when not in use. ? ?Ponemon Institute © Research Report Page 2 Part 2. Key Findings In this report we have organized the findings from the study according to the following topics: Consumers’ use of smartphones, consumers’ awareness about the security risks that accompany their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are not managing these risks. Consumers’ use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 percent use it for personal but some business use (Bar Chart 1).Only 6 percent of consumers surveyed use their smartphone exclusively for business. Bar Chart 1. What best describes your smartphone use? Both busine ss and personal use equally 40% Mostly personal but some business use 25% Personal use only 16% Mostly business but some personal use 13% Business use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in Bar Chart 2, 35 percent say they purchased it without any reimbursement.Bar Chart 2: Who purchased your smartphone and who pays the monthly service fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute © Research Report Page 3 Smartphones can perform a wide range of tasks. However, the most popular use next to the phone is business and personal emailing.The mo st popular smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to music (Bar Chart 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding may indicate why many in our study are not concerned about the security risks. Because consumers believe its primary use is as a phone or to email they may think (incorrectly) that there are negligible security or privacy risks.Bar Chart 3: Tasks that consumers do on their smartphone Phone Personal email Business email Address book Texting Store or move data Internet browsing Obtain documents Calendar View documents Listen to music Schedule tasks Shop Camera Social networking 0% 20% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% 100% 120% As reported in Bar Chart 4, 66 percent have paid for an item via their smartphone once, irregularly (once every two months) or regularly (maybe once a month). Fifty-one percent were surprised that they were charged for a service of product they signed up for.Bar Chart 4: Key questions about smartphone use Each bar defines the percentage yes response Did you ever pay for an item via the mobile phone? Did you every sign-up for a service or product on a mobile without realizing that there would be a cost? Have you ever signed a terms and conditions request on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute © Research Report Page 4 Consumers store confidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a significant amount of personal data.Bar Chart 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar Chart 5: How much p ersonal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned future purchases, purchase history, health data and security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6: What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary & personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% 100% 120% Ponemon Institute © Research Report Page 5 Many consumers surveyed have used email and text to sign u p for services or products without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent made what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7: The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website Other 12% 34% 31% 46% Despite these unexpected charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills every month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8: Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it every month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not certain. Ponemon Institute © Research ReportPage 6 Consumers’ awareness about the security risks that accompany their use of smartphones Marketing messages—not privacy and security risks—worry consumers. While the majority of consumers do not feel their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unwanted marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9: Attributions about privacy and security risks The agree response is a combination of strongly agree and agree.The disagree response is the sum of unsure, disagree and stro ngly disagree. I worry more about the security of my desktop or laptop computer than my smartphone. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a hacker will attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone while traveling. I do not worry about being tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% Agree Disagree They also worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the surv ey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are aware that what is described in the scenario could happen to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios: 1. Location data embedded onto image files can result in the tracking of the smartphone user. 2. Smartphone apps can transmit confidential payment information (i. e. credit card details) without the user’s knowledge or consent. Ponemon Institute © Research Report Page 7 3.Smartphones can be infected by specialized malware called â€Å"diallerware† that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. 5. Financial apps for smartphones can be infe cted with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. . A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet through a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain basic security protections that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based o n how the phone is used for purchases, Internet browsing and location. As a result, the user may receive unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers’ level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local WIFI network is insecure (35 percent). Bar Chart 10: Are you aware of the following smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Jailbreaking Spyware Social network snafu Auto transmission Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 4 0% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute © Research Report Page 8 Bar Chart 11 reports consumers’ actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk – wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11: Have any of these situations happened to you? Each bar defines the combined very concerned and concerned responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers’ level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very concerned or co ncerned about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12: Are you concerned about of the following smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware Unwanted marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disabled through â€Å"jailbreaking† but generally are not aware of this risk.In Ponemon Institute © Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While the re is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone: the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, â€Å"diallerware† infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. Line Graph 1: Summary of consumer responses to eleven smartphone securi ty risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute © Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be important when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13: How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have neither keypad locks nor passwords on their smartpho ne. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14: Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute © Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn off Bluetooth â€Å"discoverable† status on their device when they are not using it. Only 10 percent set up download controls on their smart phone to protect against apps and games that may contain malware. Bar Chart 15: Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute © Research Report Page 12 Part 4. Methods Table 1 summarizes the sample response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers located in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A total of 793 respo nded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final sample of 734 consumers (2. 5 percent response rate). Table 1: Sample response Sample frame Invitations sent Total returns Rejections Final sample Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are Apple’s iPhone, RIM Blackberry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows Mobile. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 Sprint HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other Total Pct% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% 100% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure Total Pct% 24% 19% 12% 9 % 3% 3% 2% 2% 1% 1% 25% 100%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full or part-time position. Pie Chart 1: Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2: Employment status 5%2% Employee Homemaker Retired Student Unemployed Business owner Active military 13% Ponemon Institute © Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their region in the United States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3: Household income Pie Chart 4: Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast Mid-Atlantic 14% 20% 61 to $80k 81 to $100k 101 to $150k 12% 18% Midwest Southeast Southwest 15% 17% Pacific west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute © Research Report Page 14 Part 5. Conclusion The key finding from this research is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being published about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more worried about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if lost or stolen could result in financial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that auditors who did not pa rticipate are substantially different in terms of underlying beliefs from those who completed the survey.Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute © Research Report Page 15 Appendix: Detailed Survey Responses Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sa mple frame Invitations sent Total returns Rejections Final sample Part 1. Background Q1a. Please select the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) Total Q1b. Please select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other Unsure Total Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally Total Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. % 2. 5% Pct% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% Pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% Pct% 6% 13% 16% 25% 40% 100% Ponemon Institute © Resea rch Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges Total Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking Travel assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never Total Q6a. Have you every signed u p for a service or product on your mobile without realizing that there would be a cost?Yes No Total Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other Total Pct% 35% 13% 10% 8% 34% 100% Pct% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 51% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute © Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No Unsure Total Q9. Have you ever been the victim of mobile payments fraud? Yes No Unsure Total Part 2. Attributions Q10. Please rate each one of the following statements using the scale provided below each item. Strongly agree and agree shown . Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute © Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? Concerned and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the user’s knowledge or consent. Were you aware that this could happen?Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? Concerned and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called â€Å"diallerware† that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. We re you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? Concerned and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total Very concerned 29% Concerned 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% Very concerned 31% Concerned 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute © Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Res ponse Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute © Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, p eople use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute © Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone’s security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute © Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases Purchase history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I don’t have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute © Research Report Page 23 Q28a. Do you synch your smartp hone with any of the following devices? Laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly Daily Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I don’t use social networking apps Total Q30. Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes No I don’t have children Total Q32b. If yes, do you use your children’s smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute © Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? Full-time employee Part-time employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual household income? Below $ 20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute © Research Report Page 25 D4. What is your highest level of education attained? High school Vocational University or college Post graduate Doctorate Other Total D5. Please check gender: Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my lifestyle I often give advice to others about how best to use computers and software I need to ask for help if something goes wrong with my computer I always try to spend as little time as possible online I am often confu sed when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I don’t feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute © Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to [email  protected] org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Resea rch Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute © Research Report Page 27

Tuesday, July 30, 2019

How do people feel about the changes that have taken place on Portobello road over the last few years?

The changes that have affected Portobello road in the last decade have a had a great impact on the local community along with the future proposals which have been outlined for the area by the council in order to improve the area. For the purpose of the investigation it is useful to understand how the local community view these changes and proposals, and to gain an insight into the conflict that is arousing from the proposed changes and developments. A secondary source presented as an article from the Notting Hill Action Group, which is an organisation campaign involved in fighting local issues. In this article local residents are protesting against the eviction orders that have been served on Elgin books, a bookstore which has been on the road for more than 20 years, one of the reasons for this protest is that the rent has increased so much the bookstore can no longer afford to pay substantial amounts of money on rent. The local residents are also furious about the fact that breaches against planning consent rules i. e. ‘the Fluid juice bar shop front being put up without planning', are allowed to go unchecked by the council, even though actions like these are ‘considered an offence to the streets character'. Although these protests are creating an unhappy atmosphere in and around Portobello road, it is useful to understand why the residents feel what they do, one of the reasons may be down to the fact that residents don't want to ruin Portobello's individual character. However this is very difficult to overcome the conflict between residents and planners because many ‘greedy people in the area are using Notting hill's celebrity as a way of forcing up rents and forcing out businesses, which have been in the area for more than 30 years. An article labelled ‘Planning rage' which is slightly different to the 1st 1 although still sharing the same subject matter of ‘planning orders'. In this article (which is written by NAG) the Unitary development Plan is being criticized by many residents along with the Notting Hill Action Group itself! This is extremely relevant to the investigation because the future proposals stated in question 4 are based on the Unitary Development Plan, therefore it is useful to understand how the residents view these changes. The article starts off with the fact that ‘ owners of small family-run businesses say that they will be squeezed out by the unitary development Plan which is proposing to open the floodgates to huge chain stores. ‘ And it also states that ‘the recent arrival of chain stores such as GAP and Starbucks has fuelled their fears. ‘ It is evident from these 2 lines, that the people of Portobello road ‘don't want the small businesses (which make the area so unique) be swallowed up by chain stores that will make the area look like any where else. Especially a resident in particular called Mr Walton who lives in Arundel Gdns, who says: â€Å"we are concerned that developments should not harm the character of the area. † The council have responded to this argument by saying: â€Å"we're trying to react to what people want, and to do it within the powers we are granted. † It obvious that this is a complicated issue, because there is a balanced argument between both the councillors and the residents, therefore it is difficult to determine who is right in what is being said. Another article displays a variety of articles, one of which is to do with the division between the rich and the poor on Portobello road. This article is stating that there is a ‘widening gap between the rich and the poor in the UK and this is marked in the Notting hill area, which has multi million pound house prices while Goldbourne ward (northern section) is in the fifth poorest ward in inner London. ‘ Therefore many of the residents of the Goldbourne ward have organised a pilgrimage, which is a powerful reminder to everyone to challenge the status quo, and to work energetically for a fairer, more balanced society. Many of the people who are involved in this protest are trying to convince the council to give in to their requirements by organising these sorts of campaigns. However it is not easy for the council to equalise the 2 parts of the road because the census data on page shows that there is a high unemployment and low home ownership rate which means that most of the population live in rented houses, therefore it would take the council a long time to match up to the employment and home ownership rates which are 3 times higher in the Pembridge ward. Although the newspaper article is outlining resident views, it is still a secondary resource and so its reliability could be questioned, we cannot be sure that there is a division between the rich and the poor in the 2 wards, as the article is written by a person who may well be biased. However the primary data in the form of a shopping, environmental and residential house surveys show that the Pembridge ward is far better off than the Goldbourne ward in terms of house prices and quality. Even though most people situated in Portobello road such as the residents in the 1st NAG article are criticising the future proposals that have been made by the council (stated in question 4) there are also others who are in favour of these improvements i. e traders. In the article named ‘Portobello 2000' Anne swift is an antiques dealer who talks about the future of Portobello road, and also mentions the importance of ‘Portobello having the opportunity to establish itself as the worlds leading centre for antiques and a leading market for general commodities. Anne sees the ‘over commercialisation' of Portobello road as a good thing as this would encourage trade from tourism, however the people in the ‘planning rage' article see this as gentrification steam roller, and as a threat to small businesses. Therefore this is causing a growing conflict between traders and residents. Anne swift suggest some of her own proposals which are in line with those stated in question 4, she believes that all traders have to offer high quality goods, by displaying better merchandise. She also states that improving the environment will create a more clean and spacious environment for everyone, especially tourists. Lastly she suggests the need for friendly and efficient service in order to satisfy customers. A questionnaire which was conducted on all parts of Portobello road in order to find out information about the residents and tourists who shop there. The results of the questionnaire were then converted in to a graph, which helped to analyse the relationships between the figures. From question 1 on the graph its evident that the majority of people questioned were residents (58%) and the remaining were either tourists or workers (42%). This proves that Portobello road attracts quite a lot of tourists and therefore has a large sphere of influence, as the figures are nearly similar to that of the residents. Out of the 58% of the residents questioned, 33% of them have lived in the area between 11-20 years, which showed that they knew the area well and were aware of the changes that have taken place over the last decade. Many of the residents questioned felt that the area had changed in terms of housing which is now of a better quality and residents, as new people are being attracted to the area everyday. 2% of the residents felt that the changes had made the area better, while 29% of the people felt that the changes were quite good for the area, however there were only 7% of residents who felt that the area had declined. This shows that Portobello road has made a great improvement since the last decade. The remaining results showed that 40%of the people questioned have visited Portobello road more than 10 times mostly for Antiques and general food shopping. Again, this shows that tourism is an important factor, which affects Portobello road everyday and has maximised its function.

Monday, July 29, 2019

Arab-Israeli War of 1973 Essay Example for Free (#1973)

Arab-Israeli War of 1973 Essay The Arab-Israeli War was an armed conflict initiated by the Arab nations of Egypt and Syria against Israel on October 6, 1973 in an effort to reclaim territories that Israel had controlled since the Six Day War of 1967. The date holds special significance to the Jewish calendar, being Yom Kippur, hence this war is also known as the Yom Kippur War. Though Israel was caught by surprise and experienced severe losses during the war, assistance from the United States military led to a cease-fire less than three weeks later. In the aftermath, Israel retained its territories and its aftermath had far ranging effects on the geopolitics of the Middle East. First, the victory of Israel had an uplifting effect on its population. Its military had been seen to have grown largely complacent following the Six Day War. However, despite initial defeats, they managed a successful turnaround of the Yom Kippur War’s outcome. As such, despite the surprise advantage of Egypt and Syria they had regained the upper hand in less than two weeks, though at a high cost in casualties. In effect, Israel woke up to the reality that their military supremacy in the region was not absolute. (Rabinovich 498) Second, by granting support to Israel, the United States invited the ire of oil-producing Arab states. This manifested itself in the actions of Saudi Arabia, which not only reduced its oil production but declared an embargo against the United States. Saudi Arabia was later joined by other oil-producing Arab states and together they extended their embargo against other import dependent nations in Western Europe as well as Japan. The result was the 1973 energy crisis that sent oil prices spiraling past $60 per barrel and close to $100 per barrel in 1979. (Smith 329) Third, on the geopolitical front, enemy states of Israel concluded in the aftermath that they could not defeat it by force, and thus turned towards diplomatic tactics in antagonizing it. The effect was that many African and Third World nations, under pressure from the Arab states, broke their diplomatic ties to Israel. Works Cited No author. â€Å"The 1973 Yom Kippur War. † Anti-Defamation League, 1999. Retrieved September 24, 2008 from: http://www. adl. org/ISRAEL/record/yomkippur. asp Smith, Charles. Palestine and the Arab-Israeli Conflict. New York, NY: Bedford, 2006. Rabinovich, Abraham. The Yom Kippur War: The Epic Encounter That Transformed the Middle eAst. New York, NY: Shocken Books, 2005. Rabinovich, Abraham [2005]. The Yom Kippur War: The Epic Encounter That Transformed the Middle East. New York, NY: Schocken Books. ISBN 0 8052 4176 0. Charles D. Smith, Palestine and the Arab-Israeli Conflict, New York: Bedford, 2006, p. 329. Arab-Israeli War of 1973. (2016, Aug 16).

Water Rocket Design Research Paper Example | Topics and Well Written Essays - 2000 words

Water Rocket Design - Research Paper Example The typical construction of a water rocket consists of household materials such as discarded plastic bottles, water, duct tape etc. Typical water rockets are constructed out of plastic bottles. The plastic bottles may be used individually or in combination after cutting out their bases and joining them together. Water is filled inside the plastic bottle rocket body but some space is left empty. The plastic bottle filled with water and partially empty is then turned upside down and sealed. This aids preserving the water inside. Compressed air or other gas injected into the water filled plastic bottle pressurizes the water inside. Typical sources of compressed air include bicycle pumps or portable air compressors. Similarly, other gases such as carbon dioxide or nitrogen may be used using compressed gas cylinders. However, using nitrogen may be dangerous given the high compression ratios used to store nitrogen. The compressed gas tends to provide the means to store potential energy ins ide the rocket body. The stored potential energy is releasable from the rocket when desired. The mass fraction of the water rocket increases with the use of water. This allows the provision of greater impulse when compressed air and water escape from the water rocket body. In addition to water, other additives are also used to increase the mass fraction of water rockets. ... This paper will look into the construction of water rockets to teach students mathematical principles while looking into learning styles, safety and other pedagogical considerations. Water Rocket Design Principles Water rockets are a direct application of Newton’s third law of motion describing action and reaction. The release of compressed gas and water allows the rocket to lift itself skywards for considerable distances. The exact physics behind water rockets depends in large part on the stored energy inside the rocket and the air drag encountered by the moving rocket. However, a lack of standardized construction techniques means that a number of different physics models are used to delineate how water rockets operate. The final outputs from a water rocket include the total height achieved as well as the total duration of flight. These outputs depend on a number of different inputs including the pressure of compressed gas, the volume of water used, the nozzle configuration a nd the weight of the water rocket body. The relationship between these inputs and outputs are expressible in a variety of different ways. Various models are available to delineate the relationship between these inputs and outputs. However, none of the available models guarantees a high degree of accuracy so these models can be best used as approximations. Mathematical Relationships In order to simplify the relationship between the inputs and outputs for a water rocket, students were presented with a simple water rocket mathematical model. The physics behind water rockets requires exploration of advanced concepts such as (Gommes, 2010): incompressibility of water; compressibility of

Sunday, July 28, 2019

DISCUSSION Essay Example | Topics and Well Written Essays - 500 words - 1

DISCUSSION - Essay Example (APA website, 2010) Principle B of the same code encourages the building of relationships of trust. Further, it is stressed as important that a portion of the psychologist’s â€Å"professional time† should be contributed for â€Å"little or no compensation or personal advantage.† (ibid. Principle B) It is true that the psychologist clarify professional roles and obligations, though. (ibid. Principle B) This may be interpreted as suggesting that the driving of someone 100 miles to a canyon is not part of the professional obligations of the psychologist. While this may be true, a caring psychologist may argue that in considering the best interests and preferences of a client (see: ibid. Standard 3.10), this trip to the Grand Canyon would be completely justified. In addition, if the professional opinion of the psychologist is that the trip is of benefit to the wellbeing of the client, he/she is entitled to make that call. (see: ibid. Introduction and Applicability) From a personal perspective, the need to arrange and make the trip is evident – the lines between client and psychologist would not significantly be overstepped; only a superficial dependency would result; and the compassionate, caring psychologist would help the dying client to complete this one achievable wish. Sometimes it is possible to â€Å"just know† (writer’s quotation marks) something – your every instinct tells you that what you perceive is true and you want, more than anything, to act on your feelings. The question of honesty and integrity in the professional lives of psychologist is referred to no fewer than 17 times in the Ethical Principles of Psychologists and Code of Conduct and its general principles and standards. (APA website, 2010) Of particular note in a reaction to the scenario here – where one would be tempted to â€Å"adjust results† (writer’s quotation marks) a little to ensure continued funding of

Saturday, July 27, 2019

Marcia's Identity Statuses Movie Review Example | Topics and Well Written Essays - 250 words

Marcia's Identity Statuses - Movie Review Example At such status, audience may likely assess that his significant attribute develops from growing aspirations for which he gets determined to challenge the utmost of his potentials as embodied in ‘to live deep and suck out all the marrow of life’ by Thoreau which Neil himself read at the opening of a club patterned after the Dead Poets Society. While it is stimulating to watch Neil unfold a position that seeks wild truth of itself, the conflict raised by his father’s interference on getting him to abide by the conventions which Mr. Perry believes would suit his son eventually manifests Neil’s weakness of confronting the reality. Indeed, he gave his father a brief capture of his opposing decision during the play yet he appears to not have gotten out of the momentary soliloquy and chooses to escape beyond the world of the living, thinking that only by giving in to this tragedy would he come to attain peace with the utter well-being of his passion. What is Todd Anderson's status? Please use examples from the movie to support your answer. Todd Anderson is a type who at first seems afraid of breaking into a dimension Mr. Keating rather describes as possessing elements that make human beings alive.

Friday, July 26, 2019

Global competition study of Accor Essay Example | Topics and Well Written Essays - 5500 words

Global competition study of Accor - Essay Example The rate of growth within the hotels and motels industry has been described as a generally promising one (Accor, 2013). As exhibited in figure 1, from 2009, the industry has recorded increase in industry value. The recorded growth notwithstanding, Hospitality Net (2012) lamented that the overall growth has been saturated around very few competitors. This means that until an individual company within the industry performs extraordinarily well, it would find itself within a growing industry but will not really be part of this growth. This is the reason it is extremely important and relevant that the current research be undertaken with the aim of analysing the strategic competitiveness of Accor. The selection of Accor is also of interest because it is considered as one of the leading contributors of the industry’s growth (Accor, 2013). It is therefore important to study the company so as to find ways in which the company can maintain its current competitive position within the industry. Accor is headquartered in Paris and a member of the Paris stock exchange with an operating ticker of AC. Due to its key financials, Accor is regarded as a major global hotel operator (Hotelier News, 2014). Among the 92 countries in which Accor operates, Europe is its largest market with nearly 3,576 hotels and 461,719 rooms in Europe alone (MarketLine, 2014). The target markets of Accor have been largely influenced by its two major segments which are hotels and other businesses. Under the hotel segment, there are targets with luxury, upscale, mid-scale, and economy target markets. As far as other businesses segment is concerned, there are target markets for corporate departments and casinos (MarketLine, 2014). Table 1 gives the key financials of the company from 2009 to 2013. When the key financials of Accor is graphically represented, it is possible to get the real impulse of why it is important for the project to be carried out. This is because the graph in

Thursday, July 25, 2019

Euro-Mediterranean Partnership Essay Example | Topics and Well Written Essays - 1500 words

Euro-Mediterranean Partnership - Essay Example 3. The rapprochement between peoples through a social, cultural and human partnership aimed at encouraging understanding between cultures and exchanges between civil societies (Social, Cultural and Human Chapter)." http://europa.eu.int/comm/external_relations/euromed/index.htm It is an ambitious initiative with bilateral and regional dimensions and multilateral dimension supports, in the increasingly globalised world. Under MEDA programme, they are creating partnerships in all aspects like regional integration, socio-economic balance and financial and technical assistance. Despite these, in 2005 convention, it is noted MEDA was "created at the initiative of the European Parliament in 1996, the program grants aids to no-profit associations, Universities, Research Centres and public Bodies in order to realize projects aimed at promoting democracy, freedom of expression and association, and safeguarding specific groups, such as women, young people and minorities. The granted funds for this kind of projects can total a maximum of 80%" http://www.euromedi.org/inglese/home/partenariato/partenariato.asp). Despite these, in 2005 convention, it is noted that MEDA had very slow advancement. ... in the partnership are peace, security, stability, good governance and democracy, sustainable economic development and reform, education and socio-cultural exchanges, justice, migration and social integration, human rights and democratisation, political and security cooperation, information and communication technology, trade, financial cooperation, dialogues between two or more cultures, and the visibility of the process. It has announced that heredity sites would be maintained and safeguarded, 'Creating a future that care for the past'. "Its aim was to conserve and inventory manuscripts held in small libraries dotted throughout North Africa and the Near East, thus preserving the books and the wisdom they contain," Euro Mediterranean Partnership (2002, p.14). Main topics that would be investigated in the Research are as follows: 1. Illegal immigration into prosperous countries, an annoying issue that has to be controlled and guided in a proper way. Most of the European countries are facing problems due to illegal immigration and are trying to find ways and means of curbing them, while legal immigration would be encouraged. EU is facing extensive confusion as a result of illegal immigration. Research would probe into this matter and would try to present a clearer picture. 2. Security and Terrorism are the two issues that have been haunting every country today, and more so, the Western powers. After the fanatic Muslim movement lifted its ugly head in certain regions, curbing it has become the priority issue to all affected countries. Research would investigate these issues with other connected problems like fanaticism in European countries, growth of terrorist activities, help from Middle East countries in controlling training camps for potential terrorists and

Wednesday, July 24, 2019

Crash 2005 Movie Review Example | Topics and Well Written Essays - 1500 words

Crash 2005 - Movie Review Example From this paper it is clear that  more than a being a picture, Crash is a social documentary of how racism or the tendency to discriminate and systematically oppress others is deeply rooted in our society as defined by Scupin. It is the perfect analogy of how we as a human race deal with life, people and our own experiences. Physical characteristics and racial differences may be interpreted as two distinguishing traits that separate us.  This reseach highlights that  another example of this occurred at the beginning of the film when the Persian family was attempting to purchase a gun. The clerk at the gun shop made a few blatantly racist comments about the perceptions of the customers. There were several references to the twin towers and planes. It didn’t matter that the two were Persian, not Arab. A reoccurring theme was that post 9/11, all Middle Eastern people became potential terrorists. It is amazing that people have the ability to interpret bad events and cast thei r own prejudices on different ethnic groups to mask their feeling of anger and frustration.  Certain stereotypes have stood the test of time, no matter how many strides for racial equality have been made.  Perhaps stereotypes like that have maintained their prevalence because there are so many people that perpetuate them. It is often believed that all young black men are destined to be thugs, criminals and drug dealers. Additionally it is a common statistic that the majority of incarcerated males are African American.... Another example of this occurred at the beginning of the film when the Persian family was attempting to purchase a gun. The clerk at the gun shop made a few blatantly racist comments about the perceptions of the customers. There were several references to the twin towers and planes. It didn't matter that the two were Persian, not Arab. A reoccurring theme was that post 9/11, all Middle Eastern people became potential terrorists. It is amazing that people have the ability to interpret bad events and cast their own prejudices on different ethnic groups to mask their feeling of anger and frustration. Certain stereotypes have stood the test of time, no matter how many strides for racial equality have been made. Sandra Bullock's character made the statement about the relationship between white and black people: "If a white woman sees two black men walking towards her and turns the other way, she's a racist. Well I got scared and didn't' say anything, and the next thing I knew, I had a gun shoved in my head!" Perhaps stereotypes like that have maintained their prevalence because there are so many people that perpetuate them. It is often believed that all young black men are destined to be thugs, criminals and drug dealers. Additionally it is a common statistic that the majority of incarcerated males are African American. As a young black man, it must be difficult to break free of that stereotype. "Things will never change." That attitude along with the perpetuation of existing stereotypes may be largely responsible for negative racial longevity. Ludacris' character was one of the most interesting to me. Here was this articulate young

Tuesday, July 23, 2019

Pricing Strategies for NIVEA Essay Example | Topics and Well Written Essays - 3500 words

Pricing Strategies for NIVEA - Essay Example For this reason Nivea launched the ‘Nivea for Men’ in the year 2008 (The Times 100, 2008). In the face care category, Nivea Visage is the most successful product in the markets of Europe, France, Austria, and Germany. In Germany this product captured 1% market share, in Austria it surpassed 1% market share just 3 months after product launch, in France it covered more than double the target market share (Maschauer & Et. Al., 2004). In Germany’s shower segment, Nivea Bath Care occupied 11.9% share, in bath product segment Nivea Bath Care occupied 11.5% share, in the liquid soap segment, it occupied 7% of market share and in solid soap segment Nivea Bath Care occupied 13.6% market share (European Cosmetic Markets, 2007). Beiersdorf operates in imperfect competitive markets. There are generally many sellers in this type of competition. The offered products are primarily differentiated. There are competitor brands present such as Rexona, FA, Palmolive, Dove and many ot hers. There is free entry for entering the market and company can sustain in the long run. The products are also differentiated. The product cost in this type of competition is determined by market power and buyers or sellers have ideal information about the brand of the company (Reynolds, 2005). During 1970 to 1980, Nivea extended the brand to a wide range of skin care products, such as Nivea creme and Milk Soap among others. Nivea creme first came in the market of Germany in the year 1912. In Europe, this creme was launched in the year of 1912, in the United States it was launched in the year of 1922 and in other countries including South America, it was launched in 1926. The other products of the brand are body soap, powder and sun protection... Nivea is one of the leading names in the global consumer products market pertaining to skin care and beauty related products. The discussion will further proceed with identification of certain factors such as market share and products of Nivea along with the competition that the company faces. In the subsequent section of the assignment, value based market segmentation will be applied along with its six relevant steps in order to comprehend the market and consumer segment of Nivea. Nivea has emerged as a popular name in superior quality skin care and beauty products. It is one of the biggest cosmetic brands which transformed from a skin care product to a trustworthy personal care product for all family type. Nivea has been able to create a niche for itself in not only European market but also global market. It has been able to withstand tough competition globally and has emerged as a leading player. It has expanded its operations in many new markets such as South America, Eastern Eur ope, Central America and Asia. Nivea occupies almost 15% of men’s fairness market. Sales of male skincare products have increased after launching of the ‘Nivea for Men’. The company wanted to raise its share in the UK male skincare segment. Value based segmentation facilitates pricing with actual value perceived and delivered to customers. This provides information that which type of customers are paying most profitable price. For making a value based segmentation six steps are needed.

Many Teenagers Run Away from Home Essay Example for Free

Many Teenagers Run Away from Home Essay Each year, many teenagers run away from home. Why do you think are their chief causes? There are many teenagers who run away from their home. Recently the problem of teenagers running away from home is getting more and more serious. This happens in big cities and small towns, and our country is no exception. Each year, many teenagers run away from their families. But it all depends on the person. The main reasons of teenagers’ running away are in surrounding community. The closest people in the world are our family. But if there are some problems in family, then person, especially teenager, who is formed own current psyche, escape from the hopelessness. Nowadays it is very difficult to live with the society around us. Many people try to find a benefit only for themselves, trying to deceive someone in order to satisfy their needs. They deceive each other without thinking that makes a pain and mental injury. There are several reasons why teenagers run away from home, normally these reasons are related to conditions in the families, bad influence of their friends and financial problem. The first cause of running away is conditions in the family. One of the reasons is because they come from broken homes where their parents are divorced. They do not get enough love and care from their parents. As a result, they will go and find love and care elsewhere. Some parents have the habit of quarrelling in front of their children. The children feel ashamed of their parents and cannot stand this kind of environment. In the end they run away from home. Some parents are too strict with their children. They always punished, scold and lecture their children. They also put too much pressure on their children especially in their studies. Actually they should encourage and guide them more instead of putting unrealistic goals on their lives. Most teenagers do not like to be restricted and treated like children. They want to have their own freedom. They like to be creative and learn things for themselves. To overcome the problem, parents should learn how to care and love their children. They need to be sensitive and careful not to do certain things in front of the children. For example, if they have conflicts among themselves, they need to settle it on their own first instead of arguing or quarrelling in front of their children. In many families children are afraid of talking to their parents and asking them for what they want. For this reason the misunderstandings between them grow bigger and bigger. This often ends in a big quarrel. The second reason that leads to run away teenagers from their home is bad influence of their friends. They find their own way of escape by running away from home. They tend to spend their time with their friends than staying at home. That is the beginning of the problem. If they mix with the wrong group of friends, they will get involve with all kinds of wrong activities. For example, under the influence of bad friends, teenagers who escape from home may fall under alcohol dependence. Teenagers abuse alcohol. They seem to be getting a hold of alcohol at a younger and younger age. Since alcohol is used to celebrate and have fun, teens that abuse alcohol most likely has no idea of the affect alcohol and its abuse can have on their bodies. If they find bad friends that influence of them, they begin to offer drinking and in the end teens used to drink and become an alcoholics. Then finish their life in the street. Also teens may become drug addict, which in turn lead to depression and suicide. The most common reason why teenagers use drug is to relieve stress. Many of them have to suffer stress from family condition. One of the explanations is that drugs users have a poor family life. The majority of drug users have had an unhappy childhood which includes cruel punishment and parental neglect. Many teenagers become a fraudster and a thief when the run away from home. Thus the undergrowths, which are associated with bad friends, began to becoming fraudsters or steal on the street. Eventually they are arrested for petty theft and in the future they have no chance to make something of life, because they have a criminal past. The last cause of teenagers running away is financial problem. The most teenagers run away from their house for financial problem in the family. Mendicancy is big problem nowadays, especially in our country. A lot of people standing on the street and ask money. Most of them teenagers, I am sure that they have family and house, but anyway the escape from their home. The main reason it is financial problem. They become a thief and begin to stealing bags, wallets, mobile phones and others valuable things. If someone steals so they can survive or to help other people that are in need then in most cases its alright. To steal just because they didnt want to pay for something even though theyre capable then its wrong. These people should be punished in order to learn that they were wrong for stealing. But these teenagers who have home and family, who must study, help parents, they should not steal. But others teenagers find not good pay jobs, such as water in cheap cafes, cleaner, job in car washing, janitor and so on. They need the money, but they have not opportunity and choice and they have to work in such jobs as these. They have not education and no one can help them with good job. Every teenager who run away from home, have made a bad decision. They got themselves under the pressures that they felt the need to escape from. Instead of facing their problem and solving it, they chose to run from it. When they have the right decision to change some of the things that may be going on in their lives, the pressure lessens, and there is no more need for them to escape. If they learn to solve their problem and their parents will help them to do so, without cursing and impose their goals and solutions, then the escape of teenagers reduced many times. In conclusion, there are so many teenagers who run away from their families. There are many reasons for it, but one solution parents must be more careful, understanding and loving. If parents will pay enough attention to their children, the children answered them reciprocate and they the same as apply to their children in the future. For teenagers is very important parents’ attention, their understanding and advice. Parents should only speak with their child and all this will not happen. I think the main problem of this issue is misunderstood of our parents, because they forget that they also be teenagers, they want fence in all things. But this lead to lies quarrels and finally escapes from home.

Monday, July 22, 2019

Goal Statement Essay Example for Free

Goal Statement Essay I have planned on becoming a teacher for years. After receiving my own education, I look forward to sharing my knowledge with my students. In the past I have taught classes in creative writing, instrumental music, sailing, various sciences, and religious education, allowing me to experience the interactions between teacher and students in different environments. The age of my students ranged from seven to fifteen, so I utilized a variety of teaching techniques to keep the students interested. I have grown to love teaching and every time I see a look of understanding on a childs face, I feel I have made a difference in their development, even if it was just a small impact. I look forward to the opportunities provided by the college I have chosen to enroll in, to be active in the educational communities of Rhode Island, especially through their practical teaching programs in connection with coursework in their College of Arts and Sciences. I plan on learning as much as I can through these courses so I may be better prepared to pursue a successful career as an educator. I will be striving towards a double major in Secondary Education and either a math or science topic, and once I receive my degree I plan on becoming a teacher at in the science and/or math course focused on during my. I plan on using the information I have gained through my college studies to be not only a competent educator, but also an expert in the field I decide to teach. As an educator, it will be my goal to demonstrate fairness to each student by providing the knowledge and explanation necessary for them to succeed both in my class and in life. As my contribution to the community, I plan to pass on the benefits of my college education to future generations through my career as a teacher.

Sunday, July 21, 2019

Socrates Concept Of Justice When Applied To War Philosophy Essay

Socrates Concept Of Justice When Applied To War Philosophy Essay The nation is at war, and your number in the recently reinstated military draft has just come up. The problem is that, after serious reflection, you have concluded that the war is unjust. What advice might Socrates give you? Would you agree? What might you decide to do? One fundamental question answered in the Republic is Socrates concept of Justice. As all the answers, the conclusion about what it is was reached using the dialectical method, a process that is also called, intellectual midwifery. Socrates begins another discussion and a conclusion is reached that it is just to do good to our friends when they are good and harm to our enemies when they are evil, but he does not accept this as the final meaning if justice, and said that doing harm is far worse than receiving harm, because committing injustice harms ones self internally (Davis, 2000). In conclusion, harming any person is an injustice, and so any just man would not commit it. Davis noted that it was the first that it had been declared in European philosophy the idea that a man should not harm others, even his enemies (2000). This is in fact very deontological, as the goodness of an act is considered in itself. In the first book of The Republic, Socrates receives the argument that men find it easier to fall into the pleasures of the unjust rather than choose the inevitable loss and suffering endured as a result of being good and just. But because the just life is more important than the external pleasures that vice and injustice can yield, loss and suffering is a little price to pay. Better is the poor man with a good, just soul than the rich man who has found his wealth through vice and thus attained a tainted soul (Davis, 2000). In addition, his view of justice was exemplified by the famous story, The Ring of Gyges. The point of the story is this: when one has the chance to do something bad, and gain something for ones self, one should not. That is justice. Thus, in this first question, I think that Socrates would have regretted it, because it is not the right thing. We should take note that Socrates is a good warrior himself of Athens, while being its greatest philosopher at the same time. While the end could be good, the point is it was attained in the wrong manner. In his line of thought, Socrates would have advised that there should be some form of repayment to the commitment of injustice. And yes, I would agree. The essence of justice, as was expounded by Davis is not gaining something good for ones self by making other people suffer. Would it have been unjust for Socrates to escape? If you think it would have been, explain your position on whether it is ever morally appropriate to disobey the law. If you think Socrates could have escaped without committing an injustice, explain why. Is there some argument Crito could have made but didnt? Habin noted three arguments of Crito as he was convincing Socrates to escape. First, Socrates friends reputations would have suffered; because it would only mean that his friends do not have the courage to help him escape. Their reputations would suffer. Second, Socrates would not be able to provide for his children in prison. And third, if he does not flee, it would become impossible for Socrates to teach philosophy, which means success for his enemies (2003). Socrates responded, however, that, A good man cannot be harmed eitherin life or in death, and in addition, and in relation to his concept of justice, one not ought to harm ones friends. It must be cleared that harming a person, for Socrates meant means him less good, less. Lastly, in response to Critos argument related about his children, the philosophers reply was, if escaping is unjust and he does it, then he would show himself unfit as teacher of virtue-he would have shown that he did not know what virtue is-and so he could not make his children just or virtuous (2003). Following the line of thought that Socrates notion of justice is justice in itself, the one characterized by Gyges, wherein one should commit something beneficial for ones self without hurting people, it would be injustice if ever he tried to escape. In the first place, Socrates was condemned to drink hemlock because he was accused of youth corruption and in believing other Gods. Thus, while this he is receiver of injustice himself, it would have been greater injustice to try to escape, because he would simply commit greater injustice. One argument Crito could have made is that the Athenian laws are base or morally incorrect, and so he could have convinced Socrates to escape because it would not be injustice as it is a rebellion against the laws themselves. This is different from disobeying the laws as they are laws, and disobeying the laws because they are in itself wrong. Are your moral judgments merely expressions of your personal preferences? If not, how are they different? In articulating your position, be sure to explain how it compares to Reagans. Moral judgment is not only expressions of personal preferences. In the line of thought of the philosopher Levinas, this question itself is invalid, because there can be no personal when it comes to morality in the sense that morality is only possible between two people. Morality is not a question of acts (acts could be personal). Moral preferences could not, as they are always based on a person to person relation. To be moral means to acknowledge others preferences as well. To be moral is an acknowledgment that people are people and deserve to have a life. Thus, to cancel this right is a transgression. I thus agree with Reagans position that there must not be individual preferences when it comes to moral judgments. In one newspaper article I have read about Reagan, he was said to be mistaken in judgment simply because he deems that a baby born without brain should not be starved to death. This is in fact very humane, because while the child would have not survived even a week, Reagans decision is just an acknowledgment of the right of the infant. Is it possible to be moral without believing in God? Why or why not? It is possible to be moral without believing in God, if this idea of God is based on tradition (i.e. Jesus, Allah, Jehovah.) For although religion is a great foundation when it comes to morality, it does not mean that religion is the sole foundation of it. For instance, there are a claim in the Philosophy of Science that science is not only taking-over explanations on metaphysics (I mean, reality,) and knowledge, but science is also taking over epistemology, and now even aesthetics and ethics. For example, there is what is called bio-ethics. Question about the possibility of being moral without God is actually outdated, for Nietzsche had long ago pronounced the death of God.-the death of objectivity, as new demi-gods arises: perhaps the result is this age of post-modernism. Aside from Nietzsche, there are other ethical philosophers who have founded a system of morals without relying on the idea of a god: there is utilitarianism, pragmatism, hedonism, rational egoism, and a lot more.

Saturday, July 20, 2019

The Pitfall Of The Insensitive :: essays research papers

Still Killing us Softly by Jean Kilbourne gives us prime examples of how the media tries to influence the way we see our society. The advertisement examples that she gives show how they portray the ideal woman as young, thin and beautiful, as well as making all men to look like powerful and insensitive animals (which they aren't). Both of the distortions use pathos as their persuasive devises by evoking emotion in the consumers to cause them to buy their product.In almost all advertisements with the exception of Depends and Polydent, all the models are probably not over twenty-five. This may have worked in the 1930's when, according the American Academy of Anti-Aging, the life expectancy was thirty-five. However, that is not the case today, when the average person living in America is predicted to live to 85. The media is entirely misrepresenting the average person just to make it look as if you use their product; your age will be preserved. This causes many consumers to become dishe artened and want to look younger.Another marketing strategy is to use models that are tall and slender. By doing this in clothing ads they lure the consumer into thinking that it is the clothes that are making them look that perfect, when actually, it's for the most part camera tricks and a lot of starvation. Advertisers often use fear tactics, or slippery slope to scare the women into thinking that their product is the only thing keeping them from being overweight. Most often these cases are found in weight loss pills and appetite suppressants that show before and after pictures of someone who has successfully used their product.Have you ever seen a model in an ad for beauty products or a clothing store that was not completely gorgeous? It makes pretty good sense doesn't it? Who would want to buy clothing worn by plain or even ugly people? I find myself falling into this superficial trap every time I look at the circulars in the Sunday paper. I want to look as perfect as they do, a nd sometimes think that by wearing their clothes, my looks will improve. However it does not take me long to realize how ridiculous I sound. Women buy cosmetics for the same reason, to improve their looks, plain and simple. They want a product that brings out their features and accentuates their beauty.

How We Spend New Years Eve in Japan :: Essays Papers

How We Spend New Year's Eve in Japan What do you usually do on New Year's Eve? Does your family have something special to do for the New Year? Maybe you have a party at the bar or your friend's house, or you may spend time with your family. In Japan, the way of spending time on New Year's Eve is pretty different from the American way. In the morning, we Japanese people clean the whole house. This process is called Ousouji in Japan. This doesn't mean that Japanese people clean the house only once a year. There is a special meaning for this cleaning. Its purpose is to welcome the New Year and to wish a better life than the former year. Cleaning the house, which is covered with annual dust, is a really important way to start a new year. After finishing Ousouji, women start cooking Osechi. This is a traditional Japanese dish which is eaten a few days after the New Year. The dish is based on fish, beans, and egg. We eat Osechi because there is an old story saying one shouldn't use a cooking knife within three days from the New Year. This gives a break to the mother who cooks every day. While women are cooking Osechi, men are hanging Shimenawa, which is a kind of decoration made from rice stems. It is hung on the front door. This custom comes from the farmer's wish to have a good harvest next year. Today, we wish for good fortune and a good year. Evening time, after we finish preparing for New Year's, we normally watch a TV program called Singing Battle Between the Red and the White Team. It has been on the air for about 50 years and keeps over 50 percent of the audience's ratings every year. We think about this program as a part of a closing moment of the year. While, or after watching singing battle, we eat Toshikoshi Soba, which means "New Year's Eve Noodle" in English. As you know, the noodle is long, so we wish longer life, including healthy body, by eating Toshikoshi Soba. Finally, the last thing to do for New Year's Eve is to listen to Juya No Kane, which means "the watch-night bell" in English. This bell is like a countdown in America. But we ring it 108 times.

Friday, July 19, 2019

Dream :: essays research papers

DREAMS Theories attempting to explain the origin and functions of REM sleep include: (1) that REM sleep provides stimulation for the development of the brain; (2) that it performs a chemical restoration function, since during REM dreaming neuro-protein synthesis occurs along with the restoration of other depleted brain chemicals; (3) that it provides oculomotor (eye movement) coordination, since during non-REM sleep the eyes move independently of each other; (4) that it provides a vigilance function, since REM sleep (stage I) is characterized by a level of consciousness close to the awakened state; (5) in a more recent and controversial theory, REM dreaming performs a neurological erasure function, eliminating extraneous information build-up in the memory system; and (6) that, in a more cognitive psychological explanation, REM dreaming enhances memory storage and reorganization. Contrary to popular belief, dreaming is not caused by eating certain foods before bedtime, nor by environmental stimuli during sleeping. Dreaming is caused by internal biological process. Some researchers have proposed the activation-synthesis hypothesis. Their neurological research indicates that large brain cells in the primitive brain stem spontaneously fire about every 90 minutes, sending random stimuli to cortical areas of the BRAIN. As a consequence, memory, sensory, muscle-control, and cognitive areas of the brain are randomly stimulated, resulting in the higher cortical brain attempting to make some sense of it. This, according to the research, gives rise to the experience of a dream. Now, as in the past, the most significant controversy centers on the question of whether dreams have intentional, or actual personal, meaning. Many psychotherapists maintain that while the neurological impulses from the brain stem may activate the dreaming process, the content or meaningful representations in dreams are caused by nonconscious needs, wishes, desires, and everyday concerns of the dreamer. Thus, such psychotherapists subscribe to the phenomenological-clinical, or "top-down," explanation, which holds that dreams are intentionally meaningful messages from the unconscious. The neurological, or "bottom-up," explanation maintains that dreams have no intentional meaning. In between these two positions is an approach called content analysis. Content analysis simply describes and classifies the various representations in dreams, such as people, houses, cars, trees, animals, and color, though no deep interpretation is attributed to the content. Differences in content have been discovered between the dreams of males and females, and between dreams and occurring in different developmental stages of life. What these differences mean is under investigation. Some recent research seems to indicate that dream content reflects problems that the dreamer experiences in life, and that the function of such dreams is to facilitate the emotional resolution of the problems.

Thursday, July 18, 2019

Listo Systems Essay

Listo Systems management decide to implement â€Å" Black Box†, a new anti theft data security system to tackle recent increase in data theft. The new anti theft system will influence the movement of data as well as the working style of entire staffs. Cami Machado, an experienced staffs of Listo system who was handling â€Å" traffic† project and technical staff trainings and support is chosen to lead â€Å" Black Box† installation project. Seeing her excellent track record to implement new hardware and software, company chose her to lead the project. She is excited about the business opportunities going to create by installation of new â€Å" Black Box† project. However, the installation process will not be easy, as it seems. She is confident about her ability in successfully installing â€Å" Black Box† but worried about the staffs opposing the process of installation. Most of the technical staffs are against this project. Further, artists’ staffs believe that the great impact of this project will be on creativeness process. In addition to this, installation of this project will increase the risk of loosing creative staffs to rivals who do not have â€Å" Black Box technology†. Causal variables â€Å"Causal variables are those factors that influence the course of developments within an organization and its results or accomplishments. These variables are within the organization’s control and can be altered by the organization† (Hersey, Blanchard & Johnson, 2008). In this case, â€Å"Black Box† is the causal variables. This project has ability to influence Listo development process as well as the end results or accomplishments of Listo. Further, â€Å"Black Box† implementation decision is totally under control of Listo management and the decision of installation can be changed by the Listo management if they want to. Intervening variables The human resources that are affected by the decision of Listo System of implementing Black Box (Causal variable) are intervening variables (Hersey, Blanchard & Johnson, 2008). The current condition of most of the Listo’s technical staffs and artists’ staffs who are resisting the installation of Black Box are intervening variables in this condition. Most these intervening variables (technical and artists staffs) will opt to leave the Listo for competitors if there demand is overlooked. Potential output variables Potential output variables are the dependent variables that reflect the achievements of the organization (Hersey, Blanchard & Johnson, 2008). The extends to which the â€Å" Black Box† can control the hacking and data theft of Listo system will be the potential output variables. The output variables in this will depend on the proper installation of â€Å" Black Box† and the commitment and motivation shown by intervening variables (technical and artists staffs) towards the objective of this project. If I were Cami After thorough analysis of casual, intervening and end result variables, I have found that casual variable is central of three variables. Casual variable create situation of intervening variables, which will have great impact on end results variables. Trying to change intervening variables will not change the end result variable by much rather trying to change casual variables will be effective on both intervening and end result variables (Hersey, Blanchard & Johnson, 2008). In this case, trying to change the attitude of technical staffs and artists staffs will be much less effect on end results variables. Instead, I would rather request suggestion (help) from those apposing staffs on how to implement this new project to satisfy their complain. Modifying Black Box installation project according to their request will improve end result variables. If I were boss If I were Cami boss, I would focus my time on motivation and controlling. The planning to install â€Å" Black Box† and organization require to install â€Å"Black Box† is already finished. Now, I have to focus all my attention on controlling that everything is going according to the plan. If not, what controlling measure should I need to take to bring project on track. Further, to enhance efficiency, employees’ motivation is necessary. Being boss, it is my responsibilities to motivate employees to move forward to accomplishment of organization goals.

Wednesday, July 17, 2019

Telephone Conversation by Wole Soyinka

Tele call up communion by Wole Soyinka is about, as the title suggests, a conversation over the telephone between twain people a westbound African art object and a British land bird. The spring was aspect for a place to sustain in London. He felt that the expenditure pull inmed reasonable and the location nonmaterial in the sense that it was impartial. The landlady claimed that she lived off premises mayhap indicating that it was a source of income for her. The poem is in free verse and appears like a conversation, like an active telegraphic dialogue.It is a poem that takes the support of irony to nonplus across a point strongly, that is, illogicality of racism. The poet has taken this creative idea to begin his anger over how society gives undue importance to a mans burnish and not this culture or intellect. The opening lines of the poem introduce the report which rests on the irony of the word indifferent. The vocalizer wants an apartment and in this affection he c all tolds the landlady to speak to her. He finds the value reasonable and the location indifferent. unbiased here possibly indicated impartial to run and tint.The landlady emphatically says that she lives off the premises the apartment is a source of income for her. Ein truththing seems alright and the speaker feels that he should tell the lady that he is an African. He does this to avoid a atrophied journey because he has an apprehension that when the lady sees him she might react negatively and refuse him. Hence there is the need for this self-confession. He has not done any prostitute that he should confess yet he seems apologetic. The response to this self-confession is ironically a telling silence a pause that transmuted right breeding of the lady.She is possibly caught unawares. The African is in addition breaked and hurt to react instantaneously and therefore, the heavy silence is broken with call into questions How dismal? and Are you light or very d ark? She wants to roll in the hay the colour of his tegument. This was an absurd notion followed by the whites they thought that the igniter shades of the dark-skinned people were better than the darker ones. The speaker is suddenly conscious of the fetor of rancid breath of the public booth, its rose-cheeked colour, the loss pillar box and the red bus all Red.It is an evocative understand that brings out the reality if the prejudice against him. The colour red here symbolises the extent of shock and anger of the African. He is the one looking for acceptance and belonging, and lodging. The colour might besides refer to the branding of cattle, where each of them has a red mark on its bole that makes it easier for its master to identify them. The mans silence is an ill-mannered silence eloquently interpreted as bad dexterity by the landlady. She politely tones down the avidity of her question save nevertheless seeks to know how dark he is.The poet calling her considerat e is an irony because she does not rephrase her question sen tauntively and considerately, nevertheless it is considerate as so far she converted the phrases. revealing came when the African realised that the whites shall never hear the opprobriouss as human beings as themselves. The African replies in a childish way, resigning himself and simplifying the choices of the landlady. He says, You mean like plain or milk chocolate? All his anguish, bruise and anger takes recourse and he forces to see himself through the eyes of the lady.She answers him in unhealthiness and then, adjusting himself with the wave-length of the white lady, apparently complying with her, he says, West African sepia from down in his passport. This is again an irony, as the African in reality faces rejection in europium by the whites despite having a passport. This depicts that the colour of the skin is an absurdly important parametric quantity for describing humans according to the whites. The answer of the African does not satisfy the lady and she feigns not to understand whats that? is her question.He replies that it is similar to grizzled and she immediately clarifies that thats dark. Now the man has had enough of her insensitiveness. He disregards all constraints of formalness and mocks her outright, saying that he isnt all black, the soles of his feet and the thenars of his hands are completely white, but he is foolish enough to sit on his bottom so it has been rubbed black due to friction. But as he senses that she is about to slam the receiver on him, he struggles one last meter to make her reconsider, pleading her to at to the lowest degree see for herself only to have the phone slammed on him.Exasperated by these indifferences he is sharp to tell her that but for his brown skin he is like any early(a) normal human being with palm of the hand, soles of his feet a peroxide blond. He realises that she wants the details to be able to reason him. But the process a ngers him and provokes him to describe how the bottoms farrow black and asks her to judge for herself. The lady had already sent the receiver rearing on the thunderclap. She had disconnected. The telephone conversation has concluded but the man has to have the last word. He asks if she wouldnt rather see for herself.