Saturday, August 31, 2019

The Devil from “Young Goodman Brown” Nathaniel Hawthorne

Character Analysis of: The Devil Sometimes there is a feeling that reeks of â€Å"no†, because what is about to be done is immoral, but there is an even larger, overpowering feeling that says â€Å"yes†. This, in the minds of many can be interpreted as the devil working his way into our in our daily lives. In Nathaniel Hawthorne’s â€Å"Young Goodman Brown†, the devil does just that. The devil is not, in fact, the main character but has the most impact on Goodman Brown. The devil has worked his way into many of the puritan’s lives, leaving them with horrid secrets to bear. But, the devil worked his way into Goodman Brown’s soul, which leaves him spiritually dead before he actually dies. The devil is a part of mans everyday life whether it is liked or not. In â€Å"Young Goodman Brown†, Hawthorne makes this clear by using different characteristics, actions, symbolisms, and the relationship that the Puritans have with the devil. The devil is a very sly but wise character; he will try to find ways to make a man sin without, man, necessarily knowing about it. The devil has many different personas, but to Goodman Brown he looks like a normal man from the village. This is an example of a wise decision, because looking like a â€Å"normal† man from Salem makes him seem more trustworthy and more attractive to Goodman Brown. The devil makes several wise decisions that put himself ahead of man. The most important and only goal that the devil has is to get Goodman Brown so far lost into sin, â€Å"the forest†, that he can no longer find his way out, or â€Å"his faith†. The devil is trying to get Goodman Brown away from the holy Puritan lifestyle, tempting him to leave the safety of his home and head to the uncertainty of the forest. In the mid 1800’s the Puritans thought of the forest as being the â€Å"devil’s domain†, or the â€Å"devils breeding ground. † They associated the forest with Native Americans, which in that time the Puritans thought that if you didn’t believe in â€Å"the God†, then you were of the devil. The devil is consistently referred to, in the text, as â€Å"his fellow-traveler†, this could be symbolic for the fact that they both are traveling to the same place, or that they have sin in their lives and were headed in the same direction. The devil is never far from his staff, nor is he without knowing its location. His staff symbolizes the snake from the Garden of Eden, and the sin in life. He can get where he needs to be very quickly, this and the fact that Goody Cloyse’s broomstick flies leads me to think that witchcraft and the supernatural play a big part in the lives of these characters. Throughout the story the devil does not change his view on life, the way he acts, or the way he treats others. These characteristics make him a flat character. Hawthorne hints that the devil could be Goodman Browns father; this creates a link between these two main characters. This could mean that the devil and Goodman Brown actually are related or that the devil is actually Goodman Brown’s internal opposing force, almost as if he had multiple personalities. The devil tells Goodman Brown that he has, â€Å"†¦been as well acquainted with your family as with ever a one among the Puritans†¦Ã¢â‚¬  this means that everyone in the Puritan world has met with the devil himself. This may also mean that all of the Puritans have a secret sin that they have to bear for the rest of their lives. The devil found his way into Goodman Brown’s soul and vanquished faith. The rest of Goodman Browns life was lived with excruciating pain, not physical pain but emotional pain. He was able to see what everyone was hiding behind their own personal mask. Goodman Brown lived the rest of his life not with the devil on his right shoulder but with the devil as this conscious.

Friday, August 30, 2019

Animal Welfare

Nicole Stengel ENG 122-009 Lawless, Caprice 04/ 11/12 Thesis Confined animal feeding operations (CAFO’s) are more commonly known as factory farms in the United States and are this country’s primary source of animal food products. Mass production of meat in The U. S. has continued to increase industrialization of itself for over the course of a century. As technology within factory farms advances, efficiency increases; profit is the primary goal in mind for these industrial owners.In the 19th century, industrialization of CAFO’s thrived in efficiency and profits with new procedures that divide labor duties, cut expenses and decreased interaction between workers and livestock (Purcell, 61). The most primary difference between CAFO’s and local farming is that CAFO’s are corporately owned, confining hundreds of thousands of animals in small spaces at one time, reducing labor expenses and necessity for land ownership (An Encyclopedia of Issues). Local fa rms are more traditional having an appropriate ratio of livestock to workers.These livestock are less likely to suffer from neglect, abuse or unethical slaughter procedures. The tactics of meat production within CAFO’s such as the forklift and assembly lines, as well as controlled growth rates are least concerned with animal welfare and most concerned with profit as well as production efficiency. The establishers of this industry have been able to increase profits substantially by technological advancements as such devices and the use of growth hormones in livestock to obtain a fortune of income for themselves.Unfortunately, the fortune the establishers continue to earn is handed to them at a detrimental cost to three areas of importance: a) Animal Suffering b) Consumer Health c) Environmental Hazards Animal Suffering Slaughter processes are very brutal within CAFO’s and are usually long lasting in terms of suffering. CAFO livestock are exposed to neglect, abuse, physi cal mutilation and psychological trauma. Most livestock agriculture within CAFO’s are so closely compacted next to each other in tiny cages, they catch diseases from living in each other’s bodily wastes(In-text note).They live in sickly environmental conditions, they do not leave their cages and never see the light of day-except, perhaps when being transported to slaughter. One procedure that occurs prior to slaughter common in CAFO’s is known as, â€Å"stunning† where cows are shot by a metal bolt to the head. Hogs are stricken with an electrical jolt. This, in all is to shock the livestock subject unconscious. However, terrified cows and hogs who attempt inhibition of this process are often left partially, or even completely conscious.Nevertheless, meat production does not slow down at the sake of one subject. The subject will be preceded to slaughter regardless of whether it is conscious or not (Freeman, 66). Chickens, however, were exempted from the H umane Slaughter Act from the stunning process. Instead, they are paralyzed by the dragging of their heads along underwater pools with electrical charges. After they are paralyzed (and fully conscious), they are continued through the slaughter process on machinery that boils them alive and/or chops their heads off consecutively on a fast paced line (Freeman, 78).Calves are kept confined in small crates tied up by their limbs and necks to keep them from moving in order to keep their muscles premature and their meat tender. Meanwhile, their diets are maintained deficient in iron to keep the color of their skin pale. The harsh conditions exposed to calves are willfully condemned upon them by farm operators as a mechanism to obtain a specific taste in the meat. It is not surprising that when compared to all diseases that spread among livestock in CAFO’s, calves are the most susceptible to fatality. Calve deaths range from 15-20% in most â€Å"successful† factory farm operat ions.Other than iron deficiency and confinement, this fatality for calves is also caused by their stress of separation from their mothers (Mason 25). `CAFO’s also process animals are through â€Å"skinning machinery† at fast paces. (Purcell, 71). Regardless as to whether the animal is conscious or not, the fast paces of machinery such as this leaves no time between subjects for any concern for animal welfare. Costs to Public Health On a secondary note, mass production of meat is linked to the spread of salmonellosis and mad cow disease to consumers (Encyclopedia of Environmental Politics).It also contributes to a lack of resistance to antibiotic bacterial infections in consumers because factory farmed animals are fed high doses of antibiotics. Heart disease and stroke are also associated with diets high in meat intake (Encyclopedia of Environmental Politics), especially that of poor quality. Controlled growth rates by the use of hormones such as estrogen and testostero ne in livestock also play a role in public health hazards, in addition to mechanisms for profit and industrialization. The average U. S. citizen consumes 607 pounds of animal products yearly.Many nutritionists believe USDA Dietary Guideline Advisory Committee to be excessive in protein anyway (Mason, 113). Animal sources of protein are rich in cholesterol and polyunsaturated fat. Consider this, The United States is one of the most obese countries in the world. Our food guide pyramid is much different from other parts of the world with nutrition habits clinically proven to be more beneficial, such as the Mediterranean Diet. According to Andrea Cespedes in a comparison between the two pyramids, protein portions are much larger for a daily value recommendation on the USDA chart when compared to that of the Mediterranean’s. Nuts and seeds, as well as beans, are grouped with meats, poultry and fish. Nuts and seeds are not foundation foods for the USDA pyramid† (Cespedes). Fi sh are rich in polyunsaturated fat, an essential fatty acid to the body. It is not surprising that the USDA Food Pyramid puts a stronger emphasis on animal proteins than the Mediterranean Pyramid, requiring some of them to be served in school lunch programs-many USDA Reps are financially tied to the meat industry! In 1998, the USDA elected six representatives out of eleven onto the Dietary Guidelines Advisory Committee Freeman, 98).These fattening meats infused with growth hormones (testosterone or estrogen) that are recommended for children may be a reasonable explanation for peculiar bra sizes and premature sweating in some young girls. Technological upgrades and new mechanisms of industrialization also play a large role in the CAFO costs to consumer health. Upgrades are used to cut expenses and to increase product quantities in order to increase profits for the industries. Purcell demonstrates a strong example of this concept. †¦Mechanization of slaughterhouse facilities, wh ich made killing a rapid, iecemeal, impersonal process. The knocker alone would confront live animals and quickly send them down the line as immobile carouses. Divided labor meant a series of discrete and relatively simple tasks for the largely unskilled and poorly paid immigrant workers (Purcell, 62). Procedures as such, indeed are the mechanisms that make the mass production of meat a multi-billion dollar industry accounting for unjust and dangerous working conditions for slaughterhouse workers and hazards to the health for consumers of these products. Costs to the EnvironmentOn a third note, CAFO’s inflict a variety of hazards to the environment. Animal waste is absorbed into the ground and distributes pollution to water. The consumption of electricity in CAFO’s is extremely demanding. Greenhouse gases that emit into the air from these establishments warm the earth deteriorating the atmosphere. According to the Encyclopedia of Environmental Politics, over 8 billion animals are slaughtered in CAFO’s every year. This generates 1. 4 billion tons of manure-which is 130 times more than humans produce in an equal time period.Excessive animal waste seeps into waters polluting living environments for fish and the water sources the public drinks from. Methane is a greenhouse gas more potent than carbon dioxide and is most commonly produced by farm animals (Brickman). Excessive emissions from gases as such heat the earth, destroying ecosystems and lead us in the direction of global warming. Fossil fuel is another leading cause of Global Warming (Campbell, 1239) and is released in excess from high energy usage of CAFO’s. Although J.Patrick Boyle, President and CEO of the American Meat Institute (AMI) assured Wayne Pacelle, President and CEO of the Humane Society of the United States (AHSUS), â€Å"The AMI is an ethically appropriate organization as the entire establishment is committed to the welfare of animals,† evidence provided by Pacelle supported that CAFO livestock are beaten and tortured to death (qtd in Clemmit. ) According to Pacelle, from his testimony before Senate Appropriations Subcommittee on Agriculture in 2008, a staff member of the AHSUS had been andomly selected to investigate the Hallmark/Westland Meat Packing Co. in Southern California under-cover as a factory worker. Pacelle had not been surprised by the report he had received back from the investigator. He filmed workers ramming cows with the blades of a forklift, jabbing them in the eyes, applying painful electric shocks to sensitive areas, dragging them with chains pulled by heavy machinery and torturing them with a high pressure water hose to stimulate drowning, all in attempts to force crippled animals to walk to slaughter. Shortly after this investigation, AHSUS discovered, â€Å"Hallmark/Westland had been previously cited for mishandling animals. Incidents as such, accounting for animal abuse and suffering are common among CAFO†™s across the United States and it is clear the USDA and the AMI could strive for a higher quality conditions of life for livestock. The AMI is not concerned with life quality-only industrialization efficiency. The USDA does not hold regulatory requirements firm enough to regulate adequate life quality for livestock in CAFO’s. J.Patrick Boyle of the AMI claims, â€Å"The AMI seek not only to meet the regulatory requirements but to exceed them† (Qtd. in Clemmitt)). Unfortunately, USDA does not regulate frequently enough to ensure such a deal. Most commonly, the USDA is aware of animal suffering and inadequate living conditions provided for them. The AHSUS investigator reported that, during his undercover investigation, an agent from the USDA visited the establishment. He claimed, â€Å"the agent was present twice daily in the living area-which he merely noted animals who could not stand yet approved the rest for slaughter. It may have been appropriate for the USDA re presentative to investigate these animals in greater depth after the sighting of sick and injured livestock. It is clear that the responsibility for animal welfare should not be left in hands of the AMI or the USDA-their standards for animal welfare are not adequate enough. The AMI has far too many animals to care-take each one individually and the USDA is not present frequently enough to regulate already low standards.After all, the primary responsibility of the USDA is food, not animal welfare. Livestock agriculture is in dire need of regulatory welfare requirements that will protect their well being adequately instead of minimally. In addition, it also needs inspectors who will enforce these regulations firmly as the AMI is solely in the business for the sake of profit; not animal welfare. As of now, regulatory inspections of CAFO’s are not performed with the carefulness necessary to ensure a quality way of life for livestock. J.Patrick Boyle of the AMI stands that the mea t industry provides adequate living for livestock and there is no need for additional welfare standards within CAFO’s. Proven numerous times, requirements are often not met and regulators are dis-concerned with the matter. Something more must be done to increase animal welfare requirements for livestock agriculture. Conclusion Establishers of CAFO’s are only concerned with industrialization and profit; their livestock is abused, neglected and they suffer slow, painful deaths.Livestock growth control is another method of industrialization, deigned for profit at the cost of health for animals and consumers. CAFO’s exhibit severe environmental hazards such as global warming from greenhouse gases and pollution from animal use in addition to excess animal waste. Low quality meat-a product of mass production spreads diseases. It is the responsibility of USDA affiliates to regulate these conditions. However, this responsibility should be taken far more seriously by inc rease of welfare requirements and inspections that are performed more frequently as well as efficiently.

Thursday, August 29, 2019

Language And Culture Of Anishinaabe People Essay

Language And Culture Of Anishinaabe People - Essay Example Children learn their language, governance, the judicial system, culture, religion, and citizenship. This culture was overshadowed by Christianity and modernization, but the remaining descendants teach their children about their ancestors in order to ensure the continuity of their culture. It is difficult to maintain ethnic identity without the existence of language. The Anishinaabe descendants struggle to maintain continuity of their language by teaching their children. The learning process begins by explaining the meaning of the verbs in the seven teachings (Apple, 2008). The seven pronouns are set in the teachings called the seven grandfathers. These are Nbwaakaawin (wisdom), Zaagi’idiwin (love), Minaadendamowin (respect), Aakwa’ode’ewin (bravery), Debwewin (truth), Dibaadendiziwin (humility) and Gwekwaadiziwin (Honesty). These are part of the original words of the ancestors that form the roots of the language. Understanding language helps to understand the cultural practices, institutions, and social festivities observed by the Anishinaabe. The elderly in the communities act as reference points for teachers and learners of the language. Their dialect and understanding of the language have not been overly diluted by the English language, as is t he case among the young people (Eigenbrod, LaRocque and DePasquale, 2010). The Ojibway language, part of the Algonquian language group, is the most frequently spoken Aboriginal language besides Cree and Inuit languages. It is usually expressed in syllabics or the Roman orthography. The syllabics were invented in 1840 by James Evans, a missionary working in Hudson’s Bay. Some Anishinaabe people claim that he did not invent the symbols, but he incorporated them into the writing system.

Wednesday, August 28, 2019

ASSESSMENT Essay Example | Topics and Well Written Essays - 1250 words

ASSESSMENT - Essay Example Non-conventional types of dividend payments, particularly share repurchases are in most cases used currently, and therefore, the dividend decision is much more multifaceted and complex than it was in the past. In addition, there are more significant types of shareholders who should be satisfied today-particularly institutional investors-while managers once merely have to satisfy individual stockholders. Therefore, n increase in the dividend payout is taken to be good news. The company is showing that it not only has positive cash flows, however these cash flows are rising sufficiently to validate an elevated payout to shareholders. The company â€Å"proves† its cash flow by paying out some of that cash to its shareholders. This means that higher dividends might indicate lasting greater earnings for the company. How this argument has been contradicted that the dividend policy is irrelevant. It is for this reason that this paper will examine on the fact that company's dividend p olicy is irrelevant to its market value. ... i-Miller (M&M) theorem, (Irrelevancy Theory) (1961) forwarded by Franco Modigliani and Merton Miller, influences the base for modern view on capital structure, although it is usually perceived as merely scholarly because it presumes away numerous significant elements in the capital structure decision. The theorem argues that, in a perfect market, the value of a firm is irrelevant to how that firm is funded. This outcome offers a basis used to study real global reasons why capital structure is appropriate. These other reasons comprise agency costs, bankruptcy costs, information asymmetry, taxes among others. The theorem has been used to show that dividend is irrelevant to firm’s market share. Merton Miller and Franco Modigliani (MM) under their theory argued that in perfect financial markets (no transactions costs certainty, no taxes, or other market imperfections), the value of a company is impacted by the allotment of dividends. They claim that company’s value is mainl y driven the prospective income and risk of its investments, therefore, maintaining income or paying them to the shareholders in dividends does not affects its value (Grullon et al 2002). MM through its theory indicated that provided the company is attaining the returns anticipated by the market, it does not matter whether the returns is directed to the stockholder as individuals currently, or reinvested. They would perceive it in terms of dividend or price appreciation. Therefore, in this case the shareholder can develop their individual dividend through selling the stock when they need cash (Lie 2000). They qualified their argument through this calculation: V t = 1/1+rt[Dt+Vt+1-m t+1P t+1] Where rt = Discount rate Dt = Total Dividends Paid V t+1 = Firm Value @ t+1 = ntP t+1 M t+1P t+1 = Amount

Tuesday, August 27, 2019

How have transnational NGOs and social movements impacted countries Term Paper

How have transnational NGOs and social movements impacted countries that practice female circumcision - Term Paper Example According to the World Health Organization, approximately 140 million girls have been circumcised all over the globe, of which about 92 million are believed to be from Africa. (Female Genital Mutilation, World Health Organization, February 2012). The origin of female circumcision is not known for sure, however some scholars on the subject speculate that this practice has its origins in the time of the ancient Egyptian pharaohs. This belief is corroborated by the fact that some ancient Egyptian female mummies were found to be circumcised. In today’s times female circumcision is commonly practiced in many parts of Africa. This practice is promoted in three ways by the people who propagate it. The Sunna type where the clitoris is excised, the clitoridectomy  type where the clitoris and minor labia are excised and the infibulations type where the whole clitoris and all the labia are cut off. (M. A. Dirie and G. Lindmark, 1992). The practice has however, been reinforced by Islami c tradition due to the belief that circumcising women dampens their sexual desire and leads to less promiscuous behavior generally. (Asaad M.B, 1980). Countries and cultures that advocate the practice believe that performing the procedure tunes down a woman’s libido. The opposition for female circumcision presents a strong case. ... According to the World Health Organization, female circumcision has no health benefits what so ever and is only a cause of damage. It is apparent with simple deduction that since the practice removes healthy female genital tissue for no medical reason; it will interfere with their normal bodily functions in addition to being the host of a bunch of diseases and infections. There can be instantaneous consequences like pain, shock, hemorrhage or tetanus etcetera or long term consequences which might include bladder and urinary tract infections, cysts, infertility and child birth complications etcetera (Female Genital Mutilation, World Health Organization, February 2012). However, debates regarding this issue are messy because of the cultural, religious, social and political connections to the issue of female circumcision on the side of the advocates of this procedure and thus, reaching a solution is a very complex course of action. The medical views on female circumcision are shrouded w ith confusion because they don’t understand the reason why people do it if it has such dangerous health implications. What needs to be done is that people should look at this practice through a cultural lens to understand its significance and why it means so much to the cultures and people who practice it. Firstly, they look upon this as a necessity according to what their beliefs have taught them. Second, this practice has different meanings for different cultures and people, third, although people who are against this practice to promote gender equality the women it is practiced upon don’t think of it as an infringement of their rights. Although this practice originated from the patriarchal society, it is women that have ensured that it keep being practiced to date.

Monday, August 26, 2019

Countrywide Essay Example | Topics and Well Written Essays - 250 words

Countrywide - Essay Example Otherwise, the ratio dropped to -11.61 in 2007 due to the general depression that affected the global economy (Kaplan, 2011). We can attribute the drop to predatory lending prices and slow housing market. The company was involved in the strategies only to lead it into problems. It is important to recognize that the company experienced a low return on assets. Ethics is a major determinant for the success of any business organization. The company’s poor performance can be partly attributed to unethical practices that it engaged while trying to maximize profit and introduce new products (Kaplan, 2011). For instance, subprime mortgage is a loan given to people with low income taking advantage of their lack of understanding of terms of the loans. The company misled the borrowers that it had a fixed rate in order to attract more clients yet they new that the people could not afford. The strategy lowered reputation of the

Sunday, August 25, 2019

How Critical is the Critical Period Essay Example | Topics and Well Written Essays - 1250 words - 1

How Critical is the Critical Period - Essay Example Cognitive scientists are finding it important to understand the stages of language development, prior to understanding how humans learn to talk. According to Penfield, there is assistance for language acquisition during childhood which also disappears in adult life, which if based on speech and brain mechanisms, makes it more meaningful to teach foreign language from the first grade on (Singleton & Lengyel, 1995). This was the fundamental view point based on the formulated idea of critical period hypothesis. The critical period hypothesis was popularized by Wilder Penfield and his co-author Lamar Roberts, but Eric Lenneberg promoted it further while relying on the biological foundations of language. Cognitive scientists believe that language and self-awareness are found in the part of the brain, but study also shows that they can also take time to develop with substantial exposure to others (Chomsky, 2003). Therefore, this leads to a growing interest in finding how children acquire and produce language, but one of the most interesting views that will be linked to this consideration is finding the critical period as to when will be that remarkable time for language acquisition. The work at hand tries to establish the point that language is innate in humans and there is a critical period for language acquisition that along the way will be nurtured by the environment and may potentially diminish as the person grows older because of other vital considerations. Language is such a complex tool that humans use for them to interact every day of their lives. However, as observed the young child does not speak the language the way as adult do, but this does not contest the fact that even in their own simple ways, young children are capable of producing a language that is enough for the adults to understand. The very basic of this for instance is shown

Saturday, August 24, 2019

Final Growth Report Essay Example | Topics and Well Written Essays - 500 words

Final Growth Report - Essay Example I found many things I had forgotten about, but overall have learned many important things about me and my personal growth as a person. I have found myself, more and more recently, pushing myself to the very edge of my existence, both spiritually, mentally, and physically. I want to see exactly what I can do, how I tick, and how long I can make myself tick for. I find myself taking on challenges and to much work, in hopes of keeping myself busy and occupied. I may slip up a little here and there, by I try to spread myself out to many different possibilities, hoping to expand my fields of study and learning as far as I possibly can. I also have found that it is more myself, that everyone else who I let make my challenges. Not saying I would turn down one that comes to me, but I keep raising the bar, pushing the tally, and raising the ante, to keep myself moving fast and foremost towards the challenging goals I have set for my personal growth. I also find myself jumping to leadership positions I would have once shied away from, and feel the need to be the leader, as well the want to take on the role when I see what I consider to be insufficient leaders to be doing a job I feel I could be doing much better. Well this rashness and bravado of myself may be a downtrodden effect of my ego, it also helps serve how well I strive for the best I can achieve. I also seem to feel a changin

Project Assessment Essay Example | Topics and Well Written Essays - 1500 words

Project Assessment - Essay Example Heseltine, the former deputy prime minister, criticized the cost-benefit analysis of the HS2 high-speed railway line. He even suggested that the expected cost of  £42.6 billion could be reduced by  £10 billion. The comment came after the heightened debate about the certainty of the estimated benefits of the HS2 project. Heseltine also pointed out that the analysis did not consider consequential growth in the project these included later expansion to connect London and Birmingham in 2026, and Manchester and Leeds by 2033. This attracted undying criticism from many quarters. However, the government was insistent that the benefits the project will bring outweighs the project’s cost. One of the latest criticisms was that the government overestimated the value of time that people travelling for business would save for short journeys. The assumptions at the time did not consider that a person could still work on transit using their laptops or other mobile devices. This has seen the time savings on business travel cut down by about a third (Mason & Watt 2013).

Friday, August 23, 2019

Conducting successful meetings Coursework Example | Topics and Well Written Essays - 500 words

Conducting successful meetings - Coursework Example Through allocation, the various people account for their action and, therefore, strive to achieve success in their respective roles thereby contributing to the success of the meeting. After assigning the tasks to different people, a meeting planner must maintain team operation with the various individuals. This ensures that they consult and, therefore, prevent mistakes. Reviewing all the actions and responsibilities at the end of the meeting further enhances the success of the meeting. The act provides the organizers with the opportunity to assess the performance of the various people assigned specific tasks. Furthermore, the review enables the organizers to assess the facilities used in the meeting and their status. Damages, loses and accidents are occurrences that even organizers must always anticipate. The review is, therefore, a perfect opportunity to assess the degree of damage and loses in order to evaluate the meeting. During the assessment, every individual assigned a task accounts for his or her roles and describes the challenges encountered. Such reviews enable the organizers to learn with the view to bettering future meetings by correcting they make in every meeting. A good meeting planer must provide a summary of the meeting coupled with the deliverables. The summary coupled with the deliverables act as the meeting’s blueprint. It explains the importance and significance of the meeting. furthermore, the summary explains the various features a meeting requires. This enables the planer to tailor an event that befits a particular meeting. The provision of a summary enhances the organization process since it helps in securing the resources in the organization of a successful meeting (Boehme, 2008). When outlining the deliverables, the planner must account for every facility and resource included and cover for miscellaneous. This way, the meeting anticipates

Thursday, August 22, 2019

Steady Oil Price Hike Essay Example for Free

Steady Oil Price Hike Essay The article about the rising oil price indicates two main economic concepts: first, â€Å"the rule of supply and demand†, and second, that† human wants is insatiable. † Oil is a natural resource and it is created by nature through thousands of years. Time is a very important element in the production of oil. Despite the fact that oil wells and rigs are discovered and/or pumped, still, the natural element of this product is very important. Going back to the relevant economic factors about rising oil prices, there is an unlimited demand for oil while its supply is getting scarcer. Aside from this fact, millions, if not billions, of dollars of investments are needed to have the black gold extracted, refined, and distributed. Everywhere oil is used. It is not only with the vehicles but also with all the machineries producing the goods and even food products that we consume on a daily basis. The second economic factor is the insatiability of humans in terms of their wants. Everyone wants this and everybody wants that. We all consume. We all want to acquire resources. This relates to the article in a sense that: (1) more consumption means more oil consumption; (2) in acquisition of wealth, natural and man-made factors happen in having oil prices rise; and (3) investors in oil trade would always go for a good profit margin while consumers would like to spare resources (money). The first factor is related to the explanation of supply and demand above. The second factor is important because natural calamities such as storm affects oil production but this all goes back to the fact that once the supply of oil is limited, and the demand is big, the market has to balance out and the only way is to raise prices. This benefit the â€Å"wants† of the investors who, in every situation, have their means in having their investments get a very good return. Consumers on the other hand, take their chance in acquiring cheaper oil as they want o save their resources in order to have extra left behind to acquire the rest of their needs and wants and this is explained by having their tanks full before the prices increase. Lastly, oil is not in market where fair competition rules. It is monopolistic. The major factor that makes it so important is its scarceness; its having limited supply with steady demand. Peer review on responses 1, 2 and 3 In the first response, the idea that oil is very vital in society is agreeable. The rest of the discourse of the article, however, is strongly disagreeable. First, in the point indicated that â€Å"the oil industry is an example of a perfectly competitive industry† and at the same time noting that â€Å"neither the firm nor its consumers decide on the price, rather the entire industry†. First oil is a product that triggers monopoly whether consumers like it or not. Second, the article contradicts itself: if the industry decides on the pricing itself, not the interaction of the oil firms and their consumers, this means that the market is â€Å"not free†. Not free means NO competition at all. Lastly, the article noted that â€Å"consumers never worried about spending massive amounts of money on oil during an economic struggle† and it is not true. Oil makes everything else expensive and it may be possible that no demonstrations are done against oil but against economic crisis, but it is important to realize that at least 70% of that crisis can be attributed to oil price movement: your cereal will be expensive once oil used in machineries producing it becomes expensive! Argument number two is also very good emphasizing the monopolistic characteristic of oil as a consumer product. The article even dwelled on deeply going into criteria of monopoly to establish the hypothesis, that indeed, this product is never a competitive product, in a sense that whether consumers like it or not, they are just forced to acquire oil out of necessity. The article is very â€Å"narrow† though. Maybe a little bit of expansion as to the idea of having it monopolistic and other related factors would even make the idea of the response more interesting. Lastly, response number 3 is a very good work. Admittedly, my response runs on parallel path as this one. It emphasizes the scarcity of the product, the inelasticity of demand, which is always there, despite the presence of supply or not. It focuses in the effect of transportation though, just like what was written in the article, not like what I have though to widen my perspective in reacting to oil-related write up.

Wednesday, August 21, 2019

The Introduction To Malicious Software Computer Science Essay

The Introduction To Malicious Software Computer Science Essay Malware is a collective term for any malicious software which enters system without authorization of user of the system. The term is created from amalgamation the words malicious and software. Malware is a very big hazard in todays computing world. It continues to grow in capacity and advance in complexity. As more and more organization try to address the difficulty, the number of websites distribute the malware is rising at an frightening rate and is getting out of control. Most of the malware enters the system while downloading files over Internet. Once the malicious software finds its way into the system, it scans for vulnerabilities of operating system and perform unintended actions on the system finally slowing down the performance of the system. Malware has ability to infect other executable code, data/system files, boot partitions of drives, and create excessive traffic on network leading to denial of service. When user executes the infected file; it becomes resident in memory and infect any other file executed afterwards. If operating system has a vulnerability, malware can also take control of system and infect other systems on network. Such malicious programs (virus is more popular term) are also known as parasites and adversely affect the performance of machine generally resulting in slow-down. Some malware are very easy to detect and remove through antivirus software[1]. These antivirus software maintains a repository of virus signatures i.e., binary pattern characteristic of malicious code. Files suspected to be infected are checked for presence of any virus signatures. This method of detection worked well until the malware writer started writing polymorphic malware [15][16] and metamorphic malware. These variant of malware avoid detection through use of encryption techniques to thwart signature based detection. Security products such as virus scanners look for characteristics byte sequence (signature) to identify malicious code. The quality of the detector is determined by the techniques employed for detection. A stealth malware detection[36] technique must be able to identify malicious code that is hidden or embedded in the original program and should have some capability for detection of yet unknown malware. Commercial virus scanners have very low resilience to new attacks because malware writers continuously make use of new obfuscation methods so that the malware could evade detections. 2.1 Computer Virus A computer virus[6] is basically a program which is written by the programmers whose behaviour is to replicate itself and spread from one computer to another. The term virus is also normally, but incorrectly, used to refer to other types of malware, including but not limited to adware .and these spyware programs that do not have a reproductive ability. Malware includes various computer viruses[6], such as computer worms, Trojan horses[17], most of them are rootkits, spyware which are also considered as dishonest adware and other malicious or redundant software, including proper viruses. Viruses are occasionally confused with worms and Trojan horses, which are theoretically different. A worm can exploit security vulnerabilities to spread itself repeatedly to other computers through networks[7], while a Trojan horse is a program that appears nontoxic but hides malicious functions. Worms and Trojan horses[17], like viruses, may harm a computer systems data or recital. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohens theoretical compression virus[6]. However, various antivirus professionals[5] dont admit the concept of kindly viruses, as any beloved function can be implemented without involving a virus automatic compression, for instance, is available under the Windows operating system at the choice of the user. Any virus will by definition make unconstitutional changes to a computer, which is undesirable even if no damage is done or intended. On page one of Dr Solomons Virus pdf, the undesirability of viruses, even those that do nothing but reproduce, is thoroughly explained. 2.1.1 Academic Work Veith Risak published[6] the article whose title was as follows Selbstreproduzierende Automaten mit minimaler Information sà ¼bertragung (Self-reproducing automaton with minimum information switch over). The article described a fully serviceable virus written in assembler language for a particular SIEMENS 4004/35 computer system. In the year 1980 Jà ¼rgen Kraus wrote his thesis on Selbstreproduktion bei Programmen at the University of Dortmund. In his work Kraus guess that computer programs[4] can behave in a way parallel to biological viruses. In the year of 1984 Fred Cohen at the University of Southern California wrote his paper on the Computer Viruses[6] Theory and Experiments. It was the first paper of him in which he has explained to clearly call a self-reproducing program a virus, a term introduced by Cohens mentor Leonard Adleman. Fred Cohen published a exhibition that there is no algorithm that can perfectly detect all potential viruses. An article that published on malware that describes useful virus functionalities was available by J. B. Gunn in the title Use of virus functions to provide a virtual APL predictor under user control in 1984. 2.1.2 Science Fiction There are several myths associated with the science.The actual term virus was first used to symbolize a self-reproducing program in a small story by David Gerrold in Galaxy magazine in 1969-and later in his 1972 novel, When HARLIE Was One. In that novel, a attentive computer named HARLIE writes viral software to recover damaging personal information from other computers to blackmail the man who wants to turn him off. Michael Crichton[7] told as a sideline story of a computer with telephone modem dialing potential, which had been automatic to randomly dial phone numbers until it hit a modem that is answered by another computer. It was an attempt to program the answer computer with its own program, so that the second computer would also begin dialing unsystematic numbers, in search of yet a different computer to program. The program is assumed to spread exponentially through susceptible computers. 2.1.3 Virus Programs The Creeper virus[6] was first detected on ARPANET, the prototype of the Internet, in the early 1970s. Creeper was an new self-replicating program developed by Bob Thomas at BBN Technologies in 1971. Creeper has used the ARPANET to infect DEC PDP-10 computers which are running on the TENEX operating system. Creeper gain admission via the ARPANET and banal itself to the isolated system where there was a message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called which is known as Elk Cloner was the first PC virus to appear in the uncultivated that is, outside the single computer or lab where it was created by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was studying in the high school and was injected in a game on a floppy disk. On his 50th iterative use the Elk Cloner virus would be activate, which prone to infecting the PCs and displaying a short poem beginning Elk Cloner: The program with a personality. The first IBM PC virus in the natural was a boot sector virus dubbed and created by the Farooq Alvi Brothers in Lahore, Pakistan, seemingly to deter piracy of the software they had written. Before computer networks[7] became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the PCs, many users frequently exchanged their information and programs on floppies. Some of the viruses are spread by infecting programs which are stored on these disks, while others programs installed themselves into the disk boot sector, which ensure that they would be run when the user booted the computer from the disk, usually inadvertently. Personal computers of the period would try to boot from the floppy at first if one had been left in the drive. Until floppy disks rejects, this was the most unbeaten infection strategy and that is why boot sector viruses were the most common in the wild for many years. Conventional computer viruses[6] emerge in the 1980s, that are driven by the spread of PCs and the consequential increase in BBS, modem use, and software sharing. Bulletin board-driven software giving out contributed directly to the swell of Trojan horse programs, and computer viruses which were written to infect readily traded software. Shareware and bootleg software were equally common vectors for viruses on BB Systems Viruses can increase their chances of spreading over the several other computers which in networks[7] by infecting the files on the particular network file system or a file system which can be access by other computers Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as MS-Word and MS-Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word processor and Excel spread sheets were also available for Mac OS, most could also spread to Macintosh computers. Although most of these computer viruses[6] may not have the capability to send contaminated email messages to those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to repeat themselves with added blank lines. If two macro viruses concurrently infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend which isa trusted source follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005.There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo!. 2.2 Classification In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs (see code injection). If a user attempts to begin an infected program, the virus code may be executed concurrently. Viruses can be separated into two types based on their performance when they are executed. Nonresident viruses straight away search for other hosts system or OS which can be infected, or infect those targets, and finally transfer organize to the application program they infected. Tenant viruses do not search for hosts when they are happening. Instead, a resident virus masses itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself. 2.2.1 Nonresident Viruses Nonresident viruses can be notion of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file. 2.2.2 Resident Viruses Resident viruses contain a replication module which is parallel to the one that is engaged by nonresident viruses. This section, however, is not called by a finder module. The virus[27] masses the duplication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to carry out a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer. Resident viruses are sometimes can be divided into a class of fast infectors and a class of slow infectors. Fast infectors are those which are designed to infect as many files as soon as possible. A fast infector, for instance, can infect every potential host file that is accessed. This pose a special difficulty when using anti-virus software[1], since a virus scanner will access every prospective host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can piggy-back on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software[5] that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful. In most of the operating systems which use file extensions to determine program relations such as Microsoft Windows. The extensions may be normally hidden from the user by default. This makes it probable to create a file that is of a different type than it appears to the users or programmers. For example, an executable file may be created named picture.png.exe, in which the user sees only picture.png and therefore assumes that this file is an image and most likely is safe, yet when opened runs the executable on the client machine. An additional scheme is to generate the virus system from parts of existing operating system files by using the CRC16/CRC32 data. The initial code can be quite small (tens of bytes) and unpack a fairly large virus. This is analogous to a biological prion in the way it works but is vulnerable to signature based detection. This attack has not yet been seen in the wild. 2.3 Infection Strategies Virus avoids detection[31] by users, some viruses employ different kinds of deception. Some of the old viruses, especially on the MS-DOS operating system, make sure that the last modified date of a host file stays the same when the file is infected by the virus. This approach does not fool antivirus software, however, especially those which maintain and date cyclic redundancy checks on file changes. Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file. Some viruses try to avoid detection by killing the tasks associated with antivirus software[1] before it can detect them. As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access. 2.3.1 Read Request Intercepts While some antivirus software employ various techniques to counter stealth mechanisms, once the infection occurs any recourse to clean the system is unreliable. In Microsoft Windows operating systems, the NTFS file system is proprietary. Direct access to files without using the Windows OS is undocumented. This leaves antivirus software little alternative but to send a read request to Windows OS files that handle such requests. Some viruses trick antivirus[5] software by intercepting its requests to the OS. A virus can hide itself by intercepting the request to read the infected file, handling the request itself, and return an uninfected version of the file to the antivirus software. The interception can occur by code injection of the actual operating system files that would handle the read request. Thus, an antivirus software[1] attempting to detect the virus will either not be given permission to read the infected file, or, the read request will be served with the uninfected version of the same file. File hashes stored in Windows, to identify altered Windows files, can be overwritten so that the System File Checker will report that system files are originals. The only reliable method to avoid stealth is to boot from a medium that is known to be clean. Security software can then be used to check the dormant operating system files. Most security software relies on virus signatures or they employ heuristics, instead of also using a database of file hashes for Windows OS files. Using file hashes to scan for altered files would guarantee removing an infection. The security software can identify the altered files, and request Windows installation media to replace them with authentic versions. 2.3.2 Self-Modification Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. Unfortunately, the term is misleading, in that viruses do not possess unique signatures in the way that human beings do. Such a virus signature is merely a sequence of bytes that an antivirus program looks for because it is known to be part of the virus. A better term would be search strings. Different antivirus programs[1] will employ different search strings, and indeed different search methods, when identifying viruses[6]. If a virus scanner finds such a pattern in a file, it will perform other checks to make sure that it has found the virus, and not merely a coincidental sequence in an innocent file, before it notifies the user that the file is infected. The user can then delete, or in some cases clean or heal the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viru ses modify their code on each infection. That is, each infected file contains a different variant of the virus. 2.3.3 Encryption With A Variable Key A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting dependent methods and an encrypted copy of the virus code. If the virus is encrypted with the help of different key for each infected file, the only part of the virus that leftovers stable is the decrypting unit, which would (for example) be appended to the end. In this case, a virus scanner will not able to detect directly the virus using signatures, but it can still detect the decrypting unit, which still makes indirect revealing of the virus possible. Since these would be symmetric keys, stored on the infected host. In fact completely possible to decrypt the final virus, but this is almost certainly not required, since self-modifying code is such a scarcity that it may be basis for virus scanners to at least flag the file as suspicious. This may be old , but solid, encryption involves XORing each byte in a virus with a even, so that the exclusive-or operation has only to be frequent for decryption. It is doubtful for a code to adjust itself, so the code to do the encryption as wll as decryption may be part of the signature in many virus definition. 2.3.4 Polymorphic Code Polymorphic code was the first technique that posed a serious threat[27] to virus scanners. Likewise various normal encrypted viruses such as a polymorphic virus[15][16] infects files with an encrypted copy of itself, which may be decoded by a decryption method. In the case of polymorphic viruses or polymorphic worms[10], however, this decryption module is also modified on each infection. A well-written polymorphic virus thus has no parts which wait identical between infection, making it very difficult to detect directly using signatures. Antivirus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has must have a polymorphic engine which is also called mutating engine or mutation engine anywhere in its encrypted body. Some viruses employ polymorphic code in a system that constrain the change rate of the virus appreciably. For example, a virus can be planned to alter only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that previously contains copies of the virus. The benefit of using such sluggish polymorphic[15][16] code is that it makes it more difficult for antivirus professionals to get representative sample of the virus, because tempt files that are infected in one run will naturally have identical or parallel sample of the virus. This will make it more liable that the detection by the virus scanner will be variable, and that some instances of the virus may be able to avoid detection. 2.3.5 Metamorphic Code To avoid being detected by emulation, some viruses revise themselves completely each time they are to infect new executables. Viruses that make use of this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine must be needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consists of over 15,000 lines of assembly language code, 90% of which is part of the metamorphic engine. 2.3.6 Avoiding Bait Files and other Undesirable Hosts A virus wants to infect hosts in order to multiply further. In some cases, it might be a bad idea to infect a mass program. For example, many antivirus softwares perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of antivirus software. Another type of host that viruses[27] sometimes avoid are bait files. Bait files (or goat files) are files that are specially created by antivirus software, or by antivirus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus: Antivirus professionals can use tempt files to take a test of a virus. It is more realistic to store and exchange a small, infected lure file, than to swap a large application program that has been infected by the virus. Antivirus professionals can use bait files to study the actions of a virus and assess detection methods. This is particularly useful when the virus is polymorphic[15][16]. In this case, the virus can be made to infect a large number of entice files. The grimy files can be used to test whether a virus scanner detects all versions of the virus. Some antivirus software employ bait files that are accessed regularly. When these files are modified, the antivirus software warns the user that a virus is probably active on the system. Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of garbage instructions. A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week. 2.4 Vulnerability and Countermeasures 2.4.1 The Vulnerability of Operating Systems to Viruses Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. Microsoft software is targeted by virus writers due to their desktop dominance. Although Windows is by far the most popular target operating system for virus writers, viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. As of 2006, there were at least 60 known security exploits targeting the base installation of Mac OS X (with a Unix-based file system and kernel). The number of viruses[6] for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. Many Mac OS Classic viruses targeted the HyperCard authoring environment. The difference in virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising. In January 2009, Symantec announced the discovery of a Trojan that targets Macs. This discovery did not gain much coverage until April 2009. While Linux, and Unix in general, has always natively blocked normal users from having access to make changes to the operating system environment, Windows users are generally not. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like XP. In 1997, when a virus for Linux was released-known as Bliss-leading antivirus[5] vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows. The Bliss virus may be considered characteristic of viruses-as opposed to worms-on Unix systems. Bliss requires that the user run it explicitly, and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked. 2.4.2 The Role of Software Development Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits. 2.4.3 Anti-Virus Software and other Preventive Measures Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computers memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus signatures. The disadvantage of this detection[32] method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect novel viruses that anti-virus security[7] firms have yet to create a signature for. Some anti-virus programs are able to scan opened files in addition to sent and received email messages on the fly in a similar manner. This practice is known as on-access scanning. Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to recognize the latest threats[27]. One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives. 2.4.4 Recovery Methods A number of recovery options exist after a computer has a virus. These actions depend on the virus. Some may be safely removed by functions available in most anti-virus software products. Others may require re-installation of damaged programs. It is necessary to know the characteristics of the virus involved to take the correct action, and anti-virus products will identify known viruses precisely before trying to dis-infect a computer; otherwise such action could itself cause a lot of damage. New viruses that anti-virus researchers have not yet studied therefore present an ongoing problem, which requires anti-virus packages[1] to be updated frequently. 2.4.5 Virus Removal One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files and does not exist in previous restore points. Some viruses disable System Restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is Cia Door. Many such viruses can be removed by rebooting the computer, entering Windows safe mode , and then using system tools. Many websites run by anti-virus software companies provide free online virus scanning, with limited cleaning facilities (the purpose of the sites is to sell anti-virus products). Some websites allow a single suspicious file to be checked by many antivirus programs in one operation. Additionally, several capable antivirus software programs are available for free download from the internet (usually restricted to non-commercial use), and Microsoft provide a free anti-malware utility that runs as part of their regular Windows update regime. 2.4.6 Operating System Reinstallation Reinstalling any OS is another loom to virus removal. It involves either reformatting the computers hard disk drive and installing the operating system and

Tuesday, August 20, 2019

Role Of Fathers In Lives Of Children

Role Of Fathers In Lives Of Children Parents serve an important role in the socialization of children by modeling important values, principles, ideals, attitudes, actions and behaviors that influence the physical, emotional and social development of the child. Fathers and mothers have unique differences that cause them to have different parenting roles, that when combined, provide the most comprehensive model to help the child develop successfully. For this reason, children need both parents to help them develop the skills to help them build successful social relations, engage in responsible behavior, develop the confidence and skills to be successful in school and to become well-rounded emotionally, physically and psychologically. Over the last two decades, researchers have begun to pay more attention to the idea that fathers make important contributions to child development (Parke, 2004; Davis Perkins, 1996). Evan (1995) indicates, however, that while fathers have now become the subject of studies and review, this is a relatively new area of study. Given the potential role involved fathers have on the development of their children, it is important to understand how fathers perceive their fathering role and its impact on children. The goal of this paper is to examine the role of fathers in the lives of their children in the literature and to identify a gap in the literature in order to come up with a research question for a future study. Review of the Literature Schock and Gavazzi (2005) observe that despite the expansion of fatherhood literature over the last several decades, not much is understood about the role of fathers in their relationship with problematic adolescents. This has prompted researchers to examine fathers parental skills. For example, Nicholson, Howard and Borkowski (2008) investigated whether fathers were able to display metaparenting skills during the first two years of their childrens lives. Metaparenting refers to a mental plan that parents use when caring for their children across five domains: responding, preventing, monitoring, mentoring, and modeling. To determine how fathers think about and conceive of their parenting strategies, the researchers looked at the two main factors contributing to paternal identity: father absence and the availability of positive parenting role models. The participants included 87 fathers. Fathers were also evaluated for their metaparenting beliefs and behaviors, and assessed for parent ing stress, parenting style, knowledge of child development and child abuse potential. The study revealed that positive parenting role models and intelligence were associated with working models of parenting based on the five components of metaparenting. Furthermore, authoritative parenting and a decrease in abuse potential were related to higher levels of metaparenting. In a previous study, Schock and Gavazzi (2005) used a modified grounded theory approach (i.e., one based on the participants meaningful experiences) to examine the intra-psychic and interpersonal difficulties that fathers had with adolescent daughters who are involved in the court system. Fourteen fathers (mean age=46.6 yrs.) and their daughters (mean age=15.6 yrs) who participated in a family-based diversion program for their at-risk adolescent daughters took part in the study. The goal of the program was to help each family identify and support the developmental needs of their adolescents so that they can successfully move into adulthood. The fathers completed face-to-face semi-structured interviews with the questions addressing topics such as the fathers perception of their relationship with their adolescents, fathers unique skills to cope with the adolescents problematic behavior, and barriers/facilitators for participating in the program. The results indicate that fathers of fem ale adolescents had feelings of uncertainty about their role as parents in four areas: poor understanding of their daughters female issues (e.g., dating, menstruation, etc.), communication barriers related to conversation topics and style of communication, limited involvement due to the absence of shared interests, and indecision about how to address their daughters problematic behavior. Based on the findings by Schock and Gavazzi (2005), it is possible that fathers have communication problems with their teenage daughters because they did not form secure attachments with their daughters during the first two years of their lives. Later studies found similar connection between childrens attachment with their fathers and father involvement. McDonald and Almeida (2004) used an ecological perspective to examine the differential impact of work experiences on fathering experiences at home in 290 fathers (mean age=40). The participants first completed a 30 to 40 minute telephone interview about their daily experiences after which they were mailed a written survey, which asked them questions about how their time was spent in the past 24 hours (e.g., cutbacks at work, and their daily work/family stressors. The authors found that fathers tend to report a greater likelihood of providing emotional support to their children on those days when they experience overloads on the job as well as on days when they cut back their workload. The amount of time that fathers spent with their children was found to be moderated by how much control or latitude they have at work. The authors conclude, however, quantity of time alone may not impact the quality of the fathering experience. This conclusion is supported by Newland, Coyl and Freeman (2008), who investigated the relationships between preschoolers attachment security, fathers involvement and fathering context in 102 culturally diverse U.S. fathers of preschoolers age 2-5. The results indicate that fathers secure attachments with other adults and their use of social support were related to parenting and co-parenting behaviors. These in turn, predict child attachment security. The use of rough housing play was considered the most important predicator of child attachment security, more important than fathers sensitivity and consistency. According to the authors, the findings suggest that fathers play an important role in their childrens attachment security, and that shared father-child activities, parenting consistency and co-parenting behaviors should be emphasized among fathers. An important finding in the literature is that fathering strategies are related to paternal role identity. Maurer (2007) assessed caregiving identities, perceptions of partners expectations and the perceived caregiving behavior in 73 fathers (mean age 33.7 yrs). The researcher found that the perceived behaviors of other fathers were significant predictors of fathers behaviors toward their own children. Bronte-Tinkew, Carrano and Guzman (2006) argue that it is important to determine how fathers identify themselves as parents by examining their perceptions of themselves as fathers. As a result, they investigated the perceptions of resident fathers (i.e., fathers who live with their children) regarding their roles in the lives of their children and how this affect their involvement with infants in five areas: caregiving activities, paternal warmth, nurturing activities, physical care, and providing their child with cognitively stimulating activities. Most of the resident fathers believe d that their role as fathers play an important part in their childrens development. The results further indicate that while most fathers were highly involved in providing physical care to their babies, they were not highly involved in cognitively stimulating activities such as reading with their children. The fathers sociodemographic characteristics (race, marital status, education, and socioeconomic status) impact their perceptions of fathering (e.g., Hispanics and other race fathers had significantly lower positive perceptions of their roles compared to other participants). Married fathers and fathers living above the poverty line had higher scores that unmarried fathers and fathers living below the poverty line. Fathers with infant sons had stronger belief in the importance of their roles and more paternal involvement than those with daughters. The latter finding is supported by Schock and Gavazzi (2005) who found that fathers of adolescent daughters face challenges when communic ating with their adolescent daughters, which is a factor in their indecision about how to deal with the problematic behavior of their daughters. A later study by Wilson, Dalberth and Koo (2010) support and expand the findings of Schock and Gavazzi (2005) and Bronte-Tinkew, Carrano and Guzman (2006) in terms of fathers involvement in their lives. The perspectives of 131 fathers on their role in protecting their pre-teenage children from sexual risk was investigated. The results indicated that while fathers take a strong role in keeping their children safe and successful, some did not talk openly and frequently with their children about sex. Though almost all the fathers agreed that fathers perspectives on the issue of sex are important for children to hear, the gender of their child determined how comfortable they were discussing sexual matters. Fathers felt that they were better suited to discuss topics such as male puberty than female topics such as menstruation. Race also played a factor, with Hispanic fathers reporting that they were more protective of their daughters than their sons. According to Gonzalez-Lopez (2004), Hi spanic fathers believe that delaying sex and using protection are important for protecting their daughters from becoming pregnant and for increasing their opportunities to attend and graduate from college. Gaps in the Literature One area that is has not been fully explored in the literature is the relationship between paternal role identity and fathering outcomes. In other words, none of the studies identified looked at the relationship between how fathers perceive their roles (i.e. how they identify themselves as fathers) and how children actually percieve their relationship with their fathers (i.e., outcome of fathers involvement). Maurer (2007) suggests that fathers perception of societal fathering roles is a good predictor of fathers behaviors. Newland, Coyle and Freeman (2008) found that parenting and co-parenting behaviors in fathers were predictors of child attachment security. Schock and Gavazzi (2005) suggest that a lack of secure attachment between fathers and their daughters lead to communication barriers and indecision about how to address problematic behaviors in their teenage daughters. Bronte-Tinkew, Carrano and Guzman (2006) found that higher positive perception of fathering roles were associ ated with high father involvement in mentally stimulating activities with their children such as reading. These findings suggest that fathers who believe that they have an important place in their children development are more likely to achieve better fathering outcomes such as providing their children with caregiving activities, paternal warmth, nurturing activities and cognitively stimulating activities. Research Question The following research question can be used to address the gap in the literature regarding father role perception and fathering outcomes: What is the relationship between paternal role identity and fathering outcomes? The independent variables related to father involvement were cognitively stimulating activities, physical care, paternal warmth, nurturing activities, caregiving activities.

Monday, August 19, 2019

The Oedipus Complex in Oedipus the King :: Sophocles

In Oedipus the King, once upon a time in a kingdom far, far away Queen Jocasta was expecting a baby boy, but one day Tiresias (a blind prophet) dropped by one day to see the queen to give her bad news about her baby. Tiresias said "My queen, the son you will bear will kill his father and marry his mother!!!" The queen was appalled by this news, thus, after the queen had her son she immediately drove him away, by leaving him in the dark, verdant woods. A herder from another kingdom found the baby boy and immediately notified his king about the baby. The king adopted the newborn boy and named it Oedipus. When Oedipus was grown up (in his twenties) he heard a legend that a prince from a kingdom far, far away will kill his father and marry his own mother. Oedipus was frightened that he will kill his father and own marry his own mother so he embarked on a journey to escape the myth. When Oedipus was traveling in his chariot he met a man in the middle of the desert, and the young arrogant Oedipus killed the man. (He did not know that he just killed his biological father) In the gates of Thebes, a sphinx was guarding the kingdom slithering back and forth. Oedipus finally talks to the sphinx, ?Maybe you can spare us some food, my kingdom was shambling into death.? ?Well, well, do you want to enter the kingdom to speak to the queen?. ? ?Yes,? replied Oedipus ?I have a riddle for you my child. If you answer it correctly, you may talk to the queen and you have heard about our king who has been missing for days. We assumed he is rotting in the middle of the desert. I guess the vultures will have a feast? In addition to talking to the queen about your discrepancies you can also marry the widowed queen.? The sphinx asked Oedipus, ?What walks on four legs in the morning, two at noon, and three in the evening?? ?A man,? Oedipus replied and he was correct. So basically he can marry the queen of Thebes and that makes him the king of Thebes. (But keep in mind Oedipus is going to marry his own mother.) The King had the Queen of Thebes four children, two sons, Eyocles and Polynices and two daughters, Ismene and Antigone.

Sunday, August 18, 2019

Interactive Media and Its Effects on Copywriting Essay -- Communicatio

Interactive Media and Its Effects on Copywriting Interactive media and the World Wide Web have become an entirely new medium for advertising copywriters. As new innovations in computer technology arise, copywriters find the best ways to utilize interactive media for marketing their products, and sometimes, themselves. They have discovered several key marketing methods including hypertext, JAVA, and accuracy of information. According to Duif Calvin, author of "The Nintendo Generation," hypertext is the most important marketing tool for advertising on the web. Hypertext is any type of link to another web site containing relevant information about a given topic. It has become very useful to marketers within the past few years. (www.jaderiver.com/glossary.htm). Hypertext allows markets to meet their audience's needs in very specific ways. For example, Ford Motor Company may have a site on the web devoted to the 1999 Ford Mustang. With the use of hyperlinks, Ford can provide detailed information about the car's warranty on a separate site. People who are interested in knowing m...

Our Duties to Animals and the Poor Essay -- Argumentative, McGinn

In this essay, I will discuss if our actions towards animals are immoral. McGinn discusses his reasons shortly, assuming that he is correct. He claims that, â€Å"we have a moral duty to relieve the suffering, and cease the killing, of the animals with which we have dealings† (McGinn 150). This is the structure of his argument: (1) It is morally wrong to cause the suffering and death of animals unnecessarily (2) We do cause the suffering of and death of animals unnecessarily. Therefore: (3) What we do to animals is morally wrong. As my thesis, I will reject his claim, and his arguments that support such claim; I shall call his allegation â€Å"Claim X†. Though objecting to this claim seems intuitively horrendous, I belief that his argument does not demonstrate the correct grounds for readers to be able to empathize with his views. In this paper, I will critically object to McGinn’s fundamental argument, by illustrating the flaws of his supporting claims. After his supporting claims are seen as fallacious, I shall demystify such key argument. Finally, to finish on a good note, I will propose an alternative view on the matter. To start, I want to first define the terms, as he has on his article. By the term â€Å"suffering†, McGinn defines them as the following: â€Å"Eating meat, hunting, vivisection, and fur coats, and the like† (McGinns 151). For â€Å"the like†, I propose he meant, other activities such as owning animals, using them for entertainment, or work. To support his argument, he poses the following three points. First, he asserts that our uses of animals do not justify our means. Second, he believes that it is our moral duty to not cause any unnecessary suffering on animals. Third and last, he claims that it is erroneous to think of a... ... destroy the environment by destroying the animals. If it is our moral duty to preserve the environment, then it is our moral duty to preserve the species that come with it. Therefore, it is morally incorrect to allow those species to be used as production material. Wrapping up, McGinn’s â€Å"Claim X† fails, it is not our duty to relieve the suffering and stop the killing of animals, which we have dealings with. â€Å"Claim X† fails because, McGinn’s supporting points do not have enough strength to support the three-premise argument. Since the argument for â€Å"Claim X† is not sustained, we are susceptible to believe that our duty towards animals end when we restrain from abusive, violent, or destructive behavior; but not when animals provide us with benefits that are intrinsic to them. In conclusion, our current interactions with animals do not portray an immoral behavior.

Saturday, August 17, 2019

Communication Structure of Standard Chartered Bank

A report submitted to the Department of English in part-fulfillment of the requirements of the Final Examinations in Business Communications, Fall 2008 Prepared and submitted by SUNSHINE Section: c Tazrin Mst. Nazia Zohora Fatema tuz Islam Md. Atikul Miah Abu Kausar Course teacher Professor Faizur Rashed Gullu Date of submission 4 December 2008 North Global University of Dhaka Page 1 of 25 4 December 2008 Prof.Faizur Rashed Gullu Course Instructor Business Communication North Global University of Dhaka Subject: Submission of our report Dear sir, We have the pleasure to submit our report titled ‘Communication Structure of Standard Chartered Bank’. This was a good opportunity for us to understand and deal with the problem. The study was aimed at knowing the communication structure of Standard Chartered Bank. If any lacking is found, the organization will be able to improve performance. The study will find a chance to know the system of the organization and its communicatio n system which will increase our knowledge and experience.They have very effective communication system. By removing the communication barriers between higher level managers and lower level managers they can do it better. We once again thank you for giving us the chance to do the report. Yours sincerely, Zohora Fatema tuz 08-10489-1 Tazrin Mst. Nazia 07-08937-2 Islam Md. Atikul 07-09137-2 Miah Abu Kausar 07-08446-2 Page 2 of 25 Preface This report is made based on the communication structure of Standard Chartered Bank. Based on case study of some employees of Standard Chartered Bank, the report was made.This report contains the communication structure of Standard Chartered Bank. It also has some suggestions for the Standard Chartered Bank to make their communication process more effective and to make their organization’s performance better. This report has some concept of communication, the process of communication, communication channel, mass communication, communication bar riers, altogether, the concept of organizational communication. And the implications of them in The Standard Chartered Bank that if they are using them properly and what should be done if they are not using them properlyPage 3 of 25 Acknowledgement At first, we take the opportunity to thank The Almighty. Then we express our thanks to our department and authorities for granting us such opportunity in this level. We are very pleased to accomplish the assigned task given by our revered course instructor Prof. Faizur Rashed Gullu sir. While completing this report we faced different problems such as shortage of time, information, convincing the employees of the bank etc. But we have been able to overcome the problems with direct and indirect assistance from our course instructor. We are really thankful to him.Above all, we have to thank the people at the bank who provided us with valuable information, gave us their valuable time and helped us in every way possible. Finally, we are please d to complete the report on the given subject properly and authentically. Page 4 of 25 TABLE OF CONTENTS Forwarding letter Preface Acknowledgement Table of contents List of illustrations Abstract 1. 0 Introduction 1. 1 1. 2 1. 3 1. 4 1. 5 1. 6 1. 7 1. 8 What is communication The process of communication Necessity of communication Barriers of communication Introduction of the organization Objectives Scope Research methodology 1. . 1 Sample 1. 8. 2 Case study 1. 9 Limitations Page no. i ii iii iv v vi 01 01 02 08 08 09 10 11 11 12 13 13 14 14 14 15 16 17 18 19 vii 2. 0 Organization of the report 2. 1 Case studies Case study 1 Case study 2 Case study 3 Findings 2. 2 3. 0 Conclusion 4. 0 Recommendation Bibliography Page 5 of 25 List of illustrations Figure 1. 1 The basic communication process Figure 1. 2 Flow of communications Page-4 Page-6 Page 6 of 25 Abstract The transference and understanding of meaning is communication. No groups can exist without communication: the transference of meaning among its members.It is only through transmitting meaning from one person to another that information that information and ideas can be conveyed. The key parts of the communication process are (1) the sender (2) encoding (3) the channel (4) decoding (5) the receiver (6) feedback. There are three types of communication: upward, downward, lateral. The study was aimed to know the communication structure of Standard Chartered Bank. If any lacking is found, the organization will be able to improve performance. The study will find a chance to know the system of the organization and its communication system which will increase our knowledge and experience.The study has been done with the method case study. The study was done with the help of random sampling. The sample size of the study was 3. Their communication style is very rich. They have very effective communication system. By removing the communication barriers between higher level managers and lower level managers they can do it better. They should enrich their formal communication system. We think that after doing these things they will be improved. Page 7 of 25 1. 0 Chapter 1 : Introduction 1. 1 What is communication? The transference and understanding of meaning is communication. Communication is more than merely imparting meaning.It must also be understood. In a group in which one member speaks only German and another one do not know German, the individual speaking German will not be fully understood. Therefore must include both the transference and understanding of meaning. Research indicates that poor communication is probably the most frequently cited source of interpersonal conflict. Because individuals spend nearly 70 percent of their walking hour’s communicating-writing, reading, speaking, listening-it seems reasonable to conclude that one of the most inhibiting forces to successful group performance is a lack of effective communication.No groups can exist without communication: the t ransference of meaning among its members. It is only through transmitting meaning from one person to another that information that information and ideas can be conveyed. Communication, however, is more than merely imparting meaning. It must also be understood. In a group in which one member speaks only German and the others do not know German, the individual speaking German will not be fully understood. Therefore, communication must include both the transference and the understanding of meaning.An idea, no matter how great, is useless until it is transmitted and understood by others. Perfect communication, if there were such a thing, would exist when a thought or an idea was transmitted so that the mental picture perceived by the receiver was exactly the same as that envisioned by the sender. Page 8 of 25 Communication serves four major functions within a group or organization: control, motivation, emotional expression, and information. 1. Control member behavior. 2. Foster motivati on for what is to be done. 3. Provide a release for emotional expression. 4. Provide information needed to make decisions. . 2 The process of communication Before making too many generalizations concerning communication and problems in communicating effectively, it is needed to know the level of communication and communication process 1. 2. 1 Levels of Communication: †¢ Intrapersonal Top level management mainly takes internal decision, so internal decision depends on them on many sectors †¢ Interpersonal Middle level managers are sometimes allowed to make some effective organizational decision †¢ Extra personal Communication between human & nonhuman being †¢ Organizational In organization higher level employees take decision.In this bank most of the decisions are taken by top level management †¢ Formal Language Those languages which are used inside office. In this bank they usually use to talk one another they simply use brother or sister. †¢ Cross-cult ural In a cross-culture there are two divisions high and low context Page 9 of 25 †¢ Mass: Print Media Electronics Media Organizational Website Before communication can take place, a purpose, expressed as a message to be conveyed, is needed. It passes between a sender and a receiver. The message is encoded and passed by a way of some medium to the receiver, who decodes the message initiated by the sender.The result is transference of meaning from one person to another person. The key parts of the communication process are (1) the sender (2) encoding (3) the channel (4) decoding (5) the receiver (6) feedback. The sender initiates a message by encoding a thought. The message is the actual physical product from the senders encoding. When we speak, the speech is the message. When we write, the writing is the message. When we gesture the movement of our arms and the expression of our face are the message. The channel is the medium through which the message travels.It is selected by the sender, who must determine whether to use a formal or informal channel. Formal channel are established by the organization and transmit message that are related to the professional activities of members. Other forms of message, such as personal or social, follow the informal channel in the organization. These informal channels are spontaneous and emerge as a response to individual choices. The receiver is the object to whom the message is directed. But before the message is received, the symbol in it must be translated into a form that can be understood by the receiver.The step is the decoding of the message. Noises represent communication barriers that distort the clarity of the message. Examples of possible noise sources include perceptual problems, information overload, semantic difficulties, or cultural difference. The final link in the communication process is a feedback loop. Feedback is the check on how successful we have been in transferring our message as original inten ded. It determines whether understanding has been achieved. Page 10 of 25 The communication process model: Figure 1. 1 The basic communication process Communication can flow vertically or laterally.The vertical dimension can be further divided into downward and upward directions. 1. 2. 2 Downward communication Upper level managers are friendly communal to the down level employees. Top level management directly gives any kinds of instruction to the down level manager are called downward communication. Smoothly working down level communication must have needed. Communication that flows from one level of a group or organization to a lower level is a downward communication. When we think of managers communicating with employees, the downward pattern is the one we are usually thinking of.It’s used by group leader and managers to assign goals, providing job instructions, inform employees of policies and procedures, point out problems that need attention and offer feedback about per formance. But downward communication does not have to be oral or face to face contact. When management sends letter to their employees home to advise them of the organizations new sick leave policy, it’s using downward communication. Page 11 of 25 From the team leader to the member of her team, reminding them of an upcoming deadline, is also downward communication 1. 2. 3 Upward communicationGround level officers communicate with the mid-level managers. Mid-level manager communicate with their Divisional Directors. Employees can frankly communicate with upper level managers. When communicated with the Upper level all over observing the rules & regulation. Upward communication flows to a higher level in the group of organization. It’s used to provide feedback to higher–ups, inform them of progress toward goal and really current problems. Upward communication keeps managers aware of how employees feel about their jobs, coworkers and the organization in general.Man agers also rely on upward communication for ideas on how things can be improved. Some organizational examples of upward communication are performance reports prepared by lower level of management for review by middle and top management. Suggestion box, employee attitude surveys, superior – subordinate discussion, and informal ‘gripe’ sessions in which employees have the opportunity to identify and discuss problems with their boss or representative of higher management. 1. 2. 3 Lateral communication Similar level employers also well communicated. Employees freely communicate with colleague’s very casual language, normal behavior.Grapevine is strictly prohibited Political conversation is restricted When communication take place among member of the same work group, among members of work groups at the same level, among managers at the same level or among any horizontally equivalent personal we describe it as lateral communication. Page 12 of 25 Lateral communi cations are often necessary to save time and facilitate coordination. In some case, these lateral relationships are formally sanctioned. More often they are informally created to a short circuit the vertical hierarchy and expedite action.So lateral communication can from management’s view point, be good or bad. Lateral communication can be beneficial, in such case they occur with the knowledge and support of superiors. 1. 2. 4 Crosswise communication Top level management can communicate directly with the ground level. Monthly performance review meeting. Everybody can communicate with everybody in this organization Figure 1. 2 Flow of communications Communication Channel Communication channel means the way of transmitted any kinds of information about this organization. Page 13 of 25 There are two types of communications: a. b.Internal communication channel External communication channel. †¢ Internal communications are: (a) Oral: Telephone, Intercom, Meeting, Presentation , Face to face, meeting (b) Written: Memo, report, graph, e-mail, letter, notice †¢ External Communications are: (a) Oral: Telephone, intercom, Meeting, Presentation, Face to face meeting, Press Briefing (b) Written: Memo, report, graph, e-mail, letter, notice, invitation, annual report, leaflet 1. 3 Necessity of communication The communication shortcoming of employees and the importance of communication in business explain why one should work to improve communication skills.Whatever position one has in business, performance will be judged largely by his/her ability to communicate. If one can communicate well, he/she is likely to be rewarded with advancement. And higher the advancement, more necessity of communication ability. The evidence is clear; improving communication skills improves chances for success in business. Communication is very much important in business; businesses want and need people with good communication skills. Evidence of the importance of communication i n business is found in numerous surveys of executives, recruiters and academicians conducted in recent years.Without exception, these surveys found communication ranking at or near the top of the business skills needed for success. Page 14 of 25 1. 4 Barriers of communication A number of barriers can retard or distort effective communication. Some causes for barriers are, purposely manipulating information for getting more favor, presenting the information based on personal understandings etc. Barriers are 3 types: 1. Intrapersonal 2. Interpersonal 3. Organizational 1. Intrapersonal barriers: Wrong assumptions Varied perceptions Differing background 2. Interpersonal arriers: Limited vocabulary Incongruity of verbal and nonverbal messages Communication selectivity 3. Organizational barriers: Information overload Emotions Language 1. 5 Introduction of the organization Standard Chartered Bank started its business in Bangladesh in 1948, opening its first branch in the port city of Chitt agong. The bank increasingly invested in people, technology and premises as its business grew in relation to the country’s thriving Page 15 of 25 economy. At present the bank has 6 offices in Dhaka Chittagong and Sylhet, including the country’s only offshore banking unit inside the Dhaka Export Processing Zone at Savar.Extensive knowledge of the market and essential expertise in a wide range of financial services underline our strength to build business opportunities for corporate and institutional clients at home and abroad. Continuous upgrading of technology and control systems has enabled the bank of offer new services, which include unique ATMs and Phone banking. Standard Chartered’s services in Bangladesh, ranges from Personal & Corporate Banking to Institutional Banking, Treasury and Custodial services. 1. 6 Objectives The study was aimed at the following objectives: A.Primary objective: To learn about the communication structure of Standard Chartered Bank B. Secondary objectives: To identify the communication strategies of Standard Chartered Bank To find out the internal communication barriers (if any) of Standard Chartered Bank To find out their awareness level of the barriers To suggest remedies for improvement To find out the mass communication style or strategies To found out the impact of gender differences inside the organization To find out the impact of cultural differences inside the organization 1. Scope After making the report some benefits will be there for both the organization and us. Page 16 of 25 17. 1 Scope for Standard Chartered Bank: If any lacking is found in their organization the management will find a way to solve their problem after studying our report. They will be able to make their organization’s system of communication more effective and the organization will be able to improve performance. 17. 2 Scope for the researchers: The study will find a chance to know the system of the organization and its communication system very well which will increase our knowledge and experience.Thus it will help building our career. 1. 8 Research methodology of the report Report is a place of factual writing based on evidence, containing organized information on particular topic o Formal in nature and written for specific audience o Discusses the topic at depth and contains conclusions and recommendations if required The study has been done with the method case study. Rather than using samples and following a rigid protocol to examine limited number of variables, case study methods involve an in-depth, longitudinal examination of a single instance or event: a case.They provide a systematic way of looking at events, collecting data, analyzing information, and reporting the results. As a result the researcher may gain a sharpened understanding of why the instance happened as it did, and what might become important to look at more extensively in future research. Case studies lend themselves to bot h generating and testing hypotheses. As we did not have sufficient time to go for questionnaire survey, we followed the method case study. Page 17 of 25 1. 8. Sample Small segment of the total population which is considered to be the representative of the total population is called the samples and the process through which the samples are selected is called sampling or sampling procedure. There are two types of sampling: 1. Random: To take the interview of the person available 2. Purposive: To take interview of people whom one wants to The study was done with the help of random sampling as because purposive sampling was not possible due to unavailability. The sample size of the study was 3. 1. 8. 2 Case study We took face to face interviews.We went to Standard Chartered Bank Islamic Banking Centre Branch which is situated in Gulshan Avenue. We talked to the three people of personal loan section individually. We asked them the same questions and got answers. After getting their answe rs we organized the three cases and studied the cases to reach the decision. 1. 9 Limitations The study was done in a very short time when we and the employees of The Standard Chartered Bank both were very busy. They at first denied talking to us but after assuring that minimum time of them will be taken they agreed to meet.So, we were unable to ask them many questions which might be important for the valuation and proper conclusion of the report. Page 18 of 25 2. 0 Chapter 2 : Presentation of Cases We did three case studies based on the three interviews of the employees of Standard Chartered Bank. The cases are given below: Case study 1 Md. Sajjadur Rahman Product marketing officer B. Sc. & M . Sc. in Mathematics Unsecured loan consumer Banking Division He works in standard charted bank for two years before coming here he worked as a marketing officer in HSBC bank for two years.In this study they said their all communications is face to face. They contact with their higher level bo ss with e-mail and they also said they contact their immediate boss face to face. When they send any e-mail to their boss it just like a SMS there are no unnecessary thighs there. But when they send any e-mail to their boss its takes time to get the reply . In this study they also said they call their male employees as brother and female employees as sister. There is no sir or madam addressing through the whole organization.In this study we also see that they follow the communication channels are up ward, down ward and lateral. Most of time they use the verbal communication to their employees and it is face to face. He also said there is no non verbal communication use their company. But sometime they use only e-mail for their boss in urgent situation. Some time they go for tour in different countries but every one does not get chance. The person who fill a minimum credits only they can join the tour. In 2006 he tour in Thailand. He is satisfied of there communication style. Page 19 of 25Case study 2 A. M. Sadeeque Hassan Product Marketing Officer BBA, MBA Major in Marketing Unsecured loan consumer Banking Division In this study they said there are very little bit barrier to their company for example they do not call their boss with unsuitable time. Higher level boss reply their e-mail very late. In this study we also known female are more active than male. Even female work on Friday when male are relax there time by visiting or gossiping. In last month one female are getting award by doing her best performance. She process 454 file in one month.It is a friendly work environment as a result it plays a significant role in communication process. There are also some internal communications to employ to employ like face to face, telephone, mobile. He was also fill the credits as a result he could join the tour of Thailand in 2006 . He is also satisfied of there communication style. Case study 3 Md. Fayssal Hossain Assistant Product Marketing officer Honors Masters in Marketing Unsecured loan consumer Banking Division In this study they said that they can talk to their higher level authority direct face to face or phone. There are also down ward, upper ward and horizontal communication.In standard charted bank all work has been done by group work and every group join as a team. There are a leader of each team and all the group follow the leader. Page 20 of 25 Some time they arrange picnic or party and the entire members attend the party or picnic. It helps to communicate with other and remove the communication barriers with upper level and lower level employees. In this time boss are free with their employees. That recreation system is effective for better employee employer relationship He was also filling the credits as a result he could join the tour of last year in china with there official tour.He is also satisfied with there Communication style. Page 21 of 25 3. 0 Chapter 3: Analysis After studying the cases we came to know about the org anization’s communication structure. Their communication style is very rich. They have very effective communication system. All of them agreed with their answers. That symbolizes their unity and effectiveness of communication. They all agreed that their organization follows face to face communication most of the time. Telephone is also a main communicating element. Oral communication is used more that’s why they are freer.They use face to face communication they also said their male employees as brother and female employees as sister. There are no sir or madam addressing through the whole organization. Most of the time they use the verbal communication There is also downward, upward, and horizontal communication. It is a friendly work environment as a result it plays an important role in the whole communication process. Some time the organization arrange picnic or party the entire member attend the party. The recreation system is effective for better employee employer relationship.Some they go for tour in different countries. Although they are satisfied with their communication style but still there are some barriers to communicate with their higher level boss. Their formal communication style is not perfect through which they communicate with their boss. Page 22 of 25 4. 0 Chapter 4 : Conclusion The report on ‘The Communication Structure of Standard Chartered Bank’ was very useful to us for our experience. We came to know about the communication structure of a renowned organization. Their communication style is very rich.They have very effective communication system. The communication style of every public organization should follow the structure. We are grateful to our course instructor for giving us such an opportunity to do the report and enrich to our knowledge to a great extent. Page 23 of 25 5. 0 Chapter 5 : Recommendations Based on our findings, we now recommend the following†¢ They should remove the communication barrie rs between higher level managers and lower level managers †¢ Their men should work equal to their women †¢ They should enrich their formal communication styleBibliography Raman, M. , & Sharma, S. (2004). Technical Communication: Principles and Practice. New Delhi: Oxford University Press Research. (2007). Retrieved on December 3, 2008 from http://en. wikipedia. org/wiki/Research Robbins, S. P. , & Judge, T. A. (2007).Organizational Behavior. New Delhi: Prentice Hall. StandardChartered Bank (2004). Retrieved on 3rd December 2008 from http://www. standardchartered. com/bd/ Page 25 of 25