Wednesday, December 18, 2019

Terrorism Racism And Hatred Essay - 858 Words

Terrorism can be stopped but I believe only to a certain extent. We can restrict traveling outside of the country and build up security but it will not solve terrorism. Racism, discrimination and hatred, does cause internal and external problems, for some groups of people. They feel only their opinions are right and everyone else is wrong and must pay. If we cannot combat discrimination, racism and hate, we will not be able to combat terrorism at all. We need to get the mindset of individuals to realize that not all Muslims are terrorists and that not all Israelis’ are here to harm or kill us. Stereotyping of a certain race or religious group is not going to get us anywhere we need to be. Trying to understand and get other people to understand that everyone does and will have differing opinions but that we can all still survive together amongst those with those differing opinions, political agendas, and/or religions. Poverty, political instability, and religious differences must all be addressed and combatted if we will ever have peace amongst our own country people or other countries people. We do not have peace in our own country. How can we make sure to have peace with any or all of the other countries, with all their different political and religious groups? Terrorism is an ever changing thing. More adversaries are using terrorism as a strategic tool that is adapting to the ever changing world socio-political environment. It is easier for these groups to get a hold ofShow MoreRelated Media Propaganda Hides American Terrorism Essay1178 Words   |  5 PagesMedia Propaganda Hides American Terrorism    An article in this months Stuff magazine for men, titled Die American Scum tells us that the world sucks. It sucks because while Americans have given other countries Mickey Mouse, burgers and gum, won wars for them, kept the peace and disposed of dictators, all we have gotten in return is terrorism. The article, by John Parrish, goes on to discourage Americans from traveling to 10 terrorist countries including Iraq, Iran, Pakistan, ColombiaRead MoreThe Attack On The World Trade Center1562 Words   |  7 Pagesindividuals plan an act of terrorism is less likely to alert law enforcement, compare to when a whole terrorist cell plans an attack, because the more people involved the less secretive the attack. Furthermore extreme right are using firearms and other easily obtainable weapons, because acquiring materials to build a bomb is much harder, more time consuming and send red flags to proper authority. Although extreme right and religious extremist are the most violent form of terrorism groups the both haveRead MoreRacism And Hate Crime891 Words   |  4 PagesRacism occurs when one ethnic group or race discriminates, dominates, excludes or attempts to eliminate a different race based on the belief that one’s own race is superior. It has been one of the most common issues in humanity. racism is the root of hate crime. Racism has been around since before the United States of America was established. Although historical events such as slavery, Columbus discovering the Americas, the tragic Holocaust led by Hitler and the 911 terrorist attacks have all beenRead MoreThe Controversial Topics Of Racism1106 Words   |  5 Pagesexample of racial inequality going on today. Racism has many forms but is commonly known as â€Å"poor treatment or violence against people because of their race† (source: Merriam Webster). Racism is a very important topic that generally occurs all over the world. It impacts our society by creating a stigma against races. Examples of this are not being able to get certain jobs, and getting less pay than someone of another race and fighting against races . Racism goes against our rights as well. For exampleRead MoreIslamophobia: Muslims and Terrorism1162 Words   |  5 Pagesnegative attitudes towards Muslim peoples who tend to be strongly associated with any act of terrorism. The media has played a colossal role in developing such negative association wherein it constantly portrays Muslim people in combination with violent terrorist acts. It does so in a way that they both go hand-and-hand. In other words, it has made it as though the Islamic religion is synonymous with terrorism. The media has perpetuated Muslim stereotypes over the years that followed the 9/11 incidentRead MoreMass Media Today a Summary1563 Words   |  7 Pagesmanage current world problems. While the deeper causes of various political events in the sout h and the East also affect the North, we are also facing an Increasing ethnocentrism and racism in Europe and North America as people are escaping to this part of the world. Wild capitalism thus combines with wild ethnicism and racism in a frightening mixture of policies and social practices that result in keeping many people or even whole countries and continents, down and out- this is manifesting in the phenomenaRead MoreThe Media, Oppression, And The Islam915 Words   |  4 Pagespresented itself; a result that allows for a better understanding and recognition of discrimination in mass media. Education is the solution to prejudiced westernized media that has projected Islamophobia for years; triggering hatred, discrimination, oppression, and pure racism- especially in the United States after the terrorist attacks on September 11, 2001- to an entire culture. The basic purpose of mass media is to provide the public with easy access to reliable and accurate information, yet thereRead MoreThe Most Important Issues of the Modern World1475 Words   |  6 Pages1. The most important problems of the modern (contemporary) world. The modern world, the world that we live in is exposed to many perils. Among the major problems are poverty, unemployment, wars, terrorism, racism, air pollution, climate change/global warming, and diseases. Poverty The gap between rich and poor nations is still growing. Although rich nations have provided aid and technical assistance to Third World nations, the developing nations face many obstacles in their drive to modernize.Read MoreThe Social Philosophies On The Race Theory And Feminism Approaches1316 Words   |  6 Pagesviewed as a self-conscious way of thinking. It is referred to as ideas of human differences beginning from ancient times to today. Racism is made up of practices and commitments deriving from racial hierarchies. However, the thought is that where there is a race, racism follows and vise versa, therefore, consequences adheres to this notion. The definitional of racism is results from the idea of what is done to races in social term, certain races, and how they are judged (Lewis R. Gordon, 2015).Read MoreThe Klux Klan And The Civil Rights Era1585 Words   |  7 PagesRacism isn’t born, it’s created. The Ku Klux Klan is a group of people who believe that any race other than white is beneath them. Throughout history they time and time again show their true colors, while still claiming to be Christians. From the start of the Klan, to the Civil Rights Era, even to today, the Klan has been a well-known group revolving around hate, racism, and bigotry. The Klan began in 1866, in Pulaski, Tennessee. Just after the Civil War ended former confederate soldiers put together

Tuesday, December 10, 2019

Privacy and Security Issues in Cookie Tracking

Question: Discuss about the Privacy and Security Issues in Cookie Tracking Answer: Introduction Cookies are little web-texts that are stored on a users systems when they visit a website. These texts allow the websites to track the user's preferences online and tailor their site to meet their liking (Rainer et al. 2013). The data stored could be the user's login information, sites visited, credit card numbers and so forth. As per Bhargavan et al. (2014), Cookies are applications that store users information for later access by the website. Most cookies are installed without the user knowledge, and web servers just access whatever information they require to serve the user better. Cookie tracking is implemented in two stages. The first stage is when the cookie is saved on the user's device, like Yahoo! Where users select their interests, a cookie is made specifically with the user's information and stored on the user's device. Now the next stage is when any browser that the user enables allows websites access to this cookie and tailors the users experience online to that preferen ce. In order to carry information between different sessions or website, cookies are the most convenient way. Therefore, use of cookies makes it easier to retrieve information. Cookies also help in storing large amount of data for the users. Security and privacy issues arise when the developers of the information system, websites and the service providers involve tracking of users information (Bo?hme and Okamoto 2015). If a user visits a website and provides information such as user name and password, the cookie stores the information thereby, making it convenient for the user while using the website next time. In addition to, the user movement needs to be tracked by the web environment and cookies help in achieving it. There is a high risk involved with the cookies, if these are sent over the internet without any encryption. Anything personal can be sent over the internet with the cookies, for example, credit card details, email addresses and more. Therefore, this information is readabl e by the people connected to the network. This is associated with the high risk of unauthorized access of the personal and confidential data with the cookie tracking tools (Pearson 2013). This may be the reason of high level of financial loss also. Some of the networks are unsecured, in which the cookies are readable from the other people connected to the network. In this context, again the cookie tracking can be used for accessing the confidential and private information of the users. The IP addresses of the network visited or the WebPages accessed through the system can be tracked through the cookie tracking. Cookie tracking is complicated because while it has many advantages such as being used to identify and authenticate a user, store number of times a user visits a website, their preferences and their preferred settings, there are several issues that cannot be ignored. A few of these problems are the uncertainty of how the data gotten is stored and who has access to them. In addition, where the line is drawn for the tracking, in this essay, Facebook is used as a case study on repeated cookie exploitation cases (Marcella Jr 2003). Ethical Concerns Many websites employ the use of these cookies in order to better serve their users, cookie tracking, however, has a host of ethical concerns attached to it which needs to be addressed (Santa 2017). One ethical concern that has been raised is the issue of the privacy of the users being infringed upon. Many argue that implementing the use of cookies is deliberating spying and collecting data to boost sales for a company. This agreement is, however, null because most websites inform the users of the fact that they are being tracked and so they have fulfilled their ethical obligations. Another ethical issue related to the cookie is that online advertising companies pay cookie-tracking developers for their advertisements more than they pay the competitors for their advertisements. This addresses how the data derived from the utilization of these cookies are being used. Majority of the cookie tracking developers are ethically bound to ensure the security of their user's information; this i s, however, not always the case (Whitman and Mattord 2011). Many websites such as Amazon and Facebook that track their users online movements have been known to sell the information collected, albeit legally to advertising companies, broker companies or any other company that requests for them. A reporter who said, It peers deeper into American life than the F.B.I. or the I.R.S. or those prying digital eyes at Facebook and Google, had described a company in Arkansas called Acxiom as the largest purchaser of such information (Santa 2017). As per Sharma, Johari and Sarma (2012), if you are an adult who makes use of the internet regularly, the odds are that it knows things like your age, race, sex, weight, height, marital status, education level, politics, buying habits, household health worries, vacation dreams and on and on." This violates the ethical principle of integrity, these websites not only track one's movements on their own sites but goes ahead to check on their whole inter net browsing habits which are not ethically sound to some people. According to the Consequentiality ethical theory, these cookie tracking applications are being used to help make the lives of internet users better and it enable them to be able to see specific advertisements that would vastly benefit them which is a good thing. Even though some may worry about the security of such applications and how far they are being investigated, the advantages cannot be overlooked. The Kantianism theory, however, would refute it by saying that the possibility of a privacy breach or security breach is enough for the application to be discontinued if it brings harm to even one individual then how advantageous is it really (Santa 2017). Take, for example, the case of Facebook tracking their user's online movements outside of the site, now while this has been a controversial issue, a Facebook engineer by the name of Arturo Bejar, has stated that it is being done for a good cause. MrBejar stated that Facebook uses the information gathered to prevent spammers, frauds ters and minors from accessing the website thereby putting their users in harm's way (Data Protection 2017). While this is a good cause, many have expressed their opinion that it does not justify the constant surveillance being carried out by the website using cookies. The hackers can use the cookie tracking tools for stealing the confidential information of a user such as the search history, user ids and passwords for the online accounts, financial transactions made over the internet, credit or debit card credentials. This is not only unethical, it is also illegal. Legal Concerns Many laws are available for the protection of a user's data online such as the Data Protection Act of 1998 that protects the user's data from being used for any malicious purpose, being stolen, used for the stated reasons and used lawfully (Data Protection 2017). Under the Data Protection Act section 2, users sensitive information that are being gathered cannot be used without their express permission, most websites put these clause in their privacy policies, telling the users to sign away their rights to the information for marketing purposes thereby abiding by this law. Facebook, however, has been accused of not following this rule by informing their users that their data is being given to third parties companies (Clifford 2017). According to the Data Protection Law, section 7 subsection 2a A data controller is not obliged to supply any information under subsection (1) unless he has received a request in writing. With this the site gives their users a choice on if to proceed with t heir operations or not, it is now left to the user to either accept or reject the online terms of usage (Chen and Zhao 2012). Additionally, all information gotten by Facebook, such as likes, shares, via the cookie tracking application is only stored on their systems for 90 days, and then it is automatically deleted, this is in accordance with the Data Protection Act 1998 section 2 which says that information gotten should be saved for a limited amount of time. The policy framework directive of EU 2002/58/EC addresses the concerns related to the handling and securing of the data gotten from cookie tracking applications (Clifford 2017). The policy states that the use of the cookies tracking applications are legal given that the users are fully informed of the purpose of the application, how they would be used and where they would be stored. Also, stated in the policy is the directive that users are given a choice on deciding the place of storing the cookie information or if they want it to be stored at all, this is especially important in multiple-user devices (Chen and Zhao 2012). This directive gives the users a certain level of trust that their information is safe and secure because the law protects them in the case of any emergency. Google has been accused of storing cookies on their users computer without their express permission that is in direct violation of the Privacy and Electronic Communications Regulations (PECR) regulations 6 th at expressly states that users must consent to any cookie being stored on their devices that could either damage or slow them down (Santa 2017). Professional Concerns Cookie tracking is an undoubtedly a brilliant invention. Information systems professionals that handle both the developing and securing of the applications are meant to abide by certain codes of conducts which govern the implementation of the cookie. According to the ACM code of conduct section, one subsection three that states Honesty is an essential component of trust. Without trust, an organization cannot function effectively. The honest computing professional will not make deliberately false or deceptive claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and problems (ACM 2017). When integrating the cookie tracking application in websites, full disclosure should be made on the process of gathering data ensuring complete safety. About 44% of websites currently have privacy policy pages whereas 52% do not state the process of utilizing and securing the cookie information. However, only 39.5% advice their users to dis continue cookie tracking while using the website. Furthermore, only about 25% of the said sites give their users options on what information they actually want to be tracked (CDT 2017). While many websites are trying to keep with this code of conduct, others are disregarding it that is not to be done as an Information Systems professional. In addition, the same code of conducts section two subsection six says that IS professionals ought to honor contracts and agreements. While many sites as mentioned before boldly stating how these cookies are being used most do not go on to state that the tracking does not end on the website alone but continues to other sites, tracking the users every movement as could be seen in the Facebook case previously mentioned. Additionally, the British Computer Society (BCS) code of conduct section two, subsection F shows that an IS professional should avoid injuring others, their property, reputation, or employment by false or malicious or negligent action or inaction (BCS 2017). It has been said that due to the data gotten from cookie tracking applications, users personal details, problems and vices have been exposed to their close families or employees. Information system professionals should ensure data gotten from the application is properly secured and is accessed by only authorized persons. Social Concerns Cookies have made using the internet a whole lot easier for many people with applications such as shopping, booking a ticket or just normal browsing thereby, making internet browsing much easier and convenient. However, websites such as Yahoo! and Google that makes use of the cookie tracking application collect bits and pieces of a persons online movements that can be detrimental to the persons offline life. One of the major advantages of the cookie tracking application is that it makes browsing easier for users, that is, adverts being shown are relatable to the users (Boohme and Okamoto 2015). However, there is the distinct possibility that someone else could have access to the user's computers and access other websites; thus the advertisements for the user automatically changes thereby taking away the major advantage that the cookie tracking application possesses. There should be an option, as previously states, for the nonprofessional to be able to switch off the tracking while th ey are not making use of their devices. Another social concern is the incessant tracking most sites do on their users; tailor their adverts to match the new data that could cause some embarrassments for the user. For example a user stumbles on a strange genre of Pornographic materials online, if they are logged on to a site like Facebook then that site has been added to their cookie data and Facebook (Marcella Jr 2003). This is also not very good for Facebook as a company that relies heavily on advertisement income, if their adverts are not useful to the users then there would be no reason for them to click on the advertisement thereby, reducing the income of the website. This leads to the issue of online profiling, when websites collect data of their users they form a profile of their habits, personal issues, likes and so forth. This profiling is an infringement on the privacy of the users because they are usually unaware of it and if the data is ever accessed by an unauthorized person could cause physical, mental and soc ial issues for the user. Limitations Several websites use cookie-tracking devices in order to gather information about the users. The most prevalent issue raised in the recent years is the inability for most users to reject. Therefore, this issue needs to be tracked. As mentioned by Mayer and Mitchell (2012), the risks associated with cookies make them vulnerable thereby, imposing limitations on the use. According to Acar et al. (2014), the different types of risks associated with cookies are cross site request forgery attack, cross site scripting, cookie tossing attack, session fixation and cookie overflow attack. The risks related to cookies make the information of the users vulnerable to be used for unsuitable purposes. As a result, for illegal or forgery purpose others can use significant information of the users such as bank detail, personal details. As asserted by Pearson (2013), in response to a request, a cookie is sent by the browser irrespective of the place of origin. This is considered a major concern related to cookies. The website is unable to recognize whether the request generated is by the user of not. Therefore, once the request is generated, if availability of cookie is found, it casually performs the required action without knowing the initiator of the request. For example, a user named Alec is a frequent user of a website thereby, having a cookie in this system. Meanwhile, if an attacker performs a delete action, the cookie supposes the request to be initiated by Alec. Therefore, the cookie lacks the potentiality of recognizing the original initiator of the request. As mentioned by Bugliesi et al. (2014), the risk concept of session fixation depends on the application level. In this case, of risk, the attackers force the user to use the attackers different session id. However, this can be implemented by using the directive path of the browser. Due to this, the users are considered a different one. By using this method, the attacker can compel the user to use different levels of application as the attacker. Another type of vulnerability that cookies possess is cross-site scripting. As commented by Sharma, Johari and Sarma (2012), an exploit is placed within the cookie by the attacker. Following this, the exploit conveys the payload from that particular cookie thereby, conducting the exploitation. However, the difficulty level rises for the attacker if the cookie has been set from beforehand. In order to conduct the attack, the attackers have to firstly control the cookie and then carry out the attack within the cookie string. Cookie tossing attack is considered as another limitation in terms of using cookie. As commented by Bhargavan et al. (2014), cookie-tossing attack is one of the most dangerous attacks on cookies. For example, a user receives a domain cookie while visiting website. Therefore, the cookie is sent to the website or server when the user visits the same browser the next time. In this case, the cookie lacks a particular path or domain. As a result, the attacker develops a sub domain cookie that is sent along with the original cookie. The website accepts both the cookies. The server lacks the option of sending the original cookie at first thereby, can select and send the duplicate cookie at first. In case, the server receives the sub domain cookie at first, it accepts the sub domain one as the valid or original cookie. Due to this, the information of the users can be vulnerable to risks, as the information is no more secured enough. According to Shar and Tar (2012), a sub domain cookie replaces the use of Jscript, the domain of the parent cookie. In terms of the number of cookies sent by the web browser, there is a limitation. However, web browsers such as Google Chrome lack the ability to verify whether the stored cookie is from a sub domain or domain thereby, just stores the cookies provided to them. Therefore, it can be possible that the sub domain is not completely secured. Attackers can use the non-secure cookie supposedly by altering the expiry dates of the cookie thereby, making it useless. This enables the attacker to develop a malicious cookie and sending the sub domain cookie to the web browser. As mentioned before, the web lacks the ability to determine the authenticity of the cookie thereby, imposing threat on the information of the users. Privacy, secrecy and security are the main vulnerabilities and limitation of using cookies. Privacy id considered as one of the major concern as this deals with storing of information of the users. The web browsers has the cookie option activated tracks the websites visited by the users. As mentioned by Chen and Zhao (2012), this provides an opportunity for the third party to access the information of the users without their consent. Government, advertisers and other users can be considered as the third parties. Therefore, there prevails high probability of misusing the information of the users. According to Hennnebert and Dos Santos (2014), the browsers willfully make it hard for the users to find the option for disabling the cookie option as this means less money for them. At certain instances, the users lack technical expertise to disable the cookie option of the web browser. Cookie security is a major issue as several loopholes has been recognized in various web browsers. This pr ovides a huge advantage for the attackers, as they are able to access information of the users such as their emails, information related to banks, credit card information and passwords. Conclusion This essay shows some of the privacy and security issues which come up with the use of cookies. Cookies are harmless if used by trusted websites, but when accessing a new and strange website, some users might not appreciate being tracked and all their information out there for the site to access. This is why cookie tracking as said at the start of this essay is a complicated issue. In this assignment, it can be concluded that cookies are small web-texts that helps in storing information in the system of the user. Information stored can be in terms of of the interest, log in information, personal information and bank details. Therefore, as this deal with the information of the users, security and privacy in terms of cookies are of utmost significance. As a result, ethical, legal, professional and social concerns are taken under consideration. Cookies are enabled by the web browsers in order to store information of the users thereby, providing better service. However, there are ethical concerns attached with accessing the information of the users. Many people considers use of cookies as unethical as they think the information of the users are been spied on deliberately in order to maximize their sales. Therefore, the privacy of the users information is accessible thereby, vulnerable to misuse. It has been seen that advertising organization pay the cookie develope rs more compared to their competitors. This provides an opportunity for the advertizing agencies to enhance their sales. Therefore, the cookie developers have to ensure security and privacy though it is breached at times. According to the Consequentiality theory, use of cookies makes the lives of the internet users easier. On the contrary, Kantianism theory highlights the security and privacy issues while using cookie thereby, suggesting discontinuing the use. In order to keep the information and the data of the users secure, Data Protection Act, 1998 is used for providing security of the information. Websites put the clause of using sensitive information of the users for marketing purposes with their consent only under the data Protection Act section 2. However, social media such as Facebook has failed in implementing the law thereby, the information of the users are fully accessible by third parties. This is due to the fact that under the Data protection Act section 7 sub section 2a, until and unless data controllers receives a written application, they are not bound to reveal the third parties. However, the information of the users for Facebook is deleted after 90 days thereby, reducing risk of misuse. Moreover, according to the EU frameworks, accessing the information of the users are legal if they are informed about the purpose and method of accessing their information. According to ACM code of conduct, the information technology professionals needs to consider both developing and security related to the use of cookie with sheer honesty. According to the statistics stated, it can be said certain websites state the some websites follows or implements the laws related to security of cookies whereas some websites fail to state the method and the purpose of utilization of information. Moreover, certain percentage of website deactivates cookie-tracking facilities while some states specifically the information that wants to be stored. The information collected by Google or Yahoo about the interests of the users can have adversely affected the life of the users thereby, raising a social concern. However, there are limitations and vulnerabilities associated with the security and privacy in cookie tracking. The web browser lacks the ability to determine between the original and sub domain cookie thereby making it easier for the attackers to invade and access the information of the users. References Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A. and Diaz, C., 2014, November. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 674-689). ACM. Acm.org. 2017. ACM Code of Ethics and Professional Conduct. [online] Available at: https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct [Accessed 26 Apr. 2017]. Albanese, J. and Sonnenreich, W., 2004. Network security illustrated. 1st ed. New York: McGraw-Hill, p.160. Ashton, A., 2012. Issues in Networks Research and Application. 1st ed. Atlanta: ScholarlyEditions, p.28. BCS, 2017. [online] BCS.org. Available at: https://www.bcs.org/upload/pdf/conduct.pdf [Accessed 6 Mar. 2017]. Bhargavan, K., Lavaud, A.D., Fournet, C., Pironti, A. and Strub, P.Y., 2014, May. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 98-113). IEEE. Bo?hme, R. and Okamoto, T., 2015. Financial Cryptography and Data Security. 1st ed. Berlin, p.218. Bugliesi, M., Calzavara, S., Focardi, R., Khan, W. and Tempesta, M., 2014, July. Provably sound browser-based enforcement of web session integrity. In Computer Security Foundations Symposium (CSF), 2014 IEEE 27th (pp. 366-380). IEEE. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Clifford, D. 2017. EU Data Protection Law and Targeted Advertising: Consent and the Cookie Monster - Tracking the crumbs of online user behaviour jipitec. [online] Jipitec.eu. Available at: https://www.jipitec.eu/issues/jipitec-5-3-2014/4095 [Accessed 6 Mar. 2017]. Data Protection, 2017. Data Protection Act 1998. [online] Legislation.gov.uk. Available at: https://www.legislation.gov.uk/ukpga/1998/29/contents [Accessed 6 Mar. 2017]. Dixon, P. 2016. Surveillance in America. 1st ed. Santa Barbara, California: ABC-CLIO, p.261. Marcella Jr, A., 2003. Privacy Handbook: Guidelines, Exposures, Policy Implementation, and International Issues. 1st ed. John Wiley Sons. Mayer, J.R. and Mitchell, J.C., 2012, May. Third-party web tracking: Policy and technology. In Security and Privacy (SP), 2012 IEEE Symposium on (pp. 413-427). IEEE. Pearson, S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer London. Rainer, K., Cegielski, C., Splettstoesser-Hogeterp, I. and Sanchez-Rodriguez, C., 2013. Introduction to Information Systems. 3rd ed. John Wiley Sons, p.161. Santa, U., 2017. Ethical Implications of Data Aggregation. [online] Scu.edu. Available at: https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/ethical-implications-of-data-aggregation/ [Accessed 6 Mar. 2017]. Shar, L.K. and Tan, H.B.K., 2012. Automated removal of cross site scripting vulnerabilities in web applications. Information and Application Technology, 54(5), pp.467-478. Sharma, P., Johari, R. and Sarma, S.S., 2012. Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. International Journal of System Assurance Engineering and Management, 3(4), pp.343-351. Whitman, M. and Mattord, H., 2011. Principles of information security. 4th ed. Cengage Learning.

Tuesday, December 3, 2019

Why Everyone Should Play Video Games free essay sample

To inform my comm3 classmates about the benefits that they can attain with playing videogames INTRODUCTION How many of you like to play games? Most games fascinate us, not just children but adults as well. Games made our childhood a lot more fun and worth looking back on. So today, I will talk about the benefits of playing videogames and why everyone should start learning to play. BODY While many articles focus on why gaming is evil or detrimental to our health, in the course of this speech I’ll tell you reasons why you should play video games instead. Kids who play video games excel at school and in math. Playing games increases brain function. C. Playing improves coordination of hand movements and the ability to concentrate without getting disturbed. D. Our focus is strengthened and we learn to block out all sounds and disturbances from our surroundings, which is quite useful. We will write a custom essay sample on Why Everyone Should Play Video Games or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page E. Most games are based on facts and that’s why kids receive lots of information with the games they play. F. Research proves that videogames enhance our hand-eye coordination as well as our reflexes. III. Gaming improves social skills A.Kids learn to play as a group and build teamwork 1. Each of them having their own task to perform and function in different ways from one another. 2. Many games are role-playing and the kids learn from the heroes they choose to be. B. Creativity, imagination, and storytelling are all improved and children are able to comprehend the flow of a story as well as its bases. C. Video games ignite a spirit of adventure. Video games have their uses and can even be considered as a learning tool. They help the kids to process information faster and to make decisions quicker and wiser.Many are able to use their talents to better the game design and strategy. Video game players become successful soldiers, surgeons, architects, software designers, scientists, and more. Games teach us about ethics, finance, governance, town planning, as well as our behavior in society. What one needs to do is, know the content of the games and regulate the number of hours played so that the benefits are reaped and disadvantages are avoided. So next time when you hear about videogames, think of the possible benefits you’ll gain, instead of the negative things that you might attain.

Wednesday, November 27, 2019

The Good, The Bad, and The Ugly essays

The Good, The Bad, and The Ugly essays In society many people are portrayed as pure and innocent, however in reality not everyone is pure, as they seem. In the play Macbeth by William Shakespeare; it presents the primary character Macbeth represents an innocent human being, but reality proves that he is a cruel evil man. The semblance of Inverness Castle looks harmless and innocent on the outside but when you peer inside the illusion, you come to realize the unholy acts of the murder. Macbeths wife, Lady Macbeth appears to show her innocent self, but also wants to achieve her ambitions and constructs the plans of murder. As a result, Macbeth is lured to murder the king, Duncan, by the desire for power, an appetite whetted by the witchs prophecies and his wifes encouragement and consequenly causes him to live with guilt and discomfort for the rest of his life. The innocence of Macbeth is shown clearly to the people of Scotland. The first illusion in Macbeths cruel massacre occurs to Duncan, the king of Cawdor, the greed of ambition overpowered him by using a false face (I, vii, 94) and using a false heart to hide from his sin. In order to appear innocent Macbeths uses his false face to fool and deceive the people of Cawdor, getting them to believe that he had no connection with the murder. His false heart leads his cruel aspiration of striping Duncan of his kingship. Some of his followers see the illusion fading and discover the wrong doings of Macbeth. The problem that Macbeth now faces is the prophecy that banquos son will be come the new king. Macbeth knows he cannot commit another murder, and with thy bloody and invisible hand (III, ii, 54) he does commit the murder upon Duncan. Furthermore, by killing Duncan and using his invisible hand, the prophecy of Banquos son does not follow thru. After the second murder, the people of Cawdo r get a little more curious about Macbeth and his intensio...

Saturday, November 23, 2019

Presidents report essays

Presidents report essays This paper will prove Richard M. Nixon wasnt such a bad president at all or at least better than some presidents. Richard Nixon was the thirty-seventh president of the United States and was the only president to resign from office. Nixon was a follower of Quakerism and he was president during the Vietnam War and when the astronauts landed on the moon. Richard Milhous Nixon was born on January 9, 1913, in, Yorba Linda, California. There he attended schools in Yorba Linda, and in nearby towns. Nixon attended Whittier College, a Quaker institution, from 1930 to 1934 where he became president of the student body and won many debating awards. In 1934 he graduated from Whittier College and won a scholarship from the Duke University School of Law. At Duke Nixon became president of the student law association. Nixon graduated from Duke in 1937, third in his class out of forty-four students. After Nixon graduated from Duke the Great Depression was still in place in the United States, there were few jobs. Nixon tried many times to get into law bureaus and firms but was not successful. He returned to Whittier and joined a Whittier Law firm. When he was twenty-six, he joined the Whittier College Board of Trustees. In 1942, Nixon served in the U.S. Navy during World War II. Richard M. Nixon was highly qualified for the presidency. Nixon was from the Republican Party. In 1946, Nixon ran for the U.S. House Representatives and won the election, after he was released from the Navy. In 1950, Nixon ran for U.S. Senator in California and won the election by over 700,000 votes. He was also Vice President to Dwight D. Eisenhower. However, Eisenhower never gave him any support, but he still won the election was put on the ballot by the Republican Party in the 1968 election. He and his running mate both promised that whoever won the election would handle the Vietnam War. His running mate was Hubert H. Humphrey, current vice president, lost the e...

Thursday, November 21, 2019

Compare and contrast the four distinct categories of presidential Essay

Compare and contrast the four distinct categories of presidential personality described in James Barber's habitual action patterns approach - Essay Example In the active positive presidential category, Barber described them as adaptive. They are also self-confident and flexible. They tend to create opportunities for actions and enjoy exercising their power. They usually do not take themselves too seriously. In addition, they are optimistic individuals. Power is considered as means to achieve beneficial results by this group. They spend much energy in their job and enjoy doing the job. The group is also productive, result-oriented, and successful in pushing programs through (Barber 6). A good example is George W. Bush. His character of taking action without too much caution as was the case with the Iraq invasion portrays a key characteristic of this group. The second group of active negative tends to be compulsive. They mainly tend to use power as a means of self-realization. This group expends a lot of energy on the job but derive little joy in the process. They are always preoccupied with whether they are succeeding or failing in their job. In addition, they tend to have low self-esteem. Mostly, they are rigid, pessimist, highly driven, and have problems when it comes to aggression and management. They usually want to get and retain power to prove to others that they are people to reckon with. A good example of active negative presidents is Woodrow Wilson. Wilson put much effort in his work but did not receive any emotional rewards. He rarely received satisfaction with the work he did. He was said to have a compulsive and perfectionist personality. The other group is passive positive. This group tends to be compliant and usually seek to be loved. They are easily manipulated. The have a low self-esteem, which they overcome by adopting an ingratiating personality. They are reactive, lack initiative, and are superficially optimistic. They spend less energy on the job but like doing the job. William Taft and Warren Harding are typical examples of

Wednesday, November 20, 2019

Axial Age Essay Example | Topics and Well Written Essays - 1500 words

Axial Age - Essay Example This crucial period in history gave rise to the philosophies of Siddhartha Gautama ‘The Buddha’, Greek philosophers such as Solon and Thucydides, and the Hebrew prophets Jeremiah, Ezekiel, and Zechariah (Plott, 32). One of the key transformations that occurred during the axial age is that people became conscious of their nature, existence, and limitations. Societies whose lives had previously been extensively dictated by religious extremism and disorder, transformed into cultured and civilized settlements governed by rules and regulations that imposed limits on human behaviors and actions. As these societies became more orderly, people for the first time had the opportunity to observe, analyze, and understand many of the natural and human phenomena around them. This enabled them to understand the reason for the occurrence of many of the events around them and how to bring them under their control. Many scholars and philosophers have opposed the propositions and ideas exp ressed by the proponents of the Axial Age, especially German philosopher Karl Jaspers, who was the first person to identify the period as key to human reconnaissance for meaning, and coined the phrase ‘Axial Age’. ... inking, and the parallels that scholars and philosophers such as Karl Jaspers have identified between different civilizations are mostly coincidental (Plott, 39). The Axial Age in India: Buddhism However, the arguments of opposers of the importance of the Axial Age lack justification because analysis of the various ideas and teachings of key philosophers and religious leaders who spearheaded the paradigm shift of the period bear remarkable similarities suggesting parallels in their way of thinking. The teachings of Siddhartha Gautama ‘The Buddha’ set the foundation for the birth of Buddhism. Siddhartha was born to a king, and wealth and splendor characterized his early life. His father shielded him from experiencing and acquiring knowledge of the harsh life that the common man lived. Thus, suffering and poverty were altogether foreign to him. However, when he became a young man and was about to inherit his father’s throne, he became exposed to his subjects and for the first time, got the opportunity to interact with the poor, the sick, and the elderly. He observed widespread suffering that depressed him and pushed him to begin questioning the meaning of life. He then made the decision to leave the palace and the royalty and lead the life of an ascetic. He began to meditate on the meaning of life which eventually led him to what Buddhists refer to as ‘the awakening’ (The Human Journey, humanjourney.us/Buddhism). His conceived ideas and belief were completely different from the extreme asceticism of the time, which he believed did not work. His ideologies began to move away from the extreme self-mortification and self-indulgence of the time. Siddhartha’s intensive meditation on the cause of suffering enabled him to become ‘enlightened’ and gain insight

Sunday, November 17, 2019

Milk Powder Essay Example for Free

Milk Powder Essay Why joint venture? Highest market share in milk powder, can provide technology and reputable brand name. Already brand recognition in Pakistan, thus familiar with market. Drawbacks? High royalties to established brand. Large multinational venture might dominate Milkpak. Pro’s Nestle Base in dairy products. Started out with infant formula. Plants in 60 countries, already business in Pakistan. Looking to fulfill long-term goals. Want decentralization, give JV own identity and responsibility. This was can better adapt to foreign market. Provide RD and technical assistance to subs. Growing interest in Pakistan market. Informal channel of communication. Con’s Nestle Want majority ownership in JV and want royalties. How to make cons pros? Majority ownership Nestle means that MP bears the least risk. Because MP has technical difficulties in setting up a Greenfield MP needs Nestle and Nestle needs royalties for its technology. But this is one of the few requirements. The JV will get its own management and gets a lot of responsibility. This makes it easier to adapt to the Pakistan market. This is also the trust Nestle puts in MP, since Nestle will bear most of the risk due to the majority ownership. Nestle also has the highest market share for milk powder, which can be used to gain a good reputation. In short Nestle bears risk, puts MP in charge of the subsidiary, gives technological and RD support, which is what MP is looking for, but needs royalties in return. Familiar with milk powder and infant formula.

Friday, November 15, 2019

Caring For Patients With Dementia Essay -- Nursing

Caring for dementia involves a lot of patience and understanding. It should be dealt with audacity and flawlessness to ensure the vulnerable adults’ well-being. Aiding at home or care home required carers to be at their best, physically and emotionally. The responsibility can be distressing but it is rewarding as well since helping dementia adults in their day to day activities is a significant matter for them. However, carers need a pause as over duty can result to substandard nursing. The big question is: who take care for the carers of people with dementia? There is a 5 million estimate of the carers in the UK and figures are foreseen to upscale for the next 40 years to 9 million (O’ Dowd, 2007). With this high number of carers, for whom the carers can ask for support during times when difficulty arises in relation with taking care of people with dementia. There are many issues that can be related to carers of people with dementia. The physical and psychological workload can be attributed as the most common concern among carers (Fjelltun et al., 2009). In addition, O’ Dowd (2007) has stated that carers are more likely to endure more anxiety, and feeling of liability which resulted to carers’ negligence of their own wellbeing. Moreover, carers suffer more stress than those who are not giving care to elderly with dementia. In relation to this, carers’ health is not interrelated with their emotional functioning (Bristow et al., 2008). These different reports suggested that carers undergo psychological issues more notable in comparison with just ordinary people. This can be regarded to carers’ exposure to a stressful environment. Dementia is a complex and progressive condition which is frequently affected by certain conditi... ...of Health. (2010) Dementia. The more we understand the more we can help. Crown: COI Fjelltun, A., Henriksen, N., Norberg, A., Gilje, F., Normann, H. (2009) Nurses’ and carers’ appraisals of workload in care of frail elderly awaiting nursing home placement. Scand J Caring Sci [online] volume 23, p57–66 Available from: http://web.ebscohost.com/ehost/pdf?vid=9&hid=2&sid=3f0cc818-facd-44f5-99fc-3c06a0edbd5c%40sessionmgr104 [Accessed 23 March, 2010] Hoskins,S., Coleman,M., McNeely,D. (2005) Stress in carers of individuals with dementia and Community Mental Health Teams: an uncontrolled evaluation study. Blackwell Publishing Ltd: Nursing and health care management and policy Personal Social Services Research Unit. (2007) Dementia UK. London: London School of Economics, King’s College London. O’Dowd, A. (2007) Who else is caring? Nursing older people. Volume 18, p12-14

Tuesday, November 12, 2019

Management Influences on Turnover Intention of Software Developers Essay

Introduction The Information Technology (IT) Age has created many opportunities for employment in the IT and IT services industry.   IT professionals are in demand all over the world.   Organizations worldwide invest money that go not only into salaries but for further training of IT professionals they hire. However, around the world, the demand, supply, selection, recruitment and particularly retention of IT professionals has threatened organizations that use, manage or deal in IT or IT services for the past few years (Parà © and Tremblay 2000; Ermel and Bohl 1997; Morello 1998; Guptill et al. 1999). This is why the departure of an IT professional from a company usually comes with disastrous effects to the organization.   When an IT professional resigns, the organization suffers loss of business process knowledge and acquired technical skills (Dorà © 2004). Since late 1996, the turnover for IT professionals has jumped from 15% to 20% annually, with only 8 of 10 IT positions being filled with qualified candidates (McNee et al. 1998).   With the annual turnover rate estimated at 20% or more (Alexander 1999; Kosseff 1999), job-hopping of IT professionals has been one of the biggest problems among managers and human resources (HR) experts (Parà © and Tremblay 2000). IT professionals seem to have a tendency to change their jobs faster than other employees when they feel dissatisfied with their current employer (Hacker 2003).   The estimated cost of replacing IT professionals range from 1.5 to 2.5 times of their annual salaries for the companies they resigned from (Kosseff 1999).   On the other hand, the cost of losing a qualified IT professional is actually 3 to 6 times more expensive than the cost of losing a manager (Kochanski and Ledford 2001). IT professionals, as also mentioned previously in this study, also tend to change jobs more quickly than other employees when they feel dissatisfied with in their current employment (Hacker 2003).   However, rational models of voluntary turnover cannot be used to explain the high turnover rates for IT professionals (Rouse 2001) since many IT professionals remain dissatisfied with their jobs even though they enjoy high financial rewards yet their creativity and expertise do not receive high respect from their peers, supervisors and companies as a whole (Fisher 2000). Furthermore, another explanation why IT professionals may resign more quickly when dissatisfied with their current employment is that â€Å"much of IT work is project oriented, the technical employee’s loyalty may be more to the project, and not necessarily to the employer† (Hacker, 2003, p. 15). These trends place intense pressure on both IT executives and HR managers.   High IT professional turnover translates to a threat not only to an organization’s IT department but to the business as a whole. Most importantly, high IT turnover poses a threat to the growth, competitive positioning and strength of the global economy (Parà © and Tremblay 2000). A dissertation by Dr. Timothy Lee Dorà © (2004) studied the relationships between job characteristics, job satisfaction and turnover intention among software developers.   These two factors – job characteristics and job satisfaction – are deemed to play crucial roles in understanding turnover intention not only among software developers but IT professionals as a whole. The current study aims to investigate the management influences on employee retention of IT professionals, focusing on job characteristics and job satisfaction, and their impact on turnover and retention.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   1.1.1  Ã‚  Ã‚   Scope and Limitations of the Study This research will study the impact of job characteristics and job satisfaction on the turnover intention of IT professionals.   Although this paper intends to replicate some of Dorà ©Ã¢â‚¬â„¢s findings, the study will not be limited to software developers only as this sector only constitutes a small sample of IT professionals as a whole. Specifically, the research study will focus on the turnover intention of IT professionals in___________. In studying the relationships between job characteristics, job satisfaction and turnover intention, this study is limited to the use of the following theoretical models and theories to support its conclusions: For the discussion on job characteristics, the research study will make use of the Job Characteristics Model developed by JR Hackman and GR Oldham (1975/1980) and the analysis on Model Employers by Minda Zetlin (2001). For the discussion on job satisfaction, as well as motivation, the paper will use the Motivator-Hygiene Theory by F. Herzberg (1968/2003) and the Synergistic Model by T.M. Amabile (1997). For the discussion on turnover, the study will use the Voluntary Turnover Model by R.M. Steers and R.T. Mowday (1987); the Rational Turnover Model by P.D. Rouse (2001); the Instinctual or â€Å"Unfolding† Model of Turnover by T.W. Lee, T.R. Mitchell, L. Wise and S. Fireman (1996); and the Conceptual Model for Investigating Turnover in IT, developed by J.B. Thatcher, L.P. Stepna and R.J. Boyle (2002-03) These models will be discussed in detail later in this chapter, as well as in Chapter 2 on Review of Related Literature. Chapter 2 Review of Related Literature This chapter will analyze the various literature which are related to this research paper. It will discuss the works of other analysts and researchers on theories/models that will be used to support this study, as well as pertinent literature on IT professionals’ turnover intentions. The chapter begins with a general discussion on motivational theories, cutlure, and leadership which are all critical factors that affect an employee’s intent to leave. The discussion them dovetails into a more specific presentation of the framework used in the current study. This chapter will also include a definition of terms incorporated into the discussion of related literature. 2.1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Relationships between Job Characteristics, Job Satisfaction, and Turnover Intention In 2004, Timothy Lee Dorà © submitted a dissertation titled â€Å"The Relationships Between Job Characteristics, Job Satisfaction, and Turnover Intention Among Software Developers†.  Ã‚   According to Dorà ©, the factors leading to the turnover intention of software developers have been poorly understood.   His study was designed to further understand the relationships between job characteristics, job satisfaction, and turnover intention among software developers.   His study involved the use of 326 web surveys that contained questions relating to job characteristics, job satisfaction, turnover intention and demographic information. The results of Dorà ©Ã¢â‚¬â„¢s study showed that several factors can influence turnover intention, most significantly, job characteristics that may be influenced by management, such as training, autonomy, feedback, number of developers, task significance, and skill variety (Dorà © 2004).   In his study, Dorà © made use of two research questions and sixteen hypotheses to understand the job characteristics variables which contribute to the various dimensions of job satisfaction, and which of these job satisfaction dimensions, in turn, contribute to turnover intention. Dorà © made use of indirect effect tests, to determine if certain job characteristics could be linked to turnover intention through the job satisfaction scales he provided.   The results of his study indicated that ten of the indirect effects were statistically significant.   All ten of the statistically significant indirect effects were associated with only three of the seven job satisfaction scales: internal work motivation, general job satisfaction, and satisfaction with pay. The largest indirect effect, according to Dorà ©, was the effect of autonomy on turnover intention through general job satisfaction: higher levels of autonomy lead to lower levels of turnover intention by increasing general job satisfaction.  Ã‚   The next largest indirect effect was the effect of organizational training on turnover intention through general job satisfaction: organizational training decreased turnover intention through an increase in general job satisfaction.   The next three highest indirect effects in Dorà ©Ã¢â‚¬â„¢s findings were also between a job characteristic (feedback, skill, variety, and number of developers) and turnover intention through general job satisfaction (Dorà ©, 2004, p. 130). 2.2  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Measuring Turnover Intentions Among IT Professionals Guy Parà © and Michel Tremblay, in contrast to Dorà ©Ã¢â‚¬â„¢s study, completed a research covering the turnover intention of not just software developers but IT professionals as a whole.   Their study, â€Å"The Measurement and Antecedents of Turnover Intentions among IT Professionals† (2000), submitted to Cirano research center, aimed to present and test an integrated model of turnover intentions that address the unique nature of the IT profession (Parà © and Tremblay, 2000, p. 3).   The authors identified a multidimensional set of HR practices that will most likely increase retention among IT employees.  Ã‚   They emphasized citizenship behaviors as well as two distinct types of organizational commitment as key antecedents of turnover intentions. The study involved the sending of questionnaires to 394 Quebec members of the Canadian Information Processing Society.  Ã‚   The study addressed four research questions: 1) What are the essential HR practices necessary to create an effective plan for retaining IT professionals? 2) What is the impact of compensation and negotiation conditions on the turnover intentions of IT personnel? 3) What is the effect of employee demographic characteristics on the turnover intentions of IT personnel? 4) Do organizational commitment and citizenship behaviors mediate the effects of HR practices, compensation and negotiation conditions as well as demographic characteristics on the turnover intentions of IT personnel? (Parà © and Tremblay, 2000, p. 4) Parà © and Tremblay provide that IT employees who are highly committed to their organization are less likely to leave than those who are relatively uncommitted.   They attach three distinct dimensions to organizational commitment: affective, continuance and normative commitment (Meyer and Allen 1997). 1)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Affective commitment – means an employee’s personal attachment and identification to the organization.   This results in a strong belief in an acceptance of the organization’s goals and values.   â€Å"Employees with a strong affective commitment continue employment with the organization because they want to do so† (Parà © and Tremblay, 2000, p. 5) 2)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Continuance commitment – is a tendency to engage in consistent lines of activity based on the individual’s recognition of the â€Å"costs† associated with discontinuing the activity.  Ã‚   â€Å"Employees whose primary link to the organization is based on continuance commitment remain because they need to do so.† (Parà © and Tremblay, 2000, p. 5) 3)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Normative commitment – provides that employees exhibit behaviors solely because they believe it is the right and moral thing to do. â€Å"Employees with a high level of normative commitment feel that they ought to remain with the organization.† (Parà © and Tremblay, 2000, p. 5) In their findings, Parà © and Tremblay provide that affective commitment and continuance commitment are negatively related to turnover intentions (Parà © and Tremblay, 2000, p. 6).   In addition to these two distinct types of commitment affecting turnover intention, their studies also points to the factor they call Organizational Citizenship Behavior or OCB. OCB is considered as a key element in organizational effectiveness.   OCB is defined as â€Å"an employee’s willingness to go above and beyond the prescribed roles which they have been assigned† (Parà © and Tremblay, 2000, p. 6, quoting from Organ 1990). Based on Parà © and Tremblay’s findings, the stronger the citizenship behavior of an IT employee, the more likely they are to stay in their company.   The IT professional’s affective commitment, or attachment to his or her organization, also decreases turnover intention. 2.3  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Job Characteristics Model Hackman and Oldham’s Job Characteristics Model, as earlier introduced in Chapter 1 of this research study, predicts what aspects of jobs reflect the level of job enrichment for employees, and how these relate to employees’ individual differences and to the work outcomes required. The model includes five core job characteristics that can be applied to any job: skill variety, task identity, task significance, task autonomy and feedback. Skill variety is defined as â€Å"the number of different skills required in the job† (Hackman and Oldham 1980; Pilon 1998). Task identity means â€Å"the completeness of the tasks done in the job† (Hackman and Oldham 1980; Pilon 1998). Task significance on the other hand is defined as â€Å"the importance of the job to the served population.† (Mohamed 2004). Autonomy means â€Å"the vertical expansion of responsibility, the amount of decision-making and independence allowed for employees.† (Mohamed 2004). And lastly, feedback means â€Å"the extent that the job itself provides information about employees’ performance† (Huber 2000). These characteristics – skill variety, task identity, task significance, autonomy, and feedback – are combined into a single predictive index which is called the Motivating Potential Score (Hackman and Oldham 1980). Figure 1. Job Characteristics Model Source: A.H. Mohamed (2004)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The five core job characteristics enumerated in the previous paragraph are in continuous interaction with individual differences that evoke three critical psychological states in an employee.   These three states are: 1) when the job is structured by skill variety, task identity and task significance this could lead employees to experience meaningfulness in their work. 2) The second state, task autonomy, which leads to feelings of responsibility for the outcomes of work. 3) The third and last state is feedback, which leads employees towards knowledge of the results of their work (Douthit 2000; Huber 2000).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   These three critical psychological states lead to a set of affective and personal outcomes:   high internal work motivation, high growth satisfaction, high general satisfaction, high work effectiveness, and low rate of absenteeism (Mohamed 2004; Donovan and Radosevich 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   These affective and personal outcomes are the results of en employee’s job characteristics.   They are defined as follows: High internal work motivation – this is the degree to which an employee is willing to work and to consider the organizational objectives as part of his or her own goals (Mohamed 2004). High growth satisfaction – this is the achievement of the employee in overcoming challenges, succeeding and growing (Steers and Black 1994) High general satisfaction – this the feeling derived from the overall satisfaction with the work itself. â€Å"This type of satisfaction is reflected mainly in decreased rates of absenteeism among employees† (Steers and Black 1994; Omachonu et al 1999). High work effectiveness – this refers to both the quality and quantity aspects of work performance (Hackman and Oldham 1980). Low rate of absenteeism. The Job Characteristics Model, also includes three attributes that are identified as Moderators: knowledge and skills, context job satisfaction, and employee growth-need strength.   These attributes indicate which employee will respond positively to the Motivating Potential Score of their job and its outcomes (Hackman and Oldham 1980). An employee’s knowledge and skills are dependent on their educational qualifications which in turn will reflect their perceptions toward their work outcomes (Sabiston and Laschinger 1995).   On the other hand, an employee’s perception of his or her context job satisfaction involves factors like pay, supervision, colleagues, and job security.   All these affect the employee’s outcomes as well (Mohamed 2004).  Ã‚   Lastly, growth-need strength is the degree in which an employee seeks opportunities in his or her job for self-direction, learning and personal accomplishment.   These elements in turn affect the employee’s level of work internal motivation (Mohamed 2004). An example of a study which made effective use of Hackman and Oldham’s Job Characteristics Model is the one conducted by A.H. Mohamed (2004) called â€Å"Using the job characteristics model to compare patient care assignment methods of nurses† for the Faculty of Nursing, University of Alexandria in Egypt.  Ã‚   The population used were the nurses in the Alexandria Main University Hospital.   Mohamed made use of a Job Diagnostic Survey (also developed by Hackman and Oldham) to determine nurses’ perceptions towards the components of the Job Characteristics Model in relation to their performance in utilizing the case and functional methods of patient care assignment (Mohamed 2004). In his study, Mohamed concludes that the jobs of intensive care unit nurses result in different expectations based also on the different categories of nurses, based on skills and challenges inherent in the work they perform (Mohamed 2004). Generally speaking thus, studies like Mohamed shows that an employee’s personal and affective outcomes are a result of the employee’s job characteristics. 2.4  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Model Employers However, management also plays a crucial role in the retention and conversely turnover of IT professionals.  Ã‚   Since IT professionals still enjoy a wide selection of employers to choose from, employers constantly compete to attract the best IT professionals by becoming â€Å"model employers†.   In her 2001 article for Computer World, called â€Å"Model employers†, Minda Zetlin outlines the strategies that make certain companies â€Å"model employers†. By compiling its eight annual list of 100 Best Places to Work in IT, Computer World roughly sums up the model employers as offering not just top compensation, but also â€Å"opportunities for career growth, investment in training, diversity in the work place, work flexibility, and, ideally, a comfortable and fun place to spend their daytime hours† (Zetlin 2001).   Zetlin in her article outlines three common themes behind the success of these model IT employers: IT is central to the best employers’ success According to Zetlin, excellence in IT is a top corporate strategy.  Ã‚   Prioritizing IT should not be limited to companies that strictly provide IT or IT services.   Companies such as Avon, for instance, which ranks 4th in Computer World’s list of 100 best employers, may be perceived to operate on a relationship-based environment.  Ã‚   Yet to process its more than 60 million custom orders every year, the company relies heavily on IT to process its complex supply chain.   The fact that is it is actually a very transactional business, dependent on technology, makes IT one of its priorities (Zetlin 2001). Management takes an active interest in employers’ careers from the day they arrive This includes having development plan for employees as soon as they join the organization.   Employees meet with their managers on a periodic basis for a formal review to assess their development plan and to evaluate its progress.  Ã‚   Orientation programs at the start of the employment are also part of this strategy.   Apart from orientation, Harley-Davidson, Inc. (ranked as No. 11) also provides for a yearly self-assessment for its employees against the established competencies for their jobs, with their supervisors doing the same (Zetlin 2001).   Such focus on career development per employee makes the employee feel that management takes an active interest in aligning its objectives with the employee’s personal goals. Model employers also provide for continuous interest on their employees’ careers throughout their employment with the company.   Knowledge mentoring programs and career mentoring programs, used by the State Farm Mutual Automobile Insurance Co. (ranked No. 13), for instance, allow employees to learn more skills and career guidance from their more experience colleagues, and help management to identify employees to fill leaderships positions in the short and long term (Zetlin 2001).   State Farm’s mentoring program is in fact so successful that it has extended the program to employees who haven’t even arrived yet – such as assigning mentors to college students who plan to join State Farm after they graduate. There are no walls between business and IT Unlike other organizations, model employers ensure that IT people and business people work side by side.   There is no division or competition.  Ã‚   IT professionals are given a better understanding that what they do helps the business succeed.   This understanding leads to career satisfaction for IT professionals.   Technology people know exactly how they contribute to the revenues of their business and how important they are in the business plan.   One advantage here is that a close relationship between IT and business allows people to switch between the two fields (Zetlin 2001).   Another strategies such as cross-functional work teams gives career development not just to IT professionals but to business people in the organization as well.  Ã‚   There are continuously different career tracks available.   An IT professional may opt to advance by taking on management roles within technology, or they may shift to business management positions (Zetlin 2001). 2.5  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Voluntary Intention Model   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   R.M. Steers and R.T. Mowday, in their study â€Å"Employee turnover and post-decision accommodation processes† (1981) analyzed turnover as rooted in voluntary intention.   Steers and Mowday viewed the interaction of intention to leave, and alternative job opportunities (ease of movement) as direct antecedents to turnover (Steers and Mowday 1981; Rouse 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As earlier discussed in Chapter 1 of this study, the direction of the process in Steers’ and Mowday’s Voluntary Intention Model starts with Job Expectations, then Affective Responses, then Turnover Intention, then finally,   Actual Turnover (see Section 1.2.1.1 of this paper).   However, these four elements were actually grouped together by Steers and Mowday under three steps. As can be seen in the Figure 3: Each step in Figure 3 contains two constructs.   The second construct (Job Attitudes) of Step 1 becomes the first construct of Step 2.   The second construct (Intent To Leave) of Step 2 becomes the first construct of Step 3. Step 1 of the Voluntary Intention Model involves the manner in which job expectations influence an employee’s attitudes regarding his or her job.   Attitudes are composed of job satisfaction, organizational commitment, and job involvement.   Job expectations in turn are influenced by three stimuli. The first stimuli focuses on individual characteristics such as occupation, age, tenure, family concerns, and personality form (Steers and Mowday 1981; Rouse 2001). The second stimuli involves information obtained during the recruitment process and at various assessments points throughout the employee’s career (Steers and Mowday 1981; Rouse 2001). For instance, studies have shown that job expectation levels are often high when the employee first accepts a new job (Porter and Steers 1973). At these particular periods, expectations are developed from both the employee and employer’s ends. In other words, a sort of unwritten social contract is deemed to be adopted by the two parties (Prouse 2001). Lastly, the third stimuli affecting job expectations are alternative job opportunities.   Studies have shown that the more alternatives there are confronting an employee, then the more negative the employee’s attitudes becomes concerning his or her current job (Pfeffer and Lawler 1979). Step 2 in the Voluntary Intention Model involves the Affective Responses that are elicited from Step 1.   These responses include the construct of job satisfaction, and how those responses influence the employee’s desire to leave the organization.   Factors that affect the employee’s decision to leave include non-work factors such as family, hobbies, religion and political influences (Cohen 1995). Steers and Mowday also identified the potential of employees to alter their actual job, in terms of pay, working hours, environment, etc., and thus change their attitudes regarding their jobs (Prouse 2001). Chapter 3 Methodology The aim of the research is to examine the relationships between job characteristic, job satisfaction and turnover intention among IT professionals in ______________.   The proposition is that job satisfaction and job characteristics as management influences have indirect impact to the levels of turnover intention among IT professionals.   The literature review indicates that there are different factors affecting IT professionals’ turnover intention.   This research is going to study the turnover intention of IT professionals in _____________. 3.1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Research Questions The study will answer the following two research questions: Which job characteristic variable(s) causes the job satisfaction among IT professionals in ____________? What job satisfaction variable(s) cause the turnover intention among IT professionals in ____________?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In answering these two primary questions, the thesis will make use of the following framework:    Hypotheses Research Question 1   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"Which job characteristic variable(s) causes the job satisfaction among IT professionals in _______________?†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The first research question will analyze the standardized effect of job characteristics to job satisfiers.  Ã‚   The null hypotheses tested were: Job Characteristics à   Job Satisfactions H1: The level of IT training does not affect the various measures of job satisfaction. H2: The level of user contact does not affect the various measures of job satisfaction.   Ã‚  Ã‚  Ã‚  Ã‚   H3: The job-required skills do not affect the various measures of job satisfaction.   Ã‚  Ã‚  Ã‚  Ã‚   H4: The level of task significance does not affect job satisfaction.   Ã‚  Ã‚  Ã‚  Ã‚   H5: The amount of workload does not affect job satisfaction.   Ã‚  Ã‚  Ã‚  Ã‚   H6: The amount of feedback does not affect job satisfaction. Research Question 2   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"What job satisfaction variable(s) cause the turnover intention among IT professionals in ________________?†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The first research question will analyze the standardized effect of the job satisfaction scales to turnover intention.  Ã‚   The null hypotheses tested were:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Job Satisfactions à   Turnover Intention   Ã‚  Ã‚  Ã‚  Ã‚   H7: The level of internal work motivation does not affect turnover intention.   Ã‚  Ã‚  Ã‚  Ã‚   H8: The level of job security satisfaction does not affect turnover intention.   Ã‚  Ã‚  Ã‚  Ã‚   H9: The level of social job satisfaction does not affect turnover intention.   Ã‚  Ã‚  Ã‚  Ã‚   H10: The level of job growth satisfaction does not affect turnover intention.   Ã‚  Ã‚  Ã‚  Ã‚   H11: The level of satisfaction with pay does not affect turnover intention.   Ã‚  Ã‚  Ã‚  Ã‚   H12: The level of satisfaction with supervision does not affect turnover intention. Research Procedures   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   3.3.1  Ã‚  Ã‚   Data Collection   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Research is a process of studying and analyzing situational factors of a specific problem or issue in order to determine solutions of it (Cavana, Delahaye and Sekaran 2001). According to Cavana, Delahaye and Sekaran (2001), there are three research paradigms: positivist, interpretivist and critical research.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As the research hypotheses of this study try to explore the relationships between job characteristic, job satisfaction and turnover intention among the IT professionals in __________________, the positivist approach will be adopted and it will provide the framework upon which the methodology of this study can be used.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In this study, the research problem requires primary data to specifically address the twelve hypotheses. An Internet questionnaire will be used as it is the most effective and appropriate data collection method. â€Å"Questionnaire† is defined as a â€Å"pre-formulated written set of questions to which respondents recorded their answers within closely defined alternatives† (Cavana, Delahaye and Sekaran, 2001). A well-designed questionnaire provides accurate and useable data for analysis in order to make a conclusion of accepting / rejecting a research hypothesis.  Ã‚   A copy of the questionnaire to be used is attached as Appendix A of this study.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   After gathering the data from questionnaires, the analysis of the data (including frequency distribution, correlation analysis and regression analysis) will be performed by a quantitative data analysis tool called SPSS (Statistical Package for the Social Sciences). SPSS predictive analytics advances in usability and data access, drawing reliable conclusions from the collected quantitative data (SPSS, Inc. 2002). In depth quantitative analysis of the data will be undertaken. Frequency Distribution, Correlation Analysis, and Regression Analysis will be used to analyze the collected data.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The population of this research is the _________ professionals in the country. The research is expected to have a 10% response rate (i.e. ____ questionnaires).   A reminder email will be sent to the students to ensure reaching the planned response rate. Participants are not inconvenienced or exposed unnecessarily to potential harm by recruiting more than is required. The research conducted by Dorà © in 2004 (which this paper intends to compare itself to) only received 326 responses which is less than 0.1% of the population.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   An invitation email   will be sent to the administration managers of the participating institutions. Then the manager will forward the invitation email to all qualified IT professionals and invite them to fill in the Internet anonymous questionnaire within 10 business days. A reminder email will be sent by the manager on the 6th business day. The invitation email only contains a consent form   and a URL to the Internet anonymous questionnaire. Participation is entirely voluntary. The participant can withdraw at any time and there will be no disadvantage if the participant decides not to complete the survey.   At no time will any individual be identified in any reports resulting from this study. A copy of the consent form is attached with this application. Variables   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The variables which will used in this study can be categorized into two categories: job characteristics and job satisfaction.   The factors within each category are discussed as follows:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The following job characteristics for IT professionals were selected for this study, based also on previous usage in similar studies as indicated in the literature review: IT Training User Contact Job-required Skills Task Significance Workload Feedback   Ã‚  Ã‚  Ã‚  Ã‚   On the other hand, the job satisfaction scales include the following: Internal Work Motivation Job Security Satisfaction Social Job Satisfaction Job Growth Satisfaction Satisfaction with Pay Satisfaction with Supervision Data Analysis   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The study will make use of descriptive and inferential analysis were used throughout the study.  Ã‚   Descriptive statistics (percentages, means, standard deviations, frequencies, and item means) were computed using the SPSS (SPSS, Inc., 2002).   This general-purpose analysis program will be used to characterize the sample in terms of demographic characteristics pertaining to gender, income, education, age, years as an IT professional, years in the current organization, and years in the current position.   SPSS will likewise used to analyze the correlation among job characteristics, the correlation between job satisfaction scales, the correlation between job satisfaction and job characteristics, and the correlation between job characteristics, job satisfaction, and turnover intention.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The primary inferential technique that will be used is bivariate correlation.   SPSS will   also be used to analyze the regression analysis for the data.   A 0.01 level of significance was adopted for testing significance.   The standardized effects of all the job characteristics for each job satisfier will also be computed.   The same method will be used to analyze the standardized effect of all the job satisfaction scales to turnover intention.   From these standardized effect analyses, the prediction of turnover intention by job satisfaction scales will be computed.    The job satisfaction scales which had a 0.60 level were considered significant to turnover intention.   The reliability coefficients ranging between 0.60 and 0.70 are deemed adequate for research purposes (Aiken, 2000, p.88).   For purposes of this study, the job satisfiers and job characteristics which have indirect effects of 0.60 above significance to turnover intention will be used.   The standardized effect of the significant job characteristic will be multiplied to the standardized effect of the particular job satisfier.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Each of the twelve hypotheses of this study will be tested in essentially six multiple regression analyses – one for each job satisfier as the constant, independent variable and its relation to each dependent variable represented by the job characteristics.   Otherwise stated, each job satisfier will represent a criterion variable and the six job characteristics will be considered predictors in each of the six regression analyses. References Alexander, S. M. (1999, November 1). The tricks for retaining talent. Crain’s Cleveland Business, T2-T3. Amabile, T. M. (1997). Motivating creativity in organizations: On doing what you love and loving what you do. California Management Review, 40, 39-58. Cavana, R. Y., Delahaye, B. L., and U. Sekaran. (2001). Applied Business Research: Qualitative and Quantitative Methods, John Wiley & Sons Australia, Ltd., Milton. Cohen, A. (1995). An examination of the relationships between work commitment and nonwork domains. Human Relations, 48, 239-263. Donovan, J.J., and D.J. Radosevich, (1998). The moderating role of goal commitment on the goal difficulty–performance relationship: a meta-analytic review and critical re-analysis. Journal of applied psychology, 1998, 83:308–15. Dorà ©, Timothy Lee. (2004).   The Relationships Between Job Characteristics, Job Satisfaction, and Turnover Intention Among Software Developers. Graduate School of Argosy University-Orange County. Douthit, M.W., (2000). Job satisfaction returns to human and social capital. Journal of behavioral and applied management, 2000, 1(1):67. Fisher, A. (2000, December 18). Inspiring the burned-out computer programmer. Fortune, 334. Guptill, B. Stewart, B. Maroccio, L., Potter, K. and C. Claps (1999). 1998 IT Spending and Staffing Survey Results. Gartner Group Strategic Analysis Report, April 1st. Hacker, C.A. (2003, Spring). Turnover: A silent profit killer. Information Systems Management, 14-18. Hackman JR, and GR Oldham, (1980). Work design. Reading, Massachusetts, Addison–Wesley, 1980:114–21. Herzberg, F. (1968). Work and the nature of man. Cleveland: World. Herzberg, F. (2003, January). One more time: How do you motivate employees? Harvard Business Review, 87-96. Kochanski, J., and G. Ledford. (2001). ‘How to keep me’—Retaining technical professionals. Research Technology Management, 44(3), 31-38. Kosseff, J. (1999, September 6). Info-tech firms increase efforts to keep workers. Crain’s Detroit Business, p. 21. McNee, B. Morello T. Zidar, E. and C. Smith (1998). IT Staff Retention and Recruitment: Addressing a Critical Problem for the IS Organization. Gartner Group Strategic Analysis Report, September 28. Meyer, J.P., and N.J. Allen, (1997). Commitment in the Workplace, Sage Publications. Mohamed, A.H. (2004, May) Using the job characteristics model to compare patient care assignment methods of nurses, Vol. 10, No. 3, May 2004, p. 389-405.   Department of Nursing Administration, Faculty of Nursing, University of Alexandria, Alexandria, Egypt. Morello, D.T. (1998). IT retention and recruitment: What has a year brought? Gartner Group Monthly Research Review, September 01. Omachonu V.K., Swift, J.A., Ross, J.E., eds. Principles of total quality, 3rd ed. Florida, St. Lucie Press, 1999:335. Organ D.W., (1990). The motivational Basis of Organizational Citizenship Behavior  » In B.M. Parà ©, G. and Tremblay, M. (2000).   The Measurement and Antecedents of Turnover Intentions among IT Professionals.   Scientific Series.   Ciprano.   September 2000. Pfeffer, J., & Lawler, J. (1979). The effects of jb alternatives, extrinsic rewards, and commitment on satisfaction with the organization: A field example of the insufficient justification paradigm . Berkeley: University of California. Pilon BA. Outcomes and surprises of work redesigning: how other leaders are coping with changes. Nursing Management, 1998, 29(8):44–5. Porter, L. W., and R.M. Steers. (1973). Organizational, work and personal factors in employee turnover and absenteeism. Psychological Bulletin, 80, 151-176. Rouse, P. D. (2001). Voluntary turnover related to information technology professionals: A review of rational and instinctual models. International Journal of Organizational Analysis, 9, 281-290. Sabiston J.A., and H.K. Laschinger (1995). Staff nurse work empowerment and perceived autonomy. Journal of nursing administration, 1995, 25(9):42–50. SPSS, Inc. (2002).   Statistical Package for the Social Sciences (Version 11.5) [Computer software].   Chicago, IL: SPSS, Inc. Steers, R. M., and R.T. Mowday. (1981). Employee turnover and post-decision accommodation processes. In L. Cummings & B. Staw (Eds.), Research in Organizational Behavior (Vol. 3, pp. 235-281). Steers, R.M., and J.C. Black. Organizational behavior, 5th ed. New York, Harper Collins, 1994:95–101. Thatcher, J.B., Stepna, L.P. and R.J. Boyle (2002-03).   Turnover of information technology workers: Examining empirically the influence of attitudes, job characteristics, and external markets.   Journal of Management Information Systems, 19, 231-261. Zetlin, M. (2001, June 4). Model employers. Computerworld, 40-45.

Sunday, November 10, 2019

War Destroys Innocence

Also, soldiers In the war never had a chance to live their youth because they had to go to war. Just as they should be starting their lives, they were forced to drop everything at once and put their life on the line. In â€Å"Peace†, it reveals that the soldiers are not in the war for themselves, but for God and for their country. Since they are doing this, their senses sharpen, and their youth fades away. If war does not kill you physically, then It will emotionally. Its a simple fact, war Is destruction at Its best.It does not only destroy lives, but emotions. The theme of â€Å"All Quiet on the Western Front† perfectly presents how war destroys innocence. † generation of men who, even though they may have escaped shells, were destroyed by the war†(Armature Prologue). Even though war does not always physically injure someone, it can emotionally scar them for the rest of their lives. The incidents that happen while people are at war are hard to forget about . They are metal images that cannot be erased. Naught broken save this body, lost but breath† (Brooke 11).This quote from â€Å"Peace† Indicates that yes, the soldiers were saved, but they're soul destroyed on the Inside. Nothing was saved, but the body. The comrades in the war had to quickly erase their youth and prepare for the worst. However, there is only so much you can prepare for. They were quickly broken down and forced to grow up no matter the occasion. â€Å"All Quiet on the Western Front†delays why war destroys youth. ‘We had to recognize that our generation was more to be trusted than Armature 12).Most of the soldiers were young, around eighteen to twenty-one years old. They never had a chance to live their youth years because they had to go to war. Right when they should be starting a new chapter In their life, they have to risk their lives and fight for their country. â€Å"For us lads of eighteen they ought to have been mediators and guides to the world of maturity to the future in our hearts we trusted them. The idea of authority, which they represented, was associated in our minds with a greater Insight and a more humane 12), In â€Å"AllQuiet on the Western Front† Paul and his comrades must determine what is correct since the older generation is incapable of helping them and being the supervisors that they are supposed to be. War destroys youth Is portrayed In â€Å"Peace† because the soldiers lose themselves and become animal-Like men. â€Å"And half-men and their dirty songs and dreary'(Brooke 7). When at the front, the soldiers lose their humanity. â€Å"Just as we turn 1 OFF Into animals when we go up to ten Ellen †¦ So we turn Into wags Ana looters when we are resting†¦.We want to live at any price; so we cannot burden ourselves with feelings which, though they may be ornamental enough in peacetime, would be out of place here†(Armature 138-139). When soldiers were giving up their humanity, they were giving up their youth as well. The soldiers lost their whole selves in the war; especially when they were on the front. They could not think like human. In order to survive the anxieties of war, Paul explains that he and his comrades would have to disconnect themselves from their emotions.The only way of surviving the war notionally is if it is avoided in thoughts. If it is not avoided, then the grief, despair, and fear would drive a man insane. Only an adult would be capable of doing this. No child or young man could. This is a perfect example of how war destroys youth. The war caused the soldiers to grow up fast. If they did not, they would not survive in any way. Mouth! We are none of us more than twenty years old. But young? Youth? That is long ago. We are old folk† (Armature 18). Armature refers to the men as â€Å"Iron Youth†.The men are still young but they have a feeling of strength and being invincible on the inside and out. The soldiers ar e no longer part of society. After the war they could not go back and live their lives like nothing happened. They have grown up in a way no one will ever understand. Most of the veterans from World War I stayed in the army because they did not believe they belonged anywhere else. They considered war their home. The soldiers lost their youth from the beginning of their journey in war. War destroyed the innocence of the veterans in World War l. There was no way of regaining what they lost.

Friday, November 8, 2019

Local Artist From Rimersburg Show †Art Essay

Local Artist From Rimersburg Show – Art Essay Free Online Research Papers Local Artist From Rimersburg Show Art Essay The local artist from Rimersburg put together a lot of different pieces of art, mostly acrylic paintings although there were a few sketches and sculptures. The art was different from most of the other art pieces that I have seen. There were some parts that I liked, but I really wasn’t too crazy about his art. One thing that did catch my eye was the backgrounds of his pictures. The colors and the textures are what I liked best about the backgrounds. I wasn’t a fan of the smaller paintings with the swirled colors all over them. Truthfully, the colors in them were getting boring after seeing ten other paintings that all looked alike. I did like the two bigger ones with the swirls. I thought that the swirls made it look like a whole bunch of people standing together. That is why I liked the bigger paintings better that the smaller ones, they looked less confusing and more like whole people. I disliked the other paintings more than the swirl paintings. The white things that were painted on top of the background all looked like body parts having sex. The sculpture also looked like they were having sex. The artist used th is really ugly blue color in almost every peace of art he painted. Overall, I didn’t like this art show. I would have liked to have seen more of a variety of paintings, less of the swirl paintings, and to have gotten rid of that ugly blue color. Research Papers on Local Artist From Rimersburg Show - Art EssayHip-Hop is ArtThe Masque of the Red Death Room meaningsBook Review on The Autobiography of Malcolm XWhere Wild and West MeetEffects of Television Violence on ChildrenAssess the importance of Nationalism 1815-1850 EuropeThe Spring and AutumnCapital PunishmentHonest Iagos Truth through DeceptionMarketing of Lifeboy Soap A Unilever Product

Tuesday, November 5, 2019

Transition Metal Colors in Aqueous Solution

Transition Metal Colors in Aqueous Solution The transition metals form colored ions, complexes, and compounds in aqueous solution. The characteristic colors are helpful when performing a qualitative analysis to identify the composition of a sample. The colors also reflect interesting chemistry that occurs in transition metals. Transition Metals and Colored Complexes A transition metal is one that forms stable ions that have incompletely filled d orbitals. By this definition, technically not all of the d block elements of the periodic table are transition metals. For example, zinc and scandium arent transition metals by this definition because Zn2 has a full d level, while Sc3 has no d electrons. A typical transition metal has more than one possible oxidation state because it has a partially filled d orbital. When transition metals bond to one more neutral or negatively charged nonmetal species (ligands), they form what are called transition metal complexes. Another way to look at a complex ion is as a chemical species with a metal ion at the center and other ions or molecules surrounding it. The ligand attaches to the central ion by dative covalent or coordinate bond. Examples of common ligands include water, chloride ions, and ammonia. Energy Gap When a complex forms, the shape of the d orbital changes because some are nearer the ligand than others: Some d orbitals move into a higher energy state than before, while others move to a lower energy state. This forms an energy gap. Electrons can absorb a photon of light and move from a lower energy state into a higher state. The wavelength of the photon that is absorbed depends on the size of the energy gap. (This is why splitting of s and p orbitals, while it occurs, does not produce colored complexes. Those gaps would absorb ultraviolet light and not affect the color in the visible spectrum.) Unabsorbed wavelengths of light pass through a complex. Some light is also reflected back from a molecule. The combination of absorption, reflection, and transmission results in the apparent colors of the complexes. Transition Metals May have More Than One Color Different elements may produce different colors from each other. Also, different charges of one transition metal can result in different colors. Another factor is the chemical composition of the ligand. The same charge on a metal ion may produce a different color depending on the ligand it binds. Color of Transition Metal Ions in Aqueous Solution The colors of a transition metal ion depend on its conditions in a chemical solution, but some colors are good to know (especially if youre taking AP Chemistry): Transition Metal Ion Color Co2+ pink Cu2+ blue-green Fe2+ olive green Ni2+ bright green Fe3+ brown to yellow CrO42- orange Cr2O72- yellow Ti3+ purple Cr3+ violet Mn2+ pale pink Zn2+ colorless A related phenomenon is the emission spectra of transition metal salts, used to identify them  in  the  flame test.