.

Wednesday, July 31, 2019

Cyber Terrorism and Information Warfare

As the use of computer technology becomes wide, people have tended to use them both for beneficial and destructive purposes. As the use of computer technology becomes more, they continue to be used for more complex and inter-reliant threats to humanity. The use of computer technology for destructive purposes takes place in the form of cyber crime, cyber terrorism and information warfare. The focus of this paper is on cyber crime and information warfare. The two have a number of similarities as well as differences.They are both applications of computer and information technology that are in use in the society in the information era. Information has been relied upon in different sectors in different countries and around the world. This has made information a very powerful tool for the economy of many countries. Information has also become a target for criminal activities like terrorism and a target to wage war (Lewis, 2002). This paper discusses the similarities and differences between cyber terrorism and information warfare. The paper begins with the description of the two concepts. Cyber terrorismCyber terrorism is the use of computing resources to engage in terrorist activities. It can also be defined as the calculated use of computers or computing networks aimed at harming, or to further social, economical, political or ideological, or such goals. People have tended to use the secrecy afforded by cyberspace to wage terrorism activities towards communities or an entire country. This has tended to cause threat and panic to people without physical presence of the attacker. The terrorists using cyberspace target computers and information to cause harm and damage to the targeted group or nation.There have been claims by some factions of scholars that cyber terrorism does not exist and that what is referred to by the use of this term is information warfare. They feel that it is not possible to use computer technology to wage serious harm or damage in a population d ue to the availability of protective technology. However, it is a fact is that cyber terrorism is a concept that is applicable in the current world of technology (Brenner, 2006). Information warfare Information warfare on the other hand is defined as the use of computer technology to wage war.It can also be defined as the use and management of information and technology in order to gain a competitive advantage over one’s adversaries. Information can be manipulated in various ways to ensure that one country gains an edge over its opponents. Information has become a very crucial tool for use in different aspects of human life. Information has come to be used as a powerful weapon in times of clashes or conflicts. This warfare is closely associated with psychological warfare. The attacking country targets the information sector of the country that it is up against (Lewis, 2002).Similarities Both cyber terrorism and cyber warfare make use of information technology and/ or networks to carry out their objectives. Regardless of their difference in objectives, information is a critical tool for both cyber terrorism and information warfare. Information warfare can be carried out in different ways: jamming or hijacking of TV and radio transmissions; disabling logistic networks; disabling or spoofing communication networks of the enemies; and sabotaging stock exchange dealings (Lewis, 2002). These are all means of use of information in warfare.Cyber terrorism can also take various forms like attacks against networks of the target group or country; threats against a community or country that are made electronically; hacking into systems; defacing networks; and denying service to the target group. It is clear that both are destructive applications of computer and information technology. The users of both cyber terrorism and information warfare use and go after the information sector of the target group or country with the aim of causing havoc (Brenner, 2006).Both cyb er terrorism and information warfare are destructive, but have not been developed to the level of destruction like the other weapons, such as the bomb. The kind of damage caused by cyber terrorism and information warfare is not large-scale, although the technologies are still being developed. It would not be possible to carry out such a destructive act like the one that happened in the United States, commonly known as the September 11 attacks (Che, Deng, Chao & Huang, 2009).Despite the fact that there are some remote examples of cyber terrorism and information warfare in the world today, they are not as pronounced as those that use the conventional weapons like bombs. All the examples and instances that are provided on the use of information for warfare and terrorism cannot compare with the use of methods like bombing, air planes and other convectional methods. However, the possible destruction that is likely to happen due to the development in technology cannot be ignored. The two concepts, cyber terrorism and information warfare are based on computer and information technology.It is a known fact that technology is developing at a very speedy rate. As a result, the technology applied in both cyber terrorism and information is not the same way it was when the two concepts were developed. It is also a fact that they are likely to be more complicated and destructive. While most countries there are development of cyber warfare capabilities, there are individual factions and groups that are developing cyber terrorism capabilities (Che, Deng, Chao and Huang, 2009). Both cyber terrorism and information warfare are destructive processes that can cause terror and damage in a place or country where they are applied.Despite the fact that cyber terrorism is not likely to cause the kind of destruction like what took place during the September 11 attacks, they are likely to cause a security scare to the public. For example, it is possible for hackers to wage terrorism atta cks by hacking into hospital systems (Brenner, 2006). Another way that this can be carried out is by launching sequenced, coordinated attacks shutting down Automatic Teller Machine systems and other financial systems in selected towns or cities.When this is carried out in a large-scale, it can be realized that this is not a random act, but an organized terrorist attack. This can lead to panic about the security and economic damage to a country. Same case with information warfare; despite the fact that unlike cyber terrorism information warfare is not aimed at harming civilians and properties, it leads to both direct and indirect effects to countries they are aimed at and their citizens. Just like cyber terrorism, information warfare causes panic on the public as well as other economic effects on the country (Collin, 1996).For example, where transmissions are hijacked to pass on hate information or other destructive information, it is possible for people to be very scared for their s ecurity. Attacking economic sectors using information technology during war or as a weapon endangers the economic status of a country. In fact, paralyzing the information sector of a country leads to massive economic costs to that country. This means that these two applications of computer and information technology are very destructive and costly to the affected country (Lewis, 2002).Both cyber terrorism and information warfare are complex problems that need to be addressed very first in national security policies. They are becoming more sophisticated and require sophisticated means to counter. They are both attacks that can paralyze the infrastructure of a country completely. The use of information for terrorism and warfare is based on the premise that information has become a very crucial resource in development and has been relied upon by countries and organizations in their daily operations (Collin, 1996).The attackers have come to realize that the best part to hit and raise ha voc is the information technology sector. The information technology sector has become the most vulnerable point that can be hit to feel the greatest effect. Studies have found out that susceptibility of information networks and the critical infrastructure have put national security in dire risk. This can be supported by the fast growth in technology and its spreading to the economic sector of many countries. This is usually the target of cyber terrorism and information warfare.The users of these two applications of computer technology targets where a country will feel the most effect when hit. This is no better than the information sector of their target (Brenner, 2006). It is easy to spot real-world terrorism just as it is to spot real-world warfare. When dealing with real-world acts, terrorism or warfare is easier to identify, thus making it easier to counter. Where a real-life attack is carried out it is possible to know that the government is either dealing with terrorism or wa rfare. Simply put, it is easy to identify terrorism or warfare in the real-world.This is not the case with cyber terrorism or cyber warfare. Where these takes place, it is not possible to immediately identify what one is dealing with. There are no people who are physically available to carry out the acts. When a real-world terrorist attack is carried out, there will be a suicide bomber who hijacks a plane or bombs a building. In real-world warfare, there are military personnel with characteristic attire and characteristic badge. This way, it will be possible to tell that it was a terrorist attack or war against a particular group or country.This is not the case with cyber terrorism and information warfare (Lewis, 2002). The activities are carried in secrecy and most of the times unless someone claims to be involved, it might be difficult to identify the perpetrators. In case of information warfare, it might be hard to identify the country involved in the attacks. It is then possible that a country could be a target of cyber terrorism or information warfare and not even be aware of it. The two applications are complex and cannot be easily identified and dealt with (Che, Deng, Chao & Huang, 2009). DifferencesThe primary focus of information warfare is not to inflict injuries or death to civilians and property. Information warfare is not aimed at demoralizing or intimidating civilians. Cyber terrorism is aimed at the achievement of a particular objective. This is done mostly through intimidation and any other means as long as the message is communicated. Injuring people, causing death, and damaging property is one of the ways used to communicate the message. They achieve their objectives by destroying as much life and property as possible. Cyber terrorists do not mind the lives that will be lost or the damage that will be caused in the process.For instant, the terrorist attacks in Romania. This happened at an Antarctic research center where terrorists accessed th e computer resources that controlled life support systems. In the process, the lives of 58 scientists were put in danger (Kalathil & Boas, 2003). However, the perpetrators were stopped before a serious harm was caused. Terrorism generally is a destructive act that is carried out for selfish purposes, while information warfare is an act that is aimed at protecting a country from destruction by its enemies (Lewis, 2002).Information warfare is legal and mostly designed by the ministry of defense as a weapon of defense to a nation in time of war. As already mentioned, it is the use of technology to gain competitive advantage over the opponents. This means that it is not an illegal means of attack, like cyber terrorism. Most of the time, information warfare is carried out by the conventional military force. There are for example some nations that have trained or are training people who are referred to as hacker warriors. These hacker warriors are used in time of war to wage attacks again st enemy nation-states.Cyber terrorism on the other hand is dangerous and unlawful attacks towards a target group to further some selfish objectives. Cyber terrorism is carried out by people who are part of a faction that is united by an obligation to a particular political philosophy. The distinguishing factor from cyber terrorism is that war is a struggle between countries or nations states (Che, Deng, Chao & Huang, 2009). Information warfare is meant to be a collateral event. This means that the information attacks are aimed at protecting one’s country and its citizen.During war, the aim of the fighters is to protect one’s country and its people from adversaries. This means that the objective of information warfare is very different from that of cyber terrorism. In most cases, cyber terrorism is not a collateral event. It is used for selfish objectives of the attacking groups. It is also important to note that most of the times cyber terrorism is not initiated by la wful combatants. This means that the perpetrators do not operate legally as is the case during war (Brenner, 2006).Cyber terrorism is aimed at causing damage and harm to a target group for a particular objective of the attacking groups. Some of the objectives of cyber terrorism include ideological, political, religious, and in some cases economical. Unlike in cyber terrorism, war is restricted to attacks between groups (armies) who act on behalf of their countries in the war. The use of technology in this case is aimed at the army or armies of the enemy nations. In warfare, the use of information is rational and justifiable, unlike the use of terrorism attacks where the acts are irrational and cannot be justified (Lewis, 2002).Cyber terrorism is basically one-sided. This means that in most cases cyber terrorism cannot be reciprocated. In most cases, its anonymity characteristic makes it hard to find out the perpetrator(s). Cyber terrorism is aimed at a specific population to further the objectives of the attacker. On the other hand, information warfare is aimed at attacking adversaries. This means that unlike cyber terrorism, it is aimed at triumphing against one’s enemies. It is used against opponents during war and is just limited to that purpose (Che, Deng, Chao & Huang, 2009).Conclusion This aim of this paper was to make a comparison and contraction of the two concepts that apply information computer technology, cyber terrorism and information warfare. The two concepts differ in definition because while cyber terrorism is the use of computing resources to engage in terrorist activities, information warfare is defined as the use of computer technology to wage war. These concepts have a lot in common, from being based on computer technology, to the kind of effects they are likely to cause to a country and its people.They are both destructive effects of information and computer technology. They are however different from their motive, to the kinds of p eople who carry out the attacks. While cyber terrorism is an unlawful act aimed at causing intimidation in achievement of different objectives, information warfare is a lawful activity carried out by military personnel aimed at coming out victorious over opponents. These two activities have led to a security scare around the world due to the effects that they lead to. They are concepts that are supposed to be address in national security policies as a matter of urgency.Despite the fact that they have not become so open in the society today, with a few remote cases being reported, with the development in technology and over reliance on technology in different sectors, it is possible that they will increase. There is need to develop more sophisticated technologies to counter this. References: Brenner, S. (2006). C3: Cyber crime, cyber terrorism and cyber warfare. Retrieved on May 11, 2010 from http://cyb3rcrim3. blogspot. com/2006/06/c3-cybercrime-cyberterrorism and. html Che, H. , De ng, D. , Chao, H. & Huang, Y. (2009).â€Å"Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears,† Journal of Universal Computer Science, vol. 15, no. 12. Collin, B. (1996). The future of cyber terrorism. Paper presented at the 11th Annual International Symposium on Criminal Justice Issues, University of Illinois at Chicago. Kalathil, S. & Boas, T. (2003). Open networks, closed regimes. Washington DC: Brookings. Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Washington DC: Center for Strategic and International Studies.

Pressco Case Study Essay

In reviewing the proposal presented by Pressco, Inc. to provide new mechanical drying equipment at a cost of $2.9 million I have considered the cash flow implications of the purchase in terms of present value of the investment and estimated resulting savings, as well as possible alternatives to purchase, and the current political climate as it affects the business issues of taxation and energy policy. Following this review, it is my recommendation that we enter into a contract for the purchase of the equipment in question before the end of the year for the following reasons. Currently, our tax rate is not particularly favorable. We have experienced some small reductions in the late 1970’s, however the introduction of Supply-Side economics into mainstream policy indicates more favorable rates as rumored are on the horizon, making this a better time to spend money and reduce our taxable income. The projected cost savings will not begin until we are likely to be benefitting from a more favorable tax rate, letting us make more money when it costs us less in terms of taxation. We are spending when spending is cheaper and making more money when making money is cheaper as well. I have provided additional detail on the options and my rationale below. Assessment of Investment Cash Flows: Assuming purchase of the equipment for cash, at a total cost of $2.9 million, there are several possible scenarios to consider: tax and depreciation rates remaining as they are or changing and the loss or continuation of the Investment Tax Credit (ITC). Without providing an excess of detail here, those scenarios include: a possible tax rate decrease from the current level of 46% to 34%, possible extension of depreciation to 7 years, and the possible repeal for the ITC tax credit, as well as the possibility of â€Å"Grandfathering† the last two options. Additional detail on these calculations and the possible permutations considered is available in Appendix A. To summarize my findings, purchase options resulted in net present values ranging from $1.4 million to $1.9 million for a return on our investment over the next 10 years. Assessing the likelihood of each option and assigning weight to each possibility is an inexact science, but I believe it in unlikely that in the current political climate we will not see both a reduction in the tax rate and an increase in the length of time over which we are required to depreciate capital assets. I have assigned weights  to each option with this in mind, and have come up with an average weighted estimate of the net present value of the investment of: $1.7 million. Alternatives to Purchase: As opposed to purchasing new equipment, we could opt to maintain the equipment we currently have, which has an estimated service life of 11 years remaining. We could retain all of our claimed Investment Tax Credit for this purchase, which has two years of depreciation left, and would not be required to invest in any new training for our employees. We would recognize $31,000 in depreciation in present value terms, as well as save an estimated $200,000 in training costs and losses due to lower production during the â€Å"learning curve†. I estimate these savings to be approximately one month of payroll to include both the time spent on training, and our reduced production as employees learn how to use the new equipment. Additional detail of this option is provided in Appendix B, C, & D. In conjunction with keeping the existing equipment, we would have the opportunity to make a different investment with the $2.9 million. Current Taxation Environment: The current Congress and Presidential administration have made a number of changes to the business environment through taxation and associated regulations in the past several years. As such, it is important to consider as many likely and reasonable options as possible when evaluating the effects of taxes on capital purchases. With the election of President Regan, the previously more fringe notion of Supply-Side Economics has begun to be implemented, starting first with the Economic Recovery Tax Act of 1981, which in addition to other business incentives, accelerated depreciation for capital expenditures to 5 years. This provision was repealed the following year as part of the Tax Equity and Fiscal Responsibility Act of 1982. We saw the back & forth over reducing tax rates and providing spending incentives to businesses again with the failed Tax Reform Act of 1983 which ultimately was rolled into the Tax Reform Act of 1984. It has become clear that the one thing we do know about the future situation of business tax is uncertain. Because of the strong bias of the current Presidential administration towards lowering tax rates, I believe that it is likely we will experience a certain degree of relief in that area. However, it is more important than  ever at this time that we not depend to heavily on benefits derived from more favorable tax treatment. As such, it is in our interest to also determine if a given project will produce a positive financial result, even in less favorable taxation scenarios. Fuel Efficiency Considerations: Of the $560,000/year savings Pressco, Inc. has estimated we will enjoy as a result of purchasing their equipment, $360,000 (or 64%) is allocated to fuel-efficiency. Therefore, we must closely examine the current climate surrounding fuel efficiency. There are two components to considering the effect of fuel economy: the possibility of future tax incentives and/or penalties for fuel efficiency in manufacturing, and the price of fuel. The most likely scenario for tax incentives to increase fuel efficiency will be in the form of credits for purchases, which through buying now we will likely not be able to take advantage of. Penalties for higher fuel consumption may be levied at a point in the not-too-distant future as the Federal Government strives to both more comprehensively address environmental concerns, and regulate the price of fuel. We saw both of these in The Energy Policy and Conservation Act of 1975, and with the Highway Revenue Act of 1982, which temporarily increased the gaso line excise tax by $0.05 (an increase from $0.04 to $0.09). The Energy Policy and Conservation Act of 1975 established reserves of crude oil and gave the President the authority to order maximum domestic production as well as rationing and conservation measures in times of crisis. This is important because these measures are clear indicators of the interest the Federal Government is taking in reducing and stabilizing fuel prices. When looking at the history of fuel prices, I see that we are in a period of unusually high prices. It is of critical importance that we evaluate the likelihood of prices remaining this high for the life of the equipment in order to consider how much of the $360,000/year savings is credible in the long-term. From 1948 through the 1960’s, the price of crude oil was fairly consistent with the price of inflation, but in 1973 as a result of the oil embargo, crude oil prices increased four-fold. Prices remained fairly stable at this level through the rest of the decade, increasing three-and-a-half-fold again with the war in Iran again disrupting production. Most recently, OPEC has been  unsuccessful in setting production quotas low enough to stabilize prices, and they have again begun to drop. While we cannot expect prices to drop back to their 1971 levels, it is wise to examine the effect of lowered fuel prices on the overall investment value. Reducing the savings attributed to fuel efficiency by 25% ($270,000/year) reduces the weighted average net present value of the investment to $1.5 million, and reducing those savings brings the net present value to $1.2 million. Still arguably viable, but less attractive. See Appendix E & F for additional detail. Conclusion: While the savings proposed by Pressco, Inc. may not be as great as anticipated by their marketing representative, we are still in a strong position to make this purchase with cash available and take advantage of the cost savings. Even if the savings attributed to fuel efficiency are  ½ of what is projected, the equipment will still provide an investment value of over $1 million in excess of the purchase price. Additionally, even if our tax rate were to stay the same, we would continue to realize financial benefits, making this investment one that is based o more than mere speculation or salesmanship.

Tuesday, July 30, 2019

Handwriting Analysis Essay

As the World’s Economy drops down, the need for jobs has rapidly increased over the years, but how do employers tell a hardworking potential from a lazy couch potato? In resumes anyone can write anything, so how do people tell the truth from a lie? In the world of businesses, the secret lies in the hands of the employees. Some employers decide to trust the resume as it is, while others choose another notion. A number of bosses have chosen to â€Å"read† their potential employees’ handwriting to understand their personality. The applicants perform a simple test. Then, people who are known as graphologists study the handwriting to uncover information about that certain person. Graphologists do not always just study a person’s handwriting. They study it and develop ways so that it is possible to uncover more information about the brain and its mysteries. Handwriting, is sometimes seen as a â€Å"blueprint to the brain† because it has been discovered to show one’s values and personality, which gives hope to the scientists around the world that the seclusive mass in the skull’s secrets can be unlocked and, maybe, be shared with the public. Handwriting analysis is an art that is used to figure out a person’s traits and characteristics. Nowadays, anyone can click on a website that shows all the rules and guidelines to become a handwriting analyzer. They then claimed that â€Å"anyone can understand their personality,† but analyzing does not mean understanding, it means discovering. So how can one understand their personality? There is always a beginning to start an end. In the history of handwriting analysis, it first started with the Emperor Nero. As everyone knows, he was paranoid and a tyrant. He had said that every letter sent to him had to be studied by an expert to see if the sender was an enemy or not. Thus graphology took it’s first flight. However, the first book about graphology was created by a scientist, Alderius Prosper about 1619. Later, in 1622, a medicine professor named Camillo Baldi created a composition about handwriting analysis. It was called â€Å"How to Know the Habits and the Character of a Person From His Letters†. Later, in 1871, another scientist named Jean Hippolyte Michan officially called the study â€Å"graphology† and created the system and rules that now help graphologists in their work around the world. Before this time, there was not much progress that helped  graphology and handwriting analysis. In 1880 – 1883 there were three German psychi atrists, Dr. George Meyer, Dr. Wilhelm Preyer, and Dr. Ludwig Klages. They all examined graphology and pointed it to a psychological turn. Around 1897 – 1927, the Germans and the Americans were having a race to see which country could establish a theory about graphology first. It ended in 1908, when the Germans scientists created the German Graphological Society. Finally in 1927, Louise Rice created the American Graphology Society. Until the time Louise Rice came along, no one in America had known what graphology or handwriting analysis was. In 1952, Klara Roman experimented with muscle tension by making a machine that could measure the pressure of the hand as it drags a writing utensil around the paper. After creating the machine device, she used it to experiment on little children’s handwritings. Then in 1955, Klara Roman and George Staemphli invented a chart that is now called the Graphological Psychogram. It puts different variables in order for an experiment which then they plotted them on the chart. For example, they would add more sleep or bring in moody people. Later, a New Yorker with the name Daniel Anthony refined the psychogram to be more accurate. When people look closely at their own handwriting, they can see that all handwriting is different and that they have their own styles. However, what most people do not realize is that they are not all unique. Instead, each handwriting has adopted a different aspect of a style. Say, there is a face. Each piece, or feature, of the face can change, but it is still the same feature. The only other difference that feature shows to other feature is their appearance. Such as it is with handwriting, each â€Å"feature† may look different, however, it is still the same. It is inevitable and can never be changed. According to dailymail.co.uk, no matter what method, formula, or any idea used to teach calligraphy, it does not affect the pupil’s handwriting. There are many â€Å"features† to handwriting that makes a handwriting unique. Such as, the handwriting’s size, spacing, signatures, shape, and etcetera. The size of one’s handwriting can be varied at times, but there is always a specific size that your hand would write into. Some people naturally have large handwriting, which can be greater than seven millimeters. A medium sized script can tend to be four to six millimeters long while a small sized font can be less than three millimeters. Also, the  spacing of one’s calligraphy can be managed as well, however, many people have never cared enough to keep their spacing even. Spacing can be determined by how far their words are from each other. Sometimes, the spacing of the words can be as far as a finger widths apart or one to two millimeters apart. The spacing can affect many parts of your handwriting. Such as it is with the signatures. The signature can be extremely hard to write or one of the most simple tasks. Whichever way it is, there is only one simple difference between them: if it is legible or illegible. That is the only difference for the signatures of one’s writing. The shape of one’s manuscript is one of the biggest differences between handwritings. They could be circular shaped, jagged points, curled, or looped. The possibilities of the different aspects can be endless. These are the different styles of one’s personal handwritings. Just like handwriting, there are many different types of personalities. However, most personalities are made up of character traits that are joined together to create one identity. Personalities are how we act or react to our daily lives. It is what links our actions and our thoughts together in what we call an attitude. There are many different types of personalities that contrast each other, but on the contrary, some tend to be alike. There are generally placed into four groups. These groups can be summarized as four characters from the Hundred Acre Woods in the Disney cartoon â€Å"Winnie the Pooh.† The Tigger, the Rabbit, the Eeyore, and the Pooh bear. The Tiggers tend to be enthusiastic, nice, the happy-go-lucky open, and more approachable. Meanwhile there is the Eeyore personality. These Eeyore people tend to be sullen, and often in a corner ignoring everybody. They are not lonely or sad, but it is that they like being alone and that it is just their nature to be alone. Even though they are solitary, they are also observant. Eeyores take in their surroundings and let everything unravel as they sit and do nothing. The Rabbit people, however, are very mismatched from the Tiggers and the Eeyores. The Rabbit people are the born leaders and they take responsibility when their is no one to take charge. They are ambitious and persevere to complete a task. They can sometimes become very bossy at times and Lastly, there is the Pooh bears. They are the most caring and friendliest of the groups. Pooh bears tend to be a people pleaser  even if they have to suffer for it. However, they enjoy to be uncomfortable if everyone is comfortable too. They tend to be the very nice people and sometimes gullible. Now these are only groups that personalitees can fall into. Though, there can be a mix of two or more groups to create a different identity. Handwriting used to be seen as an innocent tool to communicate with a pen and paper. Now, scientists have uncovered that not only does handwriting tell you moods and values, it can tell about your personalities. There is a key or a system, created by Jean Hippolyte Michan that can tell about different attributes. Meaning, with each â€Å"feature† of handwriting, there is a personality trait that matches up with that feature. A large sized handwriting symbolizes an outgoing trait in that person. A wide space between the words mean that the person prefers being alone rather that being with other people. However, there is a variable that can change. When you have a mood change, you can write differently than usual. For example, if you are happy you write contrasting how your handwriting would look when you are sad. So it can change depending on your mood. It can grow bigger, tilt more to the left or right, or become more messy. Another aspect that can affect your calligraphy is y our self-esteem. Your self-esteem is what your perspective is of yourself and what kind of person you think you are. It can constantly change it can only do so if a person thinks of themselves as a higher or lower being. For instance, a person with a higher self-esteem would look different if that same person had a lower self-esteem. Mainly though, one’s handwriting would differ the most depending on if the writer is conscious of his or her piece or not. Consciously writing would mean that the writer is writing and paying attention as he/she drags the writing utensil across the paper. Unconsciously means that the person knows that he is writing, but does not pay attention to how it looks. Such is the case when it comes to handwriting analysis, the main difference between unconsciously writing and consciously writing is that when you do not pay attention to how you write, the font tends to be messier, bigger, and less accurate than how it would be if you were consciously writing. There is a great significance to handwriting to handwriting analysis.  Handwriting Analysis is an art that is occasionally practiced by the police and used to see a what kind of person someone by trying to uncover your personality. It can also tell what mood a person is whether your happy or sad. A happy person tends to have bigger handwriting. It can also determine what a person’s values are. They can see your morals or beliefs depending on what they are looking at. There are many styles of handwriting, and it is possible that it would lead to a personality trait that would describe you. This is the importance of handwriting analysis. Handwriting analysis took a slow and long journey to be able to be what it is now. From the year 54 AD to the twenty-first century, it had progressed into a flourishing study that is researched by young and old. The style of a handwriting is the heartbeat of the whole study. With many different attributes that constructs themselves into different fonts, they all look very different. Like handwriting styles, there are different character traits that makes up one gigantic personality. However, with each â€Å"feature† of a certain handwriting, there is always a personality trait that is matched up with that â€Å"feature.† As said before, one can know their personality, but many can not understand it, so how can one be able to understand his/her personality? As many struggle to become one with themselves they begin to have doubts growing in them and soon they are confused. However, there is conviction that a person can understand their personality. Works Cited Page Lowe, Sheila. â€Å"What Does Your Handwriting Say About You?† Primer Magazine. Andrew, n.d. Web. 20 Oct. 2013. Sheikh, F.D. â€Å"What Lies in Your Handwriting.† Web log post. In the Name of the Human†¦ F.D. Sheikh, 13 Mar. 2012. Web. 12 Oct. 2013. Woollaston, Victoria. â€Å"What Does Your Handwriting Say about You?† Mail Online(2013): n. pag. Mail Online. 29 July 2013. Web. 14 Sept. 2013.

Monday, July 29, 2019

Freedom of Religion and School Prayer Essay Example | Topics and Well Written Essays - 1750 words

Freedom of Religion and School Prayer - Essay Example The courts decisions in these cases reflect the two main points of the first amendment which are that the government cannot tell anyone to worship or how to worship and the government cannot show favor to a particular religion over another. Each public school Supreme Court cases can be placed into one of the following categories: religious teaching in public schools, practice of religion in public schools, student involvement in religious practices on school property. The first court cases being discussed fall into the category of religious teaching in public schools. In the case of McCollum v. Board of Education, a school in Champaign, Illinois blocked a 45-minute time frame each week so that religious officials could visit the school and give religious instruction on school grounds. This was given the name of released time. Setting aside time during school hours for in school instruction of religion was ruled to be unconstitutional in this case. Released time is allowed off school grounds for the needs of religious students, but it is prohibited on school grounds. The court decided that religious instruction on school grounds shows support for that particular religion and therefore is unconstitutional.... The only involvement the school had was to collect attendance records to insure that the students participating showed up to their destinations. The Supreme Court found releasing students from school to participate in religious practices constitutional. Lastly, the case of Grand Rapids School District v. Ball also fell under the category of religious teaching in school. This case involved a co-teaching relationship between public teachers and teachers from private schools that engage in religious education (Parochial teachers). Parochial teachers would teach subjects that might involve moral questions. The court decided that this shared teaching between public and parochial teachers was unconstitutional. "Justice Brennan declared that public school teachers instructing in parochial schools might give the impression that the state endorsed the schools religion." (Gaustad 88). Brennan was also concerned that state paid teachers teaching at parochial schools might suggest that the relig ious schools could receive some form of government funding, which would definitely cross the line between the separation of church and state. Religious teaching on the grounds of the school in each case was found unconstitutional based on the first amendment and a violation of separation between church and state. Religious teaching was found constitutional as long as it was off school ground and voluntary for the students. In 1968, Epperson v. Arkansas an Arkansas law prohibited the teaching of evolution in the classroom or to use and textbook that teaches the theory of evolution. When this case was brought before the Supreme Court, the law was found unconstitutional under the first amendment because it prohibited "free exercise" of religion. The

Sunday, July 28, 2019

Information Systems and Strategy Management Assignment

Information Systems and Strategy Management - Assignment Example The firm must therefore radically change its information management systems to survive against the expected challenge. The European Union electricity supply sector represents a market share of over â‚ ¬150 billion annually, an annual investment of â‚ ¬30 billion Euros, while it employs over 750, 000 workers. The Electricity Supply Industry (ESIC) has a virtual monopoly in the European Union power supply industry, but the EU has decided to open up the market hence create competition for ESIC. In order for the power supply company, ESIC transform from a monopolistic system into a highly competitive market oriented firm, it needs to radically overhaul its information management systems. This will involve the company adopting a modern information technology (IT) system that incorporates all the firm’s divisions including the financial, production, and marketing sectors. Contemporary organizations have come to value the crucial importance of customer service to their continued survival. Firms with good customer oriented policies are able to able to maintain client royalty albeit the current fierce competition. The release of correct, regular and appropriate product information to workers, clients and providers across all channels is one of the fundamentals in retaining and acquiring new clientele. ESIC emerging from a monopolistic system will therefore need to change her information dissemination sector by revealing new products innovation information, financial dealings, among other news hence change her corporate image. ESIC must be geared to offer high quality customer service to her clientele by creating a seamless customer rapport across all the channels (generating, transmission, system control, distribution, supply sectors) by developing strategies aimed at surpassing the competing firms. Company products and information should be easily accessed either through the normal supply

Saturday, July 27, 2019

Why numbers matter Essay Example | Topics and Well Written Essays - 500 words

Why numbers matter - Essay Example The principles concerned with managing money are important to be taken into account while planning to save or invest money somewhere. To discuss and understand these principles, an article from Msnbc The Bottom Line dated November 06, 2011, ‘After steadying, home prices begin falling again’ has been taken into account which entails the scenario of the United States’ real estate industry. The author of the article tells about the falling prices of homes in the United States which were on a steady trend in the summer of 2011. He says that due to the imbalance between demand and supply, there are numerous houses unsold in many states of the US until the end of September 2011. This price fall is being observed by investors and analysts and they are waiting for these to be bottomed that is a rise is being expected after massive falls, though not in the short term. Considering the poor interest rates of US short term Treasury Bills; 0.005% for 3-months and 0.035% for 6-month bills as per the recent auction; this investment aspect has been kept on a farer side by many investors as the rate of return is minimal. Considering this point, other investment opportunities should be searched for. This shows that it is a nice time to buy some lower priced houses and benefit from the capital gains arising in the future, though not in the short term (Schoen, 2011). Taking control of finances is very crucial and an investor should read about some financial trends using mathematical concepts such as percentages and shares in different investments and then take calculated actions. This leads to the understanding of the compounding concept. Just as an investor determines the amount of investment he or she can do, he must take into account the related rate of return and use it to compound his or her future inflows from the investment over the concerned time period. The simple formula for it to be calculated is: Amount of investment * (1 +

Friday, July 26, 2019

What differences are there between the US and the UK in either the Essay

What differences are there between the US and the UK in either the politics of abortion or the politics of same sex relation what explains these differences - Essay Example States such as Massachusetts, Vermont, New Hampshire, Iowa, and Connecticut in United States do recognize that homosexuals have their civil rights to marry [1]. Labor Party government gives rights to homosexuals. There are only slight distinctions between marriages and same-sex couples in Britain. Plans are underway to eliminate those differences and fully accept same-sex marriage as legitimate marriages. Both UK and U.S started abortion in 1967 and 1973 respectively. Same-sex marriage recently has hit the headlines in the American politics. Britain has experienced some reactions to change laws on abortion and homosexuality in parliament and Conservative Party. United States and UK have well-defined dissimilarities in their politics of abortion and same-sex marriage. To start with, both United States and United Kingdom have abortion Acts that spells out the procedure of its application and the person to apply it. In Britain, the efforts to amend laws on abortion started back in 1967 when abortion Act was relaxed. These new amendments allowed abortion under proscribed conditions of health of fetus and mother. United States through a ruling by Supreme Court led to a change of law on abortion in January 1973. The new law stated clearly on where, who, and time limits of abortion. For the under-age, consent was required in order to allow abortion. The basic disparity in UK and U.S on laws of abortion is that it allows abortion is on request for the U.S but it is subject to location and moods of physician on the former. The United States Supreme court recognizes the rights of women to abort. They do it through very secretive manner because it values and respects personal privacy. On the contrary, British Abortion law does not provide privacy to women. It has restrictions and one has to give genuine reasons before getting a legal permission to abort. In U.S, there have been numerous incidents to stop abortion in

Thursday, July 25, 2019

How risk affect corporate financial strategy Research Paper

How risk affect corporate financial strategy - Research Paper Example Risk is the probability of loss to occur. Corporate financial strategy is affected by various types of risks. This includes political risk. Conflicts and civil wars leads to massive loss of assets by companies. When there is conflict in a country, companies’ property are looted and others destroyed.   Companies located in these countries suffer huge losses since it become hard to protect their investments. Nationalization of industries also poses political risk since companies’ lose their licenses; hence, they cannot continue to operate in these countries. Governments may also increases taxes on companies, making it difficult for any company to continue operating. The second type of risk is interest rate. When higher interest rate is charged on loans, it makes it impossible for companies to fund their operations using loans. Due to high interest rate charged on loans, corporate may fix higher prices on good and services hence reducing the market share as consumer will shift to cheaper goods (Ehrhardt and Eugene 7).The author states that one of the risks is credit risk. This type of risk is most common in banking industry where borrower will fail to meet the obligation to repay the loan in the agreed terms. Other risks occur in book keeping where incorrect figures are entered. Failure of borrowers to repay their loans and errors in book keeping causes huge loses to banking industries. The fourth type of risk is business risk. This is the probability that an auditor will suffer loss to his professional practice.

Enviromantal engneering project Essay Example | Topics and Well Written Essays - 500 words

Enviromantal engneering project - Essay Example rmore, instead of excavating and transferring the contaminated soil to another site, this process proved successful as it was done on site- saving time and energy. Bioremediation- According to Prof. Shaily Mohindra of UCLA, conventional technologies for cleaning ground water are not always effective. Moreover, these methods usually move pollutants from one point to another. For that reason, Mohindra endorses Bioremediation using Pseudonocardia dioxanivorans bacteria for the mitigation of next generation pollutants e.g. Perfluorinated compounds, nano materials, and dioxane. The progress of remediation will be monitored usin stable isotopes. Pump and treat- The application of pump and treat technology in Hanford has been successful in soil and ground water remediation. By 2011, 24.7 billion gallons of ground water had been treated, although the whole process of remediation will be completed in the next 25 years. At the end of the remediation process Contaminants such as plutonium and i ts derivatives e.g. Carbon tetrachloride will be successfully removed from the soil and ground water. In situ thermal remediation- pump and treat technology had been used for more than 17years to clean up chlorinated solvents from the subsoil in Stuttgart with minimal success rates. However, in January 2013 an in-situ thermal remediation pilot test offered a suitable alternative for remediation even under prevailing difficult geological conditions in Stuttgart. Monitored natural attenuation- The Company was justified as it relied on natural processes to clean up the site. An environmental disaster similar to the silent spring has also been observed in Oregon (Lower Columbia). Since 1985, conservation centered on removing the nearly extinct bald eagle from the federal extinction list resulted in significant overall increase in bald eagle numbers. Yet, in lower Columbia most of the eagle nests in the lower Columbia failed to hatch eaglets; and have been producing half the number of

Wednesday, July 24, 2019

Innovation and Development Essay Example | Topics and Well Written Essays - 3000 words

Innovation and Development - Essay Example But there are many obstacles to a real climate of development in those countries. One big issue is political corruption. This is one of the most difficult problems that need to be overcome for the developing countries to find a way out into higher levels of socioeconomic development. The United Nations through some of its institutions studies closely all the issues related to development and poverty reduction. Innovation policies will indeed help any developing country to find an appropriate climate for competition that can produce structural changes in favour of a real enhancement of the socioeconomic development. "According to World Development Report 1998 (WDR) in addition to taking advantage of the large global stock of knowledge, the developing countries should develop the capability to create knowledge at home. It also acknowledges that 'some types of knowledge must be built from the ground up'. This capability to create knowledge at home must encompass not only strategies to develop knowledge locally but also policies and mechanisms that will eventually enhance the capability of the nation to absorb knowledge. Together these would constitute public innovation policies in the developing-country context." As we can see from these assertions, innovation policies are necessary in order for the developing countries to adapt themselves to this new knowledge society in which the globalization process is a reality in every corner of the planet. Dr. Mani (2003) speaks about the market shortcomings in the following terms: "Further the recent Human Development Report 2001 of the UNDP also states that the market is a powerful engine of technological progress, but it is not powerful enough to create and diffuse technologies needed to eradicate poverty. Even in the network age, domestic policy still matters. All the countries, even the poorest, need to implement policies that encourage innovation, access and the development of advanced skills." Once again the need for innovation policies seems to be a priority in this new scenario of global restructuring among all the nations with a transition period from an industrial-manufacturing society to a knowledge society. But there is a very common problem in most of the developing countries regarding the lack of innovation policies or even the awareness of their existence as a tool that can increase the competitive advantage of any enterprise in any market leading to sustainable development thanks to the power of innovation. Dr. Mani (2003) addresses this problem as follows: "Most developing countries do not have a policy on innovation, as it is generally believed that developing countries do not engage in any innovative effort at all. At best they are expected to undertake incremental innovations, which are basically the adaptation of imported technologies to local conditions. But the recent growth experience of some of the developing countries and especially those from East Asia shows that they have become generators of new technologies." We have South Korea and Singapore as relevant

Tuesday, July 23, 2019

What are the factors that affect the attitude of Chinese young people Essay

What are the factors that affect the attitude of Chinese young people towards classical music - Essay Example This historical period was difficult for national culture, as there were many coup detat, rebellions, national liberation movements and communist revolution. The authors demonstrate positive impact of Western classical music within instable socio-political context. Shanghai National Orchestra became the first large center of classical music, as Shanghai was an administrative center of British Empire in China. This example proves that western instruments and musical preferences can easily merge with Chinese classical music and theatre. Success of pianist Mario Pad and Chinese musician Tan Shuzen showed that the above music had a large target audience in 1910 – 1930th in China. Thus, it became an integral part of Chinese culture, education and music, as China was under continuous influence of Europe countries. In the book â€Å"Flying Dragons, Flowing Streams† Ronald Riddle draws a parallel with integration of Western music in life of Chinese Americans. Chinatown became the place of mixture of two different cultures and a gradual assimilation started. Western popular and classical music had been coexisting with Chinese classics in 1930th – 1950th. â€Å"In the late 1970s both Western classical music and arrangements of Chinese melodies were rehearsed and performed by the Chinese American Youth Orchestra, conducted by Timothy Chan and sponsored by the Chinese Cultural Foundation.† (Riddle 1983, p. 208). The orchestra consisted of young Chinese Americans and successfully performed throughout the USA. Thus, Chinese Americans incline to Western pop and classical music, but try to remain their national culture in the new motherland. Melvin and Cai regard the period of the Hundred Flowers Movement (1957) and the Cultural Revolution as decadence of Western classical music in China. Impact of foreign music was pernicious for Chinese youth, that’s why all educational institutions, orchestras and schools related to Western classical music were destroyed and

Monday, July 22, 2019

Abnormal Psychology and Therapy Essay Example for Free

Abnormal Psychology and Therapy Essay Psychology can be described as examination of ideas, intuitive feeling, and the way someone thinks and uses his or her wits be it physical, mental, or cognitive. Abnormal psychology is ideas or conduct causing the individual troubles. The deficiency may be sadness, potential fight, or simply uncomfortableness in the individuals daily life. Mental disorders or mental disease are practices not in general associated with a person. A number of these disorders can harm others or the one who is battling with the disorder. There are a number of therapies for these disorders and are different in each case. A closer look and contrast of normal and abnormal psychology is need along with mental disturbance and mental disease from a psychology position polishing off by way of a look at different therapies useful for normal and abnormal psychology. Abnormal and Normal Psychology are likewise, also the two look into behaviors, and because of individuals different cultures and beliefs some behaviors are normal. Then again oftentimes they could be different for the behavior is not really typical or something out the ordinary. To know the difference between normal and abnormal psychology helps with acknowledging mental disturbance from a psychological perspective. To help illustrate our research on abnormal psychology, this section will compare and contrast normal and abnormal psychology. Normal psychology focuses on the different ways different people see life and want to live life, rather than relying on generalizations made about whole populations of people. See more:  Mark Twains Humorous Satire in Running for Governor Essay These generalizations can often do harm because without proper consideration they can often imply norm of behavior inimical to a person’s existence. A normal psychology in this way doesn’t imply a perfect individual existence, nor that there aren’t any pathologies. Abnormal-is the branch of psychology that studies unusual patterns of behavior, emotion and thought, which may or may not be understood as precipitating a mental disorder. The field of abnormal psychology identifies multiple causes for different conditions, employing diverse theories from the general field of psychology and elsewhere, and much still hinges on what exactly is meant by abnormal. Mental disorders and mental illnesses This next section will examine mental disorders and mental illnesses from the perspective of psychology. Adjustment disorders of mental disorders is related to an identifiable source of stress that causes significant emotional and behavioral symptoms. Anxiety disorders are those that are characterized by excessive and abnormal fear, worry and anxiety. In one recent survey published in the Archives of General Psychology 1, it was estimated that as many as 18% of American adults suffer from at least one anxiety disorder. Cognitive disorders are psychological disorders that involve cognitive abilities such as memory, problem solving and perception. Some anxiety disorders, mood disorders and psychotic disorders are classified as cognitive disorders. Alzheimers disease †¢Delirium †¢Dementia †¢Amnesia Therapies Psychotherapy is a general term that is used to describe the process of treating psychological disorders and mental distress. During this process, a trained psychotherapist helps the client tackle a specific or general problem such as a particular mental illness or a source of life stress. Depending on the approach used by the therapist, a wide range of techniques and strategies can be used. However, almost all types of psychotherapy involve developing a therapeutic relationship, communicating and creating a dialogue and working to overcome problematic thoughts or behaviors. †¢Psychoanalytic: An approach to therapy that involved delving into a patient thoughts and past experiences to seek out unconscious desires or fantasies. Cognitive-behavioral: A type of psychotherapy that involves cognitive and behavioral techniques to change negative thoughts and maladaptive behaviors. Humanistic: A form of therapy that focuses on helping people maximize their potential. Medical therapy for mental disturbance and sicknesses change between each philosophical system. The earlier style of psychotherapy were the psychodynamic therapies. Psychodynamic therapy tries to change personality practices through perceptiveness and the therapist-patient relationship (Kowalski Westen, 2009). Inside this subdivision of therapy dwell the proficiencies of psychoanalysis and psychodynamic psychotherapy. These particular therapies ask the patient to lie on a sofa or sit opposite with a therapist and talk about what one thinks of, a technique known as free association. The two most adept humanistic therapies are Gestalt therapy and the client centered therapy. Gestalt therapy is somewhat like psychodynamic psychotherapy. The most commonly known technique of the therapy is the empty chair technique. Through this method the patient exercises emotional expression by visualizing that the individual him or her wants to converse with is in the chair. The second humanistic therapy is the client centered therapy. Through this technique the therapist exhibits an position of full credence for the patient by listening emphatically. Therapeutic change occurs as the patient hears his or her own thoughts or feelings reflected by the nonjudgmental listener. Conclusion There are a number of therapies for these disorders and are different in each case. Abnormal and Normal Psychology are likewise, also the two look into behaviors, and because of individuals different cultures and beliefs, some behaviors are normal. Lastly, normal and abnormal look into behavior, this behavior may be causing the individual troubles, confrontation, or simply uncomfortableness in daily life. Mental disorders including schizophrenia and Obsessive compulsive disorder can harm others or the individual battling with them. Mental illnesses comprise of perturbations of mentation, experience, and emotion cause operative disability making it very hard to nurture relationships, keep a job, and can lead to suicide. Treatment will change with regards to the form of disorder a individual has and the individuals commitment to look for assistance with a therapist. References Kowalski, R., Westen, D. (2009). Psychology (5th ed.). Hoboken, NJ: Wiley. Nami ( National Alliance on Mental Illnesses, http://www.nami.org/Content/NavigationMenu/Mental_Illnesses/Depression/Mental_Illnesses_What_is_Depression.htm retrieved December 01, 2012. Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/mental-illness/ retrieved December 01, 2012. www.uidaho.edu/psych101/abnormal6.pdf. Retrieved December 02, 2012 Wood, S. E., Wood, E. R. The World of Psychology. Boston, MA: A Pearson Education Company. Page 538

Sunday, July 21, 2019

Glimpse Of The Indian Society Media Essay

Glimpse Of The Indian Society Media Essay Media today presents a glimpse of the Indian society that is filled with images of tradition, romance, nationalism and familial love. Teeming with energetic music, vibrant colors and heavenly portrayals of Indian families, the audiences are easily cajoled into believing that these depictions are accurate representations of attitudes and beliefs of the Indian life. However, many times, the realities of life do not always approximate the images presented by the media. As a result, media sometimes start affecting the society in an ominous manner. One such issue that is distorted by the media is the dowry system. In the process of raising alarm bells, Bollywood films, TV shows and news media have exploited this issue too much and consequently, worsened its effect. The insatiable greed of the in-laws, which ultimately leads to torturing of brides, has been highlighted so many times by the media that the viewers minds no longer recoils from such phenomenon. Moreover, with the rising consum erism, higher standards of living and exposure to the masses through media, the desires of people for material wealth have also gone up, aggravating the malevolent system of dowry. The dowry system, the custom of making payments from the brides family to the grooms family at the time of marriage, has a long history in India. It stems out from the traditional upper caste practices of kanyadaan or gifting the virgin bride (). Traditionally, these gifts could range from anything significant to even small token of good wishes. Historically, the dowry system could have been established as a form of inheritance for women, because only men inherited the family property. Furthermore, it could have been a way of compensating the grooms family for the economic support that they would give to the new bride as women has little role as bread earners for the family, making them dependent on the in laws. However, in recent times with exposure to mass media, these tokens of gifts or dowry have transformed into substantial transfer of wealth from the grooms family to the brides family, becoming an important factor in marriage proposals. Most of the marriage decisions nowadays a re based on how much dowry is the brides family ready to give. Even if the bride and groom do not suit each other, their marriage is arranged based on the exchange of dowry between the families. (). However, in the current society, where even women act as economic contributors to the family, this system becomes trivial. Yet, it has only inflamed with time. Consequently, the Government of India could not do much to alleviate this issue. Even with the changes brought about by the Hindu Succession Acts of 1956, which gave women legal rights of inheritance, and Dowry Prohibition Act of 1961, which legally outlawed dowry respectively, this practice still continues mainly because of two reasons. Firstly, even though in recent times, the exposure to media decreased the support for dowry among women, it appears that women have started valuing the resources that their dowries bring to their families. The exposure to mass media increased the desirability of consumer goods, causing the newly wed couples to view dowry as a way of obtaining them (). The other reason is that parents of daughters still believe that a large dowry will ensure better treatment of their daughters by her in-laws. They believe that the dowry will increase their daughters standing in her new household as it will act as a signal of parental support of the bride. However, thi s belief is largely baseless and stems from medias misrepresentation of this issue through its different outlets. Dowry is a hot topic that many Bollywood films tried to address. Films like Lajja and Lage Raho Munnabhai try to create awareness about this issue by depicting extreme sequences. However, this path taken by the directors sometimes backfires. In Lajja, Maithilis parents give everything to fulfill the dowry demands put up by their in-laws. They lose their land, saved money and even take on loans for the dowry. Though, Maithili rebels and calls off the wedding, seeing her father being humiliated by the grooms family for dowry. Even in Lago Raho Munnabhai, Simrans father Lucky Singh goes on to appropriating an old age house, leaving 20 old men homeless because the grooms parents wanted the land on which house was built. These acts by the brides family do not take place in the real world. However, they are able to distort the views of audiences, who then start believing strongly in this system. Vivah A journey from Engagement to Marriage, another mainstream Bollywood film, also presents a distorted vision of the dowry system but towards the other extreme. In the film, the grooms father wants nothing more for his son than a virtuous and beautiful wife dowry is unimportant and unwanted (). As Poonams father is asked for a mere token, the viewers are assured that a dowry is unnecessary when two families are as well suited as these. These films, as a result, distort the way the society views the dowry system. The reality of dowry demands in India is quite different from its portrayal in Bollywood films. The images of the dowry system presented in these films are not usually what comes to pass for a woman after her marriage and the giving of her dowry. In Lajja, Maithilis parents tried to call of the wedding because Maithilis father could not fulfill all but one of their demands. This would never happen in the real world. Similarly, what Lucky Singh did in Lage Raho Munnabhai to fulfill the dowry is unlikely to be seen today. However, one would also not find someone like Poonams father- in- law, who declined the dowry given by Poonams father. There are still many Indian marriages, where the brides treatment at the hands of her in-laws is often tied to the amount of dowry they receive. Moreover, theses dowry demands sometimes do not end with the wedding (). The shameless greed of the grooms families in the form of dowry demands continue for years after the wedding, with suggestions of furth er gifts to be made-for celebrations of the birth, naming and initiation of grandchildren. Most of the Bollywood fail to show this aftermath of a dowry induced marriage. According to Bedi, the ever-increasing demands for dowry have led to an increase in dowry-related violence and death among young married women in India, with 8391 dowry death cases in 2010 alone. The violence that the women have to undergo, despite giving dowry, has increased exponentially with the demands of the every-growing dowries. This dowry-related violence is mostly prearranged attacks within the grooms house. Many of these attacks include severe burnings, poisonings, hangings, gunshots, sharp objects, and jumping from height, generally resulting in the immediate deaths of the women (). Furthermore, the victims do not report this due to fear of another attack. They have to accept this cruelty as the price of keeping their families intact (). In some of the dowry-induced marriages, women try to commit suicides in a bid to escape the abuse from her in-laws. However, other families try to take advantage of these cases by reporting the death caused by dowry violence as suicides an d protect themselves from trials. Media, in such cases, immediately tries to capitalize on them through films and TV shows. A recent Bollywood film, Teen Behenein is based on the real-life incident of combined suicides by three sisters, which occurred in Kanpur in 1988. Though this film has flaws in every technical aspect, including script, direction and acting, it still managed to receive praise merely because of the issue that it takes up. Teen Behenien seeks to make an important point about the kinds of sexual, social, psychological and physical violence that continues to be encountered by women. This film only takes the seed of its story from real-life incidents of combined suicides by three sisters, and then builds a narrative around it (). The director was able to influence the society by combining the fictional and non-fictional worlds. In order to profit, the director exploited the issue of dowry system by exploiting it. Satyamev Jayate, a reality TV, also tried hard to create awareness about dowry. Aamir Khan, a famous Bollywood actor, is the protagonist who reveals social issues that are prevalent in India which need to be addressed. In the dowry-focused episode, Aamir delineates that every hour one bride in the country dies due to dowry harassment. This certainly is not true. Consequently, he invites a few women who have been victims of the dowry system to speak about their torture. For instance, Komal Sethi spoke about how after being tortured to pay a hefty amount to her in-laws and husband, she was left to die in the US. Lecturer Nishana, who underwent a cosmetic surgery to please her husband, succumbed to the dowry demands of her in-laws and ended up committing suicide (1.5 million rupees that were given by her parents. Though, these cases depict the extremes that this system can go to, they leave a mark of the audience who begin to consider girls as burdens. Furthermore, the fact that Satyame v Jayate commercialized such sensitive issues to profit from them only undermines the validity of its claims. In a country, where film stars are considered as ideals, the distorted depiction of their personal lives can have a profound effect on society. Through the creation of superstars, media distorts the view of the Indian society on dowry. In India, film is the principal form of entertainment, and therefore, film stars are accorded a respect otherwise offer only to family elder and men of God(). An average of ten million people a day spend the equivalent of a days wages just to enter into a fantasy world of images of bad landlord, greedy industrialist, corrupt politicians and traditional virtues of virginity, devotion to God and family and service to men (). The protagonists, therefore, become the saviors of mankind and the actors start to be revered by the Indian public. According to Gokulsing and Dissanayake, star worship offer a mental escape from the pressures and poverty of everyday life and statements or actions made by big Bollywood stars, like Amitabh or Shahrukh, can have great effects on public attitudes. In high profile and star-studded marriages, the dowry worth fortunes are given; however, just as a custom. Millions of rupees in cash, gold, along with luxurious cars are given by the brides family, but this is not a compulsion and is given just out of generosity. However, the masses get influenced when they see this on the televisions and their desires increase many- folds. They start dreaming of lavish wedding and end up making brides lives miserable, ruining their families and turning the concept of marriage has been turned into a transaction, without any importance placed on the people or the relationship (). As a result of the societys distortion view of the dowry system, in many parts of the country, the birth of a girl is not seen as an event to celebrate. Unlike the loving parents of Poonam in Vivah, the thoughts of many Indian parents are not positive at the birth of a daughter (). The lyrics of an old Indian chant used in Punjab Eat the jiggery, spin the cotton, you should not come, send your brother suggests that the birth of a girl is seen as an event of sorrow. There is no singing or celebration, as the parents have to start worrying about the dowry. Girls become a drain of familys money, unlike boys who create income for the family and stay to take care of his parents in their old age (). This belief has skewed the sex ratio in India, fostered by sex-selective abortions and infanticides. Matrubhoomi, a Bollywood film, is set in a hypothetical village in India without women. The film tries to bring forth the message that if the rampant female infanticide and feticide were to cont inue, then there would be a time where there will be no women left. However, this film failed in its goal. The film is so extreme that the audience could not digest it and the film only succeeded at undermining the seriousness of this issue. The numerous representations of dowry system on both big and small screens, it seems to be distorting to an extent. Since the introduction of mass media in the Indian society, views of the people on the dowry have change significantly. The system, which was initially meant as a form of inheritance for women, changed over time because of its misrepresentation by media. The increasing exposure to media coupled, which increased the desirability of consumer goods, transformed this system into a substantial transfer of wealth from the brides family to the grooms and made dowry an important factor determining marriage decisions. Furthermore, recent films like Lajja, Vivah or Teen Beheinen only distorted the societys view on dowry by showing extremes situation that are highly unlikely to occur. On the other hand, TV shows like Satyamev Jayate tried to commercialize this issue; however, undermined its validity in the process. In addition, medias depictions of lavish weddings of media persona lities, increases the dowry systems prevalence as more and more people try to emulate their ideals. Dowry system, therefore, has become a big problem in India and has led to practices of female infanticide skewing the sex ratio in India. In drawing this paper to a close, it is clear that the problem of dowry is only intensified by media. Until media becomes more responsible in its depiction of the dowry system, leaving aside the monetary intentions, this problem will continue unabated.

Analysis of Changes in Wage Rates in India

Analysis of Changes in Wage Rates in India CACP – The data source which is an important source for wages in rural India unfortunately does not publish the wage data from these studies. The cost of cultivation scheme collects data from the selected household at regular intervals on all aspects of farm business. The valuation of human labor has always been a problematic issue for the CACP. There is however a number of limitations associated with this data such as lack of data for many crops, problem in aggregating the data from the state level, unavailability of data at the state level etc. The four reference points have been used to look at a change in the wage rate. However, the choice of reference points in the study have been limited to the years 1983 and 1987-88 in the 80’s and 1993-94 in the 90’s. AWI Wage Rate: It is the most widely used source for analyzing trends in wage rate for rural India. However, one given problem noticed by the researcher with respect to AWI is the time lag in the data and the method of aggregating all the data for th states and all India level. There were many studies performed to check the average wage rate of labourer in different parts of India by many previous researchers. However in all these studies used simple average of wage rates in different months to arrive at the annual figures. Also, all these studies used population of agricultural labourers’ from the census as weights to arrive at the wage rate. The average AWI wage rate is 30-40 percent higher as compared to the RLE/NSS estimates of wage rates. It was also studied that the AWI wage rates were found to be marginally upwards biased as compared to the FMS estimates of wages. A look at the wage trends from AWI since 1980-81 suggests that the wage rates have generally been higher in Punjab, Haryana, and Kerala as compared to the other states in the 80’s. However, by the end of 1990, Gujarat and West Bengal have seen to have made a significant contribution and is closer to the traditional high wage rates. Rajasthan, on the other hand which was closer to the traditional high wage rates has fallen behind and is considerably lower than Kerala, Punjab and Haryana. The states on the lower ends of the wage rate are Orissa, Bihar, Madhya Pradesh, Maharashtra, and Andhra Pradesh. Kerala’s wage rate is found to be three times those in Orissa and in Punjab and Haryana they are twice the wage rate in Orissa. Wages have continued to grow in all three time periods but there was a significant slowdown in the wage rate during the period 1987-88 and 93-94. For the period 1987-88 to 1993-94, which also included the year of the financial crisis and the conseque nt economic reforms, wage rates show a deceleration in almost all the states as well as the all India level. This decline in the growth of wages is sharper for Andhra Pradesh, Assam, Bihar, Gujarat, and Karnataka. Wage trends from CACP – In the study it was found out that this wage rate had been created by aggregating over crops using crop specific weights for individual states. Wage rates from CACP are generally found to correlate well with the AWI series in spite of the differences in methodology of collection of data. In fact, for both 1983 and 1987-88, wage rates from CACP show a very high correlation coefficient of 0.95 with the AWI wage rates. It was also analyzed in the study that wage rates from CACP show better growth rates in 1987-88 and 1993-94 as compared to the AWI series. Rajasthan turns out to be an exception which showed markedly improved wage rates as showed by AWI wage series. Even for other states, CACP does not show as sharp a deceleration as AWI. Maharashtra on the other hand shows sharp deceleration in the wage rate during 1987-88 and 1993-94. NSS – These wage rates were found to be statistically more significant and reliable than that of AWI or CACP because of their consistent and superior sampling framework but they also allow for a much higher level of disaggregation. The wage rates reported by NSS for males for agricultural occupations are considerably lower than the wage rates reported by AWI. It was further studied that the NSS rates were very well correlated with the rates of AWI series with a correlation coefficient of around 0.9 in the 1980’s, 0.87 in 1993-94 and 0.95 in 1999-00. However, again for most states there was a deceleration in the growth rate during the next sub period that is, between 1987-88 and 1993-94. Except for the state of Gujarat, deceleration was seen for almost all states. Gaps between agricultural and non agricultural wages narrowed down considerably in Punjab and Rajasthan. West Bengal and Karnataka were found to be the states having the lowest divergence between agricultural a nd non agricultural activities. Comparison between agricultural and non agricultural activities gender wise was also performed. It was analyzed that the growth rates in these activities in males suggested that in 1983-84 and 87-88 agricultural wages grew faster than non agricultural wages. For females, however non agricultural wages grew faster than agricultural wages. RLE/ALE wage trends – RLE uses a subset of households from the NSS employment and unemployment quinquennial surveys. The household types are either self employed in agriculture, non agriculture, agriculture labour, other labour and others. A comparison of the wage rate from the NSS and the RLE reveal that there is a high degree of correlation between them especially in the 1990. This is true not only at the all India level but also at the state level. For the period from 1983-1987, growth rates from RLE were shown to be 70-80 percent higher than the ones shown by the NSS series in the study. The growth rate of the NS were similar to those studied by AWI or CACP for many states, however the RLE suggests growth rates higher than any of these. Further it was also studied that the growth rate of wages in agriculture are much higher than those suggested by NSS or CACP or AWI. There was also an inter range comparison done in this study to check the difference in wages under the RLE scheme. It was analyzed that comparing the 1977 RLE scheme to that of 1983, real wage rates declined by almost 10 percent for the latter. Such a decline in wage rate is not accompanied by any other wage estimates including those from NSS. WRRI Wage rates from eleven agricultural operations and seven non agricultural operations. For wage rates for agricultural operations, simple average of sowing, transplanting, weeding, harvesting, winnowing and threshing was taken as the representative wages. The analysis in the study was based for the years 1990-2000 and 2002-03. It was studied that the wage rates from WRRI for agriculture than those reported by NSS and RLE for males and almost 60 percent higher for females. WRRI estimates of wage rates are found to be closer to the CACP or AWI estimates because of similarity in methodology and sources. WRRI is the only estimate that is available after 1999-00. It was further analyzed in the study that the wage rates between male and female for agricultural occupations as well as non agricultural occupations have grown in real terms. Coming to the state wise analysis, Bihar and Orissa are the states that saw the highest growth rates of wages for both males and females. The other st ate that achieved close to 10 percent per annum growth rate of wages is Kerala. Apart from Kerala, the other two states – Andhra Pradesh and Tamil Nadu saw slower growth rates of wages. Uttar Pradesh having a large concentration of poor and rural labourers witnessed growth rates of less than two percent in both agricultural and non agricultural operations.

Saturday, July 20, 2019

Leagility Defined for the Supply Chain Essay example -- essays researc

Leagility Defined for the Supply Chain Two words, lean and agile, combine to make the word leagility. Supply chain managers need lean supply lines to eliminate waste and keep costs low. They also require agile supply chains to get the right amount of the product to the right place in order to satisfy the ever-changing nature of the marketplace. Traditional management recommended a lean supply chain for products with a stable demand, yet low profit margin. Conversely, products with a high profit margin and volatile demand should have an agile supply chain (Van der Vorst). Modern managers may benefit from studying hybrid supply chains that are both lean and agile. Lean supply chains work best with products that sell in high volume and low variety (Christopher). The reason for this is clear when one considers a type of product meeting this criterion. Toilet paper sells in predictable volume and while there is some variety with this product, it is basically the same from brand to brand. The consumer is more likely to buy this product as a result of price rather than bells and whistles. A manager of a supply chain of toilet paper can use many tools to keep the logistics cost low. Sales of this product are likely to be tied to population size with little of no variation in sales†¦except in college towns where TP sales may be higher during rush week. This consistency allows managers to ship regular orders of the product. Consistency allows for long-range contracts with shippers, wh...

Friday, July 19, 2019

A Short History Of The Blues Essay -- Music, Blues, Communication, Ni

The late 19th century marked a great deal of change in the United States as well as the rest of the world. World war one had begun and reeked great havoc on the entire world. Nikola Tesla and the fathers of communications had made major scientific breakthroughs in the communications field and modern radio programming was right around the corner. Slavery had been abolished for over thirty years but segregation was still an enormous factor amongst the African-American people in the U.S. One of the most segregated states in the entire country, Mississippi, was on the brink of one of the most influential forms of modern music that the world had ever seen or heard: the blues. What the blues did for music is reflective in almost every piece of modern music heard throughout the world today. From rock and roll to country music, all the way to hip hop, the blues is deep down inside shining like a beautiful light that makes that music glow forever. Weather a person is happy or sad, compa ssionate or indifferent; the blues will always be there to light the way. Right at the turn of the century a man by the name of W.C. Handy was about to stumble upon a sound that would change the world of music forever. The year was 1903. The summer sun was beating down ferociously and a man named William Christopher Handy, who happened to be catching a train heading north, found himself in a town called Tutwiler Mississippi which lies smack-dab in the middle of the Mississippi delta between Clarksdale Mississippi and Greenwood Mississippi. Handy, a former bandleader of â€Å"a black orchestra that mostly plays dance music and popular standards of the day, is a learned musician who understands theory and the conventions of good, respectable music’’ sudden... ... America the civil rights movement had begun and a new type of blues called soul music was introduced. Traditional country blues was making its way into college towns and it was only a matter of time before electric blues would follow. As the fifties came to a close, the most musically influential time period in the history of popular music, the sixties, would come roaring in with bands like The Beatles, The Rolling Stones, and Jimmie Hendrix all of which were heavily influenced by the blues. After the 1960’s through the seventies and the eighties the blues and its wonderful history would help to shape almost every form of modern music. In 2002 the United States Congress passed a resolution making 2003 â€Å"the year of the blues.† Without the development of the great pioneers of the blues genre music would be in a totally different place, as we know it today.

Thursday, July 18, 2019

character analysis essayof Slaughterhouse Five -- essays research pape

  Ã‚  Ã‚  Ã‚  Ã‚  Character Analysis Essay   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Slaughterhouse Five by Kurt Vonnegut   Ã‚  Ã‚  Ã‚  Ã‚  Slaughterhouse Five, by Kurt Vonnegut, is a novel that makes no sense in itself; yet, when put into context individually with today’s events, or life’s events in general, makes more sense then if it were clearly spelled out within the pages. By using the character of Billy Pilgram, Vonnegut conveys his points with Billy’s reactions and common characteristics. Billy Pilgram could not be any more a human then if he was actually walking amongst us. With basic characteristics of simplicity, confusion and general common sense, any one can relate to what Billy is and was going through. By successfully portraying this personality of Billy’s, Vonnegut creates a complex yet oddly simple character for audiences to follow.   Ã‚  Ã‚  Ã‚  Ã‚  For Billy, it truly is a gift to be simple, especially with every thing he must endure. Simplicity is a common trait that most characters in novels lack. Authors are many times trying to create such a complex character that the audience may become lost or even bored with the character. By making Billy so simple, he can create complex events that surround him. With this, Billy shows his general reactions. Without Billy delving deeply into the events, it in fact leaves room for the audience to have their own interpretation of wh...

Web Design Report

| Coursework 1 Website Report | Diarmuid Bogner / B00614798| | Dr Hui Wang Dr Hui Wang Contents Page Introduction____________________________________________________________ pages 3 -4 Analysis_______________________________________________________________ pages 5 – 6 System Design_________________________________________________________ pages 7 – 11 Implementation_______________________________________________________ pages 12 – 16 Conclusion___________________________________________________________ pages 17 – 21 Appendices______________________________________________________________ page 21Introduction Purpose The purpose of this website was for a web development based company showcase the web sites they have created, the services they offer, help and support for new and old clients and to display contact information. Another purpose for creating this website was to help increase the amount of clients that the web development company was getting. Creat ing this website also allowed me as a beginner web developer to further develop the skills that I have already acquired such as XHTML and CSS. Organisation and Function of the Website The website I created is organized into several pages.Each page was named with an appropriate name to correspond with the information that was viewed on that page. For example the contact page was named â€Å"contatct. html†. This easily allows me to identify which page I was currently working on and would help if I had to make any changes or updates in the future. The website is made up with 15 different pages. In my website directory there is also a CSS file called style. css. This file contains all the style information on my website for example the background colour or the text font, size and colour. Naming the . ss file â€Å"style† again would help me or anyone else having to edit the file knows what the purpose of the file is. The website layout follows the standard top to bottom o rganization. The website has a logo at the top, and then below is the navigation which is easy located by visitor so they can easily navigate around the website. The function of the navigation bar is to create links between different pages of the website. For example clicking on the â€Å"About† link will bring you to the about page. There are also links on the links page which bring the user to external pages on other websites.Outline of Information to Be Included In the Report This report will contain quite a large amount of information. Below I will briefly outline the information included in the report: Introduction – In the introduction section of the report I will explain the purpose of the website I created, the organisation and the function of the website which basically means how the website works. Analysis – In the analysis section of this report I explain what the target users are and what they require from my website.The report will also contain a da ta collection which is where I sourced all my information to create the website. System Design – The system design will contain an outline design of each page that will be created for the website and the rationale. Also this area will contain all the links of the pages and the type of information that has to be included on each of these pages. Implementation – In this section the report there will be screen dumps of each page and I will explain the main features of each page. Also I will have a description of how my main features where added to the website.Conclusion – the conclusion section of the report will contain a complete evaluation of the website, and if I feel that my finished website has meet all the user requirements and how I have met them. I will review what went well and what didn’t go as well as expected when designing and implementing my website. Also I will include some ideas that I think my make an improvement to my website. Appendices à ¢â‚¬â€œ The appendices section will contain any references that were used throughout the report, design and implementation of the website. Analysis Target Users and their RequirementsThe target users for my website can be anyone. But the main focus is for users that are interested in obtaining a website for their personal use or for a business. The website has requirements that I need to insure that I meet them all. Requirements * Clear layout website for easy browsing – The website must be made up with a simple, effective a clear layout and not seem confusing. * Easy functionality – Users on the website must be able to use the functions of the website with ease. * Appealing colour scheme/template – The colour scheme and the template/layout need to be appealing using bright colours and nice imagery. Corresponding information – The information on the website needs to be relevant to the website, for example information about football would not be relevant t o a web development organisation. * Follow the HCI guidelines – The website needs to strictly follow the Human Computer Interaction guidelines. For example I need to take into consideration that some visitors on my website maybe colour blind so using colours that users can see clearly wither colour blind or not. * Easy to update and maintain – The website needs to allow easy maintain and update when needed.To achieve this using proper indenting and comments on the code will help me to find areas of the code that need updated. * User friendly – I need to make sure that the website is user friendly and that the users browsing my website can easily navigate around the site and can read the information that my website displays. * Compatible – Making the website compatible with all browsers is a requirement. This is because if one user is viewing the page using Mozilla Firefox another user using internet explorer may see the website differently and this could affect the users overall experience of the website.Data Collection All of the information I used for my website was written by me, I did however use the internet for some information such as my images, icons and links. For my icons and images I used a website called http://www. iconfinder. com/ and I also used Google image search. For some of the definitions on my â€Å"Links† page I searched Google, and at the top of the search results page a definition appeared. Throughout writing my CSS code I used http://www. w3schools. com/ as a reference for certain CSS techniques such as creating my website background. Outline of Page DesignsI found that using text boxes in Microsoft Word was a great way for me to design the layout of each page on my website. You can see below how I achieved this. Logo created using Adobe Photoshop Logo created using Adobe Photoshop Homepage Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Developmen t Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Content Area (this area is used to display the main text and images for the users to read and view.Content Area (this area is used to display the main text and images for the users to read and view. Button used for users to request quote Button used for users to request quote Links to pages on website Links to pages on website â€Å"Get quote† â€Å"Get quote† Footer Navigation Bar Footer Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Logo created using Adobe Photoshop Logo created using Adobe Photoshop About Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web DevelopmentHome | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s About Content Area (this area is used to display the main text and images for the users to read and view. About Content Area (this area is used to display the main text and images for the users to read and view. Relevant image for page. Relevant image for page. Links to pages on website Links to pages on website Footer Navigation Bar Footer Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’sLogo created using Adobe Photoshop Logo created using Adobe Photoshop Services Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Services Services Icons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Links to pages on website Links to pages on website Icons to represent a service Icons to represent a serviceIcons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Footer Navigation Bar Footer Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Logo created using Adobe Photoshop Logo created using Adobe Photoshop Portfolio Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’sPortfolio Portfolio Thumbnail image of previous designed website. Thumbnail image of previous designed website. Links to pages on website Links to pages on website Thumbnail image of previous designed website. Thumbnail ima ge of previous designed website. Thumbnail image of previous designed website. Thumbnail image of previous designed website. Footer Navigation Bar Footer Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Logo created using Adobe Photoshop Logo created using Adobe Photoshop ContactNavigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Image of Office Image of Office Contact Contact Content Area Contact form, and information such as the address and telephone number will be shown. Content Area Contact form, and information such as the address and telephone number will be shown. Links to pages on website Links to pages on website Google Map of Office Google Map of Office Footer Navigation BarFoot er Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Logo created using Adobe Photoshop Logo created using Adobe Photoshop Links Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Links Links Link description Link description Link Icon Link Icon Links to pages on website Links to pages on website Link descriptionLink description Link Icon Link Icon Link description Link description Link Icon Link Icon Footer Navigation Bar Footer Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s FAQ’s Logo created using Adobe Photoshop Logo created using Adobe Photoshop Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s FAQ’s FAQ’s Content AreaFrequent questions and answers to them will be viewable on this area. Content Area Frequent questions and answers to them will be viewable on this area. Links to pages on website Links to pages on website Footer Navigation Bar Footer Navigation Bar Home | About | Services |Portfolio | Contact | Links | Faq’s Home | About | Services |Portfolio | Contact | Links | Faq’s Links of the Pages (Site Map) This is the logo I created using Adobe Photoshop and various techniques for the desired effect. This is the logo I created using Adobe Photoshop and various techniques for the desired effect. ImplementationNavigation links, when the mouse cursor is over the top of the link it changes to a lighter shade of grey. Navigation links, when the mouse cursor is over the top of the link it changes to a lighter shade of grey. Home Footer navigation, again with the use of rollover links. Footer navigation, again with the use of rollover links. Background image, which I found on Google images. Background image, which I found on Google images. Rollover â€Å"Get Quote† button which becomes a lighter shade of grey when mouse is over it. Rollover â€Å"Get Quote† button which becomes a lighter shade of grey when mouse is over it.Form created with HTML to allow user to send an email for a quotation. Form created with HTML to allow user to send an email for a quotation. Quote Reset Button resets the data that has been inputted into the form. Reset Button resets the data that has been inputted into the form. Submit button sends the form. Submit button sends the form. About The text on this page has been formatted into bullet points to make it more user friendly and easy to read. The text on this page ha s been formatted into bullet points to make it more user friendly and easy to read.Image added to page to make it more appealing. Image added to page to make it more appealing. Icons to represent services that the company offer. This makes this page look a lot more appealing. Icons to represent services that the company offer. This makes this page look a lot more appealing. Services Thumbnails of web designs to add a gallery effect to the portfolio page. Thumbnails of web designs to add a gallery effect to the portfolio page. PortfolioLarge Image shown so users can clearly view the previous work. Large Image shown so users can clearly view the previous work.Portfolio Image Example Back button to return the user to the previous page. Back button to return the user to the previous page. After clicking on any of the previous design images will load a larger scale of the image with the exact same layout and format as the screenshot above. After clicking on any of the previous design ima ges will load a larger scale of the image with the exact same layout and format as the screenshot above. Image of office added to page to give users an insight to what our offices is like. Image of office added to page to give users an insight to what our offices is like.Contact Contact information and a form added for users to complete and submit to website admin email. Contact information and a form added for users to complete and submit to website admin email. Google maps embedded to show users where the office is located on Google maps. Google maps embedded to show users where the office is located on Google maps. Links Information about each link. Information about each link. Icons added to represent the links, the icons are also clickable which brings you the new external link. E. g. clicking the YouTube icon brings user to youtube. om Icons added to represent the links, the icons are also clickable which brings you the new external link. E. g. clicking the YouTube icon brings user to youtube. com Questions and answers clearly formatted for easy reading, this is proof of following HCI guidelines. Questions and answers clearly formatted for easy reading, this is proof of following HCI guidelines. FAQ’s Button to bring user to continued support page. Button to bring user to continued support page. Help & Support Form to request future help & support.Again this form is emailed to the website administrator. Form to request future help & support. Again this form is emailed to the website administrator. Conclusion Evaluation of Website I feel that my website has met all the user’s requirements. You can see evidence of each of the users requirements from the screenshots above. Below are all the requirments and how I felt that I have met them. * Clear layout website for easy browsing – My website has been made using a simple layout which only contains a header, navigation, content area and a footer navigation.The website is also easy to brow se as I asked members of my family and friends to try and navigate around and they could do this with ease and no confusion. * Easy functionality – All of the functions that my website uses are all easy to use. For example the forms which the users complete to contact the website administrator are all very self-explanatory and users have no problem completing the form. * Appealing colour scheme/template – The colour scheme and the template that I have created is very appealing. Again I have got friends and family to try to use the website and they have all commented that it is very olourful. You can see evidence of this with the use of the background image and icons on different pages of the website. * Corresponding information – All of the information on the website corresponds to the type of the website that I created. * Follow the HCI guidelines – I have followed the HCI guidelines very strictly when creating this website. An example of this would be t hat the website does not use any colours that colour blind users may find difficulty viewing. * Easy to update and maintain – The layout created allows for easy updating and maintenance.For example if I wanted to add a new page to the website all that must be done is a copy of the page, delete the information that was copied, add new information to the page and add the page into the navigation bar. * User friendly – I find that my website is quite user friendly. The website is easy to use and the information is clear and users would have no problem reading and understanding the information. * Compatible – I have fully tested the website with a few of the most popular web browsers. You can see evidence of this below: Chrome Internet Explorer Mozilla FirefoxAs you can see from the above screenshots that the website displays correctly in all browsers so I have met the compatibility requirement. Review of Successes and Problems I found that my design was very succes sful. Creating the plan of the design was crucial in creating a fully functional website. I found that making a clear and an easy to follow plan allowed me to implement my website with very few issues and it gave me an insight to what the website would look like when completed and what look I was aiming for. Meeting the user requirements I thought would be a hard obstacle to overcome.I did a module in a computing course which solely focused on Human Computer Interaction This gave me the knowledge of HCI guidelines and ideas on how to follow them and how to stop barriers. Along with my knowledge and a full plan I was able to meet all the user requirements whilst overcoming HCI difficulties. The only thing that didn’t go to plan was the CSS code for my background. When attempting to add the background using CSS I could not get the desired look. The image kept stretching and as I added more content to the page the image repeated. After researching some more CSS online using W3sc hools. om I came up with the idea that the background should stay fixed and the rest of the page should scroll. This fix completely fixed this issue. The code I used is as follows: Ideas on Improvement & Further Development After reviewing my website I have came up with areas that I could improve on and areas of the website that could be further developed. I found in my portfolio gallery when clicking on the image instead of having a text button â€Å"[Back to previous page]† I could have used a rollover button which users would have a lot less difficulty trying to find and also it would make the page more interactive for the user.Instead of having a text button on this page I could have either added a button or better added a support link on the navigation bar. This improvement also gave me an idea where I could further develop my â€Å"Continued Support† area by using a PHP help desk script which allowed users to register and they could write issues on tickets that a re then viewed by administrators and support is given.Also adding a help chat room where clients can speak live with support staff. An example of this type of software that could be integrated is â€Å"oS Ticket† which is an open source software. http://osticket. com/ References: www. google. com/images www. w3schools. com http://www. iconfinder. com/ http://stackoverflow. com/questions/1150163/stretch-and-scale-a-css-image-in-the-background-with-css-only