Thursday, October 31, 2019
At the instructions box Essay Example | Topics and Well Written Essays - 500 words
At the instructions box - Essay Example ERMââ¬â¢s role within organizations is the provision of a reliable framework under which the methods and the processes essential in the management of risks are outlined. Expounding the same, it is a reliable tool expressing clearly the organizational objectives putting into consideration a balance between the potential risks and their rewards (Barton et al., 2002). In its capacity, the primary importance of ERM in business premises is the provision of an assurance that eventually enables organizations to effectively control the risks and maximize opportunities. As a case example risk management at PricewaterhouseCoopers (PwC) reveals that if done and managed effectively, ERM impacts significantly in value addition, sound response to change as well as maintaining a steady improvement and enhancing adequate response to changes (Simkins & Ramirez, 2008). Although it cannot be quantified numerically, the assumption of ERM inclusion in any organization is expected to have a negative impact since a robust framework that decisions can be based upon is not provided. In turn, risk management becomes a challenge, as there is no reliable tool to balance and mitigate the process. Internal audit relevance in enterprise-wide management is embedded on three categories of roles, which are distinct, and the executive should remain aware of. The first category concerning ERM embarks on assurance, followed by risk management evaluation while the third category involves the management review of the key risks (Institute, 2004). As an indispensable part under ERM, internal auditing serves as a consultant and in turn; the physical duty to manage risks is left as a managementââ¬â¢s responsibility. The relevance of the distinctions is providing a controlled process under which the management will be helped to set up and improve the crucial processes. It serves more of an advisory as opposed to actual risk
Tuesday, October 29, 2019
Methods Of Research Essay Example | Topics and Well Written Essays - 500 words
Methods Of Research - Essay Example Horton found out that the treatment was effective in helping the girl to stop her spoon banging behavior (Interpreting, and Draw conclusion) In Project situation 2, Latane & Bidwell used observational method of research. Observational research method was used because Latane & Bidwell observed the number of students who entered the college cafeteria accompanied by student or with out company, and determined the gender differences in need for affiliation. In this project situation Latane & Bidwell determined the gender differences in need for affiliation (Identify the problem, and Gather and observing data). In this situation, Latane & Bidwell decided to prove if females need to have greater affiliation than male students (Formulating Hypothesis and testing the hypothesis). Latane & Bidwell found out that females were significantly more likely than males to be in the presence of another person when entering the cafeteria. (Interpreting, and Draw conclusion) This study basically focused on the number of students who entered in college cafeteria with accompanied student or with out accompanied student by gender. This study was also delimited to one school only. The researcher used correlational research method.
Sunday, October 27, 2019
Comparison of Privacy and Communication on Social Networking
Comparison of Privacy and Communication on Social Networking I propose to conduct a research on the topic- A cross-cultural comparison of privacy and communication on Social Networking Sites between India and United Kingdom. Abstract My research will try to examine the cross cultural differences in the context of sharing personal information on Social Networking Sites (SNSs) and the various aspects of online privacy between the college students in India and the United Kingdom. To begin with, the research will require the students to complete a paper based survey with a variety of questions regarding their attitudes towards sharing personal information on social networks and privacy. It will also seek to better understand the behavioural issues by studying their communication pattern. The emphasis of this research will remain on identifying the commonalities and differences in the communication patterns and attitudes towards privacy between the Indian and UK students by conducting an empirical research. Literature Framework We define social network sites as web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site. While we use the term social network site to describe this phenomenon, the term social networking sites also appears in public discourse, and the two terms are often used interchangeably. We chose not to employ the term networking for two reasons: emphasis and scope. Networking emphasizes relationship initiation, often between strangers. While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer-mediated communication (CMC). What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks. This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between latent ties (Haythornthwaite, 2005) who share some offline connection. On many of the large SNSs, participants are not necessarily networking or looking to meet new people; instead, they are primarily communicating with people who are already a part of their extended social network. To emphasize this articulated social network as a critical organizing feature of these sites, we label them social network sites. Social Networking Sites (SNS) have achieved phenomenal success since the launch of sixdegrees.com in 1997. Original sites such as Friendster, Lunarstorm and MiGente, are now all dwarfed by the phenomenally successful Myspace1, and Facebook2. A useful historical record of the development of Social Networking sites was made by Boyd and Ellison in 20073, although more work is needed to understand the gratifications delivered how users derive a sense of identity and the cross cultural implications to users. The goal of this short paper is to weave digitization, identity and community into an analysis that is both historically rigorous and conscious of contemporary innovations. Launch Dates of Major Social Networking Sites (SNSs) Source: Social Media Graphics Among undergraduate college students, the three most visited social networking websites are Facebook, MySpace, and Friendster, with one study reporting Facebook use as the most popular at 90% (Stutzman, 2006) while another study reports Facebook use as most popular with 78.8% who à ¢Ã¢â ¬ÃÅ"à ¢Ã¢â ¬ÃÅ"sometimes or à ¢Ã¢â ¬ÃÅ"à ¢Ã¢â ¬ÃÅ"often use Facebook (Hargittai, 2007). Undergraduate students using Facebook averaged 10à ¢Ã¢â ¬Ã¢â¬Å"30 min daily use for the time categories and averaged 150à ¢Ã¢â ¬Ã¢â¬Å"200 friends for the friend categories (Ellison, Steinfield, Lampe, 2006). Students and alumni use Facebook to communicate, connect and remain in contact with others (Acquisti Gross, 2006; Charnigo Barnett-Ellis, 2007; Ellison et al., 2006). There are conflicting reports whether Facebook is used for dating with one study that reports such use (Charnigo Barnett-Ellis, 2007), while another study reports that students do not use Facebook for that purpose (Acqu isti Gross, 2006). Also, undergraduate students typically use Facebook for fun and à ¢Ã¢â ¬ÃÅ"à ¢Ã¢â ¬ÃÅ"killing time rather than gathering information (Ellison et al., 2006). Although Facebook is very popular among students, others have profiles on it too. Over the past decade, the communication uses of the Internet have become a very important part of young peoples lives (e.g., Gemmill Peterson, 2006; Jones, 2002; Lenhart Madden, 2007; Subrahmanyam Greenfield, 2008). Social networking sites are the latest online communication tool that allows users to create a public or semi-public profile, create and view their own as well as other users online social networks (Boyd Ellison, 2007a), and interact with people in their networks. Sites such as MySpace and Facebook have over 100 million users between them, many of them adolescents and emerging adults. Although research on young peoples use of social networking sites is emerging (e.g., Boyd Ellison, 2007b; Ellison, Steinfield, Lampe, 2007; Valkenburg, Peter, Schouten, 2006), questions remain regarding exactly what young people do on these sites, whom they interact with on them, and how their social networking site use relates to their other online (such as instant messaging) and off line activities. Furthermore, because of the potential to interact with known others as well as meet and befriend strangers on these sites, it is important to study the nature of their online social networks in order to get an understanding of how such online communication relates to young peoples development. The goals of the present study were to explore emerging adults use of social networking sites for communication and examine the relation between their online and offline social networks. Given the vast array of information that can be shared and the number of users, concerns regarding security and privacy issues are a recurring issue (Acoca, 2008). Some concerns involve potential threats to personal safety from the abundance of information that is assumed to be available and accessible about an individual on their online profile. Specifically, there are concerns regarding identity theft if users provide too much information (e.g., birth date, address, phone, full name etc.). In addition, there are concerns for personal safety for vulnerable users who could be stalked, or otherwise threatened. A less commonly considered threat is the possibility of social risk as a function of self-identification with minority or stigmatized groups. Although some of these concerns have surfaced in the popular media (e.g., news.cnet.com), there is little empirical investigation documenting how much and what kind of information is present in personal FACEBOOKà ¢Ã¢â¬Å¾Ã ¢ profiles to determine the potential for threats of any type, nor is there any information regarding how users differ in the information disclosed in their profiles to provide clues as to who is most likely to be at risk. India is ranked fourth in the world in terms of the Internet users. It had a total population of 1,147,995,898 people by the year 2008, out of which 81,000,000 people were using the Internet which makes 7.1% of the total population of Internet users (Internet World Stats, 2009). Social networking is catching on fast. About 56 percent users do both social and professional networking on the Web, while 29 percent do only social networking (Madhavan, 2007). There are about 10 million people who are on social networking sites. What started with the popularity of Orkut in India has now become a cultural revolution. Even most of the schools going teens have an account on some social networking site (Java, 2007). Out of the total social networking users in India, only 1 mn to 2 mn (only 10% to 20%) are on Indian social networking sites. According to a recent report by comScore, Inc. (Mishra, 2009), visits to the social networking sites have increased by 51 percent from the last year. The stu dy also found that global social networking brands continued to gain prominence in India during the last year, with Orkut, Facebook, hi5, LinkedIn and MySpace each witnessing significant increases in visitation. Orkut reigned as the most visited social networking site in December 2008 with more than 12.8 million visitors, an increase of 81 percent from the previous year. Facebook, the second most popular social networking site, had 4 million visitors, up by 150 percent since last year. To make its position strong in the Indian social networking market, Facebook has launched an Indian interface which helps local users to connect with their friends in 6 different languages e Hindi, Punjabi, Tamil, Malayalam, Telugu and Bengali. This move allows users to choose any of the six languages and use it as per their convenience by selecting the language tab. MySpace also promotes a lot of India specific content like promoting musical talent and even taking their talent abroad thereby upliftin g the Indian culture. It is followed by local social networking site Bharatstudent.com with 3.3 million visitors (up 88 percent) and hi5.com with 2 million visitors (up 182 percent). Other popular networking sites in India featured in the list in descending order are ibibo, MySpace, LinkedIn, BigAdda and Fropper. Top Social Networking Sites in India by Unique Visitors December 2008 vs. December 2007 Total India e Age 15+, Home/Work Locations (excluding visits from cyber cafes, mobile phones and PDAs) Source: comScore World Metrix Users Demography for the United Kingdom Source: Socialbakers (2010) User age distribution on Facebook in United Kingdom Source: Socialbakers (2010) Male/Female User Ratio on Facebook in United Kingdom Source: Socialbakers (2010) Age Growth on Facebook in United Kingdom Source: Socialbakers (2010) Top 10 Countries on Facebook Source: Socialbakers (2010) Research Strategy The process will be initiated by the collection of social network data through a survey of Indian and UK college students. The population sample chosen for this research purpose will be a specific number of college going students in India and UK (to be decided at a later time). The sample will be restricted to a few hundred students from each country so as to make it easier to do a survey research. The student will be encouraged to participate and share their views on the subject of content sharing and privacy. The information provided by them will solely be used for the educational research purpose. The survey employed in this study will be based on a popular survey used previously by Pew Internet and American Life Project among American teenagers. The survey used in this research may differ in some ways to adjust the variations from previous similar researches. A copy of the original survey questions is available to consult on the Pew Internet and American Life Project website. The responses in the original survey were categorical, thus quantitative analysis will require performing chi-square (à â⬠¡2) test. Collection of data The primary data for this research will be collected by conducting a survey based on numerous questions that will seek to answer the questions based on information sharing and the degree of privacy maintained by students in their social profiles. The type of information sought is presented in the next section in the form of tables. However the level of information has been limited and the original research is expected to be more comprehensive in nature and may include more variables and situations. Other secondary data presented in the research will be collected from various social networking sites, social networking research services, network usage statistics, sharing and privacy reports published by various organizations. Research Methodology The purpose of this research determines its methodology. It will be a comparative study of Indian and UK college students attitudes and behaviour towards communication patterns and controlling privacy on Social Networking Sites (SNSs). Research Questions How do the students in India and UK differ in reference to privacy on Social Networking Sites? How do the students in India and UK differ in reference to communication patterns on Social Networking Sites? The college students in India and UK will be contacted through friend lists of my own friends on prominent SNSs. I will encourage my friends to persuade their friends on SNSs. Later on I will segregate the lists of Indian and UK college students for the purpose of comparison. I am expecting a response rate of nearly 60-70 percent. The results will be formatted according to the following tables. Table 1. Public Nature of Social Network Site Profile Degree to which your online social profile is public India N= X United Kingdom N= Y Visible to everyone Visible to friends of friends Visible only to friends Table 2: Attitude towards sharing personal information on SNSs Is it alright to share the following information on social sites? India United Kingdom à â⬠¡2 N df p State in which you live City in which you live College name IM Screen Names Birth date Family members names Relationship (s) Email address (es) Links to other personal blogs or websites Mobile Number Table 3: Types of information shared on SNSs Would you share the following detail on your social profile? India United Kingdom à â⬠¡2 N df p Surname Photos of yourself Photos of your friends Photos of family members City name High School name Email addresses MP3 files Video content Events list Birthdays Table 4: Response to contacting by strangers How would you normally respond to a strangers friend request? India United Kingdom Completely ignore Respond positively Decline the request Block the user Block and report the user to avoid further contact Table 5: Communication patterns on SNSs Do you usually do the following? India United Kingdom à â⬠¡2 N df p Post messages on friends wall or comment on their posts Send private messages to someone on your friend list Send private messages to someone not on your friend list Poke your friends Poke your friends friends
Friday, October 25, 2019
Solving Problem Creatively Over The Net :: essays research papers
Solving Problem Creatively Over the Net Since I got my internet privileges last 3 month, I had learn and encounter many weird and wonderful things. I have met the ugly side of internet and learnt something called "if you overspend your time limit, the phone bill gonna be very ugly."Perhaps the most interesting moment I encounter in the internet is when I discover homepage making. I made a homepage from learning HTML language from a web site. I want my homepage to be bold and simple but most of all animation- free. As a surfer myself, I know how it feels when entering a homepage that is full with high resolution graphic and animation. The animation had to be reload and reload again. Within 2 hours I managed to made myself a homepage.I also know to make an impressive homepage,one must have a high counter number so that people will revisit the homepage again. I can't use any "sensual" word to attract people cause it's against Geocities's rule. So I did a very nasty thing. I cheated, I put an extra counter number in my homepage beside my origi nal counter number so each time when it reload it will look like this---->0101.While the only people who visited my homepage was myself, but instead the counter number show 101. MIRC The Solution When my PC suffered a data crash, I lost all my data. I lost all my e-mail address and most importantly my browser.The computer technician managed to repair my PC but he gave me an old version of Netscape.I have trouble using it in Win'95.So I downloaded the later version of Netscape.The downloading seize when it reaches 52%. I had to reload if I were to use Netscape.Instead I used MIRC to download the program because MIRC come with this neat feature that allow me to resume downloading where I left out. As a result, I get to continue my downloading at 17564 byte from a friend. I'm The Biggest Leech The rule of warez is-to download you must upload. The warez people even wrote a scipt to ban people who didn't upload when they download. To upload any program of mine to anyone will take forever, all the file I have is at least 6
Thursday, October 24, 2019
Appearance of Pre-Hispanic Filipinos Essay
The natives of the Philippine islands already wore different types of clothing and ornaments before the arrival of Spanish colonizers. The men usually wore short-sleeved, collarless jackets that reached just below the waste. The jackets were also symbols of their status in the community. The chief usually wore red, for example. The bahag was worn for the lower part. It is a strip of cloth wrapped around the waist which passes between the things, leaving the thighs and legs exposed. A head gear or a putong is a piece of cloth wrapped around the head. This is also important like the color of the jacket. A red putong meant that the wearer has already gone to war and killed an enemy. An embroidered putong meant that the wearer has killed at least seven enemies. Adornments such as necklaces, armlets or kalombiga, anklets, earrings and rings were also worn. These were usually made of gold and other precious stones. Women also wore sleeved jackets called baro and skirts called saya or patadyong. Women fancied wearing ornaments as well such as gem-studded bracelets, necklaces, earrings, and rings. Tattoos Tattoos played an important part in the appearance of pre-Hispanic Filipinos both for the men and women. Tattoos were considered to be the equivalent of medals, one had to work for and earn it. The more tattoos a person had, the more impressive was his or her war record. The Visayas was known to be the Islas del Pintados or Islands of the Painted People because it was the there that the early Spanish colonizers observed very tattooed people and Spanish writers referred to them as the pintados, meaning ââ¬Å"paintedâ⬠.
Wednesday, October 23, 2019
National Museum of Anthropology
Armageddon, judgment day, doomsday, annihilationââ¬âdark as they may be in connotation, these are the terms many people associate with 21st December 2012. In anticipation, astrologists, scientists, and media men have foreshadowed the near future with a catastrophic picture of the earthââ¬â¢s end. As time approaches, public obsession on the earthââ¬â¢s destruction continues to spread, leaving us to our own interpretations and causing panic to the general public, including of course the business sector. As the day draws near, people question themselves how they should prepare for the destruction.Undoubtedly, many religious followers will form big crowds in churches and houses of worship to plead for Godââ¬â¢s mercy. At the same time, computer programmers may think this phenomenon as another Y2K in the making, thus backing up files and creating new programs seem rational at this point. Moreover, some governments have already pronounced concern on the issue, and pushed some efforts to prevent disaster. However, in the midst of all these, it is equally wise to consider pondering on the phenomenon with skepticism. This way, we could come up with a good judgment of whether to believe the prophecy or not.The 2012 hysteria started with the observation that the 13th Baktun of the Mayan Long Count calendar, also referred to as the Aztec calendar, ends on 12-21-2012, a winter solstice (Soveign 2008; Eden n. d. ; Cooper n. d. ). The calendar which is carved on the Aztec ââ¬Å"sun stoneâ⬠is currently on exhibit in the National Museum of Anthropology and History in Chapultepec Park, Mexico City. Relevantly, some people ponder that since the ââ¬Å"sun stoneâ⬠shows days of the sun, its final day which is December 21, 2012 ultimately predicts the ââ¬Å"end of the sun.â⬠History recounts a number of phenomena predicted by the Mayas, some of which include solar and lunar eclipses, taking into consideration the rotation of the earth and its speed. T he Mayas also predicted that in 1996, people would create an inter-dimensional network that could enable people to communicate despite a far distance such as the Internet. These prophecies establish reliability of the Mayas and their Long Count calendar in predicting future astrological events.In line with the 2012 phenomenon, many are awed by the Mayan prophecy as the date corresponds with the galactic alignment in which ââ¬Å"the ecliptic of our solar system will intersect with the Galactic plane, called the ââ¬ËGalactic Equatorââ¬â¢ of the Milky Way. â⬠(Eden n. d. ) At the same time, the earth will also be aligned with the center of the Galaxy where there is maximum mass. This alignment, which never occurred before could definitely cause disruption in the earthââ¬â¢s activity. Furthermore, the said date coincides with the earthââ¬â¢s solar maximum.During this time, solar flares, sunspots, and coronal mass ejections are strongest. These flares come from the sun and shoot through planets, discharging radiation and strong electrical currents and causing problems for satellites, communications, and power grids. (Raeder, as mentioned in Eden n. d. ) An investigation conducted by NASA's THEMIS (Time History of Events and Macroscale Interactions during Substorms) satellite declares that conversely, galactic alignment will create ââ¬Å"a huge breach,â⬠allowing more sun particles to come in, possibly causing great danger to both living and non-living creatures.Implications to Different Sectors In line with the upcoming phenomenon, investors to electric and power companies should take precautions in the next three years. Due to strong electrical currents predicted by experts, power failure may likewise take into play. On the contrary, those who have invested in solar energy might reap the harvest, though this still needs in-depth investigation. Moreover, since the forecasted catastrophe is caused by the flares of the sun, it basically implie s earthââ¬â¢s need to contradict the main force, which is heat energy.To control excessive amount of heat onto the earthââ¬â¢s surface, we may need to make serious efforts to counter this by taking better care of our environment. Basically, plant and marine life, which produce the greatest amount of oxygen should be multiplied in order to save the planet. While the Mayan prediction and scientific explorations offer substantial explanation regarding the 2012 catastrophe, let us consider how other sectors of the society react to the said end. In particular, we may note portions of the business sector that thrive from the said prophecy.For example, Sony Pictures Entertainment will release a movie titled, ââ¬Å"2012â⬠in November this year. This movie, directed by Roland Emmerich, centers on the doomsday of 2012 based on the Mayan prophecy. As early as last year, the movie outfit has already released a teaser trailer and launched a Web site that not only promotes the film bu t also invites viewers to register for lottery. Similarly, a number of Web sites (i. e. , December212012. com) that have been established are used not only to promulgate the news but also to sell products that bear captions related to 2012 phenomenon.Some of these include books, t-shirts, caps, and other accessories. All these reveal a hidden agendum of how some profit makers earn from the panic they have just caused the people. These also give the impression of how this prophecy would culminate to a meaningless end similar to prophecies made in the past, such as the Y2K. The truth regarding galactic alignment offers enough warning for everyone to start preparing for the next cycle of weather disturbances and natural disasters. Although many visionaries including Nostradamus (mentioned in December212012.com) offer common views regarding doomsday, we should not allow ourselves to be victims to profit-seekers who proliferate the news only for their personal gain. May this also serve a s a call to stop sensationalizing the issue because at the end of the day, no one can really predict what exactly will happen in the future. Furthermore, may this remind media people and Web authors of their responsibility to our people to tell and live the truth. Works Cited Cooper, Adrian. ââ¬Å"The Year 2012. â⬠(n. d. ). Retrieved 4 March 2009 < http://www. whatismetaphysics. com/year2012. html>. Eden, Dan. ââ¬Å"December 21, 2012: The Real Doomsday? â⬠(n. d. ).Viewzone. Retrieved 3 March 2009 . Emmerich, Roland. ââ¬Å"2012. â⬠(2009). [Film]. NY: Sony Pictures Entertainment. ââ¬Å"History Presents Nostradamus 2012. â⬠(2006). Retrieved 3 March 2009 < http://www. december212012. com/articles/news/History_To_Air_New_Nostradamus_Special. htm>. Raeder, Jimmy. ââ¬Å"Important Update: January 2009. â⬠In Eden, Dan. ââ¬Å"December 21, 2012: The Real Doomsday? â⬠(n. d. ). Retrieved 3 March 2009 . ââ¬Å"Soveign, Mark. ââ¬Å"What Exactly will Happe n in 2012? â⬠(2008). Retrieved 4 March 2009 .
Subscribe to:
Comments (Atom)