Monday, September 30, 2019

Intro to Religiion

Jake Walton There are many different definitions of religion, but two we are studying about is Paul Tillich’s definition and Melford E. Spiro’s definition. Paul Tillich is a Christian theologian and philosopher who defined religion â€Å"the state of being grasped by an ultimate concern, a concern which qualifies all other concerns as preliminary and which itself contains the answer to the meaning of life.Melford Spiro, a contemporary anthropologist defined religion â€Å"an institution consisting of culturally patterened interaction with culturally postulated superhuman beings. † I prefer Tillich’s definition. I prefer Paul Tillich’s definition because I am a Christian and I can relate to what he is saying with his definition. As a Christian, God is your ultimate concern, just like Tillich said. God comes before everything. He is your only way to heaven. So you have to make him your ultimate concern by living for him every day.Tillich’s def inition went on to say â€Å"a concern that qualifies all other concerns as a preliminary†¦Ã¢â‚¬ , this means that God comes before anything else in life. Nothing should ever come before God. Everything else should just be a preliminary, or second to God. The last part of Tillich’s definition says a concern which contains the answer to the question of the meaning of life. This means that God is the meaning of life. I prefer Tillich’s definition because this is what I believe.I believe that God is the answer to what is the meaning of life, he has a purpose for everyone and everyone’s life. God should be your ultimate concern if you want to go to heaven, He is the only way in. You have to live your life through him, and to do that he has to be your greatest concern. If other things get in the way you have to put them off and make them second to God. Never let anything get in the way of you and God. I feel Tillich’s definition of religion is a great d efinition of religion.

Sunday, September 29, 2019

Night VS. Maus Essay

Libraries, bookstores, and even school classrooms are swamped with many explanations of the Holocaust. So many survivors have a story to tell, so many people have a point to make, and so many more people simply want to try to understand the horror, or maybe help others to understand it better. Elie Wiesel’s Night and Art Spiegelman’s Maus are two greatly admired works of art which are flooded with the shocking dreadful summary of the Holocaust works. During the tenth grade one of my favorite books was Maus. Another one of my beloved stories was Night. Although they are very different, they also have similarities. Art Speilgman’s Maus is a comic book and it tells the tale of Vladek, Art’s father. Vladek and his wife Mala are survivors of the terrible tragedy known as the Holocaust. Throughout the story, it tells all about Vladek going through life’s trials and tribulations. There are even parts of Vladek’s story that he doesn’t want Art to tell. I personally believe Art wasn’t wrong for telling them anyway because why would he tell some of the story but not all? I think skipping parts would mess up the flow of the story. On pages 85 and 86 of Maus is the â€Å"Hanging scene.† This is a very important scene because both books have a hanging scene. In Maus, Anja’s father comes into the room with a horrific look on his face and says â€Å"They just arrested my friend, Nahum Colon, and his son.† In Maus, you see how the emotions in the words. In Night, it is much darker and cruel because you feel worried when you read it. You have to i magine what the expression on each person’s facial expression is. Maus’s hanging scene embraces the reader to understand better and show how serious the Holocaust really was in my opinion because in Night only the people who know of the hanging are the people at the concentration camp, where in Maus everyone in the street knows. Though both books have lots of similarities, there are also many differences. Maus is a graphic, â€Å"comic book† novel while Night is a regular book. Even though both story tellers were at the same place, they were treated differently. The survivor in Maus had used skills like using a different language and disguising himself. Vladek could speak Polish, English, and German. He also used his skills he picked up from working elsewhere to mend shoes. While in Night Eli was only  a child at the time and he was trying to do basic work and keep his father going. Elie was manipulated easily by other Jews. The other Jews would tell him to just abandoned his father and fend for himself and he began to think that he should do it. Elie also didn’t have any plugs or connections to ensure his safety or to get a good job but, sometimes he did get lucky. Another contradictory feature that differs is the relationship between Art and Vladek in Maus, and Elie and his father in Night. Vladek always seemed to need Art around to stay with him and help him to deal with his health issues, but Art didn’t hastate in say no. Art was married and wanted to embrace his relationship with his wife more than he did with his father because Vladek was self-centered and did what he wanted to do at all time. He loved being there for his father, but didn’t want to deal with his ways. Unlike that with his father, Elie always took it upon his to be there for his father through everything. Elie’s father meant the world to him and when things was wrong Elie blamed himself for not doing more than enough to keep his father up and in shape to stay up with him. The relationships between Elie and his father were a lot closer than Vladek and Art because Elie’s father was all he had left, so he didn’t want to risk losing all that h e had.

Saturday, September 28, 2019

Company assignment Essay Example | Topics and Well Written Essays - 2750 words

Company assignment - Essay Example These statutory provisions applied in conjunction with established principles of common law and equity in relation to directors duties2. However, in the consultation phase leading to the implementation of the CA 2006, the Government expressed dissatisfaction at the inherent uncertainty of these provisions and have attempted to codify both the common law and statutory provisions pertaining to directors duties under the CA 20063. In turn this has lead to some commentators arguing that the CA 2006 codification of directors’ duties has resulted in tighter controls on the exercise of director’s duties. This paper critically evaluates this argument with a comparative analysis of the previous legal position and how far this has been changed by the CA 2006 provisions. If we firstly consider the previous position under common law and equity, the issue of fiduciary duty has commonly arisen in constructive trust and tracing cases. Additionally, issues have arisen regarding the int errelationship between director’s duties and the abuse of the corporate structure as exemplified by phoenix company syndrome4. The term â€Å"phoenix† company is utilised to define a corporate structure where assets of one limited company are moved to another legal entity5. Commonly, some or all of the directors and management will remain directors in the successor company and in some instances the successor company will have the same or similar name to the failed business6. In simple terms, a phoenix company is a limited liability company: â€Å"housing individuals, or the directors by name or otherwise, who abuse the corporate form by dissolving one company and creating another to avoid payment of debt†7. Furthermore, it has been commented that the Register of Companies is â€Å"littered with cases involving phoenix companies†¦Ã¢â‚¬ ¦ ones which fail and then seemingly reappear overnight in substantially the same form and with substantially the same mana gement8†. Typically, a phoenix company will use all or some of the assets of the insolvent company and will trade in the same industry and similar manner to the failed predecessor9. Whilst it is perfectly legal to form a new company from the debris of a failed company, â€Å"phoenix syndrome† has repeatedly been criticised as a means of abusing the statutory provisions implemented to protect against wrongful trading and abuse of position10. For example, a director of a failed company can become a director of a new company unless they are bankrupt or subject to a disqualification11. One the hand, it is clear that not all legitimate businesses will succeed on first attempt and the Small Business Service12 estimates that one in three businesses shuts down within three years13. Nevertheless, it is submitted that reasons for failure are multifarious and it would be undesirable for the law to penalise honest individuals from acting as directors simply due to difficulties in r unning a business. Accordingly, it is propounded that in such circumstances, the phoenix company arrangement is beneficial in allowing a business to start again14. Moreover, the phoenix arrangement enables profitable aspects of the failed business to survive into the successor company, thereby preserving an element of continuity for both suppliers and employees15. Conversely however, in the

Friday, September 27, 2019

Sedimentary Rocks Essay Example | Topics and Well Written Essays - 1250 words

Sedimentary Rocks - Essay Example The key characteristic feature of sedimentary rocks is that they are layered. Although there cover of the earth’s crust is extensive (about 75 per cent), sedimentary rocks only constitute about five per cent of the total volume of the crust. The earth’s crust mainly consists of the igneous and metamorphic rocks. Sedimentary rocks are vital sources of the natural resources such as coal and drinking water (Stille and Fichter, 2008). Formation of Sedimentary Rocks Sedimentary rocks are usually formed in areas where there is water or water had existed in one particular time. The dead materials of animals, plants, and pieces of rocks or minerals are then transported to these areas (water bodies) by wind, water, ice, or gravity where they are often dropped off and sink to the bottom. At the bottom of the water bodies, they little by little begin to form layers which build on top of one another. This puts pressure on the lower layers thus the weight of all of the layers pushes down the lower layers until they harden into rock.   This process does not occur in few years but takes millions of years to happen.   During this process, the water body dries up and the sedimentary layer that used to be under water becomes a surface layer (Boggs, 1995). Categories of Sedimentary Rocks According to Stille and Fichter (2008), sedimentary rocks are categorized into three main groups based on sediment type. The three categories include: Clastic Sedimentary Rock: they are formed from mechanical weathering debris. Examples include sandstone, conglomerate and breccias. Organic Sedimentary Rocks: they are formed from accumulation of dead plant and animal materials. Examples include coal and some limestones. Chemical Sedimentary Rocks: they are formed by precipitation of dissolved materials from solutions. Examples include some limestones and rock salt. Distinguishing Characteristics between the Three Categories of Sedimentary Rocks Clastic Sedimentary Rocks These are the most common type of sedimentary rocks and are comprised of granular materials which occur in sediments. Clastic rocks largely consist of surface minerals such as clay, feldspar and quartz which are formed as a result of physical breakdown of rocks and alteration of rocks chemically. Clastic sedimentary rocks are classified according to the size of the particle which is dominant in the rock. For example, Breccia is composed of large angular fragment, sandstone is composed of sand size weathering debris and conglomerate is made up of large rounded particles. Clastic sedimentary rocks have clastic texture; they are made up of clasts (Stille and Fichter, 2008). Organic Sedimentary Rocks Organic sedimentary rocks are composed of organic matter: animal and plant fragments. This type of rock is usually formed in two ways. One type (which includes limestone and chest) forms in the sea due accumulation of dead plankton shells whereas as the other one (coal) is formed due accumulation of dead plant on the earth surface (Boggs, 1995). Chemical Sedimentary Rocks Chemical sedimentary rocks are formed by inorganic precipitation of supersaturated mineral constituents. They form within the depositional basin from components of chemicals dissolved in water. Unlike clastic sedimentary rocks, the direct origin of chemicals is not east to esteblish. The chemicals could originate from magma or from an

Thursday, September 26, 2019

Write a dialogue in which John Hick, the astro-physicist priest (lets Essay

Write a dialogue in which John Hick, the astro-physicist priest (lets call him Father Tom) from Arthur C. Clarkes The Star, the Devil, - Essay Example Out main agenda was about Science and Religion and which theory of the two seemed more credible as evident in the Star by Arthur Clarke (Rabkin, 1980). John Hick: My evening is fine †¦ how about you? (He stretches his right hand to meet mine in a greeting. I realized that the lines on his face symbolized one who is deeply troubled by some questions he could not find answers to. So I interjected to help him think aloud about his woes). The narrator: Father†¦ why are you in the outside? I thought it would be fine if you were inside the room so that this candle could bring light into the room and scare aware insects†¦ you know†¦ things like that (I paused to allow him time to respond while he scrambled a seat for me to join him in the conversation). John Hick: (While supporting his cheeks, he began): Little one, you are yet to live the length of time I have been breathing. That is why you may not be able to understand some of these things. To begin with, I’ve chosen my outhouse ostensibly to come to terms with what religion and science has in store for us humans. John Hicks: The house is artificial; it technically obfuscates my vision of nature. The symbols of science such as the planets, galaxies, the moon, darkness, chirping crickets, wind are more real to me here than when I’m inside the house. With these symbols of nature so true and real, I do entrust my religious faith with answers as to their origin, but in situations where I’m certain that religion is not providing me with the answers that I need, I refer to Science. However, my main worries stem from the competing theories; I’m technically lost for though with regard to which side has all of the answers to nature. John Hicks: It is not that easy the way you think, my little friend. I must admit here before you that that the lines you are seeing on my

Wednesday, September 25, 2019

Oceania Research Paper Example | Topics and Well Written Essays - 2500 words

Oceania - Research Paper Example Polynesia is made up of more than 1000 islands spread over central and South Pacific Ocean. The occupants of Polynesian are called Polynesians. According to the history, the occupants were sailors who used stars to determine night hours. The land is about 70 million sq miles of Pacific Ocean. Polynesia is made up of two different cultural groups, east and west Polynesia. The culture of west belong to high populations, it is made up of well build institutions of marriage, well developed judiciary, financial and trading traditions. The groups that occupy this area are the Tonga, Niue, Samoa and Polynesian outliers. According to the (Richard, 2011) the eastern part is adapted to small islands such as cook, islands, Tuamotus, Marquesas, Hawaii, and Rapa Nui. The leaders were appointed based on their blood hereditary. The settlement in the area was of two categories, the hamlet and village, the size of an island was the determining factor on whether the hamlet or a village will be build. In the large volcanic islands, the hamlet was mainly built because of many zones; these zones could be divided all over the islands. Villages were established on the coast of small islands and it consist of 40 or more houses. Melanesia extends from Arafura Sea to the western part of Pacific Ocean, and Fiji to the east. The people occupying the region are called Melanesians and are believed to be he ancestors of Papuan speaking people. The number of languages in Melanesia is about 1320 and they are scattered across the land. The leaders were appointed based on the individual personality not through inheritance or blood like the Polynesians. The key components for leadership were power of persuasion, selecting high placed woman as a partner and many other physical factors. Micronesia lies to the Melanesia to the south and to the east is Polynesia; Philippines to the west and Indonesia to southwest. Micronesia is made up of 607 islands and it has four states, Chuuk, Yap, island of Kosr ae and Ponpei. The original languages of Micronesia indigenous people are in a class of Austronesia language family (Richard, 2011). The island was colonized by Spain in 17thcen. Later on the Germans purchased it from the Spanish in 1899. The Japanese fought out the Germans from the island in 1915 but American forces took over from the Japanese during the world war 11. The Micronesia culture is one of the last to develop in the region; it is a mixture of Melanesians, Polynesians, and Filipinos. One of the main ethnic groups in the region is Fijians. Fijians arrived at Fiji when it was already occupied by the Melanesians, but Melanesians was still weak since they were still new in the area. Due to their strong war tools, they managed to fight out Melanesians and occupy the area. Due to the conflict between the two groups, Fiji ends up being a place of relentless and bloody conflict. The early missionaries and traders who visited the islands show the details of extreme violence and ca nnibalism. In the Fijian culture, warfare, cannibalism and religion were interdependent (Richard, 2011). The traditional rights and customs demand bodies and sacrifices to be carried out for the security of the society, at the same time for a war to be carried out successfully; it needs the mediation of priest and the help from

Tuesday, September 24, 2019

Concepts learned in International Relations Essay

Concepts learned in International Relations - Essay Example the ‘national interest’ is captured in the image of a social evolutionary process that predetermines a series of associated connotations and denotations of an otherwise natural phenomenon (Trubovitz, 1998, p.3). The individualistic view of ‘what’s good’ is truly based on the concept of private benefit while social good or benefit is located in a larger context that even encompasses international interests. It’s against this backdrop that American national interest as against international collective benefit ought to be examined. Concepts such as ‘absolute good’ and ‘relative good’ in a politically charged environment of conflict between ideologies are more relevant and highly feasible though definitions of them might vary according to biases and prejudices of individuals who seek to interpret them. Social issues of conflict and ideological differences deserve more attention in a study of international relations than a superficial analysis of consequences thereof. Theoretical underpinnings of social transformation in an international relations context focus attention on the inevitable concept of conflict between private interests and public interests. By extension it’s the same conflict between national interests of the individual nation state and the collective interests of the international community at large. The subsequent developments that unfold as the conflict evolves into a multifaceted phenomenon bear a closer semblance to those social issues such as ideological differences, social biases and prejudices, ethnic and religious interests and societal mores or value systems. At an international level the macrocosmic phenomenon though might assume a diversity and a complexity that has little parallel in conflicts within the boundaries of a nation state. The theoretical rigor with which the polemical issues in interstate relations are treated generates a greater degree of enthusiasm in the conflict and its impact on such relations. While

Monday, September 23, 2019

Jonathan Safra Foer Extremely Loud and Incredibly Close (2005) Literature review

Jonathan Safra Foer Extremely Loud and Incredibly Close (2005) - Literature review Example For instance, in William Golding’s Lord of the Flies the innocent respond to the apocalypse by hopelessly degenerating into abject crudeness and barbarity, thereby questioning the supposed nobility of human existence and the lofty achievements of human civilization (Otten 1982). In contrast, To Kill a Mockingbird by Harper Lee shows the innocent witnessing the rampant social injustices with their inherent simplicity and artlessness, without attempting any analytical or immaturely logical approach towards trying to figure out things (Sterne 1994). In Khaled Hosseini’s The Kite Runner, the innocent succumb to the defilement of cherished intimacy and friendship before an abject sense of helplessness and painful unconcern (Shivani 2007). In that context, Jonathan Safran Foer, in Extremely Loud and Incredibly Close affects a unique treatment to the theme under consideration, in the sense that it celebrates the survival of innocence, signified by its very ability to feel pain , trauma and loss and its adamant stubbornness to seek out a meaning in the surrounding gloom and apathy. In Extremely Loud and Incredibly Close, nine year old Oskar is an innocent from the 21st century, who, though, inflicted by the sorrow and loss affected by a very contemporary apocalypse, refuses to give up. On the contrary, he chooses to squarely grapple with the bizarre aftermath wrecked by the apocalypse, painstakingly and deliberately looking out for solutions, trying to eke out explanations, desperately desiring to cull out some sense out of the world obsessed with nihilism. Story of Oskar depicts how the innocent collide with reality in the modern times. According to Claude Peck, Extremely Loud and Incredibly Close is not as much a novel about 9/11, but rather a literary after-effect, which tends to illustrate the varied imaginative and psychological dimensions of the apocalypse (2005). To explore this modern day apocalypse, Foer had to improvise an offbeat format marked b y vivid pictures, photos and illustrations portraying themes and scenes from the novel, empty pages and pages having only one sentence, coloured graphics, doodles, typographical oddities and a strange ending involving multiple pages showing a man falling from a skyscraper (Peck 2005). The novel vividly delineates how innocent Oskar tries to come to terms with his personal loss and trauma, his resultant bouts of anxiety, insomnia, self-mutilation and depression (Peck 2005). In many ways, Oskar is an exceptional nine years old, as he is a vegan, regularly corresponds with Stephen Hawking, can converse in passable French and is an avid and ingenuous inventor. However, one thing that Oskar has in common with all the New York children, and actually with many of the New Yorkers, is his deep seated sense of remorse and despair over the 9/11 World Trade Centre attack (Peck 2005). Surprisingly, Oskar responds to this tragedy by zealously trying to translate his anguish into pragmatic action, into some meaningful search that culminates into something life affirming, a possible resuscitation of the bruised yet indefatigable spirit of modern humanity (Peck 2005). Sadly, Oskar’s approach towards facing reality is not so liked by some prophets of the yore. Perhaps, as usual they consider innocence and naivety to be synonymous. In a review written for the New Yorker, John Updike commented on the futility of filling a 300 plus page book with â€Å"

Sunday, September 22, 2019

Transactional Communication Essay Example for Free

Transactional Communication Essay Conversations   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   They are talking simultaneously, each seeming to carry on a conversation with themselves more so than with each other. She is talking fast, looking at the air, her hand gestures extravagant and facial expressions flamboyant. He is leaned back, sunken into the chair comfortably, talking lowly, nodding his head in agreement at regular intervals, his voice running alongside hers. She is excited. He looks amused.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   They sit close to each other in the corner of the cafà ©. Sounds from conversations hum in the air around them, the clinking and bustling of a busy cafà © a background to this conversation. Despite the multidimensional setting—the music playing in the speakers above, the couple to their left discussing baby names, the loud ring of the nearby telephone and the even louder server who answered it—these two talk as if they were alone at home, as if none of the loudness existed. They are celebrating. Crumbled remains of a chocolate fudge cake occupy the table space they share, and two large mugs of coffee sit pushed to the side, ready to be taken away.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This is where a server makes it big or loses out completely on a tip. Time is a factor in everything, and as a server you have to be willing to divide your time evenly among your tables so that you don’t fall in the weeds later. If you see one of your tables finished with their plates and cups, it’s your job to pick it up, and fast. It’s an opportunity to offer them anything else, and one more chance to make an impression, to make them like you. They’ve finished eating, and more importantly, she’s just eaten chocolate cake.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   So I bustle over and say, â€Å"Hey folks, can I get this out of your way?† Smiling, of course. You have to smile.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   She looks up at me, blinking, cross, brow furrowed. He moves forward, sitting up aggressively, brow furrowing, â€Å"What, man?†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"Can I get this out of your way?† I ask, cautiously, not sure what just happened here. I even lean in a little, my hands crossed behind my back so I look more servant-ly, less threatening.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The mood cracks. She laughs. He smiles goofily in relief. He shakes his head. She puts her hand over her eyes. â€Å"We thought you said something else,† they both seem to say at the same time.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   When they leave, I find my tip—a measly $3—under the saltshaker. Apparently, noise is a factor, too. The external part of it, all those people’s voices charging the air around us, music swirling in between conversation, me asking to clear the plates; they thought I was hitting on her. Maybe I was smiling too much.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   But he must have that internal part of it, the voices in his head that tell him she’s cheating on him with every guy that sees her. Why is that, I wonder? They were having such a nice conversation, and then I got there, and everything changed. What were they talking about? Being a server is about the closest thing you can be to a fly on the wall. They almost ignore you completely, until you buzz around them and ask if it’s okay to pick up their plates. Next time, I shouldn’t say anything, I should just pick it up.

Saturday, September 21, 2019

History 17-a American history Essay Example for Free

History 17-a American history Essay Known as the American experiment in liberty and equality, the Civil War of America is supposed to be a major turning point in American history. Originated due to slavery, this war was first revoke from American citizens to acquire the right of liberty and equality. By the war, slavery was extinguished in America. Beginning of nineteenth century was much different from the eighteenth century; this was a revolutionary era in which industrialism was rising against agriculture, nationalization against state particularization and desire of freedom was heading against slavery. However, this moral idealism is not believed as an appropriate reason for the war. In accordance with some historians, it is also called as the war of power and economical affluence. It is said that South was economically abundant than the North. It was making good money in trade and commerce in comparison of North. North was not ready to accept this fact and this resulted as the Civil War. By the time of war, South occupied an area as large as Western Europe and ‘North’ has a strategic assignment to invade and conquer the southern confederation. In this war, southerners were fighting for independence, self-determination, self-government and preservation of life. Nevertheless, results of this war became the decision points for American history as the war grown the offspring of Nationality in Northerners. Southerners wanted to be separated from the American Union and Northerners were not is the support of that. In the battle against southerners, few incidents worked as the turning points of Civil War and American History as well. As instance, Northern Unions hold on Kentucky and Border States in considered as the first turning point of American civil war. This was of a great importance for Northerners. Even president of the nation, Abraham Lincoln said that ‘I can’t think of loosing Kentucky’, Kentucky was a southern state. Considered as the first modern war, the civil war of America made the nation, which is known as ‘United States of America’. During this war, Abraham Lincoln was mainly focused on Border States. He was not in favor of self-government in these states. Border States were extremely crucial for Northerners, as these states were physically separating Northern Union and Southern Confederacy. Bull Run is taken as another major defining moment in the history of Civil War. This was a land battle. This battle was full of anticipations and both sides were sure about their victory. However, Northerners managed to win this was a Herculean task for them and it was an end of southern hopes to set the self-government. Union capture on Mississippi, Forts Henry and Donelson in February 1862 is also considered as the major turning point in Civil War. It was first significant victory of union. Victories in Battle of Anteitam and Battle of Gettysburg made unions to move more rapidly in the direction of uniting American states. A defeat of Confederacy in the Battle of Chattanooga is taken as one of the most prominent turning point of Civil War. In this war Union reduced Confederacy to the Atlantic coast. This opened the way for Sherman’s Atlanta Campaign. Two incidents that took place in 1864 are taken as the last nail in the coffin of southern confederacy’s desire of self-government, independence and self-determination. These two incidents were Union capture on Atlanta and reelection of Abraham Lincoln. Both incidents respectively took place in September 1864 and November 1864. Civil War: the First Modern War American Civil War is taken as the first modern warfare. Confronted with various viewpoints and issues, this war is marked as the well mobilized war of the modern age. In accordance with historians, it deserves to be the first modern war due to its two important reasons. First reason is its technological advancements and another is a great change in the logistics and tactics applied in the battlefield. Northern generals Ulysses S.  Grant and his sub-ordinates applied strategies those were far ahead from the war approaches applied by the time. The morality war of Northern Americans against Southerners also resulted in many mesmerizing innovations, those helped in nation moving at the forefront from rest of the world. Cannons, rapid fire guns, Gatling gun, telegraphs and aerial warfare are considered as some of the stirring innovations of Civil War period. The civil war also worked as the rapid fire in the growth of American economy. It is also said that this was the beginning of American supremacy. This war was the first war in which army was not involved in killing on one-to-one manner. It was entirely technical. Both Unions and Confederacy army troops were relying on technical weapons instead of traditional ones. This was the first time when air warfare and sea warfare modes were also used. This war was the first war when a strategy of destruction was used and it also boosted he idea of unconditional surrender in the battle-field. In this was Union troops used telescopes and air-balloons to locate the position of enemy. Civil War of American History is known as first war due to it’s a completely foreign planning in accord with the world of nineteenth century. Following reasons the major basis of knowing this was as the first modern war- Railroads: Invention of railroad played a very important role in supplying armies with food, bullets, and soldiers. These cars were armed with weaponry. Hospitals: This was the first time when hospitals were set in battle field. Women s uch as Clara Barton and Dorothea Dix worked in these hospitals to give medical treatments to inured soldiers. Nevertheless, by the time medical knowledge was not advanced as today and mortality rate of soldiers due to disease was greater than their death in battle field. This was the first time in the context of using dogs as armor. Photography and Telegraph- by the time ‘Photography’ and ‘Telegraphy’ science had been introduced. Army troops used the science of photography is taking pictures of enemy position and Telegraph helped them in sending urgent messages. This is considered as a boon created from the devastation of Civil War. Secret Service: Both sides employed highly structured spy service to gain knowledge of army movements. Women and slaves played major role in this. Personnel: Numbers of African Americans fought in the Civil War was not less, most of them participated in the war from the side of Union army. They often fought in regiments those were separated out regiments. This was the first time when they had an identity of soldiers other than slaves. An ambitious win for Abraham Lincoln, civil War was the first time when rights of equality were believed to be a reason of war.

Friday, September 20, 2019

Impact of Spyware on Computers and Mobile Devices

Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may Impact of Spyware on Computers and Mobile Devices Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may

Thursday, September 19, 2019

Slave Narratives :: American America History

Slave Narratives The Middle Passage was almost inconceivable. Hundreds upon hundreds of Africans were abducted from their homes to go on boats to America. They were stacked like books on shelves in order to bring enough Negros for a profitable slave trade. The life on the boats on the way to the New World was so bad that the Africans preferred death to their gruesome future. The conditions on the boats were hellish. The slaves on the ships were packed like sardines and chained together. Among the gripping words that Olaudah Equiano, a slave abducted when he was just eleven years old, used to describe the Middle passage are hopeless, low, brutal, and wretched. The temperature in the disease- infested rooms was inconceivable. There was no fresh air for the Negro inhabitants. The feeling of shock and isolation only added to the sorrow and horror of the situation. Alexander Falconbridge, a surgeon aboard these slave ships, recalled that the "hot floor was covered with blood and mucus. It was like a slaughter-house." The sickening stench was great due to the loathsome filth from the pestilential heat. As Olaudah Equiano said, "sleep was the only [temporary] refuge." The dejection and despair of the circumstances caused many people to bitterly cry, shriek, and groan in inconceivable horror and fear. The savage cruelty of the slave traders and boat crew was ter rifying. The Negros were deprived of food and health treatments, and due to the crammed conditions this caused great waves of sickness and disease. These ships created an absolute hellish existence for the abandoned Africans aboard them. Although describable, the anguish of these people cannot be fully understood. The African's, due to these excruciating conditions, were completely and utterly terrified. During the slave trades, the noise and clamor was so frightening that many slaves attempted at running away in the tumult. On the boats, many people tried to jump overboard. Attempted suicide usually just increased the despair of the situation. Negros were punished for any attempt at escape or purposeful personal harm. If one did not eat, they were flogged until they ate the disgusting food. The slave traders expressed brutal cruelty to the slaves aboard the ships. They treated the Negros as if they were imported typical goods. They spent the least amount of effort and money in making the conditions aboard the boats tolerable in order to ensure a higher profitable outcome.