Wednesday, August 26, 2020

Systems Analysis and Design

Zenith Financial is a quickly developing organization that owes some portion of its development to a few ongoing acquisitions. Zenith Financial presently needs to combine the companies’ data innovation assets to kill excess and offer data among the new organizations. The Chief Information Officer (CIO) has oversight duty regarding the venture and has employed Client/Servers R Us to build up the design for the new corporate data framework. Joe Consultant of C/S R Us introduced 3 customer/server plans to the CIO and is mentioning the CIO to choose one.The CIO isn't sure which middleware configuration is best for the company’s objectives. The CIO has asked Chris Consultant to introduce the preferences and drawbacks for every one of the other options. Foundation ACME Financial Incorporated (AF Inc. ) is a venture banking organization that gives an on-line administration that permits their customers to get to record and market data. Zenith Financial Inc. as of late gained a few little and medium estimated organizations all through the nation, each with their own budgetary and bookkeeping systems.Almost the entirety of the organizations have built up their own application programming for their analysts’ use in their day by day occupations, however just a couple gave on-line account administration. The systematic apparatuses depend on close ongoing business sector information and authentic market information. The CIO needs to combine the money related and bookkeeping data into a corporate data framework that can bolster choice help applications for corporate administration. Normally, since the PC equipment is distinctive for various organizations, the CIO hopes to redesign the equipment to suit the new Information Technology (IT) system.The CIO will choose the best expository programming as the standard programming utilized by all organization investigators. Every nearby site will be relied upon to give an on-line administration to their clients. Clients will be given the vital application programming to get to their record data. At last, ACME Financial has created extraordinary information mining programming that gives them an upper hand. AF Inc. offers their clients venture guidance dependent on the data inferred by the information mining software.Each account director gets the data and afterward gives custom-made recommendationsâ to every client dependent on their portfolio. Framework Requirements The accompanying rundown of framework necessities mirrors the system’s needs (recorded generally arranged by need): 1. Accessibility: The CIO’s number one need is high accessibility. AF Inc. markets their unwavering quality and feels that most customers pick them for their steadfastness. The CIO needs to amplify the system’s accessibility. To accomplish high accessibility, on the off chance that a provincial office can't offer help, at that point a client should consistently approach the on-line administrat ion through an alternate office. 2.Data Integrity: The prerequisite for information uprightness differs inside the framework. The most significant information are customer’s exchanges. It is basic that a customer’s exchange is rarely lost and the framework must ensure that every exchange is finished. Conversely, information lost from the high information rate inputs, for example, Reuter’s and the NYSE, are effectively recouped during the each communicate so it isn't basic if a few information are lost during a communicate. 3. Execution: Financial markets are exceptionally unpredictable; time affectability of information is estimated in minutes. Millions can be lost if data is postponed getting to the analysts.The framework must have the option to help data communicate all through the system. 4. Security: The CIO is worried about the security of the information mining programming and the data created by the information mining programming. The Chief Executive Offi cer thinks the information mining data programming gives an upper hand to the organization. In the event that an unapproved client approached the data they could take the information mining applications or take the data created by the information mining programming. In either case, the culprit could make indistinguishable venture suggestions from AF Inc. account managers.Therefore, if contenders approached the data the outcomes could be monetarily destroying to the organization. The CIO is worried that a contender could act like a client and hack into the profoundly touchy data through his on-line administration account. 5. Development: The CIO imagines a steady relocation procedure to introduce the new framework because of the size of the change. Likewise, he anticipates that AF Inc. will proceed to develop and gain more organizations. The CIO needs to have the option to grow more application programming as new client administrations are included. The CIO likewise needs to include progressively close continuous data sources toâ the framework. 6.Backup and Recovery: The CIO comprehends that the framework will experience issues every once in a while. A key factor in deciding the system’s achievement is the manner by which rapidly the framework can recuperate from a disappointment. Reinforcement and recuperation must be smooth and non-troublesome. One approach to guarantee that the framework can without much of a stretch recoup from a framework crash is to ensure the information is copied somewhere else on the framework. The corporate database is the essential back up for every one of the local workplaces. Arrangement Each nearby office (Northeast, Northwest, Southeast, Southwest) has gets to a provincial data hub.Local workplaces use customer programming to get to the neighborhood application server. These application servers get to the neighborhood databases for practically the entirety of the data required regularly. For access to data required less r egularly the application programming should get to the focal database at corporate base camp. Each local database has just the subset of data that is important for its region, though the corporate home office keeps up the entirety of the data from every area just as information that is special to corporate applications, for example, extra bookkeeping and friends budgetary information.The corporate office is additionally answerable for the information mining programming and data. Every one of the territorial databases is associated with high limit connects to the corporate database. At long last, the corporate office gets data from Reuter’s, NYSE, NASDAQ, and other money related markets. The data stream varies every day from 30 †40 KBps to 4 †5 MBps. Twenty-five percent of the data is promptly communicated to the provincial workplaces to help the on-line account administration. All the data is separated and put away in the database. Building AlternativesAlternative I : The Database Management System This elective exploits the all-encompassing usefulness gave by the well known social database the executives organizations, for example, Oracle and Sybase. All data is conveyed into the framework where it is quickly put away into one of the databases. The social database the executives programming is liable for the dispersion of data all through the framework. Customers speak with the databases through Standard Query Language (SQL). Corporate and provincial databases are kept synchronized utilizing highlights provided by the RDBMS software.Transactions are ensured by utilizing unique Transaction Processing Software. The merchant provided RDBMS programming is liable for back-up and recuperation of the considerable number of databases. Information security is taken care of at the line level inside every database. This implies customers can just get records for which their client has authorization. Existing application programming may must be changed to utilize SQL. Elective II: Common Object Request Broker Architecture (CORBA) This arrangement relies upon CORBA to integrate the customers and databases. CORBA is liable for circulating information over the system.The RDBMS programming is as yet liable for the back-up and recuperation, yet the databases are kept synchronized utilizing CORBA as the essential vehicle component for the information. Customers, application servers, and databases convey to one another through CORBA’s transport system. Existing application programming would be enclosed by IDL to speak with different applications. Uncommon close constant dealing with application programming would send the data to every one of the local workplaces where it is coordinated to customers that buy in to the information.Alternative III: Message and Queuing (M&Q) The message and lining configuration utilizes business M and Q programming joined with an exchange preparing item to guarantee customer’s exchanges are f inished. Dec Message Queue and MQ Series are a portion of the main items for informing and lining programming. Customers convey to different elements utilizing messages. Messages are kept in lines and the message and lining middleware is liable for message dispersion to the fitting customers. The product applications will be adjusted to send and get messages from queues.Questions to Answer (Total 100 focuses) The contextual analysis must be talked about covering the structures and these inquiries with your colleagues, yet your last review should be your synergistic work. Doing investigate on explicit items for the task ought to surely be a group action. The all out length of the review ought to most likely not surpass 5 pages. 1. Portray in more detail the design of each structural other option. To do this you should tissue out the points of interest of the different parts.This will require some exploration on theâ products showed (or other practically identical items that you find ). Note that a few administrations are consequently given when a specific item is bought, while others must be created to fulfill the framework prerequisites. You ought to depict what administrations are naturally given by the items, which administrations would should be created, and how administrations ought to be appropriated over the system. (40 focuses) 2. Assess every one of the options against the framework necessities, d

Saturday, August 22, 2020

Rock :: essays research papers

Rock Later styles of substantial awesome music during the 1990s, for example, grunge (the normal model being Seattle's Nirvana), show impacts of overwhelming metal however are commonly not marked sub-classes of substantial metal, instead of whip metal and hair metal. The general nonattendance of virtuosic guitar performances is maybe one explanation grunge groups haven't been viewed as overwhelming metal groups. Another key craftsman during this time was Megadeth, which consolidated the tireless, fast whip metal riffs with the extravagant guitar soloing of speed metal ala Judas Priest. Norwegian Black Metal Since the late '80s, the Norwegian scene has been portrayed by agnosticism, viciousness, and a portion of the best overwhelming metal at any point recorded. The scene was to a great extent impacted by a trio of non-Norwegian groups in the 80s - Venom, Celtic Frost, and Bathory. Britain's Venom is broadly viewed as the main dark metal band, and their goofy sinister acting was a colossal effect on Europe's outrageous metal scenes. Their second collection, "Black Metal", gave the new kind its name. the band that had the most direct impact on Norway's extraordinary metal scene was a small time studio venture from Sweden called Bathory. Bathory's collection "Under the Sign: The Sign of the Black Mark" basically characterizes the normal dark metal sound - uproarious, quick, and ineffectively recorded. Nonetheless, the Viking Set of three, comprising of the collections "Blood, Fire, Death", "Hammerheart", what's more, "The Twilight of the Gods", is the thing that truly commenced the blast of Scandinavian metal. The mid 90s saw the Norwegian metal scene ascend in unmistakable quality on the world stage as groups continually attempted to "out-evil" each other. Three primary groups developed - Mayhem, Burzum, and Emperor. (Particularly Emperor, IMHO) Mayhem turned into the melodic pioneer of the scene, while Varg Vikernes of Burzum turned into the centerpoint of the Dark Metal "movement", for absence of a superior word. Sovereign, in the interim, collected the most basic recognition. Varg (otherwise known as "Count Grishnakh") was answerable for beginning a flood of chapel burnings and grave contaminations and in the end killed Mayhem guitarist Euronymous. Sovereign has likely had the most enduring effect on the scene, as the sound that they made has been the diagram for numerous groups, for example, Norwegian metal geniuses Dimmu Borgir, just as an enormous number of non-Norwegian groups. DIMMU BORGIR Dimmu Borgir is a melodic dark metal band hailing from Norway. Shagrath, Silenoz and Tjodalv started the band in 1993. Soon after, Brynjard Tristan joined to play bass, and Stian Aarstad joined for console obligations. Dimmu Borgir was conceived. They are a band which achievement is estimated with so much groups as Emperor, Kreator and Cradle of Filth.

Tuesday, August 18, 2020

Early Action Decisions are Now Available - UGA Undergraduate Admissions

Early Action Decisions are Now Available - UGA Undergraduate Admissions Early Action Decisions are Now Available Early Action decisions are now available online! You can view the press release with some statistics about EA students who were admitted here. For students who were deferred, please understand that this is not a denial decision. We want to be able to have a more in-depth review of you, including short essays, activities, recommendations, etc. Please be sure to read the deferred student FAQpage before commenting on here. If you have questions about your specific decision, please do not post them on this blog. As well, do not give out or request personal academic information in your post, as we would then need to delete these posts. We are not able to answer questions about individual students here because we will generally not have your information in front of us and we cannot disclose individual student information in a comment. I would recommend talking with both your family and high school counselor first, then reviewing this previous poston suggestions about how to react to an EA decision, and finally reading the FAQs available from your myStatus page. Please be patient, be nice and be courteous. Have a great weekend and go Dawgs!

Sunday, May 24, 2020

Analytical Literary Response to Hansel and Gretel

Dana Lancaster English 215-007 Professor Otero-Piersante Critical response 10-28-09 Hansel Gretel In the fairy tale, â€Å"Hansel and Gretel† by the Brothers Grimm, the protagonists Serve as heroes who must overcome the circumstances of their birth in order to reach maturity and enlightenment. This hero quest takes place in three stages. The first is the separation, in which the parents cast the children away from their home. In this stage, the children are for the most part controlled by their surroundings. The second stage of their journey is the transformation, when the children â€Å"battle a monster,† or, in this case, defeat an evil witch. In this stage, the children rely upon their own increasing intelligence to control their future. In†¦show more content†¦In the second stage of Hansel and Gretel’s hero quest, the transformation, they must defeat and conquer their youth, id, and naà ¯vetà ©. They do this by killing the evil witch who had lured them into her gingerbread house. This is the most vital part of their development, yet they begin it in their most vulnerable position. When the children are alone in the woods, they have l ost a sense of security and previous values. They must work towards a higher level of psychological existence: their form of heroism. â€Å" The cottage was made of bread and roofed with cakes, while the window was made of transparent sugar.† (48) A gingerbread house is a symbol of the mother, who nurses the infant from her body. In this way, the house serves as the Good Mother to the children. When the children are shocked to see the failure of the witch as a mother figure, it only further intensifies their oedipal development. By eating the gingerbread house, the children show they are ready to destroy somebody’s home, which is what caused them to be deserted by their parents in the first place. By allowing their id to behave unchecked in this manner, they endanger themselves. In order to defeat the witch, they must ignore the pressures of the id and follow the superego. This balance then gives rise to their ego, which is an essential component of their enlightenment . Birds appear once

Wednesday, May 13, 2020

International Business and the BRIC Countries Impacts of...

International business Introduction BRIC countries have been projected by economists to be some of the emerging economies in the near future. There is increased market potential in those countries hence leading to the possibility of more firms developing their roots in those countries. These projections are facilitated by the high population growth rate being experienced in those countries hence providing market and cheap labor for production. It is projected that, there will be emergence of new economies especially china, Russia, India and Brazil. Most of the projections indicate that by 2020 chinas growth national product (GNP) will surpass that of individual western economic powers except that for US, while at this time too, Indias economy will have overtaken or will be in the process of overtaking the European economies (Nye, 2000). Due to Indias and chinas large population which will be estimated to be at 1.3 billion and 1.5 billion respectively, the standard of living of people residing in those countries does not need to match that of the western countries so as to become the economic powers. Russia on the other hand is said to have a potential of being one of the economic powers by at this period through to its oil and gas reserve but, there are projections that it will still be faced by severe demographic crisis from low birth rate, AIDS situation and poor medical care. There will still be sufficient reserves of energy to meet the demand for the growingShow MoreRelatedFactors That Influence Growth Via Innovation1223 Words   |  5 Pagesinnovation in emerging economies. Most of these studies use RD and patient as a measure of innovation in determining the influence of innovation on growth. Gould and Gruben (1996) investigated economic growth rates across many countries to a simple index of patient strength and other variables. They found a significant positive impact when patent was interacted with a measure of openness to trade. That is, growth increases by .66% on average due to the impact of stronger patents in open economies, suggestingRead MoreOne Of The Reasons By Brazil’S Economy Is An Important1349 Words   |  6 Pagesreasons by Brazil’s economy is an important player in the world today is its size. They are the world’s fifth largest country by size and the ninth largest by nominal GDP. Other comparisons include the f act that they represent the largest economy in Latin America and second largest in the Americas. Because imports and exports are a significant component of Brazil’s GDP, at 27%, trade represents a key factor in Brazil’s economy (Brazil Economy: Facts, Population, GDP, Inflation, Business, Trade, CorruptionRead MoreRise of Brics Economy and Its Impact on Global Stock Markets9547 Words   |  39 PagesIRACST – International Journal of Commerce, Business and Management (IJCBM), ISSN: 2319–2828 Vol. 2, No.1, February 2013 Rise of BRICS Economy and its Impact on Global Stock Markets Naganathan Venkatesh Research Scholar, NITTTR, Chennai, India Abstract The world is changing and becoming increasingly multipolar due to the emergence of China, India, Russia, Brazil and South Africa forming so called BRICS. The global influence of America is fading out due to the recent decline in their stockRead MoreGoldman Sachsm BRICs692 Words   |  3 PagesIn 2003, Goldman Sachs issued an investment report that coined the now-famous acronym, BRICs, to jointly refer to the economies and states of Brazil, Russia, India, and China. At the time, these four countries only accounted for a fraction of global Gross National Product. It is believed that between 40 and 50 years from now, these nations may catch up to the OECD countries, countries which include the United States, Germany, the United Kingdom and over a dozen others, in economic ability and performanceRead MoreHotel Room And Occupancy Rates1601 Words   |  7 Pagesand spent freely on luxuries, including travel. This culminated in a substantial increase in travel rates and hotel room and occupancy rates, two indicators of a hotel s performance. Travel spending has also picked up quickly, especially in emerging economies where tourism is on the rise. Global tourist arrivals are expected to increase an annualized 4.8% over the five years to 2015 to reach 1.2 billion. As a result of these positive trends, industry revenue is expected to increase an annualizedRead MoreSouth Afric A Key Source Of Foreign Exchange1788 Words   |  8 Pagesone of the most div erse and enchanting countries in the world; exotic combinations of landscapes, people, history and culture offer the traveler a unique and inspiring experience† (EdusouthAfrica.com, 2016). South Africa is positioned in the southern part of Africa which borders 7 countries and has 3 capitals which deals with different aspects of laws to enable to country to run efficiently. However, with the country being one of the continents largest economies in the world, South Africa has struggledRead MoreThe Global Hotels And Resorts1602 Words   |  7 Pagesand spent freely on luxuries, including travel. This culminated in a substantial increase in travel rates and hotel room and occupancy rates, two indicators of a hotel s performance. Travel spending has also picked up quickly, especially in emerging economies where tourism is on the rise. Global tourist arrivals are expected to increase an annualized 4.8% over the five years to 2015 to reach 1.2 billion. As a result of these positive trends, industry revenue is expected to increase an annualizedRead MoreIndia s Growth Of Domestic Market954 Words   |  4 Pagesbackground of the later decline of its regular commodities exports. Within the similar period, India also adopted the substitution industrialization policy. India adopted the strategy of ISI in the 1950s in the same intention as to create self-reliant economy. The ISI strategy, or more known as autarky, was based on the model of growth as propounded by Mahalonobis, which stresses the significance of basic industries for growth; and focus on long term patterns of growth by utilizing of the products of theseRead MoreHow A Company Approaches Entry Into The Brazilian Market1782 Words   |  8 Pagesinto the BRIC (Brazil, Russia, India, and China) markets. These countries have greater market potential than most developed countries, primarily due to their higher growth rates and the sheer size of their populations. For this reason, these countries are often grouped together in business literature and research, but they are hardly homogenous. Companies intending to conduct business in these countries need to consider their market entry strategy carefully and distinctly for each country, withoutRead MoreComparison of Basic Economic Indicators o f Bric Nations4949 Words   |  20 PagesComparison of Basic Economic Indicators of BRIC Nations Abstract In economics, BRIC is a grouping acronym that refers to the countries of Brazil, Russia, India and China, which are all deemed to be at a similar stage of newly advanced economic development. It is typically rendered as the BRICs or the BRIC countries or the BRIC economies or alternatively as the Big Four. Table of Content 1. Introduction 4 2. Statistics 5 3. Economic Indicators 6 3.1 GDP 6 3.2 Inflation 7 3.3 Deficits

Wednesday, May 6, 2020

Reflections on Visual Representation Of Mice and Men Free Essays

As a female, I was annoyed the way the novel made women out actively by using words like tramp’, ‘pitch’ and tart’ and the way men in the novel used them as prostitutes, so my representation shows the freedom and confinement of Curly wife – Eve given her power in my representation because her and the other women had none In the novel and Eve made the men all fairly insignificant In my representation because It wasn’t fair that they had all the power In the book. I felt Like Curlers wife was Like a caged bird In the novel because she desperately wanted to escape from her life, but just couldn’t. This is why I used a birdcage as the cost dominant thing in my representation. We will write a custom essay sample on Reflections on Visual Representation: Of Mice and Men or any similar topic only for you Order Now It is sparkles because I wanted it to look luring because Curlers wife was lured into marrying Curler because she thought that marriage would give her freedom. The bride’s veil hanging on the outside of the birdcage emphasizes that her hopes and dreams were out of reach and that marriage was central to her being trapped. Black chains are also wrapped around the sparkles cage, which makes her even more confined than Just being in the cage. A mans clothing and top hat sits over the veil, chains and the cage door, which shows hat men, and especially rich men like Curly and his father are the most powerful, have the most freedom In the novel, and are the ones who trap and confine other less powerful people. Bird’s feathers in the cage are a metaphor for Curler’s wife who is like a confined bird, and the fact that they are popping out the side of the cage shows that she is desperately trying to escape. Just like a bird is free to fly where ever it likes, her dreams were free once, but now they are caged. Curlers wife, the prostitutes and the girl in the red dress are all nameless in the novel Just like the bird in the cage – we now it is a bird because we can see its feathers, but we can’t actually see what type of bird it is. Even so, the feathers are black which has two symbolic meanings, firstly black symbolizes her misery and death, and the way the feathers are scattered everywhere reminds me of the description of the frenzy before her murder and of her dead limp body. Black Is also the color associated with evil and the author constructs her as a sank/flirt who Is trying to corrupt men. Eve Included one tiny single feather with beautiful red spots on it, which shows the way the men treat her potty feather is also like Curly wife’s hair – it is soft which tempts Ellen to touch it which eventually leads to him murdering her. Also, the red spotted feather is like her dreams that are mostly hidden now that she is confined in her marriage cage. Red is associated with prostitutes and was also the color of Curlers wife’s shoes and the red dress the girl was wearing who accused Ellen of rape, so in my representation, I have made it a feminine color. The red spotted feather also shows Curlers wife’s vibrant personality that we understand more when she explains how she could have en a movie star. The quote ‘An a guy tool me he could put me in pitchers†¦ On sparkly paper backs this up and is shown in bold lettering to show how forcefully she said the words, but Eve cut them in half on the poster to make the words hard to understand Just like in the novel when she spoke them to Ellen, he couldn’t really understand her which again emphasizes how trapped and alone she was. This idea is shown again in another quote ‘Satisfy night. Everybody out doing’ osmosis. Everybody! An’ what am I don? Standing’ here talking’ to a bunch of bindle stiffs’ which emphasizes tha t the men are all out and have friends, but she is not allowed to have either. The black font is damaged Just like she admits that she is damaged through this rhetorical question. Even so, Ellen and Crook are also excluded and confined and they are shown on my representation as stick figures/’bindle stiffs’ connected to this quote who I positioned at the outside of my picture, Just like they are at the outside of society. They have weird square heads and uneven bodies to show that they are different to the other powerful men represented by the suit and top hat on he cage in the middle of the representation, and the men in the newspaper article in the background. Colorful, red, shiny swirls are radiating from the cage and heading upwards which is like the singing/chirping bird because Curly wife was always trying to be happy and talk to the men because she was trapped and lonely. These red swirls floating upward also represent the freedom of dreams. But people can’t understand birds just like the men couldn’t understand Curlers wife’s loneliness which is also shown by a clump of red letters that are Jumbled up in a small pile hardly noticeable on the eight hand side of the cage. The Jumbled letters are separate from the men’s words, which are shown as colorful ‘happy words, all Joined together because they are all free to socialize with each other. Even so, the men’s words face inwards in a circle which shows their social circle and represents the way they keep her out and trapped in her cage. Curlers wife is excluded from the friendships and confined to her unhappy life on the ranch because she is female, and because she is the boss’s wife. By Paris Whittaker Year 11 How to cite Reflections on Visual Representation: Of Mice and Men, Papers

Monday, May 4, 2020

Leadership Style A Critical Conceptualization

Question: Why was the study done? What was the population studied? What did the researcher(s) conclude? What other information about this study do you believe is unique or important to recall? Are there specific statements made by the author that you wish to retain? Answer: Introduction: The common theme With the importance of leadership felt across different organisations in all modern day businesses, it would be worth to discussion various facets of this topic. Hence the current piece of annotated bibliography endeavours to undertake a critical review of the conceptualisation behind leadership in general, context of different types of leadership style, its political implications and the identity surrounding the leadership.While a host of deliberations by a number of researchers across different fora and papers are available, a holistic understanding is still far from its final mile (Druskat, 1994; Komives et al. 2005). Therefore, the current article presents an annotated bibliography of this topic touching upon the important aspects by evaluating a set of 3 papers through a critical review. Lilienfeld, S O.; Waldman, I D.; Landfield, K; Watts, A L; Rubenzer, S and Faschingbauer, T R. (2012). Fearless Dominance and the US presidency: Implications of psychopathic personality traits for successful and unsuccessful political leadership. Journal of Personality and Social Psychology, 103(3): 489-505. The paper by Lilienfeld (2012) endeavours to examine both the positive and negative aspects of psychopathic personality and its conditional implication with leadership. The literature review of this paper finds at one hand a majority of incidence on behavioural level manifestations surrounding psychopathy and the coincidence of such with antisocial elements and almost an unsuccessful situation so a failed leadership. On the other hand the literature critic of this papers also present a contrast picture that certain traits of psychopathic nature like interpersonal level of dominance, power of persuading people and similar ones prove to be conducive to acquire political positions and in turn successful type of leadership. In this line, the current paper finds many research works supporting the idea of conventionally linking the condition of psychopathy with unsuccessful situations, but at clinical studies same condition (psychopathy) has to some extent has linkage with successful behav iour at social contexts including politics, business and other works of life. The methodology this paper specifically tries to examine the possible linkage of various traits of psychopath personality with successful outcomes like better performance in job and leadership taking very successful persons in the study sample. They include 42 presidents of US up to George W. Bush. The sample comprises of presidents performance and behaviour across history and the data was rated by 121 experts. It was also supported by other historical surveys development of objective indicators of performance. The analysis of this paper mostly employed statistical techniques including factor analysis. The finding of this paper presents a number of characteristics of successful leadership like fearless dominance, persuading nature, better management of crisis emerged with the presidents features vis--vis some sort of psychopathic traits. Even better relationship management, similar features, seemed to have significant linkage with variables of president level performance, mainly when people taken as world level figures. Some sort of limitations were identified by this paper too which are cautioned to be interpreted in associationship between control variable and covariates. Contrast to successful behaviour, deviating behaviour too emerged with psychopathic conditions. They included impulsive actions, negative type of job performance, impeachment decisions, not acting on unethical behaviour among subordinates etc. The paper in addition to statistical inferences provides the research world, a better platform to debate whether certain condition of psychopathy can be seen as positive leadership behaviour and some time negative ones. Van Eeden, R., Cilliers, F., van Deventer, V. (2008). Leadership styles and associated personality traits: Support for the conceptualisation of transactional and transformational leadership. South African Journal of Psychology, 38(2), 253-267. The present paper by Van Eden et al. (2008) presents a vivid description about the leadership model and the types or categories of styles associated with the leadership model for the smooth running of a management system. The model of leadership described in this paper comprises of transactional type of leadership, laissez faire behaviour in addition to transformational kind of leadership. Here the model of leadership is conceptualized by the behaviour around with various styles, which is empirically supported. The transactional leadership described in this paper includes that type of leadership whereby the particular leader makes it clear about the course pattern of work the followers should carry out as in a typical transaction such as complete given task successfully, for receiving any reward as punishment that would again include satisfying the need of followers, which is subject to fulfilling of that transaction which is satisfaction of need of the leader. Literature critique cited inside this paper finds the link between work environment with globalisation in context of acceleration of tempo of the change accruing in technology, market, workforce, and expectation of workforce The critique about transactional as well as transformational distinctly viewing the leadership concept either as a condition of provisional reinforcement towards followers by transactional leadership or displacing the followers out of latters self-interests in the light of organizational and societal betterment. As part of the research methodology this article has used specific questionnaire which included assessment of personality traits and leadership style. This paper observes that this study greatly supports the leadership styles at conceptualisation level. It infers that the style of leadership is also linked with personality level traits. These results were clearly observed in better strategic type of thinking, innovative approach among the sample managers. Odom, S. F., Boyd, B. L., Williams, J. (2012).Impact of Personal Growth Projects on Leadership Identity Development. Journal of Leadership Education, 11(1), 49-63. This article by Odom et al. (2012) investigates the change in course of leadership mainly in terms of identity development among leadership education students by using specific tools. The paper envisages that inside the courses providing leadership education, the educators may try to incorporate real life cases which students can try developing leadership qualities. Against this backdrop the current piece of paper uses qualitative methodology which includes personal awareness and similar projects. The paper critique a number of similar studies demonstrating models with a number of constructs or tools used for leadership identity development. The data this paper employs comes from students at undergraduate level from Texas AM University for a personal leadership education program. A total of 90 students were chosen using random sampling technique across 3 different study seasons. The data were analysed using deductive type of content analysis. The paper thus analyses the assignments given during Personal Growth Projectsusing the components from an established model in name of Leadership Identity Development. Different aspects comprising of development of self-aspects of the model which included building of self-confidence among students, deepening of own awareness, interpersonal level efficacy among many other variables were considered. The major observation of the analysis of this paper showed the assignment emerged to be extremely effective towards promotion of students identity of leadership mainly in category of self in the model. The paper however recommends conducting further research including other models of leadership project so as to validate and strengthen the findings. Conclusion: From annotated bibliography of these 3 papers it becomes clear that the topic of leadership style is topic worth debatable across research forum. There is lot of variation in conceptualisation in case of transactional and transformational leadership and identity associated with leadership. Even the concept of leadership style varies greatly across contexts mainly in political circumstances. The discussion overall throws a lot of inputs and recommendation for further research that should take utmost care of varying contexts of leadership before making generalisation. References: 1. Druskat, Vanessa Urch (1994). Gender and leadership style: Transformational and transactional leadership in the Roman Catholic Church, The Leadership Quarterly, 5(2): 991192. Eagly, Alice H.; Johnson, Blair T. (1990). Gender and leadership style: A meta-analysis, Psychological Bulletin, 108(2): 233-256.3. Hogg, Michael A. (2001). A Social Identity Theory of Leadership, Personality and Social Psychology Review, 5 (3): 184-200.4. Komives, Susan R.; Owen, Julie E.; Longerbeam, Susan D.; Mainella, Felicia C. and Osteen, Laura (2005). Developing a Leadership Identity: A Grounded Theory, Journal of College Student Development, 46 (6): 593-6115. Lilienfeld, S. O., Waldman, I. D., Landfield, K., Watts, A. L., Rubenzer, S., Faschingbauer, T. R. (2012). Fearless dominance and the U.S. presidency: Implications of psychopathic personality traits for successful and unsuccessful political leadership. Journal of Personality and Social Psychology, 103(3), 489-505.6. Mandell, Barbara and Pherwani, Shilpa (2003). Relationship Between Emotional Intelligence and Transformational Leadership Style: A Gender Comparison, Journal of Business and Psychology, 17 (3): 387-4047. McColl-Kennedy, Janet R and Anderson, Ronald D (2002). Impact of leadership style and emotions on subordinate performance, The Leadership Quarterly, 13 (5): 5455598. Odom, S. F., Boyd, B. L., Williams, J. (2012). Impact of Personal Growth Projects on Leadership Identity Development. Journal of Leadership Education, 11(1), 49-63.9. Ogbonna , Emmanuel and Harris, Lloyd C. (2000). Leadership style, organizational culture and performance: empirical evidence from UK companies, The International Journal of Human Resource Management, 11(4): 766-788.10. Van Eeden, R., Cilliers, F., van Deventer, V. (2008). Leadership styles and associated personality traits: Support for the conceptualisation of transactional and transformational leadership. South African Journal of Psychology, 38(2): 253-267.

Monday, March 30, 2020

A Good Man is Hard to Find

Introduction A Good Man is Hard to Find is one of the most successful works written by Flannery O’Connor. The short story was written in 1953 and published together with other works she had done earlier under the same title. This short story best epitomizes O’Connor’s work, her themes, and her style of writing. The purpose of this paper is to illustrate how A Good Man is Hard to Find best brings out themes and styles that characterize O’Connor’s writings.Advertising We will write a custom essay sample on A Good Man is Hard to Find specifically for you for only $16.05 $11/page Learn More Discussion A Good Man is Hard to Find portrays a disparity of violent action with hilarious and carefully created characters and a philosophy that underlines her staunch Roman Catholic faith. The short story is disturbing and entertaining at the same time- a feature that characterizes most of O’Connor’s writings, notably W ise Blood. The story begins on a naà ¯ve perspective, but instantly changes when O’Connor introduces a character known as Misfit, a convict who broke out of jail. Through Misfit, the author examines the Christian perception of grace- that true forgiveness from God can be received just by asking. The Grandmother, a main character in the story, is a petty, bad tempered, and imperious, but receives God’s grace before she dies. Despite her mainly negative traits, she treats Misfit as one of her own children. For O’Connor, God’s pardon is an energy not controlled by a person, something unmerited, or a moment of revelation. Styles Grace In A Good Man is Hard to Find, O’Connor explores the theme of grace through her two characters: Misfit and Grandmother. The most observable point on this theme in the story is when Misfit and the Grandmother both receive God’s grace despite their many faults, sins, and limitations. Christian theology teaches that God’s gifts are given even to the person least likely to receive them, forgiveness is among these gifts. Looking at the characters, none of them is worthy of God’s grace. Grandmother deceives her children, controls her son, and whines frequently about the inadequacy of the current and seems unaware of the world around her. She believes that she is superior and is the most appropriate person to judge others, for instance, she orders Misfit to pray yet she cannot even come up with an articulate prayer. Misfit, for his part, is a convicted murderer who escaped from prison. Despite the two characters’ flaws, God grants them forgiveness, signifying that even persons with similar traits as Misfit and Grandmother can receive God’s salvation. Religion O’Connor’s was raised in a Roman Catholic background and she has reflected this upbringing in most of her writings, frequently drawing a lot of debate due to her callous representation of religion. Alt hough her works are frequently violent in nature, they are based on her conviction and divinity.Advertising Looking for essay on american literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More Besides, her characters frequently face violent of ruthless situations that force them into actions that awaken or change their faith, such as Grandmother in A Good Man is Hard to Find. For O’Connor, writing was a way of expressing her Christian faith on paper. We observe Misfit and Grandmother undergo a moment of grace and are their sins are pardoned; this is precisely what the roman catholic teaches, or Christianity in general. Epiphany Many of the writings by O’Connor contain scenes of epiphany, a moment when a character receives pardon, or God’s forgiveness. This style is evident in her writings such as Good Country People and A Good Man is Hard to Find. Throughout this story, O’Connor expresses how hard it can be fo r a non-Christian to change his/her ways. The moment of grace (epiphany) takes place when â€Å"The Grandmother’s head cleared for an instant† and she â€Å"saw Misfit’s face twisted close to her own as if he were going to cry† (O’Connor, pp. 374-375). She was moved with Misfit’s desire to be assured of actions that Jesus did and those he did not do, and realized that she was responsible for him. She tells her â€Å"Why you’re one of my babies. You’re one of my own children† (O’Connor, pp. 375). Grandmother demonstrates a moment of grace, despite her earlier acts of meanness, and receives God’s grace. Styles Symbolism Symbolism is a style that O’Connor uses in most of her stories. As a writer of fiction, combined with her Catholic background, she preferred to use symbols to express her faith and beliefs through her characters. A number of works such as Good Country People make use of symbolism. In A Good Man is Hard to Find, there are a number of symbols. The Misfit’s portrait of Jesus and Grandmother’s epiphany are representations of her religious beliefs. Grandmother has a hat that she frequently wears to show that she is a woman, however, this hat represents her distorted moral principles. While preparing for the journey with other family members, she wears her tie so that in case of an accident, it would be known that she was a woman. She is very indifferent to the fact that she will be dead by then and other persons, including her three grandchildren, would possibly be dead. Her only concern is her position as a woman, an absurd reason that exposes her meanness and distorted moral codes. Irony Irony is a common feature in Flannery O’Connor’s works, and A Good Man is Hard to Find is no exception. For example, Bailey’s mother pictures herself as an upright woman, but her actions prove otherwise. She dresses excessively, is deceitful, uses r acist terms, and resents America’s positive contribution to Europe after war. In fact, she foolishly utters that she knows Misfit. We only know her true picture when the story takes a disastrous turn. Eventually, she is killed by Misfit, whom she had claimed to know, even though she dies after redeeming herself by reaching out to her killer.Advertising We will write a custom essay sample on A Good Man is Hard to Find specifically for you for only $16.05 $11/page Learn More Violence O’Connor’s writings are frequently characterized by extreme use of violence and this has led critics to question her Christian background. Most instances of violent are normally carried out by narcissistic characters with depressing lives. A Good Man is Hard to Find portrays many scenes of extreme violence and these are committed by Misfit, the murderer who escaped from prison. Misfit shoots Grandmother as well as Bailey’s mother. However, the viol ence serves a role: it makes Grandmother and Bailey’s mother to realize how vile their mean behavior towards others was. Ultimately, we see both women changing their behavior before their deaths, moreover, Grandmother’s epiphany forms the climax of the story. Works Cited O’Connor, Flannery. A Good Man is Hard to Find and Other Stories. California: Harcourt Brace Jovanovich, 1977. This essay on A Good Man is Hard to Find was written and submitted by user Maximus G. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Saturday, March 7, 2020

The Inefficiency Of U.S. High Schools Essays - Youth, Free Essays

The Inefficiency Of U.S. High Schools Essays - Youth, Free Essays The Inefficiency of U.S. High Schools U.S. high schools are not properly preparing kids for the college experience. The primary purpose of a high school in the United States is to get kids into college. The courses taught in U.S. high schools are way too lenient in their grading policies and offer students much leeway. High school courses are too lenient because high school teachers make them that way. One good example that proves just how much leeway secondary education offers students is that on average, professors at the high school level accept late papers. Of course late papers are marked down, but this policy voids the purpose to having deadlines. Most universities, both public and private set strict guidelines on these matters and openly encourage their professors to do the same. I turned in papers a week late in high school and still received a grade of 70 % on them. This is coming back to hunt me in college because I now have a big problem meeting deadlines. Although I do not like to admit it, if high school had been stricter in this respect I might not be going through these many difficulties right now Most public high school teachers are astoundingly underpaid and overworked with sometimes over fifty students in a single classroom. In the last ten years the average class size doubled according to a Time magazine study published in 1995 stating that throughout the whole nation classes have doubled in size. The article mentions that this problem has occurred and will worsen due to illegal immigration, a population expansion, and people migration to cities and urban sites. Some students that can afford a private tutor or the cost of private education follow that path. This is not fair to the majority that can't afford this. Again, the lack of individual and private interaction between professor ends up resulting in that the student gets half of the education. For some reason I don't know, the student ends up always paying the price of an inadequate and inefficient public high school system. These statistics offer little incentive and motivation to get teachers to take action and lobby for change. Governmental cutbacks have forced many schools to close vital advanced placement and other college preparatory courses which are vital for the student aspiring for a college education. It is becoming now more than ever common that states give private entities and teachers public school charters along with grants and financial aid to encourage the nation's public high schools, as California Governor William Wells said in a 1994 Time magazine article titled, "A Class of their Own," "to raise their standards and improve the quality of education for all students." Public high schools around the nation should establish and "enforce" stricter college preparatory curriculums because over 50% of high school students that participated in a Time magazine poll conducted in 1996 said they are interested in pursuing a 4-year college education. The article stated that fifty years ago this would not have been the case. If over half the students attending U.S. high schools wish to pursue university education then public schools should tailor their programs to meet the needs and demands of the majority. It is important to know that there is a small percentage of the nation that don't even go to high school as the October 22, 1990 Time Magazine article, "Schooling Kids At Home," points out. Parents send their kids to school confident that the school will prepare them well for the future, but overlook that essential programs like SAT preparation and study skills courses are not offered. How must a school system expect that one study efficiently for exams if they don't show how. Clearly people have been studying for many years and there is no set way to study, but it helps to know what are the most time efficient ways to review for exams. I feels that s "study skills" class should be offered in every public high school around the nation. If this implies a great cost then study skills should be incorporated in the daily curriculum or at least taught once a week during class. The fact is that some time should be set aside for this essential class for which there is great need for. The same concept applies for S.A.T. preparation. Again I propose the conundrum, how must one be expected to pass the S.A.T if schools don't show us how to pass it. Many

Thursday, February 20, 2020

Emanuel Medical Center Case Study Example | Topics and Well Written Essays - 1500 words

Emanuel Medical Center - Case Study Example While this was a public relations problem in the short term, the issue pointed out the larger systemic problems that exist at EMC. The ED has increasingly become a cost center, and staff morale and quality of care is reflected in this dilemma. The Emergency Medical Treatment and Active Labor Act (EMTALA) of 1986 mandated that emergency rooms must treat all patients, without regards to their ability to pay. This legislation took effect at the same time that the numbers of under and uninsured people in California began to escalate. Lacking primary care physicians, the uninsured have made the ED the primary clinic for their health care. This further exacerbated EMC's financial position from two aspects. First; uninsured people were using the most expensive delivery system available, which overloaded the capacity of the ED. Second; people were waiting until their condition was chronic or terminal before seeking treatment, which further drove up costs. The outdated ED was operating well in excess of capacity, which put an additional strain on nurse availability, response time, and specialty services. With half of the patients that were admitted through the ED either uninsured or underinsured through Medi-Cal, Moen's challenge was to find areas that could compensate for the large losses incurred by the ED. With all of health care experiencing declining reimbursements and increasing expenses, it has been a difficult task to find areas of profitability. EMC expenses have outpaced revenue growth in the period of 1997-2002. Wages and salaries, the largest single expense, grew by 28 percent during this period, while revenues increased by only 23 percent. The nursing shortage has contributed to the problem, as it has forced EMC to hire temporary nurses, and reduce the number of beds available, which have both negatively impacted the bottom line. During this same era, reimbursements from Medi-care, Medi-Cal, and HMOs were declining. An experiment with capitation in the late 1990s did not prove successful, and the hope of vertical integration became an insurmountable expense. Area competition has also put pressure on EMC. Specialties and high-tech procedures are largely not available at EMC, and this business goes to the competition. The financial reality of EMC operating at a loss for the past several years has made capital investment in new equipment and technology out of reach of financing. In addition, closures and consolidations have increased the hostility of the external operating environment. All of these factors; increasing expenses, reduced reimbursement, competition, and escalating salaries have all combined to form the perfect storm. The only bright spot on the balance sheet has been the investments that EMC made in the 1990s, which managed to keep them operating into the 21st century. In fact, without these investments the financial solvency of EMC would be in doubt. In addition, EMC enjoys a significant amount of community support, and has aggressively sought community involvement through a matching grant from the Mary Stuart Rogers Foundation. Moen's greatest operational challenge will be to reduce operating expenses, and increase patient revenue within the realities of their current financial situation. 2.) There are numerous strategic options available to Robert Moen, though they all have a large degree of uncertainty in regards to their financial

Tuesday, February 4, 2020

Insuring your business Coursework Example | Topics and Well Written Essays - 250 words

Insuring your business - Coursework Example Ideally, the common risks associated with cosmetics businesses include fire and health risks, especially for employees handling the cosmetics who are exposed to the different chemicals used during the manufacture of the cosmetics. Equally, the chemicals used are highly reactive and could easily explode if exposed to fire. The company has not had any legal claims previously; however, there was once an instance of contract breach in which the supplier failed to deliver goods in time and the company suffered a significant loss. Because the company had taken a comprehensive cover, the insurance claim tool cover of all the costs as well as the fees paid to the attorney. My company is unique, as it has established an expanded customer base and, as such, deals in timely delivery lest the customers fail to get their products in time. As the operating manager, in order to identify the risks associated with the business, I have characterized all occurrences that seem to pose threats and ascert ain the likelihood of such occurrences. With availing enough resources for every operating department, the company saves a lot from reduced expenses as most risks are prevented before occurrence rather than mitigation after their

Monday, January 27, 2020

Barbarians and Roman Civilisation

Barbarians and Roman Civilisation The debate surrounding the extent to which the Barbarians facilitated the disappearance of Roman civilisation in the years 376AD to 496AD is one that has been contested throughout history. The arguments can be divided into two major schools of thought. Firstly, Henri Pirennes, Pirenne Thesis[1], which postulates the Barbarians did not facilitate for the disappearance of Roman civilisation and culture, with Roman society continuing after the breakdown of central authority. Pirenne asserts the Barbarians sought to benefit from the established Roman civilisation, and thus strove to preserve the Roman way of life. Conversely, the eminent Bryan Ward-Perkins -archaeologist and professor at Oxford University- hypothesises in his magnum opus, The Fall of Rome and the End of Civilization the argument: Germanic people instigated the end of civilisation for almost one thousand years, characterised by social, economic and technological regression.[2] I believe, its undeniable to determine that n umerous areas of the former Western Empire suffered detrimental changes to their quality of life at the hands of the Barbarian tribes. Nevertheless, evidence shows an abundance of continuity across the former Western Empire following the Germanic incursions, with society progressing in Barbarians cities such as Marseille[3]. Therefore, when assessing the extent to which the Barbarians facilitated for the disappearance of Roman Civilisation; one must determine on a case-by-case basis with no overarching answer conclusively possible. Although, it appears for the majority of the former Western Empire that society progressed, characteristically Roman, but slowly transformed into a Germanic-Romano society, reinforced prominent primary and contemporary sources. One example of the supposed regression that Ward-Perkins uses to develop the idea of the fall of Roman civilisation is the collapse of literary sophistication[4] which characterised the Empire. Ward-Perkins argues the literary record of the Dark Ages was not as comprehensive and sophisticated as the period of Roman authority that preceded it. When assessing whether Romanic literary culture survived, or in fact developed, the most utilitarian surviving material is the primary source of eight court charters from Lombardy and Merovingian France. These documents provide an unrivalled primary source for evaluating if Romanic literary culture survived. The Merovingian documents illuminate that of 138 subscribers 73.2% managed to sign the document themselves.[5] With only 37 not being able to sign and therefore assumed illiterate we can see an exceptionally high literacy rate. The documents also highlight the demographics of the signatories allowing us to see indisputably, 53 out of the lit erate 101 were traditional laymen.[6] Of course, this statistic cannot be conclusive of the entire former Western Empire, but is an indicator that decades after the sacking and formal Germanic occupation a culture of literacy did not irrefutably fall, and in places such as Merovingian France it undeniably developed. Subsequently, this primary source supports Henri Pirenne, who asserted, There was an extensive and mostly literate Merovingian lay culture [under Clovis I.][7] However, as much as these primary documents aid Pirennes argument, in equal regard, they retract, supporting the argument that one cannot provide an overarching answer, assisting Ward-Perkins overall regression claims. The first reason why the source is disputable in its substance is those called to sign attendance were innately from the higher echelons of society, even at upper lay level[8], where literacy was more common than across the general population spectrum. Analysing the equivalent primary documents of Lombard Italy, the number is nowhere near as impressive, considering that of 988 signatories only 326[9] could sign their name. Despite representing 633 of the signatures, only 14% of laymen managed to sign with 554 instead having to use the stamp. The value of this Pro-Pirenne source is retracted further when consider ing that Lombard women were excluded from signing, allowing us to assume immediately that 50% of the population was inherently illiterate. Subsequently, this primary source provides a clear level of understanding into the nature of post-Roman literacy. Nevertheless, it must be ascertained that the documents cant be treated overly conclusive due to their incomplete nature, and as they only show a localised picture.   Moreover, the documents suggest arguably the most conclusive argument, pockets of Romanic civilisation in the field of literacy continued to excel, whereas others regressed following the fall of Rome. It must be acknowledged since only a modicum of documents survived they cannot be wholly representative of the population, coupled with the fact, not everyone would have been called to sign a during their life. These people were the lowest on the social hierarchy; as a feudal society and due to the nature of the time its overwhelmingly likely that the majority of the population would remain illiterate. Overall, this primary source appears to be mostly useful as it mirrors the trends of many other facets of Roman life that can be proved more conclusively with France flourishing, culturally and economically whereas other regions, especially in Italy[10]. There is evidence, in line with the Pirenne Thesis suggesting society did not back track, seen in Merovingian France, with Gregory of Tours Historia Francorum,[11] allowing us to see literary sophistication surviving 108 years after the fall of Rome. Yet, concurrently supporting Ward-Perkins as there is evident disparity across the Empire, from written sophistication, down to technical regression, with the reduction of documents written on Papyrus paper; seen by the fact that 7th century Italy only has eight surviving Papyrus documents, only one originating from Rome.[12] Therefore, allowing us to see that even though the upper classes are still literate theyre producing less material of the prow ess that characterised the empire. Similarly, for the subordinate classes the lack of evidence makes it impossible to formulate a broad conclusion for large areas of the former Western Empire. On the surviving information, available the evidence would suggest the Pirenne Thesis as the most convincing argument when analysing literacy in the former Western Empire, as it appears broadly, a literary culture survived. Many contemporary historians promote the view of the Barbarian as, lacking refinement being primitive, ignorant, brutal, rapacious, destructive and cruel.[13] Emphasising the idea, Roman civilisation was extinguished suddenly and brutally: Roman civilization did not pass peacefully. It was assassinated.[14] Which I do not agree with; rather I align with Pirenne who affirms the Barbarians found it advantageous to embrace the culture.[15] The Primary source, Sidonius Apollinaris promotes in his letters[16] the civilised Barbarian, the Visigoth King, Theodoric II. Apollinaris presents Theodoric with a lengthy description describing him as a man of prestige and celestial reverence, with the masculine grandeur avowing If there is a miss through eithers error, your vision will mostly be at fault, and not the archers skill. Yet still possess a fair complexion often flush, but from modesty, and not from anger. From Apollinaris description, we see Theodoric as the ideal Tertullian[17] noblema n, an embodiment of Western Culture; which Theodoric II unequivocally strove to fit, a blend between the philosophically methodical and the compassionate.[18] We can see that Apollinaris epistle is a valuable source for analysing whether the Barbarians continued Roman ideals, due to contextual factors. Firstly, Theodoric strove to preserve Roman civilization like his father, as they saw Frankish culture as subordinate to Roman due to the admirable ideals Roman culture presented. Their determination to preserve roman culture can be seen at the Battle of Chà ¢lonswhere they fought alongside the Romans to force Attila out of North-Eastern France. Despite being the (illegitimate) grandson of Alaric I, under Theodoric I, Frankish-Barbarian culture became interconnected with the Romans. As they were pivotal to Roman victory upon Theodorics II succession he was engulfed into the higher strata of Romanic civilisation having gained acclamation defending Romanic culture against rival Barbari an empires. Therefore, when evaluating the source, we can see from Theodorics territories, despite the loss of a centralised government in 476AD, the region remained Roman in nearly every sense of the word, only through decades of gradual attrition long after the fall of Rome that the region itself stopped identifying as Roman, evolving into a Gallo-Romano society. Theodoric produced a myriad of geometric and stonework motifs[19] in Carcassonnea promoting continuity between Rome and the reign of Theodoric II, showing Roman civilisation surviving. Despite Apollinaris sheer idealisation of Theodoric, we can see that the description isnt just propaganda comparable with Tacitus Germania[20], but, rather an astute analysis of Theodorics character. We can see this as Apollinaris outlines Theodoric wanting to represent a Roman man but falling short, he embraced Christianity to preserve Roman civilisation; however, it was apparent his prayers were more in habit than in convicted assiduity. Subsequently, its undeniable to determine that despite the sources amplification, its credible in its material; a criticism suggesting Theodoric wasnt a convicted Christian would send him into a bout of rage. However, the suggestion he was almost so civilised as for him to be Roman should be taken lightly as despite his appreciation of culture and art, he obtained th e throne by the murdering elder brother Thorismund[21]. Gibbon stated: he justified this atrocious deed by the design which the heir-apparent formed of violating his alliance with the empire.[22] Therefore, regardless of the good nature to Theodorics crime, defending the Empire, he violated the principles of being Roman. In Theodorics Visigoth kingdom, its clear to see Romano culture surviving, only after gradual attrition, evolving. Therefore, we see both Pirenne and Ward-Perkins coming through; Pirenne could clearly assert that culture here did survive before transforming into a Gothic kingdom. This source validates the argument of Ward-Perkins, its clear despite the attempts made by Theodoric to maintain a level of Roman culture; it was incompatible with the average Barbarian who had little interesting in preserving Romanness dating back to the tribe of Theodorics grandfather sacking Rome in 410AD. Theodorics Roman ideals were not shared by the upper echelons of the Frank society , seen by the fact he was assassinated only a few years after taking the throne by brother Euric. Its possible to see the shift (or, perceived shift) in civilisation from Roman control to Barbarian through the primary source, the Bishop of Chaves, Hydatius. Hydatius The Chronicle of Hydatius and the Consularia Constantinopolitana[23] provides the only extensive account of Spanish history through the fifth century. Hydatius states that post-Roman Gallaecia was, A wretched place to live, the inhabitants: cold, inhospitable and brutishà ¢Ã¢â€š ¬Ã‚ ¦ Despite the mineral wealth, the place had a vile reputation for brigandage and ruinous tribal warfare.[24] Hydatius allows us to see the transition from peaceful times the emergence of a Germanic kingdom, following 411AD and, Vandal and Suevi invasions theres a drop in the variety of sources used by the Churchman. Hydatius was forced to live within an isolated Roman community constantly threatened by the barbarian presence[25], subsequently Germanising the region facilitating for a cultural revolution. The complexity of the Chronicle is replaced by uncertainty; Hydatius makes no secret of the fact that the Barbarians that facilitated for the loss of sophistication in his work. Following the death of John of Jerusalem in 417AD, all Hydatius could ascertain was that an elderly man took over the bishopric, despite it being well known outside Northern Spain that Praylius had been occupying the role for several years. Due to the Barbarian occupation, we see clear gaps in the information the source presents. Hydatius knows after the expulsion of Nestorius from Constantinople, Flavian became the Patriarch (447-449); but gives no indication that he knew of either man who occupied the role from 431-447AD, Maximian and Proclus[26]. Subsequently, we see an undeniable decline under Germanic occupation regressing from fluid streams of communication with Flavius Aetius to uncertainty; reinforcing the argument that Barbarians facilitated the disappearance of Roman civilisation in the years 376AD to 496AD. However, akin to many characteristics of the period, the answer appears to be somewhere in the middle, which becomes apparent due to Hydatius source limitations. Hydatius is intrinsically anti-German due to their forceful occupation of his land and therefore he demonises them at every opportunity. Its perspicuous that the Chronicle was never intended for anyone outside Spaniards, potentially even Galicia.[27] Despite being a one-of-a-kind account of Barbarians in Spain, Hydatius is prone to exaggerating the occupations impacts. The barbarian entry in 409AD was undoubtable an event which made an impact, but not a resounding one, with chroniclers such as Count Marcellinus passing over it with silence, but to Hydatius it was an event of equal significance to the Sack of Rome. Delusion expected of a man who fully expected the world to end within fifteen years[28]. One of the reasons why Hydatius source is not conclusive of Germanic Spain is due the contrast between Hydatius meagre knowle dge of the world, compared with the other letters and sources coming out of Spain synchronously. We can see that during the period of 468-483AD, when the times were more tumultuous, encompassing the fall of Rome we can see that communication between the Rome and Mà ©rida was frequent and fast. This consequently, suggests the rest of Spain was not so cut off from civilisation and the Romanic world. There are many communiquà ©s addressed to Zeno, the Bishop of Mà ©rida from Pope Simplicius, with one reading We have learned from the report of many[29], about Zenos excellent administration. Therefore, it can be deduced that many travellers reported the ecclesiastical conditions in Southern Spain, Simplicius bears no hint of anticipating any difficulties in sending confidential letters outlining his ambitions to a distant land that Hydatius had marked as Barbaric. Correspondingly, the metropolitan bishop, and the Pope years prior to Hydatius, referred to North-Western Spain as the edge of the world and an extreme part of the earth[30], it is subsequently no surprise that Cape Finisterre was believed to the furthest west point on Earth. Therefore, the hypothesis that the Barbarians alone were responsible for the lack of communication is not a conclusive one, despite it being true that the reach of the sources decreased; there was a reason why for centuries the Greeks referred to the land as mountainous, cold and hard to reach. Subsequently, supporting the argument that despite what Hydatius said appearing mostly true, when considering the entire Western Empire, the account is microcosmic. Reinforcing the idea that in certain areas, life carried on as normal, whereas in other places, such as Galicia, the status-quo Romanic culture was replaced by the new Germanic one. For the majority of people in Spanish lands communication does not seem to be affected, referenced by the dozens of surviving letters between Tarragona and Rome (463-465AD) with, in the many qualms raised, communication never even being implied. When assessing whether Roman Civilisation disappeared or not, one of the most compelling arguments from both Ward-Perkins and Pirenne is centred on the post-Roman economy. Henri Pirennes Thesis has spearheaded the argument suggesting continuity with the Roman economic model. The Thesis establishes that Mediterranean trade in 600AD was no different to that of 400AD taking the stance that the Germanic invasions did not destroy the unity that the ancient Mediterranean world had enjoyed[31]. This perception of continuity has stemmed debate, especially considering Pirennes Thesis is heavily reliant upon written evidence[32],   Looking at the archaeology along with the written sources is pivotal to comprehending the post-Roman economy and the role the barbarian invasions played; thus, Ward-Perkins provides a convincing argument. Extensive settlements such as Marseille are communities that had significant populations supported by excellent archaeological records, enabling the most ro unded view on the extent to which Barbarians facilitated the disappearance of Roman Civilisation. As preluded, one such case study mentioned by both Ward-Perkins and Pirenne is Marseille, a site which has been extensively excavated enabling for detailed accounts of Late Antique Marseille to be presented. Ward-Perkins incorporates the evidence of professor Simon Loseby, accredited for the most vigorous excavation and analysis of Marseille into his work, Ward-Perkins believes, Marseille may have been particularly well-placed to ride, even to turn back, a tide of events whichà ¢Ã¢â€š ¬Ã‚ ¦ was pushing ahead the process of urban and economic decline.[33] This conclusion is possible due to examination of both written and archaeological evidence; pinpointing the fact that Marseille continued as a trading centre centuries after 476AD through examination of the ceramic material available there.[34]   It appears Marseille was able to continue as a part of the pan-Mediterranean trading network until at least the end of the sixth century.   Its also noted that Marseille had i ts own mint, capable of producing copper and gold coinage, suggesting that Marseille had an economic hegemony on the surrounding area[35].   Thus, Marseilles image is not simply of a city that endured Barbarian rule, but rather one that progressed.   This view is emphasised in written sources too, seen from the Bishop of Tours, presenting a thriving cosmopolitan city, stimulated by the perpetual flow of merchants, diplomats and churchmen[36]. Conclusively, Marseille undoubtedly avoided economic decline under the rule of the barbarians and from the contextual evidence available the Roman way of life appear does not appear to vanish from the city; collateral to, neighbours Arles. However, Marseille is an isolated case study.   In this instance, the barbarians appear to have had a very small role in the end of the Roman world, Marseille is not representative of the situation many found themselves in after the barbarian invasions.   What it shows through archaeology was that the invasions were not universally detrimental as in some areas, Barbarians sought to use Roman institutions for profit, promoting continuity between the Romans and Barbarians. This is where the differentiation between Ward-Perkins and Pirenne comes in. Across the former Empire, evidence suggests a general decline in standards of living. Ward-Perkins actively pursues the idea that the period following 476AD was one of a dramatic move away from sophistication toward much greater simplicity.[37] He reinforces this stance by through an examination of pottery and coinage, seen through the existence of luxury, but a substantial middle and lower goods market.[38]   Ward-Perki ns also establishes a pattern of reduced pottery and coinage production, across the former Empire in from 476 until the fourteenth century[39].   Where the Pirenne Thesis falls short compared to Ward-Perkins is the fact that Ward-Perkins recognises cities such as London and Marseille flourished following the collapse of Imperial power, whilst other economic centres collapsed. Wherever the Barbarians didnt see profit, they laid siege destroying the societies civilisation, seen from the economic damage left to industries such as farmland, and the loss of citizens either through capture or violence.   Evidence of the Barbarian trail of destruction can be seen from the sack of Mainz all the way to Toulouse and into Spain.   It may be unfair to criticise Pirenne exceedingly, as Ward-Perkins had the best part of seventy years extra research available following Pirennes posthumously published Thesis. Considering the information Pirenne had in the 1920s he provides a de tailed, accurate analysis of Mediterranean trade and Roman Civilisation. But, when we add the years of development, with widespread archaeological analysis, predominantly a post-World War II development; in the Mediterranean and Central/Western European we see a new light. Thus, we are able to come to the conclusion that whilst areas of the former Western Empire fell into a state of economic devastation, other areas improved, rising to new heights under Barbarian occupation. In conclusion, whilst the Barbarians catalysed the ending of the most vast and complex institution in the ancient world, the notion they conclusively marked the end of civilisation in the west for a thousand years is a claim that does not stand true conclusively.   There is undoubtable evidence to suggest that after the occupation of the Empire by the barbarian peoples, the systems implemented by the Romans were still in place, and that both the administrative[40] and day to day status quo remained largely unchanged for over two hundred years. Archaeological and literary evidence suggests, after the Barbarian invasions individual provinces and communities continued to carry out daily life in much the same way that they had done in the later days of the Empire the early seventh century. Following the Barbarians penetration of the empire its undeniable that certain tribes sought to ruthlessly destroy, as can see be in Pesaro and Fano in Italy which had their walls destroyed and internal structures burnt to the ground.[41] Milan too, where the Milanese women and children were enslaved and the men all killed[42]. But, there were clear examples of the preservation of Roman culture as we can see through case studies such as Marseille, and Barbarian kingdoms originally characterised by their Roman way of life. Leading to the assertion that the extent to which Roman civilisation survived depended on where you happened to live. Predominantly, Romanic culture appears to continue for decades after the first crossing of the Danube by the Barbarians, the period of Germanic rule ushered a time of narrowing horizons, strengthening local roots, and consolidating old loyalties.[43] Bibliography [1] A series of papers published from 1922 to 1939. Each book or paper shall be referenced as the title of the book in the footnotes but referred to as the Pirenne Thesis in the document for ease of understanding. [2] The Fall of Rome and the End of Civilisation (Ward-Perkins, 2005) p. 104. [4] The Fall of Rome and the End of Civilisation (Ward-Perkins, 2005) p. 37. [5] Writers and Readers in Medieval Italy (Petrucci, 1995) p. 66. [6] Of the Literate: 53 Lay, 37 ecclesiastics, 2 women and 9 uncertain. [7] Mohammed and Charlemagne (Pirenne, 1939, reprint 2012 edition) p. 284.   Originally published as: De là ©tat de linstruction des laÃÆ' ¯ques à   là ©poque mà ©rovingienne(translation: Lay Education in the Merovingian Epoch) (Pirenne, 1934) [8] Traditional Yeoman for instance, as they would be classified as lay. [9] Writers and Readers in Medieval Italy (Petrucci, 1995) Book, Handwriting and School. [11] The Historia Francorum: Ten books recounting the worlds history from Creation to the Christianization of Gaul, as well as Frankish conquests and the Christianisation of Gaul. [13] Terry Jones Barbarians, Episode 4 End of the World (BBC Two, 2006) [14] The Fall of Rome and the End of Civilisation (Ward-Perkins, 2005) p. 220. [15] Key theme of all books in the Pirenne Thesis mentioned throughout Medieval Cities: Their Origins and the Revival of Trade [16] http://sourcebooks.fordham.edu/halsall/source/sidonius2.html [17]  The father of Western Theology: Tertullian published the book De Pallio, which in part outlined what it meant to be an ideal Roman man, with special focus on those in higher society. [18] Apollinaris on Theodoric II: Silent at a good throw, he makes merry over a bad, annoyed by neither fortune, and always the philosopher. He is too proud to ask or to refuse a revenge; he disdanisn to avail himself of one if offered and if it is opposed will quietly go on playing.- Footnote 16 for the web address to the quote. [19] http://imgur.com/gallery/J41Jl [20] Tacitus Germania: a historical and ethnographic work on the Germanic tribes outside the Roman Empire. The book outlines different characteristics and details of each tribe, describing them as a purer race compared to the decadent Romans, the antagonists of Tacitus polemic. [21] This is arguably very Roman. However, we are following the idealised Roman perspective as outlined by Tertullian.   [24] The Chronicle of Hydatius and the Consularia Constantinopolitana (Burgess, 1993) pp. 72-83. [25] The Chronicle of Hydatius and the Consularia Constantinopolitana. (Burgess, 1993) p. 4. [26] The Chronicle of Hydatius and the Consularia Constantinopolitana. (Burgess, 1993) p. 96. [27] Hydatius records events such as the eclipse of the sun on the 11th November 402AD which was a total eclipse where it was scarcely visible in Northern Spain, where he was, but almost total in Constantinople. [28] The Chronicle of Hydatius and the Consularia Constantinopolitana. (Burgess, 1993) p. 32. [29] Romans and Barbarians: The Decline of the Western Empire. (Thompson, 1982) p. 149. [30] The name Finisterre even directly translates to Latin as finis terrae, meaning end of the earth. [32] Mohammed, Charlemagne the Origins of Europe: Archaeology and the Pirenn

Sunday, January 19, 2020

How Games Makes a Better World

How games can make a better world A few months ago I saw a talk by Jane McGonigal on TED. com. She has been a game designer for about 10 years now and she had some really interesting ideas about how we spend way to little time playing videogames. We are currently spending 3 billion hours a week playing online games. That might sound like an awful lot of playing games and not so much solving problems like hunger, poverty and climate change. But according to her research, we have to increase that playtime to 21 billion hours a week to survive the next century. Have you ever heard about an â€Å"epic win†?That’s when you succeed with something and the outcome is so extremely positive that you didn’t even know that it was possible. What we need is to transfer epic wins into the real world. But that’s not an easy task. In game we become the best version of our self. When we are playing games we get much better confidence and we are much more likely to stand up and try again after failure, as opposed to when we try to tackle real life problems. In game the missions and problems that you have to solve are always match to the level you’re currently at. That means that before you even start, you know it’s possible.You have to work hard to succeed, but you know it’s possible. When we face a problem in real life we often don’t feel the same way. We often feel overvalued by the problem, depressed or frustrated. In game you rarely feel that way. So what is it in games that make us feel like we can achieve everything? What is it that games have that the real world doesn’t? When you’re first showing up in a cooperative online game, like Guild Wars, World of Worldcraft or Little Big Planet, there are people that are willing to support you with a world saving mission right away.All these collaborators that are willing to help you achieve your epic mission is nothing that exist in real world situations. Thereà ¢â‚¬â„¢s also a lot more positive feedback in games than it is in the real world. Games like Guitar Hero always boost your confidence by giving bonus point when you for instance managing to play all the notes right at a really difficult part of a song. Or when you make an awesome slide in the middle of the solo. You don’t get that kind of positive feedback in real life. When I’m done cleaning my room, I wont get â€Å"+1 cleaning†. Or when I’ve finished this homework I wont get â€Å"+25 school†.The problem is that it’s so rewarding to play computer games that many people decide to spend almost all of their time in this virtual world. Just because they think the virtual world is better than the real one. So far, gamers have spent 5,93 million years solving the problems in World of Worldcraft. Imagine if we somehow could transfer all that problem solving in to the real world! How we could do this has been a mystery for me ever since I heard h er speech. Until now that is. Just a few days ago I read a really interesting article in the news magazine â€Å"Ny Teknik†.The article was written by Helen Ahlbom and she gave some very good examples on how we are already making the world better with games. Nissan and Fiat has developed new cars models that save your fuel efficiency in an onboard computer. You later upload your statistics to their website and compete with each other on who can drive most eco friendly. I got so interested by these new ideas that I just had to visit Fiats website to see it for myself. It appeared that the transferring of all the good stuff from games to the reality had already begun.The game gives you a lot of positive feedback on your driving, much like the feedback I earlier said you didn’t get for real world accomplishments. I’ve already started making my own computer games. I always thought that computer games was just something silly you played when you where bored. But now I see how games can make the real world a better place. These new ideas has really got me thinking and I think that this is something that I actually would like to have as a job in the future. ———————– A portrait taken by the photographer Phil Toledano of a gamer on the verge of an epic win This is a screenshot from Fiats website

Saturday, January 11, 2020

Ethical Issue on the Internet

Ethical issues relating to the use of the Internet and the implications for managers and business practice. by Mihai C. Orzan Abstract When we address the topic of ethical issues on the Internet we are generally referring at two different matters: privacy and intellectual property. Each has been examined extensively in the last five years, since the Internet explosive intrusion in everyday life activities, each has an important number of sub fields that require special attention from managers and other business professionals.The purpose of this paper is to to make a short presentation of most relevant developments pertaining Internet ethical issues in direct connection with the business world. The Privacy debate is centered on the arguments regarding citizens’ right to privacy granted or implied by laws on one hand and companies approach on â€Å"customer data, considered an asset to sell for profits† (Choi, 2000, p. 317) on the other hand. Privacy on the Internet is ex ploding as a topic of public concern these days. A recent Internet survey showed that 4 out of 5 users have major concerns regarding various privacy threats when they’re online.Yet only 6% of them have actually experienced privacy abuses. Those who are not yet on the Net cite privacy as the main reason they have chosen not to become Internet users. If electronic commerce is going to thrive, this fear is going to have to be dealt with by laws and by industry practices and this paper attempts to give a thorough description of the major computer ethics trends of the moment. The other major source of concern for business world as well as the majority of Internet users is copyright control.Serious question come from both approaches on this matter: what information available on the Internet can I freely use and how can one protect the hardly earned information that he posts on a website. In fact, â€Å"The Internet has been characterized as the largest threat to copyright since it s inception. It is awash in information, much of it with varying degrees of copyright protection. † (O’Mahoney, 2001). Copyrighted issue constitutes an important part of this paper and it details most of the present concerns of intellectual property. 1 Privacy Everyone has the right to know what information is collected and how it will be used and to accept or decline the collection or dissemination of this information– particularly financial and medical information. † President George W. Bush. Privacy has become a major concern on the Internet. According to (Ferrell, Leclair & Fraedrich, 1997), â€Å"the extraordinary growth of the Internet has created a number of privacy issues that society has never encountered before and therefore has been slow to address. † Opinions have been expressed and actions were taken in order to resolve these matters in one way or another.In an interview earlier this year United States President George W. Bush (Miller, 2 001) expressed numerous and informed concerns regarding privacy issues, including access, security, and use of personal information. He promised to ensure actions that will meet consumer demands for privacy protection and advocated â€Å"opt- in† policies for mailing lists. He concluded the interview by stating: â€Å"I share many people's concerns that, with the advent of the Internet, personal privacy is increasingly at risk, and I am committed to protecting personal privacy for everyone. Privacy issues on the Internet relate to two major concerns. The first concern is users’ ability to control the rate, type, and sequence of the information they view. Spam, or unsolicited commercial e- mail, is a control concern because it violates privacy and steals resources. A second concern relates to the ability of users to address and understand how organizations collect and use personal information on the Internet. Many 2 Web sites require visitors to identify themselves and provide information about their wants and needs.Some Web sites track visitors’ â€Å"footsteps† through the site by storing a cookie, or identifying string of text, on their computers. The use of cookies can be an ethical issue, especially because many users have no idea that this transfer of information is even occurring. Internet privacy is an important ethical issue because most organizations engaging in e- commerce have not yet developed policies and codes of conduct to encourage responsible behavior. Spamming â€Å"Junk e- mail and spam are both terms for advertising and e- mail sent to you which you did not ask for and which you do not want†, (Elbel, 2001).However, spam is a more generic term that includes broadcast posting to newsgroups as well as individuals. And spamming is very costly for the end users: recent surveys showed that various forms of spam consume up to 15% of Internet bandwidth. According to a recent European Union study â€Å"junk email costs all of us some 9. 4 billion (US) dollars per year, and many major ISPs say that spam adds 20% of the cost of their service†, (Elbel, 2001). As you can see spamming is a very profitable endeavor and have grown over the years to assume a number of different forms.Thus, we can distinguish: v Unsolicited e- mail is any email message received where the recipient did not specifically ask to receive it. It might not be always an abuse. v Bulk e- mail is any group of messages sent via e- mail, with substantially identical content, to a large number of addresses at once. Many ISPs specify a threshold for bulk e- mail to be 25 or more recipients within a 24- hour period. Once again, bulk e- mail itself is not necessarily abuse of the e- mail system. 3 Unsolicited Commercial E- mail (UCE) is a form of e- mail containing commercial information that has been sent to a recipient who did not ask to receive it. Several ISPs specify that sending even one UCE is a violation of privacy. v Make Money Fast (MMF) are e- mail messages that â€Å"guarantee immediate, incredible profits! â€Å", including such schemes as chain letters. v Multi-Level Marketing (MLM) are e- mail messages that â€Å"guarantee incredible profits! â€Å", right after you send them an â€Å"initial investment† and recruit others. v Mailbomb is probably the most harmful type of spamming.It takes the form of email packages delivered repeatedly to the same address until the mailbox is overloaded, or perhaps even the system that hosts the mailbox crashes. Mailbombs generally take one of two forms. A mailbox might be targeted to receive hundreds or thousands of messages, making it difficult or impossible for the victim to use their own mailbox, possibly subjects them to additional charges for storage space, and might cause them to miss messages entirely due to overflow. This is seen as a denial- of- service attack, perhaps also harassment.Another form of mailbombing is to forge subscripti on requests to many mailing lists, all for one recipient. The result is a huge barrage of email arriving in the victim's e- mail box, all of it unwanted, but â€Å"legitimate†. There are several ways to escape spamming, but none will guarantee 100 percent reliability. First, a complaint to the ISPs that originated and forwarded the spam is required. It is also recommended to switch to an ISP that uses one or all of the anti- spam databases available (RBL, RSS, and DUL). About 40% of the Internet is using these services, with good success.Also, it is important that you never, under any circumstance, reply to junk e- mail, even if it is to send a â€Å"remove† request. Most spammers ignore such 4 responses, or worse, add you to their list of validated e- mail addresses that they sell. Also, getting removed doesn't keep you from being added the next time they mine for addresses, nor will it get you off other copies of the list that have been sold or traded to others. Fina lly, we should note that there are voices that argue that spamming is a legitimate form of expression and restricting it would be a First Amendment infringement.Even more, has been suggested that â€Å"junk e- mail (also called â€Å"bulk† e- mail and â€Å"spam†) should be legally protected†, (D’Ambrosio, 2000). Tracking a user on the Internet Data about individuals is collected in a wide variety of ways, including information provided on application forms, credit/debit card transactions, and cookies. Many users expect that such activities are anonymous, but unfortunately they are far from being so. It is possible to record many online activities, including which newsgroups or files a subscriber has accessed and which web sites a subscriber has visited.This information can be collected both by a subscriber's own service provider (available in the request headers of browsers) and by agents of remote sites which a subscriber visits. But the most popular fo rm of collecting data about web surfers is the cookie. These are short pieces of data used by web servers to help identify web users. The cookie is stored on the user's computer, but contrary to popular belief it is not an executable program and cannot do anything harmful to the machine. Cookies are used by Internet shopping sites to keep track of users and their shopping carts.When someone first visits an Internet shopping site, they are sent a cookie containing the name (ID number) of a shopping cart and other useful tags. Another use of cookies is to create customized home 5 pages. A cookie is sent to the user’s browser for each of the items they expect to see on their custom home page. One of the less admirable uses of cookies, and the one that is causing all the controversy, is its use as a device for tracking the browsing and buying habits of individual web users.On a single web site or a group of web sites within a single subdomain, cookies can be used to see what web pages you visit and how often you visit them. However, such concerns can be easily addressed by setting the browser to not accept cookies or use one of the new cookie blocking packages that offer selective cookie access. Note that blocking all cookies prevents some online services from working. Also, preventing the browser from accepting cookies does not confer anonymity; it just makes it more difficult to be tracked on the Web. Related to cookies, but more damaging is the activity known as â€Å"prying†.Many of the commercial online services will automatically download graphics and program upgrades to the user's home computer. News reports have documented the fact that certain online services have admitted to both accidental and intentional prying into the memory of home computers signing on to the service. In some cases, personal files have been copied and collected by the online services. Use of Personal Information You can find out simple directory information about peopl e on a variety of web sites, like Switchboard, Whowhere, Four11, Bigfoot.These contain information retrieved from telephone books. And most of these sites allow someone who doesn’t want to be listed in their databases to have his/her information removed. But beyond the free services there are the fee- based services where one can find out a great deal about 6 individuals on the Internet. There are services like as KnowX, Informus, Infotel, CDB, Infotek, Information America, and Lexis- Nexis that offer subscription based services and give access either through the Internet or through their own telephone networks.The information they provide is primarily from public records like records of court cases, both civil and criminal (not the full text, not yet anyway, but an index of cases), bankruptcies, judgments and liens, property records, such as county tax assessors files, professional license information, if regulated by the state, Dept of Motor Vehicle data from many states, v oter registration data from many states, stock investments, if you own 15% or more of a company’s stock, and many more other sources.Data warehouses built with this kind of sensitive personal information (including â€Å"browsing patterns,† also known as â€Å"transaction- generated information†) are the lifeblood of many enterprises that need to locate their customers with direct mailing (or e- mailing) campaigns. It may also create the potential for â€Å"junk e- mail† and other marketing uses. Additionally, this information may be embarrassing for users who have accessed sensitive or controversial materials online. In theory, individuals (data subjects) are routinely asked if they would permit their information to be used by the information collector.Application forms usually include a clause stating that personal information provided may be used for marketing and other purposes. This is the principle of informed consent, meaning that if the individual does not so request that his/her data not to be used for such purposes, it is assumed that he/she had given permission. The alternative principle, of affirmative consent, where an individual is required to give permission for each and every occasion on which a data user wishes to make use of an individual’s data, becomes extremely expensive and complex and is seldom practiced.The Federal Trade Commission is urging commercial web site operators to make public their information collection practices in privacy policies posted on web sites. 7 Many web sites now post information about their information- collection practices. You can look for a privacy â€Å"seal of approval,† such as TRUSTe, Council of Better Business Bureaus (BBB), American Institute of Certified Public Accountants, WebTrust, and others on the first page of the web site. Those that participate in such programs agree to post their privacy policies and submit to audits of their privacy practices in order to display the logo.There are several technologies that help online users protect their privacy. v Encryption is a method of scrambling an e- mail message or file so that it is unintelligible to anyone who does not know how to unscramble it. Thus, private information may be encrypted, and then transmitted, stored or distributed without fear that outsiders will have access to its content. Various strong encryption programs, such as PGP (Pretty Good Privacy) and RSA (RSA Data Security) are available online.Because encryption prevents unauthorized access, law enforcement agencies have expressed concerns over the use of this technology, and Congress has considered legislation to create a â€Å"back door† to allow law enforcement officials to decipher encrypted messages. Federal law limits exporting certain types of encryption code or descriptive information to other countries and file them under the same ammo type as nuclear weapons. v Anonymous remailers. Because it is relatively easy to determine the name and email address of anyone who posts messages or sends e- mail, the practice of using anonymous remailing programs has become more common.These programs receive e- mail, strip off all identifying information, and then forward the mail to the appropriate address. v Memory protection software. Software security programs are now available which help prevent unauthorized access to files on the home computer. For 8 example, one program encrypts every directory with a different password so that to access any directory you must log in first. Then, if an online service provider tries to read any private files, it would be denied access. These programs may include an â€Å"audit trail† that records all activity on the computer's drives.Censorship and Blocking Software â€Å"With its recent explosive growth, the Internet now faces a problem inherent in all media that serve diverse audiences: not all materials are appropriate for every audience† (Resni ck & Miller, 1996). Any rules or laws about distribution, however, will be too restrictive from some perspectives, yet not restrictive enough from others. Apparently it might be easier to meet diverse needs by controlling reception rather than distribution. In the TV industry, this realization has led to the V- chip, a system for blocking reception based on labels embedded in the broadcast stream.On the Internet, the solution might be considered even better, with richer labels that reflect diverse viewpoints, and more flexible selection criteria. Not everyone needs to block reception of the same materials. Parents may not wish to expose their children to sexual or violent images, businesses may want to prevent their employees from visiting recreational sites during hours of peak network usage, and governments may want to restrict reception of materials that are legal in other countries but not in their own.The blocking solution with the largest acceptance at this moment is PICS (Pla tform for Internet Content Selection). Its labels are supposed to be able to describe any aspect of a document or a Web site. As was natural to be expected, PICS labels started out as an attempt to block web pages that were not compliant with indecency 9 laws. As one of its initiators said, â€Å"the original impetus for PICS was to allow parents and teachers to screen materials they felt were inappropriate for children using the Net†, (Weinberger, 1997).At this moment, Microsoft, Netscape, SurfWatch, CyberPatrol, and other software vendors have PICS- compatible products, while AOL, AT WorldNet, CompuServe, and Prodigy provide free blocking software that is PICS- compliant. Intellectual Property Intellectual Property concerns the protection of â€Å"all products created or designed by human intellect – book, songs, poems, trademarks, blueprints†¦and software† (Davidson, 2000, p. 9). The copying of software programs, although nominally protected by copyright laws, is certainly widespread. Much of the argument about IP lies in the deontological dichotomy between rights and duties†, (Davidson, 2000, p. 12). Software producers claim that they have the right to protect the fruit of their endeavors, and have the right to be compensated for the resources spend in the development process, while consumers claim that they have the right to use a product for which they have paid and expect that the product will be free of defects. This should lead to competitively priced products with superior quality, providing value for money. 10 Copyright, Patents, and TrademarksAccording to prof. Johnson (2000) â€Å"as computing resources become more and more prevalent, computer software becomes easier and easier to access, and as such, easier and easier to copy†, (p. 124). Protection for one’s work, from a legal point of view, requires copyright, patents, and trademarks for sensible and strategic information. The best approach is to hav e a combination of trade secret protection, copyright laws, and trademark laws for the product in question because these are cheap, effective, and fast ways of protecting a software product from being pirated.Copyright Issues Copyrighted works on the net include news stories, software, novels, screenplays, graphics, pictures, Usenet messages and even e- mail. â€Å"In fact, the frightening reality is that almost everything on the Net is protected by copyright law† (O’Mahoney, 2001). Software and manuals, as novels and other literary works, are protected under copyright laws. In simple terms, this guarantees the copyright owner, the author in most cases, the exclusive rights to the reproduction and distribution of his intellectual property.Thus, copyright law guarantees the owner of the intellectual property the same types of rights that patent law guarantees the owner of an invention or other piece of seemingly more tangible physical property. Computer software and dat a are intellectual property, and as such are covered by copyright law. The problems start when people cannot, or will not, make the mental transition from physical to intellectual property. While most people would not steal books from a bookstore or a software package from a dealer's showroom, 11 ven if they knew they would not be caught, many of the same people would not hesitate copying a computer program from a demo or from their friends and colleagues. The only free software is the one places in the public domain, also known as freeware. For the rest of the software products the user must abide by the license agreements which usually come with a program and places restrictions upon reproducing and distributing the software, including such things as loaning the software to a friend or colleague and making duplicates for classroom or network use. Some licenses even go so far as to restrict use to a specific computer.In most cases, however, the user does have the right to make a ba ckup copy of the software for archival purposes. In theory, any use of a software package which falls outside of the limits of the license agreement renders the user, and quite often the user's company or institution, liable to prosecution. A computer program is defined in the copyright law as â€Å"a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result. † Copyright protection begins at the time a work is created in fixed form; no act other than creation of the work is required to obtain a copyright for the work.According to (Yoches and Levine, 1989) â€Å"the scope of copyright protection for a computer program's expression may extend beyond its literal code to the structure, sequence and organization of the program. † Another debated and important aspect of software copyright involves the use of databases, data warehouses, and other forms of data collections. Under traditional concepts of literary copyright, the data contained in a compilation, and the selection of the data, may sometimes not be protected from copying. Only the coordination and arrangement of the database may be protected, and even then there must be some originality to the collection and arrangement for it to be protected†, (Losey, 1995). 12 There are essentially three ways to legally protect computer databases: copyright, trade secret and contract. Raw facts in a database may not be protected by copyright, regardless of the time or expense that went into locating them. However, in many databases the data itself, or the particular expressions of the facts, may have been created by the author. In such cases the data has originality and can be protected.Even if the contents are raw facts, not new materials created by the author, the compilation aspects of the database (selection, coordination and arrangement) may still receive copyright protection. A trade secret is â€Å"knowledge which a person or com pany acquires through its own efforts and which has some value to it† (Losey, 1995). Typically, this knowledge is kept secret from competitors because it is felt that this information provides some type of competitive advantage. Since a computer database is a compilation that derives economic value, it is a type of intellectual property that has frequently received trade secrecy protection.Finally, the owner of a database can require that any purchaser enter into a written contract as a condition of purchase of the database. That written agreement could expressly provide that the purchaser will not disclose the content to anyone but authorized users, nor make any copies or unauthorized use of the information. Typically this takes the form of a License Agreement between the owner/licensor of the database and the user/licensee of the database. Protect your site against theft It might be useful to know that a link is a URL, a fact not unlike a street address, and is therefore not copyrightable.However, a URL list may be copyrightable under a 13 compilation copyright if it contains some originality. The Internet was created on the basis of being able to attach hypertext links to any other location on the Web. Consequently, by putting yourself on the Internet, â€Å"you have given implied permission to others to link to your Web page, and everyone else on the Web is deemed to have given you implied permission to link to their Web pages† (O’Mahoney, 2001). The two primary methods of protection are technical countermeasures and legal protection.Technical countermeasures include strategies such as digital watermarking and spiders that search the Internet for copies of your pages or graphics. These strategies tend to be difficult, expensive, and user- unfriendly. The primary vehicle for legal protection is copyright. This is by far the easiest and most popular form of protection in use today. In implementing a copyright strategy, there are three ite ms that you should consider: v Ownership: before trying to copyright your website, a clear understanding of what exactly it is considered to be copyrighted is required.There are many elements to a website, including text, graphics, scripts, data, and code. If everything was created from scratch for the website, ownership is not an issue. However, if someone else created text, or some clip art was downloaded from another website, or scanned photographs from archives were used, or a web design firm was hired to load all informational content into an attractive package, then ownership of the respective elements is shared with the original creators, unless otherwise stated in contracts and licenses. Copyright notice: it is generally a good idea to put a copyright notice on your website. It used to be that in order to be afforded any copyright protection whatsoever, one needed to put the world on notice by attaching a copyright notice to the work. While this is no longer the case, it is still customary to attach a 14 copyright notice on copyrighted works in order to be eligible for certain types of damages. The copyright notice consists of at least elements that include the copyright symbol and/or the term â€Å"Copyright†, the year of copyright, and the name of the copyright holder. Registration: register your copyright with the Copyright Office. Although the Copyright Act gives protection just for creating your work and reducing it to a tangible form, that protection proved somewhat illusory in some cases when registration was overlooked. Patents and Trademarks â€Å"A recognized brand name or trademark represents the goodwill that has been built into the product or service†, (Eldenbrock & Borwankar, 1996). Consumers tend to associate the recognized brand name or trademark with certain characteristics that are specific to that name or mark.Therefore, companies often spend millions of dollars annually for safeguarding the investment in the related in tellectual property rights. Trademark laws protect the name of the software, not the software itself. Some examples include: â€Å"Lotus 1- 2- 3†, â€Å"Apple â€Å", â€Å"D- BASE†, â€Å"WordPerfect†, and many others. Copyright protection protects the expression of an idea, not the idea itself. A patent protects the idea itself. There are two major drawbacks to patents. They take a lot of money and a lot of time (usually two or more years).Computer games are rarely patent protected because the shelf life for a game is usually no more than six months. 15 Fair Use â€Å"When the fair use doctrine applies to a specific use of a work, the person making fair use of the work does not need to seek permission from the copyright owner or to compensate the copyright owner for the use of the work†, (Lehman, 1998). The fair use is a form of limitation of the exclusive rights of copyright owners for purposes such as criticism, comments, news reporting, teaching (i ncluding the possibility to make multiple copies of a copyrighted work for classroom use), scholarships, or research.In order to determine whether the use made of a work in any particular case is not a copyright infringement, Smith’s (2001) Copyright Implementation Manual offers the following guidelines: 1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; 2. the nature of the copyrighted work; 3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and 4. the effect of the use upon the potential market for or value of the copyrighted work.The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors. Those creators and authors who wish to dedicate their works to the public domain may, of course, do so notwithstanding the availability of protection under the Copyrigh t Act. 16 Libel and Defamation â€Å"We know that as the Internet grows, there will be more and more lawsuits involving libel and defamation. † said attorney David H. Donaldson, editor of Legal Bytes, â€Å"The only question is if the number of cases will grow steadily or if there will be an explosion of lawsuits all at once. The Internet has been used to harass, slander, threat and these online activities led to arrests, successful sues (because have used netnews to slander and for delivering inappropriate screen saver images) and other forms of legal punishments. The most frequent form of libel on the Internet is flaming, defined as â€Å"the practice of sending extremely critical, derogatory, and often vulgar e- mail messages, or newsgroup postings to other users on the Internet or online services† (O’Brien, 2002, pp. 326).Famous cases of racism or defamation have turned the attention at the gaps in legislation regarding Internet crime. Sexual explicit web p ages are responsible for another stir in social awareness regarding Internet- related legal void. Sometimes even a â€Å"link to another's page could be defamatory and may subject someone to legal liability†, (INET Legal Networks, 2001), if it links to a page where offensive or illegal content is present and if you do not give strong warning to the web surfer about the consequences of his/her â€Å"click†.There are a number of features unique to the Internet that distinguish it from any other medium and have â€Å"led to the current re- examination of existing libel laws to allow for their possible evolution and ultimately their application in the cyberspace†, (Potts & Harris, 1996). These features include its global nature (more than 125 countries are linked via Internet), which raised questions about jurisdiction, repeated publication every time a 17 page is updated/viewed, and the possibility to enforce judgments.Another Internet specific aspect is its highly interactive nature, which decreases the effectiveness of later corrections, but empowers the ability to reply, which might be considered more gratifying, immediate and potent than launching a libel action. Accessibility is another feature of the Internet, which distinguishes it from traditional print or broadcast media. The relatively low cost of connecting to the Internet and even of establishing one's own website means that the opportunity for defamation has increased exponentially. Now, on the Internet everyone can be a publisher and can be sued as a publisher.Internet anonymity means that users do not have to reveal their true identity in order to send email or post messages on bulletin boards. This feature, coupled with the ability to access the Internet in the privacy and seclusion of one's own home or office and the interactive, responsive nature of communications on the Internet, has resulted in users being far less inhibited about the contents of their messages than in any other form of media. Computer Crime One of the biggest threats for the online community comes from various ways in which a computers network in general and the Internet in special might be used to support computer crime.The list of such actions is vast as â€Å"criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorism† (Sager, Hamm, Gross, Carey & Hoff, 2000) and a few of the most dangerous and common ones have already entered the general IT folklore. The Association of Information Technology Professionals defined computer crime as including â€Å"unauthorized use, access, modification, and destruction of hardware, software, data, or network resources; unauthorized release of information; unauthorized copying of 18 oftware; denying an end user access to his or her own hardware, software, data, or network resources; using or conspiring to use computer or network resources to illegally obtain information or tangible property. † Software piracy Software piracy is the illegal copying of computer software. It is also considered the computer industry's worst problem and, according to the specialists, has become a household crime. â€Å"People who wouldn't think of sneaking merchandise out of a store or burgling a house regularly obtain copies of computer programs that they haven't paid for†, (Hard- Davis, 2001).Software piracy is fought by legal means (licenses, copyright, trademarks and patents, and lawsuits, when all else fails). According to Zwass (1997), â€Å"deterrent controls (legal sanctions) and preventive controls (increasing the cost of piracy by technological means) can be used to combat software piracy. † Information technology is a key driver in the globalization and growth of the world economy. In a recent study of worldwide software market (International Data Corporation, 1999) the total worldwide package software market has been st imated at $135 billion. Worldwide expenditures on software are expected to increase to about $220 billion by the year 2002. The U. S. software industry is reaping the benefits of this hyper growth, having captured 70% of global software sales. According to (Software Publishers Association, 1998), the worldwide revenues of business- based PC applications was $17. 2 billion, but global revenue losses due to piracy in the business application software market were calculated at $11. 4 billion.This is very similar to the report of (International Research and Planning, 2001)’s Business Software Alliance (BSA), a watchdog group representing the world’s leading software manufacturers, which announced the results of 19 its sixth annual benchmark survey on global software piracy. The independent study highlights the serious impact of copyright infringement with piracy losses nearing $11. 8 billion worldwide in 2000. Figure 1 shows an interesting correlation between the national piracy rates compiled by the SPA with the per capita GNP for 65 countries in the year 1997.Higher software piracy rates are heavily skewed towards countries with low per capita GNP. The effect of GNP is much more pronounced for the countries with GNPs less than $6,000, as shown in Figure 2. Each $1,000 increase in per capita GNP is associated with a nearly 6% decrease in the piracy rate. These results indicate a significant income effect on the global piracy rates, particularly in the poorer segments of the world. The different ways of illegally copying computer software can be broken down into five basic ways of pirating. Counterfeiting is duplicating and selling unauthorized copies of software in such a manner as to try to pass off the illegal copy as if it were a legitimate copy produced by or authorized by the publisher. v Softlifting is the purchasing of a single licensed copy of software and loading it on several machines, contrary to the terms of the license agreement. This i ncludes sharing software with friends and co- workers. v Hard- disk loading is selling computers pre- loaded with illegal software. v Bulletin-board piracy is putting software on a bulletin- board service for nyone to copy or copying software from a bullet in- board service that is not shareware or freeware. v Software rental is the renting of software for temporary use. An interesting study regarding software piracy in academic environment was conducted at the Faculty of Business at the City University of Hong Kong (Moores & 20 Dhillon, 2000). A total of 243 usable responses were received, of which 122 were female and 121 were male. As shown in Figure 3, 81% of the respondents report they buy pirated software on a regular basis, with a significant minority (29%) buying every month, and 3% even reporting they buy several times a week.The most popular pirated software bought was spreadsheets, followed by programming languages, databases, word processors, and statistical packages. Oth er software mentioned included e- mail, graphics, and game software. Only 7% claim to have never bought pirated software. Illegal Information The Internet was designed as an inherently insecure communications vehicle. This allowed an impressive number of security gaps that led to numerous hacking techniques. Probably the most famous one at this moment is the denial of service attack, that led to the shutdown of many famous Internet sites, including Yahoo! , eBay, Amazon, and CNN.Other hacking tactics include spoofing (faking an web page to trick users into giving away critical information), Trojan horses (programs that are planted on user’s machine without his knowledge), logic bombs (instructions in computer programs that triggers malicious acts), and password crackers. According to Givens (2001), â€Å"Identity thieves are able to shop online anonymously using the identities of others. Web- based information brokers sell sensitive personal data, including Social Security n umbers, relatively cheaply. † In December 1999 300,000 credit card numbers were stolen from the online music retailer CD Universe database.That’s way it is considered a federal crime to possess 15 ore more access devices like cellular activation codes, account passwords, and credit card numbers. 21 Beside the theft that these kinds of devices enable, such actions lead to loss of trust from customers to such services that have been the target of hacking. It is also illegal in many states to have pornographic related material on your machine, and in some cases mere possession of child pornography is punishable by many years in jail. As mentioned before, possession or export of certain types of cryptographic techniques is a very serious federal crime.AMA Code of Ethics of Marketing on the Internet â€Å"All professionals find a code of ethics is useful to guide them through the sometimes thorny issues that confront them† (Klampert, 1998). Codes of ethics are an orga nized, written set of rules that describe expected behaviors. There are many such codes in Information Systems (ACM, IEEE, British Computer Society), but none of them has overall recognition. Most institutions that provide Internet access have formulated policies and procedures regarding the fair use of their facilities.The most frequent policies are grouped under the following categories: a Code for Ethical Computer Use (usually a written policy an institution has developed to describe ethical use of their computer system), an E- mail Privacy Policy, and an Internet Access Policy. One of the most representative such codes for the Internet community is the one that has been imposed by the American Marketing Association for its members. Below there are a few of the most interesting requirements, as they can be found in the latest edition of (AMA, 2001) Code of Ethics for Marketing on the Internet: 2 Adherence to all applicable laws and regulations with no use of Internet marketing th at would be illegal, if conducted by mail, telephone, fax or other media. Organizational commitment to ethical Internet practices communicated to employees, customers and relevant stakeholders. Information collected from customers should be confidential and used only for expressed purposes. All data, especially confidential customer data, should be safeguarded against unauthorized access. The expressed wishes of others should be respected with regard to the receipt of unsolicited e-mail messages.Information obtained from the Internet sources should be properly authorized and documented. Marketers should treat access to accounts, passwords, and other information as confidential, and only examine or disclose content when authorized by a responsible party. The integrity of others' information systems should be respected with regard to placement of information, advertising or messages. Conclusions This R paper gives a general overview of the most debated ethical issues related to the us e of Internet and their implications for managers and business practice.However, there are several other less critical aspects that should be considered by a very thorough revision and some very interesting papers on these subjects are listed in Appendix C. These aspects include unauthorized use of computer resources at work, accessing individuals’ private e- mail and telephone conversations and computer records by the companies they work for and other forms of computer monitoring, challenges to 23 work conditions and individuality that are brought about by computer systems, mistaken computer matching of individuals, and many, many more.To protect themselves and the people they work with, information professionals need to be as professional as they can be and, sometimes, must decline a project if clients insist that they do something they have moral objections about. Ethical considerations are inherent for any IT professional. Moral behavior, including acting with integrity, increasing personal competence, setting high standards of personal performance, accepting responsibility for your actions, avoiding computer crime, and increasing the security of computer systems developed are just a few of many such considerations.Overall, I believe that there is a critical need for heightened debate on professional ethics in Information Systems. 24 Appendix A Figure 1. Per capita GNP and piracy rates. Figure 2. Piracy rates and per capita GNP less than $6000 25 Figure 3. Frequency of pirated software. 26 Appendix B Cited Works 1. Choi, S. – Y. & Whinston, A. B. (2000). The Internet Economy: Technology and Practice. Austin, TX: SmartEcon Publishing. 2. D’Ambrosio, J. (2000,. January). Should â€Å"Junk† E- mail Be Legally Protected? [online]. Available: http://www. fmew. com/archive/junk/. October 26, 2001). 3. Davidson, Robert (2000, April). Professional Ethics in Information Systems: A Personal Perspective. Communications of the AIS, Vol. 3, Article 8. 4. Elbel, F. (2001, October 23). Junk E- mail and Spam. [online]. Available: http://www. ecofuture. org/jmemail. html. (October 26, 2001). 5. Elderbrock, David and Borwankar, Nitin. (1996). Building Successful Internet Businesses: The Essential Sourcebook for Creating Businesses on the Net. Foster City, CA: IDG Books Worldwide. 6. Ferrell, O. C. , Leclair, D. T. , & Fraedrich, J. P. (1997, October).Integrity Management : A Guide to Managing Legal and Ethical Issues in the Workplace. O’Collins Corp. 7. Givens, Beth. (2001, March). A Review of Current Privacy Issues. [online]. Available: http://www. privacyrights. org/ar/Privacy- IssuesList. htm. (October 26, 2001). 8. Hard- Davis, G. (2001, March). Internet Piracy Exposed. Alameda, CA:Sybex. 27 9. INET Legal Networks (2001). Defamation – Law for Internet [online]. Available: http://www. lawforinternet. com/subject_defamation. php3? searchkys=defamation =topdefamation. html. (October 26, 2001). 10.Internationa l Data Corporation (1999, February 10). Distribution of Worldwide Software Revenues Vary Dramatically [online]. Available: www. idcresearch. com/Press/default. htm. (October 26, 2001). 11. International Research and Planning. (2001, May). Sixth Annual BSA Global Software Piracy Study. [online]. Available: http://www. bsa. org/resources/200105- 21. 55. pdf. (October 26, 2001). 12. Johnson, Mark B. (2000, January). Software Piracy: Stopping It Before It Stops You. Proceedings of the sixteenth ACM SIGUCCS Conference on User Services. pp. 124- 131. 13. Klampert, Elizabeth (1998, July 13).Business Ethics for Information Professionals. Proceedings of the AALL 1998 Conference on Independent Law Librarian Program, Anaheim, CA. 14. Lehman, B. A. , (1998). The Conference on Fair Use: final report to the commissioner on the conclusion of the Conference on Fair Use. Washington, DC: Office of Public Affairs U. S. Patent and Trademark Office. 15. Losey, Ralph C. (1995). Practical and Legal Protec tion of Computer Databases [online]. Available: http://www. eff. org/Intellectual_property/database_protection. paper. (October 25, 2001). 16. Miller, M. J. (2001, February 6).Bush’s Privacy Plan. PC Magazine, Vol. 20, No. 3. 28 17. Moores, T & Dhillon, G. (2000, December). Software Piracy: A View from Hong Kong. Communication of the ACM, Vol. 28, No. 10, p. 88- 93. 18. O’Brien, J. A. (2002). Management Information Systems: Managing Information Technology in the E- Business Enterprise. New York, NY: McGraw- Hill. 19. O’Mahoney, B. (2001). Copyright Website [online]. Available: http://www. benedict. com/digital/digital. asp. (October 26, 2001). 20. Potts, David & Harris, S. (1996, May 16). Defamation on the Internet [online]. Available: http://owl. nglish. purdue. edu/handouts/research/r_apa. html. (October 26, 2001). 21. Resnick, P. & Miller, J. (1996). PICS: Internet Access Controls Without Censorship. Communications of the ACM, Vol. 39, No. 10, pp. 87- 93. 22. Sager, Ira, Hamm, Steve, Gross, Neil, Carey, John and Hoff, Robert. (2000, February 21). Business Week. 23. Smith, Steve. (2001, May). Copyright Implementation Manual [online]. Available: http://www. groton. k12. ct. us/mts/cimhp01. htm. (December 1, 2001). 24. Software Publishers Association (1998). SPA's Report on Global Software Piracy [online]. Available: www. pa. org/piracy/98report. htm. (October 26, 2001). 25. Weinberger, J. (1997, March). Rating the Net. Hastings Communications and Entertainment Law Journal, Vol. 19. 26. Yoches, E. Robert & Levine, Arthur J. (1989, May). Basic principles of copyright protection for computer software. Communications of the ACM Vol. 32 No. 5. pp. 544. 27. Zwass, Vladimir. (1997, Spring). Editorial Introduction. Journal of Management Information Systems, Vol. 13, No. 4, pp. 3- 6. 29 Appendix C Bibliography 1. American Marketing Association (2001). Full Text of the AMA Code of Ethics [online].Available: http://www. ama. org/about/ama/fulleth. a sp. (October 26, 2001). 2. Berman, J. & Weitzner, D. (1995). User Control: Renewing the Democratic Heart of the First Amendment in the Age of Interactive Media. Yale Law Journal, Vol. 104, pp. 1619. 3. BRINT Institute. (2001). Intelectual Property: Copyright, Trademarks and Patents. [online]. Available: http://www. brint. com/IntellP. htm. (October 26, 2001). 4. British Computer Society. (2000). British Computer Society Code of Practice [online]. Available: http://www. bcs. org. uk/aboutbcs/cop. htm. (November 30, 2001). 5. CETUS. (1995).Fair Use: A Statement of Principle [online]. Available: http://www. cetus. org/fair4. html. (December 1, 2001). 6. Cheng, H. K. , Sims, R. R. , and Teegen, H. (1999, Spring). To Purchase or to Private Software: An Empirical Study. Journal of Management Information Systems Vol. 13, No. 4, p. 49- 60. 7. Gopal, R. D. , & Sanders, G. L. (1997, Spring). Preventive and Deterrent Controls for Software Piracy. Journal of Management Information Systems Vol. 13 No. 4. pp. 29- 47. 30 8. Hinman, Lawrence M. (2001, September 15). Ethic Updates [online]. Available: http://ethics. acusd. edu/index. tml. (October 25, 2001). 9. Jamison, B. , Gold, J. & Jamison, W. (1997). Electronic Selling: 23 Steps to ESelling Profits. New York, NY: McGraw Hill. 10. Lending, D. & Slaughter, S. A. (2001, April). Research in progress: the effects of ethical climate on attitudes and behaviors toward software piracy. Proceedings of the 2001 ACM SIGCPR conference on Computer personnel research. p. 198- 200. 11. Limayem, Moez, Khalifa, Mohamed , Chin, Wynne W. (1999, January). Factors Motivating Software Piracy. Proceeding of the 20th international conference on Information Systems, p. 124- 13. 12.Scott, Thomas J. , Kallman, Ernest A. , Lelewer, Debra. (1994 November). Ethical Issues Involving the Internet. Proceedings of the conference on Ethics in the computer age. pp. 31- 32. 13. Thong, J. Y. L. , & Yap, C. – S. (1998, Summer). Testing and Ethical Decisi onMaking Theory: The Case of Softlifting. Journal of Management Information Systems Vo. 15, No. 1. pp. 213- 237. 14. U. S. Department of Energy Computer Incident Advisory Capability Information Bulletin. (1998, March 12). Internet Cookies. [online]. Available: http://ciac. llnl. gov/ciac/bulletins/i- 034. shtml. (October 26, 2001). 31