Thursday, October 31, 2019
Consumer Behavior Essay Example | Topics and Well Written Essays - 4000 words - 1
Consumer Behavior - Essay Example This essay focuses mostly on answering nine questions on the topic of consumer behavior. The first question focuses on understanding the statement that Generation Y consumers continue to perplex Marketers. The researcher explaines the terminology of Y Generation and provides detailed analysis on the question. Second question is focused on discussing the statement "Think globally, act locally" in relation to the diffusion of consumer culture. Other questions that were answered describe discussion on the differences, that are involved in buying something for yourself versus buying something for someone else, discussing why children and teenagers form such important segments and demonstrating how marketers might reach these young consumers, outlining the traditional family life cycle, applying it to current US society, and then evaluating the need for its updating, discussing on how demographics are essential measures in consumer behavior analysis with particular reference to the US con sumer and so on. The essay also answers on some practical questiones, such as "Select any three religious, ethnic or social groups and show how the values and attitudes of consumers in each shape their behaviors, and the strategies marketers can use to reach them". The researcher provides deep analysis on the topic and gives references to the real examples too. He also shares some personal practical knowledge to answer questions, such as "consumption subculture to which a member of your family or extended family belongs", provides examples and description needed.
Tuesday, October 29, 2019
On Defining Governance, Democracy and Decentralization Essay
On Defining Governance, Democracy and Decentralization - Essay Example Increasingly, among international organizations (such as the World Bank and the United Nations), governance is used as a concept to both provide a broad overview of and describe the way societies manage themselves. In the dialogue routinely engaged in by the United Nations and the World Bank "governance" is normally spoken of in terms of three systems - the political/administrative; the economic; and the civil society. When looking at governance from this perspective an important additional dimension is introduced into any discussion of the relationship between governance, democracy and decentralization because one is forced to pay attention to the significance of decentralization for economic development. This represents a very significant dimension in terms of the overall well-being of the society as a whole for it can be central to the defining of its development potential. Governance has also been described and dealt with, particularly in the past two decades, in terms of how to improve the functioning of the actual political/administrative system extant in a particular country. ... rnmental organization (which frequently means the downsizing of government bureaucracies); and the strong encouragement of transparency and accountability in government. There is obviously a long history of discussion about and consideration of what are the attributes of democracy and democratic governance. During the course of the past half century, most attention in this regard has focused upon four basic attributes. These include the conduct within a country of free and fair elections; the existence of a reasonably well-organized and competitive party system; a delineation of, respect for, and protection of basic civil liberties and human rights within the society; and, the encouragement, support of and active participation of a vigorous civil society and, in particular, strong interest groups. While democracy and its attributes have been the topic of much thought, writing and discussion, it is still the case that there are not totally precise measures of or delineations of where democratic governance begins or ends within a society. In fact, democracy is inevitably a "work in progress." The institutions and processes of democracy are constantly in a state of evolution. Such evolution is not always necessarily in a progressive or productive fashion. Clearly there are moments in almost all societies in which democratic processes and values suffer setbacks. Likewise, there are other times when what is normally evolutionary progress toward higher levels of democratic governance sometimes become dramatic movement. The concept of decentralization is perhaps a little less clearly defined in part because it is the newest of these concerns. One of the things that has added some misunderstanding to the debate and discussion over decentralization is the frequent
Sunday, October 27, 2019
Users Who Suffer With Schizophrenia Social Work Essay
Users Who Suffer With Schizophrenia Social Work Essay Introduction This report will look at service users who suffer with schizophrenia, it will highlight what schizophrenia is. The needs of service users who suffer from schizophrenia will be identified including; personal, interpersonal, social, educational, accommodation and medication needs. The services available to service users which meet these needs will also be identified. What is Schizophrenia Schizophrenia is a complex disorder with a number of variants, although the prognosis is well understood by specialists. It is a neuropsychiatric disorder where a number of factors may have impacted upon the central nervous system and which results in a cluster of symptoms that are classified as schizophrenia. It is commonly thought, incorrectly, by the general public to be associated with dangerous and extreme madness and thus carries a stigma which other diagnoses do not (Eldergill 1997). About one in 100 people will have one episode of schizophrenia, and two thirds of these will go on to have further episodes. Schizophrenia usually starts in the late teens or early 20s, but can also affect older people for the first time. The causes are unknown but episodes of schizophrenia appear to be associated with changes in some brain chemicals. Stressful experiences and some recreational drugs can also trigger an episode in vulnerable people. (www.mentalhealth.org) Needs of service users with schizophrenia Personal needs An individuals personal needs include; Good basic personal hygiene; this may include assistance to wash and brush their teeth or the individual may need prompting/reminding do so. Having clean fitting clothing; help or prompting again may be needed to assist the individual to get dressed. Food and drink supplies; individuals may need assistance shopping or making meals, to ensure good diet and physical health. Interpersonal needs It is important that individuals gain support from their family, friends and professionals. Awareness of the individuals illness and needs is also paramount. It would also be useful to the individual if their family and friends have an idea of what causes their episodes and ways of defusing the situation or a point of contact when these situations arise. Social needs It is important that the individual does not feel excluded from society because of their illness. To be able to carry out social activities on a regular basis Meet other people with the same illness; this can provide an understanding of their illness as well as peer support. Educational needs Education about their illness and also education for their family and friends. What to do or who to contact when experiencing the onset of a psychotic episode. Education on ways to prevent or control the psychotic episodes. Accommodation Stable adequate housing. Depending on the severity or their illness; supported living or residential accommodation. Medication It is important that the service user understands what medication they are taking, if any. What the medication does. Side effects of the medication. Services The National Service Framework for adult mental health has seven standards; Standard one covers mental health promotion and aspects of discrimination and social exclusion that is associated with mental health problems. Standards two and three cover primary care services for people who have mental health problems and include 24-hour crisis services. Standards four and five highlight what is needed to provide effective services for people with mental health problems. This includes being familiar with the care programme approach and its relation to care management. Standard six relates to the individuals who care for people with mental health problems, with social service departments being given the lead responsibility in ensuring that all carers needs are assessed and that they receive their own written care plans. Standard seven sets out what is needed to achieve a reduction in suicides. This will potentially involve all social workers in a range of settings. (Golightley 2009) Social services Social services are put in place to assist people who are experiencing a crisis or are in need of ongoing support. The adult mental health services would be the provider of this service to individuals with schizophrenia. Golightley (2009) highlights the role of social workers working with sufferers of a mental illness to be; Educating service users and their families about their illness. Helping to arrange appropriate low stress accommodation. Networking with the service user to provide community support. The use of behavioural techniques to modify behaviours. Encouraging compliance with medication. Acting as an advocate for the service user where appropriate. It is important that social workers are able to identify whether the service user is a risk to either themselves or others. If so it is important to identify the risk and a way to manage it. General practitioner MIND the mental health charity state that General practitioners are usually the first point of contact for individuals who believe that they are experiencing the onset of a mental illness. GPs can offer advice and referral to other specialised mental health services and treatments. It is also possible for them to prescribe anti-psychotic medication once assessing an individuals situation and they feel the individual would benefit from it. After diagnosis GPs still play an important role in individuals aftercare and physical health. The GP will be able to provide advice about the medication, what it does and its side effects. According to the Government, GPs play a central role in the care and treatment of people with mental illness. (Department of health 2001) Community mental health teams Community mental health teams are put in place to assist and treat service users who suffer from mental disorders which primary care teams cannot treat including schizophrenia. Community mental health teams usually consist of professionals such as; Psychologists Psychiatrists Nurses Social workers Occupational therapists Support workers (www.mind.org.uk 2012) All of these professionals work alongside each other as part of a multidisciplinary team. They create individual care plans for each service user and assist them to either maintain their disorder or work towards full recovery depending on the severity of their disorder. To access the services of the community mental health team service users would need to be referred by their general practitioner, social worker or health visitor. These professionals will only refer individuals to this service if they believe that it would be appropriate and their patient would benefit from the services they have to offer. Once the service user has been referred, they will receive an assessment from the community mental health team which will determine the next steps for them to take towards recovery. The assessment will give the service user a diagnosis .Depending on the outcome of the assessment their next steps may include; advice, treatment or ongoing support from the team and in some cases referral to another service which specialises in their disorder. (www.mind.org.uk 2012) Early intervention service There is some evidence that early intervention can prevent psychosis and can help to prevent some of the worse consequences of psychosis, such as periods of unemployment, misuse of drugs or alcohol, getting into trouble with the police or becoming depressed. (Care services improvement partnership and national institute of mental health England 2006) The early intervention team is part of the wider community mental health team framework. This service is specially designed for sufferers of schizophrenia and associated psychotic illnesses. This service aims to assist people who are at risk of experiencing their first episode of psychosis or are in the early stages of a psychotic illness. The early intervention team consists of; Psychologists Psychiatrists Community psychiatric nurses Social workers Support workers They aim to improve the effectiveness of short and long term treatment by; providing prevention strategies, detection of illness, support and treatment in the early stages of psychosis (www.mind.org.uk 2012). Crisis resolution and Home treatment To access this service, service users are usually referred by a community mental health team, general practitioner, social worker or health visitor, although it is possible for service users to refer themselves The team is staffed by mental health professionals including; Psychiatrists Mental health nurses Social workers Occupational therapists They provide intensive and rapid support for people aged 16-65 years old who are experiencing a mental health crisis and who, without the teams help, would be admitted to a psychiatric hospital. Sometimes the CRT can support people in their own homes, shortening their stay in a psychiatric hospital. For people in the community, CRTs arrive quickly ideally within an hour. The team is then available 24 hours a day, seven days a week. Support continues for as long as it is needed or until the person transfers to another service (www.mind.org.uk 2012). Burton (2009) describes the crisis resolution and home treatment team as the gatekeeper to other mental health services, prompt assessment of an individual suffering a crisis, community based care, remain involved throughout the crisis, undertake crisis prevention planning and work in partnership with the sufferer, family and carers. Residential care If service users feel they are not ready to live in the community independently or supported, residential care may be the next step for them to take. Residential care services provide service users with rehabilitation and support if they are suffering with a severe long term mental illness. This service provides 24-hour care by residential social workers, nurses and mental health support workers. Care homes are for people who need a high level of care and find it hard to manage in their own home (www.mind.org.uk 2012). This service can be accessed by having a community care assessment, service users may have to pay for this service as it is means tested. Service user groups Service user groups are put in place to assist service users of all types. Each group is tailored to suite specific service user groups. Service user groups that specialize in assisting individuals with personality disorders, emotional or behavioural difficulties would benefit sufferers of schizophrenia. These specific groups aim to make service users feel; supported, empowered, included and a part of something. New coping strategies are provided which can lead to service users experiencing fewer crises. Self-help and peer-support groups enable people to meet and share information, friendship and support. They often bring together people with a similar mental health issue, on a short- or long-term basis. (www.mind.org.uk 2012) Talking therapies Talking therapies, such as psychotherapy, counselling and cognitive behaviour therapy (CBT), can help to manage and treat schizophrenia. Talking treatments help individuals to identify the things they have issues with, explore them and discuss strategies or solutions. They can allow individuals to explore the significance of their symptoms, and so to defeat them. (www.mind.org 2012) Cognitive behaviour therapy can be accessed through the NHS service users can access these service through their GP. Many voluntary associations including MIND offer these services at no cost. Benefits There is financial help available to those who cannot work due to a mental illness. These benefits can help towards care, rent and other commitments. Disability living allowance Service users who suffer from a mental disability such as schizophrenia may be eligible to claim this benefit whether they are working or not. Disability living allowance is a tax free benefit put in place to help with extra costs you have because of your disability. To apply for this benefit service users must first apply through the jobcentre plus, their social worker or support worker would be able to assist them with this process. The claimant may then need to undergo a medical examination in order to receive the benefit. Receiving this benefit could increase the amount of other benefits the service user is entitled to. (www.direct.gov.uk) Housing benefit Housing benefit can provide individuals on a low income with financial support to pay their rent. How much each individual receives depends on their circumstances. Housing benefit depending on the service users income can pay all or part of their rent. Individuals are eligible to apply whether they are working or not, they can apply through their local council or jobcentre plus by filling in a housing benefit form.(www.direct.gov.uk) Council tax benefit Service users can apply for council tax benefit through their local council. Depending on individual circumstances service users may be eligible to get all or part of their council tax bill paid. Individuals can get a council tax benefit claim form from their local council. Summary http://www.rbwm.gov.uk/web/social_mental-health.htm http://www.smhp.nhs.uk/OurServices/MentalHealth/CommunityServices/Communitymentalhealthservices/tabid/2538/Default.aspx www.mentalhealth.org.uk http://www.nice.org.uk/usingguidance/commissioningguides/schizophrenia/specifying.jsp http://www.cwp.nhs.uk/OurServices/adult/CrisisResolutionHomeTreatment/Pages/default.aspx http://suite101.com/article/what-is-a-crisis-resolution-team-a204890 http://www.mayoclinic.com/health/schizophrenia/DS00196/DSECTION=symptoms http://www.nhs.uk/Conditions/Psychosis/Pages/Introduction.aspx https://www.gov.uk/housing-benefit http://www.nao.org.uk/publications/0708/helping_people_through_mental.aspx http://www.rethink.org/how_we_can_help/our_services/nursing_and_resident.html http://www.mind.org.uk/help/diagnoses_and_conditions/schizophrenia http://www.mentalhealth.org.uk/help-information/mental-health-a-z/S/schizophrenia/ Department of Health (DH), 2001, The Mental Health Policy Implementation Guide, London: DH.
Friday, October 25, 2019
a good man is hard to find :: essays research papers
ââ¬Å"A good Man is Hard to Findâ⬠The reason a good man is hard to find is because if ones standards are to high their goal is almost impossible to reach. The grandmotherââ¬â¢s mindset was still in the past she falls into the old southern woman stereotype. The Southern woman wanted a religious, upstanding southern gentleman and in this day and age that type of individual is hard to find. The grandmother has a strong faith in god and it affects every aspect of her life. The misfit doesnââ¬â¢t believe in god he believes that god through everything off balance by claming to raise the dead but no one can prove it so therefore he has no faith, this totally contradicts the grandmothers beliefs. What I drew from the statement ââ¬Å"somebody there to shoot her every minute of her lifeâ⬠is that as soon as death was near, the old lady changed from a bitter old racist to an understanding and compassionate southern lady. This is a direct knock on southern life and how many older people in the south hide behind the faà §ade of religion and manners to disguise their racist and bitter ways. If someone had threatened her every minute of her life, then she could have been nice all the time, not just when it mattered. Poetry Paper The purpose of this project is to help you develop an appreciation of one author's ability to involve you in deep reading of literature. Write a 4-5 page paper on a short story or novel by a writer from the list below. (You may not choose a story we have discussed in class.) Pay careful attention to, and write in depth about, à · plot (don't simply retell the story) à · character development (what does the author do to make us care what happens to the main character) à · figurative language (how does the author's use irony, symbolism, etc. help create deeper levels of understanding of the theme the author is exploring) You are responsible for researching the writer/stories in at least two academic journal articles. You may not simply go out to the Internet for your sources, they will not be credited. You may also not simply provide a quote or two from the articles. You must demonstrate that you have read the articles in their entirety and how they have led to an understanding of the writer and/or the stories.
Thursday, October 24, 2019
Personality Theory: Albert Bandura & Carl Rogers Essay
Personality is an intriguing component in psychology vital for the perception of human beings. Understanding and defining personality has proven to be a difficult task. It is so complex, in fact, that no single theory can adequately define it. If one was to ask an ordinary individual to do so, some of the most common answers might be ââ¬Å"a personââ¬â¢s characteristicsâ⬠or ââ¬Å"the impression (s) one makes on othersâ⬠. Personality Theorists on the other hand view personality as the essence of the person, the individualââ¬â¢s true inner nature (Rathus, 2004). According to Carver and Scheier (2000), ââ¬Å"Personality is a dynamic organization, inside the person, of psychophysical systems that create a personââ¬â¢s characteristic patterns of behaviour, thoughts, and feelingsâ⬠(p.5). For this assignment the assumptions of the Social-Cognitive and Humanistic theoretical paradigms of personality will be applied to evaluate the personality of the case study, M yesha. It will also discuss personality tests- methods/instruments, used to measure whether people are sad, glad or bad and how people with certain personality traits respond to lifeââ¬â¢s demand. Before one can begin to understand and assess this individualââ¬â¢s personality, it is important to briefly review the Social-Cognitive and Humanistic theories of personality with their respective theorists such as Albert Bandura and for the Humanistic approach, Carl Rogers. According to Passer & Smith (2007), social cognitive theory is a perspective that was developed by Albert Bandura. It ââ¬Å"combines the behavioural and cognitive perspectives into an approach to personality that stresses the interaction of a thinking human with a social environment that provides learning experiencesâ⬠(p.467). It is proposed that an individualââ¬â¢s thoughts and actions originate in the social world and there is the capacity for self regulation and to engage in active cognitive processes (Bandu ra, 1999). The humanistic or phenomenological theories of personality view humans as innately good. Emphasis is placed on individual experiences, relationships and ways of understanding the world. Human nature includes a natural drive towards personal growth. We as humans have the ability to choose what we do regardless of environment and humans are pretty much conscious beings. We are not controlled by unconscious needs and conflicts (Engler, 2008). According to Rogers (1951) individuals possess the innate ability to know what is important to them, what is essential for a more fulfilling life. This is known as an Organismic Valuing Process. Myesha demonstrated this as she wanted to study Literatures in English, while her mother wanted her to follow in her stepfatherââ¬â¢s footsteps and study Law instead. Rogers would have stated at this point that Myesha went against her Organismic Valuing Process and conformed to her motherââ¬â¢s wishes by studying Law. When significant others in an individualââ¬â¢s world, ( in Myeshaââ¬â¢s case; her parents), provide positive regard that is conditional, rather than unconditional, the individual introjects the desired values, making them ones own, thus they acquire ââ¬Å"conditions of worthâ⬠(Engler, 2008). As a result, the self concept becomes based on these standards of value, rather than on the organismic evaluation. According to Bandura (1978), while assessing an individualââ¬â¢s behavior, there are three interactional processes to consider; the person, the individualââ¬â¢s behaviour and the environmental setting. These factors all operate as interlocking determinants of each other and ââ¬Å"it is largely through their actions that people produce the environmental conditions that affect their behavior in a reciprocal fashionâ⬠(Funder & Ozer, 2001, p.461) (see Appendix 1). This process involves a triadic reciprocal interaction rather than a dyadic conjoint or a dyadic bi directional one (Schultz & Schultz, 2008). For instance Myesha quickly realized that Law was not for her. She considered dropping out of the University as she had gotten involved with a spoken word group around this time. As a result, her stepfather threatened to stop supporting her if she dropped out and this placed a strain on family relationships. These are all factors of cause and effect, which are influencing each other. Bandura views Myesha as an agentic operator in her life. He would believe that she has the capability to intentionally make things happen by her actions and that she is not an ââ¬Å"onlooking host of internal mechanisms orchestrated by environmental eventsâ⬠(Bandura, 2001, p.2). Individuals are sentient agents of experiences rather than simply undergoers of experience. The sensory motor and cerebral systems are tools people use to accomplish the tasks and goals that give meaning and direction in their lives (Harrà © & Gillet 1994). Carl Rogers also agrees to some degree with Bandura, in the belief that the environment also affects us and the people in our environment determine what our behavior will be like (Pervin, Cervone & John, 2005). He also believes that her experience in the spoken word group can have an impact on her personal growth and individual experiences. The belief is that Myeshaââ¬â¢s experiences are unique, and that her perception of the world is critical to understanding and achieving a particular behavior that would be identical to her becoming a self-actualized individual (Gladding, 2004; Engler, 2008). Social cognitive theory maintains that most human behaviour is self-regulated. Through cumulative direct and vicarious experience, people develop performance standards that they use to evaluate their own behaviour. Almost constantly the person compares what he or she does in a situation with some performance standard (Schultz & Schultz, 2008). According to Bandura (1974), these standards are prescribed by socialization agents and parents who define the conduct worthy of reward. Responses from these individuals are either negative or positive based on the valued levels. For example, if performance is achieved or exceeds the standards, an individualââ¬â¢s parents may react in a positive manner towards the child. This child will experience intrinsic reinforcement. On the other hand if performance falls short of a standard, the person experiences intrinsic punishment, as a result of the negative reaction exhibited by oneââ¬â¢s parents, social agents or ones self (Hergenhan & Olson, 1999). Although Myesha seemed to be able to manage her performance in the Law programme, her decision not to attend her class presentation may be viewed as a form of intrinsic punishment. Bandura and Kupers (1964) for example, found that children, exposed to models who set high performance standards, reinforced themselves only for superior performance, whereas children, exposed to models accepting minimal performance standards, reinforced themselves for minimal performance. It would be expected then that relevant people in a childââ¬â¢s life, for instance parents, siblings and peers, would have a profound influence on the development of a childââ¬â¢s performance standards. We see that Myeshaââ¬â¢s success as a straight ââ¬ËAââ¬â¢ student throughout primary school transitioned to a declining performance upon entering secondary school. Additionally, we need to consider her family relationship as a contributing factor. At this time, her brother was considered the favourite by her mother and stepfather. Additionally, performance standards must be realistic. In other words, if they are too lenient, they will be too easily met, and little, if any, self-reinforcement will result from performing in accordance with them (Bandura 1974). If they are too stringent, one will experience frustration or worse. In Myeshaââ¬â¢s case, her stepfather threatened to withdraw financial support if she dropped out of the Law programme and this further caused their relationship to become strained. Her brotherââ¬â¢s attitude was negative and her mother became depressed. Bandura (1986) says, ââ¬Å"In its more extreme forms, harsh standards for self-evaluation give rise to depressive reactions, chronic discouragement, feelings of worthlessness, and lack of purposefulnessâ⬠. According to Hergenhan and Olson (1999), Bandura observed among the mechanisms of personal agency, none is more central or pervasive than peopleââ¬â¢s beliefs about their capabilities to exercise control over events that a ffect their lives. Self-efficacy refers to what a person is actually capable of doing, that is, belief in oneââ¬â¢s capabilities to organize and execute the courses of action required to manage prospective situations (Bandura, 1994). This is known as perceived self efficacy (Bandura, in press, p. 2). According to Pajares (1996), these beliefs of personal competence effect behaviour in several ways as they influence the choices individuals make and the courses of action they pursue (544). Individuals engage in tasks in which they feel competent and confident and avoid those in which they do not. This was exhibited by Myesha with her spoken word group becoming very popular on the local scene. At this point, according to Bandura, Myesha has a high self esteem and a high self efficacy, as she enjoys performing with her group (Pervin et al., 2005). In contrast, she considers dropping out of the Law programme, as it is something that she does not enjoy, but is still capable of doing. She knew the material for her presentation, but Myesha still skipped it. In doing so, she exhibited a high self esteem, because she knew the work and yet at the same time, she possessed a low sense of self efficacy, as she was unable to achieve a high grade on the presentation as she found it difficult to think about it. Rogers (as cited in Barone, Hersen, Vincent & Hasselt, 2004) stated, an organism functions to maintain consistency among self perceptions and congruence between perceptions of the self and experiences. According to Lecky (as cited in Swann, Griffin, Predmore & Gaines, 1987), self conceptions are important for survival because they enable individuals to predict and control the nature of social reality. Thus ââ¬Å"individuals are therefore motivated to preserve their self views which they do by thinking and behaving in ways that perpetuate their conceptions of selfâ⬠which was demonstrated by Myesha when she skipped the presentation (Swann, Griffin, Predmore & Gaines, 1987 ,p.881). Rogers states however that if Myesha continues to participate in the spoken word group she is more likely to achieve her ââ¬Å"ideal selfâ⬠in agreement with the result shown from Banduraââ¬â¢s High self efficacy (Friedman & Schustack, 2008). The humanistic or phenomenological, theories of personality suggest that she should have a positive and optimistic view of her behaviour and she should take life into her own hands and stop doing law which is making her unhappy. She should continue being involved with her spoken word group which she is successful at. Then being able to finance herself in the degree she wants to do as she is old enough to do so (Schultz & Schultz, 2008). According to Pervin et al. (2005), ââ¬Å"Bandura believes that social and economic conditions influence individualââ¬â¢s beliefs about their ability to influence eventsâ⬠(p.419). In the case study Myeshaââ¬â¢s emotional ties to her family along with her step father threatening to withdraw his financial support led her to continue with the Law programme. In contrast Rogers (as cited in Kahn & Rachman, 2000), views Myeshaââ¬â¢s decision to continue with the Law programme as a need for positive regard, which is acceptance, peace and financial support from her family. Myeshaââ¬â¢s decision is also an indication that the conditions of worth still exists. However based on Rogerââ¬â¢s conditional positive regard, she is bending herself out of shape to please her family (Schultz & Schultz, 2008). Experiences in accordance with these conditions are perceived and symbolized accurately in awareness, while those that are not are denied and distorted into awareness, which may lead to incongruence between the self as perceived and the actual experience of the individual, also resulting in possible tension, confusion and maladaptive behaviour (Pervin, Cervone & John, 2005). These said experiences can be perceived as threatening by an organism without conscious awareness, utilizing a process known as subception, which is a form of discrimination without awareness that can result in anxiety. This was displayed when Myesha thrashed in bed, sweating and her heart pounding the night before she was to do the presentation (Barone et al., 2004). Carl Roger proposed that Myesha is living in the here and now as she is involved with the spoken word group which she enjoys. This is what he calls existential living, which is on the basis that the present is the only reality that one has. Social cognitive theory disagrees with this notion in that ââ¬Å"a primary determinant in an individualââ¬â¢s actions and emotions is in ones expectations about the futureâ⬠(Pervin et al., 2005, p. 425). Organisms possess expectancies regarding topics such as behaviour of others, the rewards or punishments that may follow a certain type of behaviour, or an indvidualââ¬â¢s ability to handle stress and challenges. It is this system of thoughts about the future that constitutes the personââ¬â¢s expectations. In the case of Myesha, she felt an immediate sense of relief when she played truant and did not take part in the presentation, she also felt guilty and worried over the consequences of her failure (Pervin et al., 2005). Recommended Instruments to assess Myeshaââ¬â¢s personality When one speaks of personality assignment in psychology, activities include the diagnosis of mental illness, prediction of behaviour, measurement of unconscious processes and quantification of interpersonal styles and tendencies. Although all of these descriptions may be true for different clinicians working with various client groups, this listing may not accurately capture the full range of modern personality assessment. Personality assessment therefore is a complex clinical enterprise where the tools of assessment are used in concert with data from referring providers, such as, clients, families, schools, courts and other influential sources (). In order to assess Myeshaââ¬â¢s personality, we should briefly look at her perceived self-efficacy. Self-efficacy is defined as a personââ¬â¢s beliefs about their capabilities to produce designated levels of performance that exercise influence over events that affect their lives. Self-efficacy beliefs determine how people feel, think, motivate themselves and behave. Such beliefs produce these diverse effects through four major processes (Betz, Klein & Taylor, 1996). They include cognitive, motivational, affective and selection processes. We see that Myeshaââ¬â¢s struggle to choose a career, has affect on her self-efficacy. Therefore, it is suggested that we measure her personality using the ââ¬ËCareer Decision Self-Efficacy Scaleââ¬â¢ (CDSE). The CDMSE is a well-developed construct. Hackett and Betz (1981), were the first to apply Banduraââ¬â¢s (1977) propositions about self-efficacy to career behaviour in a seminal study of womenââ¬â¢s career development. They demonstrated that career decisions, achievements and adjustment behaviours were subject to the influence of self-efficacy beliefs in both men and women. Taylor and Betz (1983) developed the Career Decision-making Self-efficacy (CDMSE) scale to measure these self-efficacy expectations, in terms of goal selection, occupational information, problem solving, planning, and self-appraisal. In the process, Taylor and Betz demonstrated that participants with lower levels of efficacy for decision-making were also more undecided. Another instrument that will be used to assess Myeshaââ¬â¢s personality is the Q-Sort. The Q-Sort is a technique used by humanistic theorists such as Carl Rogers, to measure the self concept of an individual (Hergenhan and Olson, 1999). The Q-Sort assessment was developed by Stephenson (1953). This assessment was used to help individuals to differentiate between the ideal self and the concepts of the self, since human beings struggle with the concepts of who they really are as Myesha exhibited in the case study (Barone, Hersen,Vincent & Hasselt, 2004). The Q-Sort consists of a deck of 100 cards, each containing fairly specific characteristic statements within an individualââ¬â¢s personality such as ââ¬Å"detail orientedâ⬠or ââ¬Å"high self-esteemâ⬠(see Appendix 2). Since the individual chooses the cards this enables the psychologists conducting the assessment to have some control in the results of the assessment and to find the origin of Myeshaââ¬â¢s behaviour, also defining what they want to know. The goal of this assessment is to determine where a person is at, relative to these qualities, at the beginning of treatment and then to re-assess at various intervals and at the end to determine progress (Engler, 2008). As the name indicates, Myesha will have to sort the cards in accordance to what she believes are her characteristics and place them in categories. This will enable Myesha and the tester to be able to see the differences and discrepancies between the real and ideal self as well as examine and highlight the level of self esteem. Meyshaââ¬â¢s real self will reflect immediate circumstances, experiences and self characterization, while her ideal self should enable her to relate to the future by setting goals to which she would aspire, rather than goals that others want her to obtain. This technique is often best used on students. Myesha is a student and this assessment will indicate how empathy, conditional positive regard and genuineness have played a role in her personal growth. This will enable the psychologists to help her to come to some realization of who she is and how to work towards who she needs to be. These two instruments will allow Myesha to have an understanding of who she is and this should also enable her to successfully cope with, or eliminate, her anxiety as she strives towards her future goals. References Bandura, A. (1994). Self-efficacy, Encyclopedia of human behavior. Academic Press, 4, 77-81 Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. New Jersey: Prentice-Hall. Bandura, A., & Kupers, C. J. (1964). Transmission of patterns of self-reinforcement through modelling. Journal of Abnormal and Social Psychology, 69, 1-9 Bandura, A (1999). A social cognitive theory of personality. Retrieved on 12th Feb 2010 http://www.des.emory.edu/mfp/Bandura1999HP.pdf Bandura, A. (2001) Social Cognitive Theory: An Agentic Perspective. Annual Review of Psychology. 52, 1-26. Bandura, A. (in press). Self-efficacy: The exercise of control. New York: Freeman. Bandura, A. (1974). The case of the Mistaken Dependent Variable. Journal of Abnormal Psychology, 83 (3), 301-303. Bandura, A. (1978). The Self System in Reciprocal Determinism. American Psychological Association, 33 (4), 344 ââ¬â 358. Barone,F. D., Hersen,V., B, V., & Hasselt, V.( 2004). Advanced Personality (1st Ed). Springer. Betz, N., & Hackett, G. (1981). The relationship of career-related self-efficacy expectations to perceived career options in college women and men. Journal of Counseling Psychology, 28, 399-410. Betz, N. E., Klein, K., Taylor, K. M. (1996). Evaluation of a short form of the Career Decision- Making Self-Efficacy scale. Journal of Career Assessment, 4, 47-57. Carver,C.S and Scheier,M.F. (2000).Perspectives on personality (4th Ed.)Allyn and Bacon. Engler, B. (2008). Personality Theories (8th Ed). Wadsworth Publishing. Friedman, S. H., & Schustack, W. M. (2008). Personality Classic Theories and Modern Research (4th Ed). Allyn & Bacon. Funder , C. D., & Ozer, J. D. (2001). Pieces of The Personality Puzzle (2nd Ed). Norton and Company Inc. Gladding, T. S, (2000). Counseling: A Comprehensive profession (4th Ed). Prentice Hall, Inc. Harrà ©, R., & Gillet, G. (1994). The discursive mind. Thousand Oaks, Calif.: Sage. Hergenhan, B.R., Olson, M. H. (1999). An introduction to theories of personality. 5th ed. New Jersey: Prentice Hall. Pajares, F. (1996). Self efficacy beliefs in academic settings. Review of Educational Research, 66 (4), 543-578. Passer, W. M., & Smith, E. R. (2007). Psychology: The Science of Mind and Behavior (3rd Ed). McGraw Hill. Pervin, A. L., Cervone, D., & john, P.O. (2005). Personality Theory and Research (Eds). John Wiley. Rathus, A.S. (2004). Psychology Concepts and Connections. New York: Thomson Rogers, C. R. (1951). Client-centered therapy: Its current practice, implications,and theory. Boston: Houghton Mifflin Schultz, P. D., & Schultz, E. S. (2008). Theories of Persoanlity (9th Ed). Wadworth Publishing. Swann, B. W.,Griffin, J. J., Predmore, C. C., & Gaines, B. (1987). The cognitive affect crossfire: When self-consistency confronts self-enhancement. Journal of Personality and Social Psychology. Taylor, K., & Betz, N. (1983). Applications of self efficacy theory to understanding the treatment of career indecision. Journal of Vocational Behavior, 22, 63-81.
Wednesday, October 23, 2019
Chapter 2 â⬠research methodology Essay
Aim and Objectives. The aim of the research is to undertake an analysis of the Chinese banking industry systems, processes and products through a case study of Bank of China and HSBC, London. Objectives. The research objectives are as follows :- 1. Assess the overall state of the Chinese banking systems, processes and products. 2. Evaluate implementation of systems, practices and processes of the modern banking industry. 3. Evaluate areas for further growth and development by Chinese banks. This chapter aims to illustrate the methodology of the research. It describes; common research philosophies, research approaches and the research strategy. Veal (2000) has described research as ââ¬Å"systematic and careful inquiry and search for the truthâ⬠or an investigation into a subject to discover facts. What is Research? Research is a well defined area of study of a particular problem or issue in its totality or in specific to a particular area of concern. (Veal, 2000). Research should entail the following characteristics, which will be kept in mind by the author while evaluating the subject (Morgan, 2000):- (a) Systematic collection of data. (b) Analytical interpretation of data. (c) Developing a theory and conclusion. The Research Philosophy Modern research has three models; these are positivism, realism and interpretivism. (Cantrell, D. C. (n. d. )). Positivism Positivism entails a scientific stance for research and interpretation of data. Thus only those phenomenon which are observable and measurable are regarded as knowledge. Positivists maintain an independent and objective stance. (Cantrell, D. C. (n. d. )). Phenomenology (Interpretivism) This is opposite of the positivistic approach and is known as interpretivism or phenomenology. (Cantrell, D. C. (n. d. )). Though positivistic and interpretivism paradigm are two extremes, most researchers use elements of both practices, which is implied in realism. This approach is considered the most appropriate for the project as the writer will be carrying out a comparative analysis of the Chinese and the British Banking system with a case study of the Bank of China vis a vis HSBC, London. Since banking systems are not just financial and economic systems but involve social issues in the context of a broader socio-political environment, a realistic approach to research is considered the most suitable. Research Approach There are two strands, which can be adopted, deductive and inductive. The deductive approach is used when a hypothesis is developed and the research design has to test that hypothesis. The deductive approach is amplified by means of a diagram at Figure 1 (Trochim, 2000). ââ¬â Figure 1 On the other hand the inductive approach is related to qualitative data, as a sample used in a case study as contrasting to the large quantum of data which is used in the deductive approach. A theory is said to be developed from data collection in this approach. A diagram showing the inductive approach is at Figure 2 below (Trochim, 2000):-Figure 2 The dynamic nature of the research will entail application of both approaches by the author as in practice almost all the research projects have elements of both the approaches in view of the importance of including both qualitative and quantitative findings. Research Data In general data contains information collected and recorded in note books, questionnaires, audiotapes, videotapes, models, photographs, films and test responses. (Veal, 2000). Research data in this case will be the response of selected customers and managers of Bank of China and HSBC, London. based on a questionnaire.
Tuesday, October 22, 2019
Aboriginal Conditions in Canada
Aboriginal Conditions in Canada Free Online Research Papers Since European settlers arrived in North America hundreds of years ago, the original inhabitants of this continent endured devastating consequences imposed upon them by their colonizers. In modern times, Aboriginal people continue to struggle against the Canadian state in their search for rights, land, sovereignty and the improvement of social conditions. This essay will examine current living conditions of Aboriginal people in Canada and determine how these conditions can be improved or solved. The issues that are going to be apparent in this essay are the following: The on-going dispute over land claims involving Aboriginal citizens/groups and the Canadian government; the socioeconomic disadvantages prevalent in many Aboriginal communities and the desire for some form of Aboriginal self-government. Again, the above issues will be examined followed by their potential solutions. One problem contributing to a larger net of social problems is the general lack of knowledge about Aboriginal people amongst Canadians. It is not complicated to understand that with significant knowledge of a certain subject, one can pose better questions and can draw better conclusions about that subject. In this case, knowledge of the histories, cultures, languages and systems of governance of Aboriginal people would lead to a greater understanding of these peoples in modern-day Canada. This knowledge provides a more educated and accurate picture of Aboriginal life that can be studied amongst scholars, citizens and policy makers alike. Unfortunately, Aboriginal people are continuously victimized by racism in society. The media influences common clichà ©s and stereotypes but a misinformed and uneducated populace continue to discriminate against something they do not even begin to understand. Our elected leaders, although not experts on the subject, would presumably have knowl edge and be aware of the situation of Aboriginal people in Canada given the serious nature of itsââ¬â¢ history. In reality, this is not always true because policy decisions are often misguided, influenced or misinformed. For example, in the 1950ââ¬â¢s, the federal government forced Inuit families of Northern Quebec to be removed from their communities and placed in Canadaââ¬â¢s High Arctic in order to establish Canadaââ¬â¢s ownership of this territory. ââ¬Å"Testimony to the Royal Commission on Aboriginal Peoples in 1993 referred to the ââ¬Ëcruel and inhumaneââ¬â¢ policy of forced relocations and charged that Inuit were used as ââ¬Ëhuman flag-polesââ¬â¢ to ensure Canadaââ¬â¢s sovereignty on the High Arcticâ⬠(McMillan and Yellowhorn, 2004). Policy decisions like this is a reflection of Canadaââ¬â¢s negligence to act upon an important issue. It also suggests that our decision makers are not up to speed regarding knowledge of Aboriginal people in Canada. This ignorance leads to poor policy decisions that affect many Aboriginal communities. There exist over one hundred cultures or groups of Aboriginal people in Canada. They live in the northern areas of the Northwest Territories and Nunavut to the islands of Victoria on the west coast and Prince Edward Island on the east. There exist eleven main language groups that account for over fifty total languages. Therefore an enormous range of culture exists throughout Canadaââ¬â¢s indigenous population. It is difficult to classify these peoples by region or ethnicity individually, as over time culture has changed, languages have gone extinct and different races interbreed. In fact, the generic term ââ¬Å"Aboriginal Peopleâ⬠is confusing in itself. Although it is widely used to classify all the different cultures in Canada, by definition, it implies ââ¬Ëpeople from the beginningââ¬â¢, derived from the Latin phrase ab origine. This label implies a degree of sameness among many people when there is none. Terms such as ââ¬Å"Nativeâ⬠or ââ¬Å"Indigeno us Peopleâ⬠cause similar problems and are used for convenience purposes. Perhaps the most important classification of Aboriginal people in Canada is the legal title given by the federal government in the Constitution Act, 1982 which enshrines the rights of Indian, Metis and Inuit people in Canada. Although ââ¬Å"Indianâ⬠is the most politically and historically wrong, it is the term the federal government uses in order to determine whether a person can qualify for clauses in the Indian Act, 1876. One such clause states that Status Indians living on reserve are exempt from federal taxes (another common misconception is that all Aboriginal people are entitled to this right). Although there are generic terms to define Aboriginal people in Canada, it is relevant to know that there exists a huge range of cultures, all with distinct histories. The social and economic condition of Aboriginal people in Canada is alarming. Suicide rates for youth are eight times the national average for females and five times the national average for males (Health Canada, 1997). Rates of incarceration for First Nations persons are over five times higher than the national average (Solicitor General of Canada, 1997). Aboriginal life is disenfranchised in urban and rural areas all over Canada with high levels of alcohol and substance abuse and child mortality. Some 39% of adults report family violence, 25% report child abuse and 15% report rape problems in their communities (Statistics Canada, 1991). Parallel with the social inequalities that Aboriginal people endure is the economic struggles. The 1986 and 1991 Censuses of Canada identified a wage gap between Aboriginal Canadians and the general population (Census of Canada, 1986, 1991). This economic disadvantage goes hand in hand with the social problems associated in the daily lives of Aboriginals. While Aboriginals, including registered Indians on and off reserve as well as Mà ©tis and Inuit reported annual incomes between $14 000 and $19 000, average Canadian incomes around the same period were close to $27 000 annually. A family of four cannot be expected to live sufficiently with an annual income of $14 000. The Canadian government needs to address this wage gap with improved social programs that not only give financial aid to those who need it, but that also uncover the underlying causes of why poverty rates are so high. Equally important, Aboriginal leaders need to be at the discussion table when developing and implementing these programs. There have been successes in addressing social and economic problems. In 1993, an Umbrella Final Agreement was signed between the Government of Canada, the Government of Yukon and the Council for Yukon Indians (McMillan and Yellowhorn, 2004). The agreement gave title to over 40, 000 square kilometres of land to Yukon First Nations (see land claims, p. 6), financial compensation well over $240 million, and rights regarding the interests of wildlife management, resource development and heritage preservation (Ibid.) Restoring control over the resources of their land is an extremely good way of improving social conditions of First Nations people because it creates many new areas of income (hunting/fishing, tourism), as well, it gives back a great deal of autonomy to Aboriginals; something they have been searching for a long time. The Indian Act of 1876 also accounts for many of the problems endured by First Nations people in Canada. This legislation effectively made all Aboriginals wards of the state. It also created a legacy of dependency as many Aboriginals relied on the state for income. The Indian Act states that title to the land is held by the Crown, which makes the reserves pockets of federal jurisdiction within the provinces. Reserves are specific areas set aside for bands of Aboriginals and they have not had a positive effect since their introduction by the federal government. Many reserves in Canada are without running water, or without proper drinking water, and it is common to find a family of seven or eight living in a small, dilapidated home. A revision to the Indian Act in 1885 forced all Indians to obtain permission if they wished to leave their reserve. Impeding out-migration from reserves and implementing poor policies and initiatives that tended to generate poverty became the legacy of the Indian Act. For example, Indian Affairs policy in the farming sector placed restrictive regulations on Aboriginals; while non-Native farmers used mechanized and industrial farming equipment, Aboriginals were expected to continue to use horse power and hand tools (McMillan and Yellowhorn, 2004). Simply put, the colonial agenda of our ancestors and the reluctance to change these systems by current governments have had devastating effects on Aboriginals in the country. In order to effectively change and improve the conditions, the Indian Act must be radically modified or removed. There are currently over 800 unsettled land claims in Canada. Land claims are the resolution to Indian treaties in Canada that are constitutionally recognized agreements between the Crown and Aboriginal peoples. The earliest treaties signed were between the British and Aboriginal peoples in the late seventeenth to late eighteenth century as ââ¬Å"peace and friendship treatiesâ⬠. The British sought these agreements to forge a political alliance with Native groups and gain their assistance in wars with the French (McMillan and Yellowhorn, 2004). After Confederation, the ââ¬Å"numbered treatiesâ⬠were signed, affecting the Ojibwa and Cree of southern Manitoba (Treaty 1) and continued until most of western Canada was covered through treaty signings. There was not much difference in each federal treaty. Aboriginals agreed to release and surrender their rights in exchange for reserves and small cash payments. Members of treaty bands still receive an annual payment, amoun ting to only $5 per person under most treaties (McMillan and Yellowhorn, 2004). The Canadian government must negotiate with Aboriginal groups in order close the outstanding land claims in Canada. Although this is an extremely complicated task, especially with claims that have large urban centres within them, the onus is still on the government to settle the claims ââ¬â stipulated in the Constitution. There have been many Aboriginal groups who have settled their claims with the federal government. The Gwichââ¬â¢in and Sahtu Dene and Mà ©tis of the Northwest Territories settled land claims in 1992 and 1993 respectively (McMillan and Yellowhorn, 2004). Furthermore, the Nunavut Final Agreement of 1993 brought the territory of Nunavut to Canada in 1999. The process for dealing with land claims was established in 1974 as the Office of Native Claims, a branch within the Indian and Northern Affairs Commission (INAC) (McMillan and Yellowhorn, 2004). In order to qualify for a hearing, Aboriginal groups had to prove that they were part of an organized society that had occupied the land before the English arrived and established in the area. A revolutionary case involving an Aboriginal man from the Northwest Territories changed a section in the Indian Act and guaranteed more rights for all First Nations people. In 1967, Joseph Drybones was charged with under section 94(b) of the Indian Act for being an Indian intoxicated off a reserve. In reality, he was prosecuted for being Indian. The case would be appealed all the way to the Supreme Court of Canada and in a six to three decision, the court struck down section 94(b). The decision was monumental for Aboriginal people because it allowed them to enjoy the rights that other Canadians enjoyed, including the rights of mobility and the freedom to make their own choices. After the decision, Aboriginals, accustomed to taking orders now suddenly had the option to decide for themselves where to live and many decided to leave their reserves. The Supreme Court decision also brought to light the other discriminatory clauses in the Indian Act. The recognition of the rights of A boriginals in the Constitution Act, 1982 made certain clauses in the Indian Act incompatible with those in the Constitution. As a result, the courts following 1982 struck down more clauses in the Indian Act such as the clause that said an Indian woman lost her status by marrying a non-Aboriginal man. Another significant issue pressing Aboriginals in Canada is the cry for a form of self-government. Many First Nations people agree that the only way to begin to address the many problems of their people is to create an independent Aboriginal government. With a complicated political structure, many other competing interests and a reluctance to act on Aboriginal issues, this task is not easy. Anna Hunter (2006) has developed a range of options that work in and around the Canadian state. Her continuum comprises of five different styles of government. Aboriginal self-regulation is a municipal-style system, which relies on federal and provincial/territorial governments for funding and authority (Ibid). Constitutional self-government includes the capacity to assume jurisdiction over the education, health and welfare of community members within their traditional territory. It also includes the authority to make economic and social policy, administer taxes, pass laws, manage land and natural resources, and negotiate with other governments (Ibid). Aboriginal self-determination encompasses the internationally recognized right to a broad range of cultural, economic, legal, political, and jurisdictional content (Green, 2003). It should be noted that Aboriginal self-determination does not imply the right to secede. The preceding three ideas are the most important on Hunterââ¬â¢s continuum. They present interesting and plausible options for Aboriginal leaders and elected officials. Of course, flaws exist in all three systems. Also, each option is not necessarily universal for all Aboriginal people in Canada. Different communities have unique needs and therefore progress can only be made with partnerships between Aboriginals and government representatives to adopt the system that suits a particular community best. Although it has taken decades for Aboriginal people to bring the topic of self-government to mainstream discussions, significant gains have been made by some groups of First Nations in Canada. For example, the Sechelt Indian Self-Government Act (1986) allowed the Sechelt people title to their reserve lands, the right to draft their own constitution and laws, and are no longer bound by the Indian Act (McMillan and Yellowhorn, 2004). This was a tremendously successful experiment with self-government that allowed the Sechelt to prosper both economically and culturally. The living condition of Aboriginal people in Canada is far from perfect. Improvements need to be made on many fronts. Specifically, social conditions of Aboriginal people need to be reviewed and improved through social programs, a more active Aboriginal voice in politics and other innovative approaches. Also, existing land claims in Canada need to be resolved. Although many of these land claims are very complicated and require extensive care, agreements need to be made one way or the other in order to fulfill the commands of the Constitution, restore faith for Aboriginal people in the Canadian government and finish this outdated dispute. Finally, along with their right to land, Aboriginals deserve to govern themselves appropriately within the Canadian state. There exist many forms of Aboriginal self-government and it is up to Aboriginal leaders and non-Aboriginal leaders alike to delegate together the possible outcomes. Addressing the above issues will not be easy for Canadian governments. Reluctance to act as well as many other issues pressing Canadians stands in the way of improving the conditions of Aboriginal people. Morally and legally the Canadian state must improve their policies in order to restore a legacy of mistakes from past generations. Bibliography Green, Joyce. Self-Determination, Citizenship, and Federalism: Indigenous and Canadian Palimpsest. Regina: Saskatchewan Institute of Public Policy, 2003. Health Canada. 1997. Basic Departmental Data. Ottawa: Medical Services Branch, Heath Canada Hunter, Ann. Canadian Politics: Democracy and Dissent (eds). Joan Grace and Byron Sheldrick. Pearson Education Canada Inc., 2006. McMillan, Alan and Eldon Yellowhorn. First Peoples in Canada. Douglas McIntyre, Vancouver, British Columbia, 2004. Solicitor General of Canada. 1997. Basic Departmental Data. Ottawa: Solicitor of Canada. Statistics Canada. 1991. Aboriginal Peoples Survey. Report. Ottawa: Minister of Supply and Services Canada. Research Papers on Aboriginal Conditions in CanadaQuebec and CanadaRelationship between Media Coverage and Social andThe Effects of Illegal Immigration19 Century Society: A Deeply Divided EraAssess the importance of Nationalism 1815-1850 EuropeStandardized TestingInfluences of Socio-Economic Status of Married MalesBringing Democracy to AfricaPETSTEL analysis of IndiaWhere Wild and West Meet
Monday, October 21, 2019
Human Resources Management The WritePass Journal
Human Resources Management Introduction Human Resources Management from à à à à à http://adh.sagepub.com/content/4/4/392.full.pdf Dickey, J., Dudley, L., Rees, J., Thompson, J. Wamsley, G. 1999. Information Technology à à à à à Implementation Issues: An Analysis. Dissertation submitted to the Faculty of the Virginia à à à Polytechnic Institute and State University in partial fulfillment of the requirements for the à à à à à à à à degree of Doctor of Philosophy in Public Administration and Public Policy: 1-5. à à à à à Retrieved on Nov 20, 2012 from http://scholar.lib.vt.edu/theses/available/etd-042399-à à à à 053715/unrestricted/DISSERTATION2.PDF Scandura, T.A., Williams, E.A. 2000. Research Methodology in Management: Current Practices, Trends, and Implications for Future Research. Academy of Managementà Journal, 43(6): 1248ââ¬â64. Taylor, S., Beechler, S. Napier, N. 1996. Toward an Integrative Model of Strategic International Human Resource Management. Academy of Management Review, 21(4): à à à à à 959ââ¬â86. Usunier, J. C. 1998. International and Cross-cultural Management Research. Thousand Oaks, CA: Sage Publishers. Vanderbroeck, P. 1992. Long-term Human Resource Development in Multinational Organizations. Sloan Management Review, 34 (1): 95ââ¬â102. Human Resources Management Introduction Human Resources Management , February 22). Tesco Job Sparks Outcry. Wall Street Journal Eastern Edition. p. B7. Tesco jobs at risk after Eddie Stobart taiceover. (2012). Truck Driver, 8. Tesco ready to chill
Sunday, October 20, 2019
A Mans Character is his Fate
The statement, ââ¬Å"a manââ¬â¢s character is his fateâ⬠is a very powerful statement that I strongly agree with. I believe this is true because, in my opinion, you choose your fate by the actions and choices you make every day and your actions and choices make up your character. Someoneââ¬â¢s character can say a lot about them and your character most always chooses your fate. Your character determines what happens in your life and what path you take in your lifetime just as fate does. This is a strong quote because it suggests that your character determines your fate and your fate is completely dependent on your character. I think this quote says that if you have good character your fate will be good but if you have bad character, in return, you fate will be bad. If a personââ¬â¢s character is bad and they consistently make terrible decisions and actions than their fate is bad but if a person makes correct and morally-good decisions their fate will be good. This is a good quote for people to live by because it encourages them to have a positive, strong character and if they do they will have a positive and fulfilling life ahead of them. I believe this quote is very good and very powerful because when thought about it can change your outlook on your whole life and hopefully, make transformation from bad character to good character in all people. I think this quote is great and has a very unique place in the movie ââ¬Å"The Emperorââ¬â¢s Clubâ⬠.
Friday, October 18, 2019
HS630 Week 5 Essay Example | Topics and Well Written Essays - 750 words
HS630 Week 5 - Essay Example The preparedness measures and resource preparedness strategies that need to be executed to prevent and to mitigate the situation to ensure the future going concern of this business include ( Lindell 2006). Risk management procedures should be clearly outlined and operational at all the times during the business operations. This strategy is the key driver towards the implementation of the business response and recovery plans because it boosts the readiness and the preparedness of the business towards major disasters associated with the shipping agency and the liners business. This strategy involves the mobilization of the available resources and acquiring the required facilities to be used upon the eventuality of any disasters. The facilities should include fire stations and trucks, availability of highly trained staff and employees who are able to mitigate both the foreseeable and unforeseeable disaster at the ports as well as the ships in the waters ( Lindell 2006). This strategy involves the identification and the analysis of the cross-sectoral dependencies that exist in the operations of the business. The role of this strategy is to asses the reliability of the business emergency preparedness and the critical infrastructure protection, the established special team is obligated to carry out several test and exercise on the effectiveness and the reliability of the business. A special team is obligated for this task and their report is submitted to the risk management team of the company for further examinations in regard to the critical infrastructure business ( Lindell 2006). The findings on the tests and the conducted exercise are very useful in the decision making of the organization mostly used by the risk management team of the business. Effective and efficient utilization and mobilization of resources is an important aspect in the assessment of various logistics and the overall
Thiel Fellowship Essay Example | Topics and Well Written Essays - 250 words
Thiel Fellowship - Essay Example In my view, these claims are fallacious and lack evidence. In fact technological advances in developed countries for instance have doubled over the years. Taking young top talent denies them various educational progresses that are sustainable for their overall success in life. Furthermore, education is critical to understanding even more technological advances. This in my view renders Thiel Fellowship irrelevant in any contemporary society. Sadly, Thiel has maintains that, education may not be useful for some career paths and youth do learn various ââ¬Å"valuable thingsâ⬠in college that not end up assisting them in life. In my view such claims are baseless. Education offers a broad range of opportunity. In addition, application of acquired skills is very vital and this is what many career paths offer. In my view, Thiel Fellowship may not be an alternate path to real and sustainable success. The various acquired values in life makes a person achieve their goal and offer sustainable solution to societal problems. In this regard, even with the chance at Thiel Fellowship, I will reject the
Alien Relative by Amy Tann Essay Example | Topics and Well Written Essays - 250 words
Alien Relative by Amy Tann - Essay Example Although the narrator tells immigration that Hulan is her sister, she is not actually related to the narrator, just like the ââ¬Å"grandmotherâ⬠Hulan and her husband leave Feng-Yi Frank with ââ¬Å"was not even the real grandmotherâ⬠(Tan, 1993, p.622). Hulan, her husband, and her two remaining children leave Formosa the same night they leave Feng-Yi Frank with his grandmother and fly to America, assuming they will be able to send for Feng-Yi Frank right away (Tan, 1993). The fake grandmother takes him back to China and it winds up taking them eleven years to arrange for him to come to America (Tan, 1993). When he arrives, he is no longer the six year old boy they left behind, but a young man of seventeen years (Tan, 1993). He is an alien to the country he has just arrived in and an alien to his family, having been separated from them for so many years. Although Hulan does not recognize her son, ââ¬Å"he stared right at his mother, nobody elseâ⬠, a familiar stranger , remembering that his parents had left him behind although he does not discuss it (Tan, 1993, p.624). Reference Tan, A. (1993). Alien Relative. In D. Roen, G. Glau, & B.
Thursday, October 17, 2019
Gulf Currency Union Research Proposal Example | Topics and Well Written Essays - 1500 words
Gulf Currency Union - Research Proposal Example Keywords: Gulf Currency Union, GCU, Middle East, Saudi Arabia. Gulf Currency Union: A Research Proposal Gulf Currency Union is a popular object of professional discussion. Much has been written and said about its benefits and potential costs for the Gulf countries. GCU exemplifies a complex product of multiple influences and reflects the growing role of globalization and integration in economic relations between Middle Eastern countries. However, how GCU will affect these countries remains unclear. Clearly, there is a need for a study of GCU and its effects on Saudi Arabia. The choice of this research topic is justified by the growing importance of GCU ideas in the Middle East and the lack of information about the benefits and costs of GCU for Saudi Arabia. It is imperative that the effects of the currency union on Saudi Arabia be understood in their entirety, to ensure that the country uses the potential of GCU membership to the fullest and can easily avoid its drawbacks. Literature Review The growing body of literature indicates sustained popularity of GCU and related subjects in literature. The history of economic cooperation between GCC states dates back to 1981, when the Free Trade Area in the GCC region was established and a unified Economic Agreement was ratified (MacDonald & Al Faris, 2010). Since 1981, economic cooperation in among the six GCC states had been rapidly expanding (MacDonald & Al Faris, 2010). Unfortunately, because of numerous political tensions in the Middle East, the GCC states failed to implement the vision of economic integration; it was not before the beginning of the 21st century that the idea of a common trade and currency area was revitalized (MacDonald & Al Faris, 2010). During the 1990s, the GCC countries also attempted to establish a customs union (MacDonald & Al Faris, 2010). Today, the existing relationships between Gulf countries lay a solid foundation for implementing the Gulf Currency Union idea into practice. It should be noted, that more and more researchers are interested in analyzing the effects of GCU on the Middle Eastern world. The topic of monetary union in the Gulf region remains one of the popular objects of public and political debate. Previous literature ââ¬Å"has concentrated on three main themes, namely, the costs and benefits of a single currency in the short and long term; the degree of macroeconomic policy coordination and the extent to which the Gulf States meet the theoretical criteria of an optimal monetary union; and finally the best exchange rate regime for the single currency.â⬠(MacDonald & Al Faris, 2010, p.9) There is no agreement on the pros and cons of GCU for Middle Eastern countries. According to Buiter (2007), the union can benefit the GCC countries in that it promotes economic openness and financial security, as well as greater integration followed by the development of a common goods/ services/ capital/ labor markets. However, the lack of supranational governmen t bodies and institutions makes such outcomes extremely unlikely; moreover, countries joining GCU will have to sacrifice their political independence for the sake of economic integration (Buiter, 2007). Al-Bassam (2008) explored the benefits of GCU for Bahrain and developed a list of factors supporting GCU, including the elimination of currency transaction costs, considerable economic and financial savings, minimization of exchange rate risks, better pricing transparency and improved competition in business, greater fiscal
Creating an Effective Aviation Safety Management System Program Research Paper
Creating an Effective Aviation Safety Management System Program - Research Paper Example For a start, a Safety Management Systems (SMS) is a framework, which is principally formal and systematically indicates how to proactively identify risks and hazards before they eventually happen and become a big consideration to an organization (Shappel & Wiegmann, 2000). With the global business changes and the development of the modern organization, it has kind of become a regulation that before any company or business organization is legally considered safe for operation, there be a stated safety management system as a form of a reassurance that the risks that might be experienced by individuals while working for the organization are well informed to the management and that they are ready to mitigate. There actually are legal provisions and government recommendations and framed mechanisms to guide organizations on how to set their safety goals, plan for them, and measure the performance of the system (McDonald, Corrigan, Daly, & Cromie, 2000). Implicatively, an SMS is part and pa rcel of any given organization and in fact, defines the kind of operation and association the organization has and therefore every employee within the organization holds the responsibility of enforcing the frameworks for the well being of the business operations for the organization (Shappel & Wiegmann, 2000). In the aviation industry, SMS is a global standard that every industry player has to meet before they are officially licensed to operate and is closely monitored by global authorities.
Wednesday, October 16, 2019
Harlem Renaissance Poets Research Paper Example | Topics and Well Written Essays - 1000 words - 1
Harlem Renaissance Poets - Research Paper Example Some of the luminaries of the Harlem Renaissance poetry include Langston Hughes, Claude McKay, Johnson, Countee Cullen and James Weldon. Langston Hughes (1902-1967) James Langston Hughes was born in 1902 in Missouri. He was educated at Columbia University and traveled often to Africa and Europe while working as a seaman. He published his first poetry book, Weary Blues, in 1924 in Washington. He contributed to the Renaissance movement through portraying the nature of Black life in American society. He engaged his work with jazz, thus appealing to the African-American masses during the Harlem Renaissance of 1920s. His work ââ¬ËThe Negro Speaks of Riversââ¬â¢ contributed much to expressing the Black struggles, love for music, and suffering in the society. He is considered as the most prolific Black poet during the Renaissance period. ââ¬ËThe Negro Speaks of Riversââ¬â¢ His poem ââ¬Å"The Negro Speaks of Riversââ¬â¢ clearly demonstrates some elements of double consciousne ss. The poem articulates the long struggles of Black people and speaks of the struggles of the African Americans with their own identity. It speaks of the injustice to W.E.B DuBois and symbolically represents the life of Blacks in the life of the ââ¬ËRiverââ¬â¢. ... Accordingly, Hughes asserts that ââ¬ËI looked upon the Nile and raised pyramids above itââ¬â¢ (Hughes, 1994, l.6) and also ââ¬ËI built my hut near Congo and it lulled me to sleep.ââ¬â¢ The two statements indicate the awareness of origin of Black people and the need to return to the African continent. In addition, Hughes claims that ââ¬ËI heard the singing of Mississippiââ¬â¢ (Hughes, 1994, l.7) and seen its ââ¬Ëmuddyââ¬â¢ turn all ââ¬Ëgoldenââ¬â¢ to ââ¬Ësunsetââ¬â¢ (Hughes, 1994, l.7). The statement reminds the Blacks of the emancipation of Black people through the end of slavery in the Southern States. The use of river symbolizes ancient times. The main themes in the poem are an expression of the Black heritage and cultural history such as the pyramids and huts. Another theme is the battle for cultural identity in the American society and end of slavery. The symbolism defines the past struggles and calls for the unity of African Americans in expre ssing their identity. The imagery such as pyramids demonstrates the background and origins of the Black people. The ââ¬Ëblood flowââ¬â¢ symbolizes the historical struggles in ending slavery in the South. The poem highlights the economic and social inequalities that are faced by Black Americans and identity conflict that lead to low self-esteem. Claude McKay He was born in Jamaica in 1890 and died in 1940. He moved to the United States to attend Tuskegee Institute, but later moved to Kansas State University to study agriculture. He used his poetry work to demonstrate the negative impact of injustices that were faced by the Blacks in America. His poems focus on social and political life of the Blacks and his passion for his homeland Jamaica. His poems contributed to setting the tone of
Creating an Effective Aviation Safety Management System Program Research Paper
Creating an Effective Aviation Safety Management System Program - Research Paper Example For a start, a Safety Management Systems (SMS) is a framework, which is principally formal and systematically indicates how to proactively identify risks and hazards before they eventually happen and become a big consideration to an organization (Shappel & Wiegmann, 2000). With the global business changes and the development of the modern organization, it has kind of become a regulation that before any company or business organization is legally considered safe for operation, there be a stated safety management system as a form of a reassurance that the risks that might be experienced by individuals while working for the organization are well informed to the management and that they are ready to mitigate. There actually are legal provisions and government recommendations and framed mechanisms to guide organizations on how to set their safety goals, plan for them, and measure the performance of the system (McDonald, Corrigan, Daly, & Cromie, 2000). Implicatively, an SMS is part and pa rcel of any given organization and in fact, defines the kind of operation and association the organization has and therefore every employee within the organization holds the responsibility of enforcing the frameworks for the well being of the business operations for the organization (Shappel & Wiegmann, 2000). In the aviation industry, SMS is a global standard that every industry player has to meet before they are officially licensed to operate and is closely monitored by global authorities.
Tuesday, October 15, 2019
Consumer Behaviour Essay Example for Free
Consumer Behaviour Essay What kind of decision process can you expect in the following cases and why ? (a) Purchase of a greeting card for a close friend. (b) Purchase of an after shave lotion/moisturizer. Ans. Before giving answer to both questions first of all we must know what product involvement and purchase involvement). because meaning of both term determine direction of decision . Purchase involvement As the level of concern for, or interest in, the purchase process triggered by the need to consider a particular purchase. Thus, purchase nvolvement is temporary state of individual or household. It influenced by loat many factors Product involvement involvement of consumer towards particular brand .In process of purchasing a greeting card for close friend involve limited decision making purchase process. Limited decision making process involve few alternative and simple decision rules and a little post purchase evalution Why- limited decision making process occurs in some emotional and situational needs. Purchasing a greeting card for friend also influenced by our emotion and ituation . Situational factor affect in this manner like for what type of occasion we are presenting greeting card to our friend. it may be occasion of birthday, achievement and some other occasion Emotion our friend ship is product of our emotional bonding with some one and emotional attachment always form limited decision making . purchasing of product you always anticipate what would be impression of my card. In limited decision making Use and post purchase of given vary less importance because product ( greeting card )would be use by some another erson who still have not form his expectation abut particular brand. b) Purchase of an after shave lotion/moisturizer- Nominal decision making Purchase shave lotion involve nominal decision making because nominal decision making referred also as a habitual decision making which occur at number of time such as purchasing of lotion also happen number of time in nominal decision process problem is recognized ,internal search provide one solution what type of LOTION you are using previously ,what is your preferred brand and evaluation occurs only when f previous LOTION brand fails to perform . Nominal decision making occur when low purchase and involvement . in case of purchasing of LOTION there is very less purchase involvement because person are more conscious about brand of LOTION. 2. How would knowledge of perception learning help you in designing your marketing program for the following products and services? Justify your answer with reasons. a. Disposable Diapers Designing market programme for Disposable diapers we need to develop and evaluate for Ps of marketing to position product in mind of
Monday, October 14, 2019
Steganography: Uses, Methods, Tools and Examples
Steganography: Uses, Methods, Tools and Examples Steganography by Mohammed Almintakh ABSTRACT This paper talks about steganography, steganography is the art or hiding data within a medium without letting others to know about that data is exsisting. I will go through an introduction about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own good. This topic surprisingly is new for most of people who read its name , ill try to simplify the idea of this approach as much as possible. 1. Introduction Steganography is the art of hiding a message. The purpose of steganography is to hide a message from a someone you donââ¬â¢t want to see it. It is different than cryptography, the art of secret writing, which is intended to make a message cannot be read , but does not hide the existence of the secret communication. Although steganography differs from cryptography, there are many analogies between the two, and some authors classify steganography as a form of cryptography since hidden communication is a type of secret writing. Steganography works by changing bits of useless or bot usedà data in regular computerà filesà (such as graphics, sound, text,à HTML) with bits of different, invisible information. This hidden information can beà plain text,à cipher text, or even images. 2. Steganography Background: Information hiding is related to two fields, Steganography and watermarking. There are three main aspects for information hiding, capacity, security, and robustness. Capacity means the amount of information that can be hidden, security refers to the unability of an eavesdropper to detect hidden information, and robustness to the amount of modification the cover medium can resist before the hidden information is corrupted. In general, information hiding goes through these processes: 1. Identification of redundant bits in a cover medium. Redundant bits are those bits that can be edited without taking care of the quality of the cover medium. 2. Then, we select a subset of the redundant bits to be replaced with data from a private message. The stage medium is created by replacing the selected redundant bits with message bits. The modification of redundant bits can change the statistical properties of the cover medium. As a result, statistical analysis may reveal the hidden content. 3. Uses of Steganography Steganography means of storing data in a way that it hides the existence of them. Steganography used to carry out hidden exchanges .For example, Governments are interested in two types of communication of hidden data: first, which supports national security and second, which does not. Steganography support both types, also business have similar concerns, about trade secrets for new technologies or products information. Of course, using steganography to communicate greatly reduces the risk of information leakage. Businesses takes advantage of another form of steganography, called watermarking. Watermarking is mainly used to identify and entails hidden unique part of information within a medium without touching the medium. For example , letââ¬â¢s say that I have design an image , with that image , I have embedded a watermark that identifies me as the one who created this image, later on , when this image is spread with people , I can later identify myself as the creator and I can of course prove that I am the owner of this. This approach is used by companies for the copyrighted digital media a lot for the purpose of protection. Also, steganography enhances the privacy individually, although it is not a substitute for encryption, of course this is effective only if the hidden embedded information is not detected. If the communication is almost never exists, this will becomes so private to be caught. Like many tools, steganography: 1. Steganography can be a way which makes it possible to send news and information without being censored and without the fear of the messages being intercepted and traced back to us. 2. It is also possible to simply use steganography to store information on a location. For example, several information sources like our private banking information, some military secrets, can be stored in a cover source. When we are required to unhide the secret information in our cover source, we can easily reveal our banking data and it will be impossible to prove the existence of the military secrets inside. 3. Steganography can also be used to implement watermarking. Although the concept of watermarking is not necessarily steganography, there are several steganography techniques that are being used to store watermarks in data. The main difference is on intent, while the purpose of steganography is hiding information, watermarking is merely extending the cover source with extra information. Since people will not accept noticeable changes in images, audio or video files because of a watermark, steganography methods can be used to hide this. 4- Steganographic Methods: The formula below describes the process of steganography as discussed above: cover_medium + hidden_data + stego_key = stego_medium The explanation of this formula is, The cover medium refers to the file that we are going to put our information on it. Hidden data obviously is the data we want to keep secret. An encryption advanced which is a choice for us. The result shall be a stego medium , which is the same file as the cover medium. The easiest way to hide the data in an image , is called LSB(least significant bit) insertion. Figure 1: shows a common taxonomy of steganographic techniques. 5. Steganography Tools: Aà steganographyà software tools allows a user to attach hidden data in a carrier file, such as an image or video, and sometimes it could be an audio , and later take off that data. It is not necessary to hide the message in the original file at all. Thus, it is not necessary to edit the original file and thus, it is hard to detect nothing. If a given part of the message is subjected to successive bitwise manipulation to generate the cyphertext, then there is no evidence in the original file to show that it is being used by a third party. to encrypt a file. An example of this method is described in a self-published science fiction novel. In that example a file is encrypted using a 1949 photo from a digital archive of National Geographic magazine. 6. Steganography Example: There are software that preform steganography, some of well knows programs are : Hide4PGP (http://www.heinz-repp.onlinehome.de/Hide4PGP.htm) MP3Stego (http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/) Stash (http://www.smalleranimals.com/stash.htm) Steganos (http://www.steganos.com/english/steganos/download.htm) S-Tools (available fromhttp://www.webattack.com/download/dlstools.shtml) 7- Describing a tool of Steganography and how it works: Take a look on this picture Figure 2: Stego picture This picture looks ok , nothing suspicious , nothing wrong with it , but in reality it has a hidden message. If you use a software tool to analyze the pictures , this result will come up: Figure 3: QuickStego program Basically , this technique is done by these steps below : Figure 4: Steganography process 8- Deep knowledge of Steganography: Steganography comes from the Greek words for ââ¬Å"covered writingâ⬠.It is the practice of disguising the existence of a message.Generally, innocent looking carriers, e.g., pictures, audio, video, text, etc. that hold the hidden information The combination of hidden data-plus-cover is known as the stego-object Stegokey An additional piece of information, such as a password or mathematical variable, required to embed the secret information Typical Scenario Sender Sender Hides Secret Message In a Cover Using a Stegokey Transmitted Carrier Appears Innocuous Receiver Decodes Secret Message by Removing the Cover Using the Stegokey Receiver Reads Secret Message 9.Steganography and Security As noted above , steganography is an effective and efficient way of hiding data, it is just protecting the data from the unauthorized or unwanted interception. But stego is merely one of many methods to defend the confidentiality of data. It is probably the best used in integration with another data-hiding method. When used in collection, these ways can all be a part of a layered security mechanism. Some good complementary methods include: Encryption-à Encryptionà is the operation of crossing data or plaintext through a series of mathematical processes that generate an alternate form of the original text known as ciphertext. The encrypted text can only be read by one who have been given the proper key to decrypt the ciphertext back into its original plaintext form. Encryption doesnt hide data, but it does make it difficult to read! Hidden directories (Windows)- Windows provides this feature, which allows users to hide files. Using this mechanism is as easy as changing the characteristics of a directory to hidden, and hoping that no one can view all types of files in their explorer. Hiding directories (Unix)- in current directories that have a lot of files, such as in the /dev directory on a Unix implementation, or making a directory that starts with three dots () versus the normal single or double dot. Covert channels- Some tools can be used to transfer important data in seemingly normal network traffic. One such tool that does that is Loki. Loki is a tool that hides data in ICMP traffic (like ping). 10.à Steganography vs. Encryption The goal of steganography is to not keep others know the hidden information, of cource , to keep others from thinking that the information even exist.if a method of steganography causes someone to suspect the medium which carries the data , then the method has failed. Encryption and Steganography achieve separate goals, encryption is changing the meaning of the message so it cannot be read, steganography does not change the meaning or change the data to make it unusable or unintended, rather, it prevents the third party from suspecting that there is a communication or data even exists. For these people who want to reach ultimate in security or privacy , can combine both approaches , encryption and steganography. Encrypted data is difficult to be differentiate from normal occurring phenomena than a normal plain text (which is a raw text) in the medium, there are several steganography tools that can encrypt data before hiding them in a chosen medium. Steganography should not be confused with encryption .Encryption disguises the content of a message. The existence of the message is usually obvious.Steganography disguises the existence of the message .However, additional security can be obtained if steganography is combined with encryption. 11. Steganalysis and its techniques: Steganalysis , is the counter measure of steganography, is the art of detecting that there is a steganography exists , or a decoded data within a medium. There are two main major tools in Steganalysis, information theory and statistical analysis. Mainly , this reveals clearly the tremendous potential for hidden information in the interner data of course as long as a set of data can be compressed to smaller sizes.there should be a space for hidden data within the medium. Steganalysis can be classified in a similar way as cryptanalysis methods, largely based on how much prior information is known : Steganography-only attack: The steganography medium is the only item available for analysis. Known-carrier attack: The carrier and steganography media are both available for analysis. Known-message attack: The hidden message is known. Chosen-steganography attack: The steganography medium and algorithm are both known. Chosen-message attack: A known message and steganography algorithm are used to create steganography media for future analysis and comparison. Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known. 12. Method of Steganography: A lot of methods are available for digital Steganography. But exploiting the lenient constraints of a file formats is the most famous one. There are a lot of softwares that uses this technique. a- Image as carriers: One of the ways to hide data is using images , which is a good method. The difficulty to reveal the data hidden increases with the detailed in an image, and that makes it harder to guess or to suspect that image. JPHIDE/JPSeek is a package that uses the coefficients to hide the information. (http://linux01.gwdg.de/~alatham/stego.html). There was a new method of that , that embeds data in visually insignificant parts of an image. These both methods modify the image. The user however can explore image degradation with different messages and images of different length. Another way is for GIF images, is to modify an imageââ¬â¢s palette for hiding its data. Gifshuffle, which is a tool , that doesnââ¬â¢t modify the image itself, in any visible way. It permutes a GIF imageââ¬â¢s color map, that will leave the original image completely intact. b- Audio File Carriers: A lot of packages also available for embedding and hiding data in the audio files. One of the tools for audio file hiding stego is the MP3Stego,which does not only hide information effectively , of cource arbitrary, rather also claims to be partly strong method of watermarking the targeted MP3 audio files. The WAV formal , which stands for Wavaform Audio File Format, is a Microsoft audio format which mainly windows depends on, however, this format lets users hide data using StegoWave or Steghide (http://www.radiusnet.net/crypto/steanography/Java/stegowav.zip) (http://steghide.sourceforge.net/). These sites refer to both programs in order. Steghide modifies the LSB of data to be transmit in the carrier medium. Using an audio file as a medium is less popular than using an image as a steganography medium. c- Data Ordering: The data ordering which does not have ordering constrains, is usually a very good method of steganography. Each change of a group of objects could be pointed to a positive integer. pointing can then be used to encode the hidden data by modifying the sequence of objects that are not considered in ordered by the carrier medium. While this technique mainly, does not change the information quality, the data which are hidden can of course easily get lost if the medium is encoded again. For example, if we have a GIF which its color map consist of hidden data, we could then open the GIF in our favorite graphics-editing tool package that will be used , and save it again. Visually, the result will be both identical , from the original file to the second file, but the ordering of the color map may have been lost. 13. Limitations: Steganography is limited just like that encryption is, if bob wants to send an image with a hidden message to alice , he have to first agree secretly with alice on a way of steganography. Underneath the encryption model , alice can be fairly sure when she has got some ciphertext. Let us have a scenario about alice ,when she wants to borrow bobs camera and neglects to tell him to be careful for every 73rd byte in the images she sends him.Bobs will be ignorant of Aliceââ¬â¢s steganography efforts. The chanses that bob will let alice borrow his digital camera will decrease the large number of pictures he will receive from her.The amount of data that could be effectively hidden in a medium is heading to be limited by the size of the medium itselt. The less limitations that exist on the integrity of the medium, the more potential it has for hiding data. 14. Conclution I have briefly explained and defined steganography , which is in my opinion an effective tool to do so many things regarding security or reliability in any field of communication .what I mean that , this technique can be used in any section in real life, military , businesess, educational , governments and more.Also , I have shown varous tools and how they function well. 15- References: 1- Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 75-80. 2- Provos, N., Honeyman, P. (2012). Detecting Steganographic Content on the Internet. 3- Classification of Hiding Techniques Ref: F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, ââ¬Å"Information Hiding A Survey,â⬠in Proc. Of the IEEE , vol. 87, No. 7, July 1999, pg. 1063 Kessler, G. (2001, September 11). Steganography: Hiding Data Within Data. Retrieved December 6, 2014, from http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/fsc_stego.html Kessler, G. (2004, February 2). An Overview of Steganography for the Computer Forensics Examiner. Retrieved December 6, 2014, from http://www.garykessler.net/library/fsc_stego.html http://www.symantec.com/connect/articles/steganography-revealed http://en.wikipedia.org/wiki/Steganography#Network http://www.webopedia.com/TERM/S/steganography.html http://quickcrypto.com/free-steganography-software.htm
Subscribe to:
Comments (Atom)