Wednesday, July 31, 2019

Factors Affecting Women Shoppers Essay

Ministry of Women, Family and Community Development 3. 3 2013 Budget Presentation Speech by Malaysia Prime Minister. 3. 4 The Household Use of Internet Survey,2005 by Malaysian Communications and Multimedia Commisions. | | | | | CHAPTER 1 INTRODUCTION 1. 1Background of the Study The usage of Internet has grown rapidly over the past years and it has become a common means for delivering and trading information, services and goods. Nowadays, internet is not only a networking media, but it is also used as a means of transaction for consumers at global market. Women contribute the large number of Malaysia’s population. Major contribution of women to the nation always been recognized. With the increasing number of career women in Malaysia contribute further enhance of the purchasing power among women buyers. The existence of telecommunications equipment such as smart phones and tablets are not limiting time and place for them to be online. The roles of a shopper’s personal attitudes have been widely acknowledged in consumer decision-making and behavioral intentions (Wu, 2003). In particular, attitude serves as the bridge between consumers’ characteristics and the consumption that satisfies their needs (Armstrong & Kotler, 2003). Moreover, consumers’ characteristics, such as personality, as well as demographic and perception on online shopping benefits, have also been found to influence their online shopping behavior (Cheung & Lee, 2003). Thus, identifying the relative importance of each determinant of choice towards a given action could be a useful step in understanding such behavior occurs. The main aim of this study is to investigate purchasing intention of women shopper at Universiti Malaysia Pahang (UMP), with a particular emphasis on understanding and evaluating the factors which directly or indirectly influence their purchasing intentions by measuring the attitude towards online shopping. 1. 2Problem Statement Online shopping in Malaysia is a new technology breakthrough since it has just begun to assault the Malaysia retailing sector with the online shopping services (Haque et al. 2006). In order to increase online shopping in Malaysia, understanding consumer online shopping behavior and factors affecting this behavior when shopping online should be given priority. With the expansion of career women in Malaysia, women shoppers become one of the important market segments or two reasons; first, this group has money and shopping interest. According to Statistics on Women, Family and Community 2011, shows that number of female employed increased from 2000 until 2010. It shows that women in Malaysia have purchasing power (See Appendix 3. ). Second, this segment of the population has the potential of earning a greater income than other segments of the population. It will be great significance to find out the factors which influence women shoppers’ intention to shop online if we want to expand group of online buyers and the volume of e-commerce. According to to Statistics on Women, Family and Community 2011, Number of female enrollment in University is higher than ma le and the number keep increasing. In 2001, number of male enrollment student in University is 103,747 and female 142,242. In 2010, Number of male enrollment in University is 184,457 and female 278,323 (See Appendix 3. 2). The differences of student become bigger each year. The higher of education background can contribute to higher income in the future. Third, growth of online business keeps increasing. Recently, during the 2013 budget presentation by our Prime Minister has stated that; the Malaysia Government aware women not only important in a family, but also contribute to the development to the national economy. The government allocated 50 million to support women’s role. One of them is, Get Malaysia Business Online Program (GMBO) introduced to help 50 thousand small entrepreneurs, especially women to increase their online sales. Grants of thousand Ringgit Malaysia through the provision of 50 million Ringgit Malaysia by the Malaysian Communications and Multimedia Commission (MCMC) (See Appendix 3. 3). A mid-2005 survey by the Malaysian Communication and Multimedia Corporation (MCMC), only 9. 3% of Internet users had purchased products or services through the Internet during the preceding three months. Among those who did so, airline tickets were the most popular items (43. %) followed by books (15. 6%) and music (6. 8%). Amounts spent on these items were small, however, with 57. 7% of transactions worth less than M$500. Moreover, it is expected Malaysian online sales will increase every year at a high growth (See Appendix 3. 4). Opportunities of online shopping can be restricted by internal and external constraints on behavior. It is important in expl aining human behavior since an individual who has the intention of accomplishing a certain action may be unable to do so because her environment prevents the act from being performed. Moreover, there are some barriers which have contributed to the unwillingness of Malaysians to shop online because they afraid their personal information will be stole or misused by others. Despite the high potential of online shopping in Malaysia, there is still lack of understanding concerning the online shopping and its impact on marketing. Consequently a framework is needed to structure the complex system of effects of these different factors, and develop an in-depth understanding of consumers’ attitudes toward internet shopping and their intentions to shop online. 1. Objectives of the Research The objectives of this study are; 1. To determine women shoppers’ shopping attitudes towards website design. 2. To determine women shoppers’ shopping attitudes towards reliability of online retailer. 3. To determine women shoppers’ shopping attitudes towards online shopping customer service. 4. To determine women shoppers’ shopping attitudes towards trust on online retailer. 1. 4Scope of Study Literature Review Factors influencing online shopping intention toward online shopping have been researched and documented in the context of traditional consumer literature. A review of empirical studies in this area shows that the theories of Reasoned Action (Ajzen & Fishbein, 1975) and Acceptance Model (Davis, 1989) are among the most popular theories used to explain online shopping behavior. Therefore the theoretical framework f this study is based in these theories. Online Shopping Perceived Benefit Perceived benefits are advantageous results derived from attributes. The benefit can be physiological, psychological, sociological, or material in nature. Within the online shopping context, the consumers’ perceived benefits are the sum of online shopping advantages or satisfactions that meet their needs or wants. There are many differences between a physical store and its electronic counterpart. Most of the previous online shopping research has focused on identifying the attributes of online stores that promote success (Davis, 1989; Liu & Arnett, 2000). Previous studies of online shopping have established two categories of benefits; intrinsic and extrinsic. Both are important in customers’ selections to patronize the online stores. Extrinsic benefits include features such as wide selection of products, competitive pricing, easy access to information and low search costs. Intrinsic benefits include features such as design and color. Research Framework The key components of the research framework for consumer attitude towards online shopping can be seen in Figure 1. Website Design| | Online Shopping| Reliability| | | Customer Service| | | Trust| | | Hypotheses: A series of testable hypotheses were developed from the proposed research model, as shown below: Hypothesis 1: There is a significant relationship between web site design and online shopping. Hypothesis 2: There is a significant relationship between reliability of online retailer and online shopping. Hypothesis 3: There is a significant relationship between customer service and online shopping. Hypothesis 4: There is a significant relationship between trust on online retailer and online shopping. In general, base on the hypotheses, the research framework will be focusing on four factors as independent variables and propensity to shop online will be the dependent variable. . e. for the hypothesis 1, 2, 3 and 4 which are focusing on Web Site Design, Reliability, Customer Service, and Trust, it is hypothesize that there should be a positive relationship that would likely to influence the online shopping. Research Methodology To undertake this project, two types of data will be gathered. i. Secondary data This type of data will be used extensively in literature review to provide the framework of this study. Textbook, journals and internet shopping reports will be the sources of this desk research. ii. Primary data This type of data will be the main instrument used in evaluating the factors affecting women shoppers’ online shopping attitude and purchase intention. The process of gaining this input is discussed next. In doing so, the rest of this section organized into four main areas; the research design, the target population and the sample size, methods for data collection, and data analysis and interpretation. The research design In getting the shoppers data, I choose to employ descriptive research over exploratory or causal research. This type of research is suitable when a study intends to produce accurate description of variables relent to the decision being faced, without demonstrating that some relationship exists between variables. This description fits well with the objectives of this study. In addition, a cross sectional studies is elected over longitudinal studies. The former allow the researchers to assess to a larger number of customers, thus enabling them to produce a more representative data. Through this method, data is typically cross tabulated against each other to answer specific issues. This kind of data is meaningful to companies that appeal to many segments of the markets such as internet shopping. The target population and the sample size In line with the scope of the project, the population refers to the female employee of Universiti Malaysia Pahang (UMP). To further define the population, this study will only examine the behavior of women shoppers in the age bracket 20 to 55 years old. The sample elements will be chosen using systematic sampling. Within this pool of shoppers, a sample of 200 shoppers will be selected. This sample size is considered appropriate. Roscoe (1975) for instance stated ‘samples sizes larger than 30 and less than 500 samples are the appropriate for most research. Likewise, Sekaran (1994) agrees that 500 samples are the appropriate upper limit for the sample size. Methods for data collection Since cross sectional study has been chosen for this study, data will be collected through questioning. Using this method, the respondents will be identified systematically and to aid questioning the shoppers, a set of questionnaire will be designed. The questionnaires will be distributed through online and respondents will be invites through UMP Portal.

Tuesday, July 30, 2019

The Host Chapter 11: Dehydrated

Okay! You were right, you were right!† I said the words out loud. There was no one around to hear me. Melanie wasn't saying â€Å"I told you so.† Not in so many words. But I could feel the accusation in her silence. I was still unwilling to leave the car, though it was useless to me now. When the gas ran out, I had let it roll forward with the remaining momentum until it took a nosedive into a shallow gorge-a thick rivulet cut by the last big rain. Now I stared out the windshield at the vast, vacant plain and felt my stomach twist with panic. We have to move, Wanderer. It's only going to get hotter. If I hadn't wasted more than a quarter of a tank of gas stubbornly pushing on to the very base of the second landmark-only to find that the third milestone was no longer visible from that vantage and to have to turn around and backtrack-we would have been so much farther down this sandy wash, so much closer to our next goal. Thanks to me, we were going to have to travel on foot now. I loaded the water, one bottle at a time, into the pack, my motions unnecessarily deliberate; I added the remaining granola bars just as slowly. All the while, Melanie ached for me to hurry. Her impatience made it hard to think, hard to concentrate on anything. Like what was going to happen to us. C'mon, c'mon, c'mon, she chanted until I lurched, stiff and awkward, out of the car. My back throbbed as I straightened up. It hurt from sleeping so contorted last night, not from the weight of the pack; the pack wasn't that heavy when I used my shoulders to lift it. Now cover the car, she instructed, picturing me ripping thorny branches from the nearby creosotes and palo verdes and draping them over the silver top of the car. â€Å"Why?† Her tone implied that I was quite stupid for not understanding. So no one finds us. But what if I want to be found? What if there's nothing out here but heat and dirt? We have no way to get home! Home? she questioned, throwing cheerless images at me: the vacant apartment in San Diego, the Seeker's most obnoxious expression, the dot that marked Tucson on the map†¦ a brief, happier flash of the red canyon that slipped in by accident. Where would that be? I turned my back on the car, ignoring her advice. I was in too far already. I wasn't going to give up all hope of return. Maybe someone would find the car and then find me. I could easily and honestly explain what I was doing here to any rescuer: I was lost. I'd lost my way†¦ lost my control†¦ lost my mind. I followed the wash at first, letting my body fall into its natural long-strided rhythm. It wasn't the way I walked on the sidewalks to and from the university-it wasn't my walk at all. But it fit the rugged terrain here and moved me smoothly forward with a speed that surprised me until I got used to it. â€Å"What if I hadn't come this way?† I wondered as I walked farther into the desert waste. â€Å"What if Healer Fords were still in Chicago? What if my path hadn't taken us so close to them?† It was that urgency, that lure-the thought that Jared and Jamie might be right here, somewhere in this empty place-that had made it impossible to resist this senseless plan. I'm not sure, Melanie admitted. I think I might still have tried, but I was afraid while the other souls were near. I'm still afraid. Trusting you could kill them both. We flinched together at the thought. But being here, so close†¦ It seemed like I had to try. Please-and suddenly she was pleading with me, begging me, no trace of resentment in her thoughts-please don't use this to hurt them. Please. â€Å"I don't want to†¦ I don't know if I can hurt them. I'd rather†¦Ã¢â‚¬  What? Die myself? Than give a few stray humans up to the Seekers? Again we flinched at the thought, but my revulsion at the idea comforted her. And it frightened me more than it soothed her. When the wash started angling too far toward the north, Melanie suggested that we forget the flat, ashen path and take the direct line to the third landmark, the eastern spur of rock that seemed to point, fingerlike, toward the cloudless sky. I didn't like leaving the wash, just as I'd resisted leaving the car. I could follow this wash all the way back to the road, and the road back to the highway. It was miles and miles, and it would take me days to traverse, but once I stepped off this wash I was officially adrift. Have faith, Wanderer. We'll find Uncle Jeb, or he'll find us. If he's still alive, I added, sighing and loping off my simple path into the brush that was identical in every direction. Faith isn't a familiar concept for me. I don't know that I buy into it. Trust, then? In who? You? I laughed. The hot air baked my throat when I inhaled. Just think, she said, changing the subject, maybe we'll see them by tonight. The yearning belonged to us both; the image of their faces, one man, one child, came from both memories. When I walked faster, I wasn't sure that I was completely in command of the motion. It did get hotter-and then hotter, and then hotter still. Sweat plastered my hair to my scalp and made my pale yellow T-shirt cling unpleasantly wherever it touched. In the afternoon, scorching gusts of wind kicked up, blowing sand in my face. The dry air sucked the sweat away, crusted my hair with grit, and fanned my shirt out from my body; it moved as stiffly as cardboard with the dried salt. I kept walking. I drank water more often than Melanie wanted me to. She begrudged me every mouthful, threatening me that we would want it much more tomorrow. But I'd already given her so much today that I was in no mood to listen. I drank when I was thirsty, which was most of the time. My legs moved me forward without any thought on my part. The crunching rhythm of my steps was background music, low and tedious. There was nothing to see; one twisted, brittle shrub looked exactly the same as the next. The empty homogeny lulled me into a sort of daze-I was only really aware of the shape of the mountains' silhouettes against the pale, bleached sky. I read their outlines every few steps, till I knew them so well I could have drawn them blindfolded. The view seemed frozen in place. I constantly whipped my head around, searching for the fourth marker-a big dome-shaped peak with a missing piece, a curved absence scooped from its side that Melanie had only shown me this morning-as if the perspective would have changed from my last step. I hoped this last clue was it, because we'd be lucky to get that far. But I had a sense that Melanie was keeping more from me, and our journey's end was impossibly distant. I snacked on my granola bars through the afternoon, not realizing until it was too late that I'd finished the last one. When the sun set, the night descended with the same speed as it had yesterday. Melanie was prepared, already scouting out a place to stop. Here, she told me. We'll want to stay as far from the cholla as possible. You toss in your sleep. I eyed the fluffy-looking cactus in the failing light, so thick with bone-colored needles that it resembled fur, and shuddered. You want me to just sleep on the ground? Right here? You see another option? She felt my panic, and her tone softened, as if with pity. Look-it's better than the car. At least it's flat. It's too hot for any critters to be attracted to your body heat and – â€Å"Critters?† I demanded aloud. â€Å"Critters?† There were brief, very unpleasant flashes of deadly-looking insects and coiled serpents in her memories. Don't worry. She tried to soothe me as I arched up on my tiptoes, away from anything that might be hiding in the sand below, my eyes searching the blackness for some escape. Nothing's going to bother you unless you bother it first. After all, you're bigger than anything else out here. Another flash of memory, this time a medium-size canine scavenger, a coyote, flitted through our thoughts. â€Å"Perfect,† I moaned, sinking down into a crouch, though I was still afraid of the black ground beneath me. â€Å"Killed by wild dogs. Who would have thought it would end so†¦ so trivially? How anticlimactic. The claw beast on the Mists Planet, sure. At least there'd be some dignity in being taken down by that.† Melanie's answering tone made me picture her rolling her eyes. Stop being a baby. Nothing is going to eat you. Now lie down and get some rest. Tomorrow will be harder than today. â€Å"Thanks for the good news,† I grumbled. She was turning into a tyrant. It made me think of the human axiom Give him an inch and he'll take a mile. But I was more exhausted than I realized, and as I settled unwillingly to the ground, I found it impossible not to slump down on the rough, gravelly dirt and let my eyes close. It seemed like just minutes later when the morning dawned, blindingly bright and already hot enough to have me sweating. I was crusted in dirt and rocks when I woke; my right arm was pinned under me and had lost feeling. I shook out the tingles and then reached into my pack for some water. Melanie did not approve, but I ignored her. I looked for the half-empty bottle I'd last drunk from, rummaging through the fulls and empties until I began to see a pattern. With a slowly growing sense of alarm, I started counting. I counted twice. There were two more empties than there were fulls. I'd already used up more than half my water supply. I told you that you were drinking too much. I didn't answer her, but I pulled the pack on without taking a drink. My mouth felt horrible, dry and sandy and tasting of bile. I tried to ignore that, tried to stop running my sandpaper tongue over my gritty teeth, and started walking. My stomach was harder to ignore than my mouth as the sun rose higher and hotter above me. It twisted and contracted at regular intervals, anticipating meals that didn't appear. By afternoon, the hunger had gone from uncomfortable to painful. This is nothing, Melanie reminded me wryly. We've been hungrier. You have, I retorted. I didn't feel like being an audience to her endurance memories right now. I was beginning to despair when the good news came. As I swung my head across the horizon with a routine, halfhearted movement, the bulbous shape of the dome jumped out at me from the middle of a northern line of small peaks. The missing part was only a faint indentation from this vantage point. Close enough, Melanie decided, as thrilled as I was to be making some progress. I turned north eagerly, my steps lengthening. Keep a lookout for the next. She remembered another formation for me, and I started craning my head around at once, though I knew it was useless to search for it this early. It would be to the east. North and then east and then north again. That was the pattern. The lift of finding another milestone kept me moving despite the growing weariness in my legs. Melanie urged me on, chanting encouragements when I slowed, thinking of Jared and Jamie when I turned apathetic. My progress was steady, and I waited till Melanie okayed each drink, even though the inside of my throat felt as though it was blistering. I had to admit that I was proud of myself for being so tough. When the dirt road appeared, it seemed like a reward. It snaked toward the north, the direction I was already headed, but Melanie was skittish. I don't like the look of it, she insisted. The road was just a sallow line through the scrub, defined only by its smoother texture and lack of vegetation. Ancient tire tracks made a double depression, centered in the single lane. When it goes the wrong way, we'll leave it. I was already walking down the middle of the tracks. It's easier than weaving through the creosote and watching out for cholla. She didn't answer, but her unease made me feel a little paranoid. I kept up my search for the next formation-a perfect M, two matching volcanic points-but I also watched the desert around me more carefully than before. Because I was paying extra attention, I noticed the gray smudge in the distance long before I could make out what it was. I wondered if my eyes were playing tricks on me and blinked against the dust that clouded them. The color seemed wrong for a rock, and the shape too solid for a tree. I squinted into the brightness, making guesses. Then I blinked again, and the smudge suddenly jumped into a structured shape, closer than I'd been thinking. It was some kind of house or building, small and weathered to a dull gray. Melanie's spike of panic had me dancing off the narrow lane and into the dubious cover of the barren brush. Hold on, I told her. I'm sure it's abandoned. How do you know? She was holding back so hard that I had to concentrate on my feet before I could move them forward. Who would live out here? We souls live for society. I heard the bitter edge to my explanation and knew it was because of where I now stood-physically and metaphorically in the middle of nowhere. Why did I no longer belong to the society of souls? Why did I feel like I didn't†¦ like I didn't want to belong? Had I ever really been a part of the community that was meant to be my own, or was that the reason behind my long line of lives lived in transience? Had I always been an aberration, or was this something Melanie was making me into? Had this planet changed me, or revealed me for what I already was? Melanie had no patience for my personal crisis-she wanted me to get far away from that building as fast as possible. Her thoughts yanked and twisted at mine, pulling me out of my introspection. Calm down, I ordered, trying to focus my thoughts, to separate them from hers. If there is anything that actually lives here, it would be human. Trust me on this; there is no such thing as a hermit among souls. Maybe your Uncle Jeb – She rejected that thought harshly. No one could survive out in the open like this. Your kind would have searched any habitation thoroughly. Whoever lived here ran or became one of you. Uncle Jeb would have a better hiding place. And if whoever lived here became one of us, I assured her, then they left this place. Only a human would live this way†¦ I trailed off, suddenly afraid, too. What? She reacted strongly to my fright, freezing us in place. She scanned my thoughts, looking for something I'd seen to upset me. But I'd seen nothing new. Melanie, what if there are humans out here-not Uncle Jeb and Jared and Jamie? What if someone else found us? She absorbed the idea slowly, thinking it through. You're right. They'd kill us immediately. Of course. I tried to swallow, to wash the taste of terror from my dry mouth. There won't be anyone else. How could there be? she reasoned. Your kind are far too thorough. Only someone already in hiding would have had a chance. So let's go check it out-you're sure there are none of you, and I'm sure there are none of me. Maybe we can find something helpful, something we can use as a weapon. I shuddered at her thoughts of sharp knives and long metal tools that could be turned into clubs. No weapons. Ugh. How did such spineless creatures beat us? Stealth and superior numbers. Any one of you, even your young, is a hundred times as dangerous as one of us. But you're like one termite in an anthill. There are millions of us, all working together in perfect harmony toward our goal. Again, as I described the unity, I felt the dragging sense of panic and disorientation. Who was I? We kept to the creosote as we approached the little structure. It looked to be a house, just a small shack beside the road, with no hint at all of any other purpose. The reason for its location here was a mystery-this spot had nothing to offer but emptiness and heat. There was no sign of recent habitation. The door frame gaped, doorless, and only a few shards of glass clung to the empty window frames. Dust gathered on the threshold and spilled inside. The gray weathered walls seemed to lean away from the wind, as if it always blew from the same direction here. I was able to contain my anxiety as I walked hesitantly to the vacant door frame; we must be just as alone here as we had been all day and all yesterday. The shade the dark entry promised drew me forward, trumping my fears with its appeal. I still listened intently, but my feet moved ahead with swift, sure steps. I darted through the doorway, moving quickly to one side so as to have a wall at my back. This was instinctual, a product of Melanie's scavenging days. I stood frozen there, unnerved by my blindness, waiting for my eyes to adjust. The little shack was empty, as we'd known it would be. There were no more signs of occupation inside than out. A broken table slanted down from its two good legs in the middle of the room, with one rusted metal chair beside it. Patches of concrete showed through big holes in the worn, grimy carpet. A kitchenette lined the wall with a rusted sink, a row of cabinets-some doorless-and a waist-high refrigerator that hung open, revealing its moldy black insides. A couch frame sat against the far wall, all the cushions gone. Still mounted above the couch, only a little crooked, was a framed print of dogs playing poker. Homey, Melanie thought, relieved enough to be sarcastic. It's got more decor than your apartment. I was already moving for the sink. Dream on, Melanie added helpfully. Of course it would be wasteful to have water running to this secluded place; the souls managed details like that better than to leave such an anomaly behind. I still had to twist the ancient knobs. One broke off in my hand, rusted through. I turned to the cupboards next, kneeling on the nasty carpet to peek carefully inside. I leaned away as I opened the door, afraid I might be disturbing one of the venomous desert animals in its lair. The first was empty, backless, so that I could see the wooden slats of the outside wall. The next had no door, but there was a stack of antique newspapers inside, covered with dust. I pulled one out, curious, shaking the dirt to the dirtier floor, and read the date. From human times, I noted. Not that I needed a date to tell me that. â€Å"Man Burns Three-Year-Old Daughter to Death,† the headline screamed at me, accompanied by a picture of an angelic blond child. This wasn't the front page. The horror detailed here was not so hideous as to rate priority coverage. Beneath this was the face of a man wanted for the murders of his wife and two children two years before the print date; the story was about a possible sighting of the man in Mexico. Two people killed and three injured in a drunk-driving accident. A fraud and murder investigation into the alleged suicide of a prominent local banker. A suppressed confession setting an admitted child molester free. House pets found slaughtered in a trash bin. I cringed, shoving the paper away from me, back into the dark cupboard. Those were the exceptions, not the norm, Melanie thought quietly, trying to keep the fresh horror of my reaction from seeping into her memories of those years and recoloring them. Can you see how we thought we might be able to do better, though? How we could have supposed that maybe you didn't deserve all the excellent things of this world? Her answer was acidic. If you wanted to cleanse the planet, you could have blown it up. Despite what your science fiction writers dream, we simply don't have the technology. She didn't think my joke was funny. Besides, I added, that would have been such a waste. It's a lovely planet. This unspeakable desert excepted, of course. That's how we realized you were here, you know, she said, thinking of the sickening news headlines again. When the evening news was nothing but inspiring human-interest stories, when pedophiles and junkies were lining up at the hospitals to turn themselves in, when everything morphed into Mayberry, that's when you tipped your hand. â€Å"What an awful alteration!† I said dryly, turning to the next cupboard. I pulled the stiff door back and found the mother lode. â€Å"Crackers!† I shouted, seizing the discolored, half-smashed box of Saltines. There was another box behind it, one that looked like someone had stepped on it. â€Å"Twinkies!† I crowed. Look! Melanie urged, pointing a mental finger at three dusty bottles of bleach at the very back of the cupboard. What do you want bleach for? I asked, already ripping into the cracker box. To throw in someone's eyes? Or to brain them with the bottle? To my delight, the crackers, though reduced to crumbs, were still inside their plastic sleeves. I tore one open and started shaking the crumbs into my mouth, swallowing them half chewed. I couldn't get them into my stomach fast enough. Open a bottle and smell it, she instructed, ignoring my commentary. That's how my dad used to store water in the garage. The bleach residue kept the water from growing anything. In a minute. I finished one sleeve of crumbs and started on the next. They were very stale, but compared to the taste in my mouth, they were ambrosia. When I finished the third, I became aware that the salt was burning the cracks in my lips and at the corners of my mouth. I heaved out one of the bleach bottles, hoping Melanie was right. My arms felt weak and noodley, barely able to lift it. This concerned us both. How much had our condition deteriorated already? How much farther would we be able to go? The bottle's cap was so tight, I wondered if it had melted into place. Finally, though, I was able to twist it off with my teeth. I sniffed at the opening carefully, not especially wanting to pass out from bleach fumes. The chemical scent was very faint. I sniffed deeper. It was water, definitely. Stagnant, musty water, but water all the same. I took a small mouthful. Not a fresh mountain stream, but wet. I started guzzling. Easy there, Melanie warned me, and I had to agree. We'd lucked into this cache, but it made no sense to squander it. Besides, I wanted something solid now that the salt burn had eased. I turned to the box of Twinkies and licked three of the smooshed-up cakes from the inside of the wrappers. The last cupboard was empty. As soon as the hunger pangs had eased slightly, Melanie's impatience began to leak into my thoughts. Feeling no resistance this time, I quickly loaded my spoils into my pack, pitching the empty water bottles into the sink to make room. The bleach jugs were heavy, but theirs was a comforting weight. It meant I wouldn't stretch out to sleep on the desert floor thirsty and hungry again tonight. With the sugar energy beginning to buzz through my veins, I loped back out into the bright afternoon.

Monday, July 29, 2019

CASE STUDY ABDOMINAL AORTIC ANEURYSM Essay Example | Topics and Well Written Essays - 3000 words

CASE STUDY ABDOMINAL AORTIC ANEURYSM - Essay Example The initial observations showed. The patient was very cold, tachycardia with a pulse rate 100-105beats/minute, respiration 24-30/min, in respiratory distress and cyanosed. On auscultation had wheeze on both sides 4liters of oxygen was given. BP Systolic 84-80mmHg, dystolic65-62mmHg. He was complaining of back pain left side but no chest pain. The GP had been in to see him and thought it was abdominal pain and prescribed cocodamol. The patient was cachexic and pale. The working diagnosis for the ambulance crew was Dysphonic. ACCIDENT AND EMERGENCY DEPARTIMENT:- On arival vital signs 35 degree centrgrade,pulse122/min,respiration2/min, BP120/81mmHg. Blood sugar20.3mmol/L saturating oxygen 97%. On examination femoral pulse was absent. Rectal examination bowel was soft. The chest x-ray showed no focal mass. ECG showed ischemic changes of the heart. Blood gas was within normal. Abdominal x-ray showed partial gas with mega colon. Full blood count, urea and electrolyte and coagulation study were done. Urinalysis showed protein presence. NaCl 0.9% was given for low blood pressure. Morphine 10mg IV was given stat CT scan abdomen showed ruptured aortic and vascular atherosclerosis. Diagnosis of Abdominal Aortic Aneurysm was made. The patient was explained the findings, consent obtained for surgery and he was prepared for Theatre. A preoperative check list was done and he was taken to theatre with all the documents. OPERATING THEATRE:-The surgeon inserted stent graft, which is a tube of conventional graft fabric containing two stent. Because the aneurysm was ruptured the patient received 470mls cell saver blood, 11units RCC, 1000mls gelofusine, 3000mls 0.9%normal saline, 1000mls20%mannitol, 1unit platelet. OPEN AND CLOSE SURGERY ANDVANTAGES AND DISADVATAGES Abdominal aortic aneurysm is the swelling of the aorta. Aorta is the body's largest artery (the blood vessel that carries oxygen-rich blood). This artery extends from the heart down through the chest and abdominal region, where it divides into a blood vessel that supplies each leg. Although an aneurysm can develop anywhere along the aorta, most occur in the section running through the abdomen (abdominal aneurysms). Abdominal Aortic Aorta (AAA) can be treated by means of open surgery and the close or endovascular surgery. Open surgery The most common and widely used treatment for aneurysm is the open surgery. This includes the replacement of the swollen part of the aorta with artificial graft. The graft is made of material that does not wear out. It is sawn in place with a permanent suture material. The open surgery is done by making an incision depending on the location of the aneurysm. If the aneurysm is confined to the abdomen, then an incision either in the abdomen or on the side or flank may be used. The open surgery may cause a severe blood loss, greater trauma to the aorta and patient must stay in the intensive care for a longer time. This procedure is not recommended to patients who have high risk of complications. The surgery must be determined by the medical team before proceeding into the operation. Endovascular surgery or closed surgery In recent years, a treatment has been developed to repair an aneurysm without major surgery or an

Sunday, July 28, 2019

Defining concept of design thinking Essay Example | Topics and Well Written Essays - 1750 words

Defining concept of design thinking - Essay Example Design thinking is usually incorporated often into the innovation process as well as organisation. Design thinking is the art of coming up with creative and practical solutions to on-going or current problems with an aim and hope of a better future result. As such, design thinking can simply be taken to be a type of thinking that is solely focused on finding a solution (solution focussed thinking). Instead of just focusing on how to solve a specific current problem, design thinking majorly aims at finding the best future solution. As such, the concept commences with a goal. By taking into consideration both the future and present conditions and the problem parameters, design thinking makes it possible for alternative solutions to be explored and evaluated simultaneously. Therefore, unlike design thinking, the scientific methods only commence with definitions of the problem parameters on the way of finding a solution to the problem. It does not explore alternatives or possess the futu re dimension in its process. Thus design thinking looks at both ambiguous and known aspects of the problem to figure out the open available alternatives and hidden parameters which will lead to the achievement of the goal. Since the process of design thinking is commonly iterative, there exists a lot of starting points. For example, initial problem redefinition or other intermediate solutions. Design thinking is a multidisciplinary process covering fields such as engineering, law, psychology, marketing and economics among others. For example, in engineering, education is geared towards the creation of engineers who can think and create designs (Pourdehnead, et.al, 2011). However, design thinking is a complex subject and one of the approaches used in teaching engineers design is the project-based learning approach (Dym, et.al, 2005). Engineering design

Saturday, July 27, 2019

American University Essay Example | Topics and Well Written Essays - 500 words

American University - Essay Example AU is known to have six divisions including the Kogod School of Business, which is known as to oldest business school established in Washington DC. The more than 50 years of experience of the university could only speak for its stability which could, in turn, imply a tradition of excellence and relevance under present business conditions. Being known also for the school’s curriculum linking business and politics, I believe that my study of business in the university would give me the necessary preparation regarding policy and regulation and their effects on business decisions. It should is obvious now that policy and regulation would always continue to be part of business realities.As a Qatari, I believe AU will allow me to deal with other cultures since the school is known for a variety of students coming from 75 countries. This is complemented by a wide source of its faculty since one-third comes from outside the US. Based on this, I believe that the school could help me as a Qatari or US outsider in terms of being more capable to relate with different kinds of people from different cultures.On a practical or personal note, I know that I could play soccer still at AU as I used to have during my high school and some years of college life. I believe also that my stay with the university, with its location in Washington DC, would allow me to continue my enjoyment of the place since I have studied in Northern Virginia Community College for 3 years and I really liked living in Virginia.

The Development of the Professional Engineer Essay

The Development of the Professional Engineer - Essay Example epartment of Innovation (2009) states that Engineering Council maintains a set of standards that the chartered engineers are expected to follow; these recognized standards are meant for professional outcomes and ethical conduct in the industry. These standards help to ensure the employers that their engineers have confidence in their knowledge areas and have the required expertise. There are a list of member institutions who have been authorized to assess engineers for registration for this recognized title; Institution of Civil Engineers (ICE), Chartered Institution of Building Services Engineers (CIOB), Institution of Engineering and Technology etc. Finch (2008) stated in her article that according to the ICE website, there were 79,432 members recorded in 2006. A chartered engineer is required to portray a standard of performance and possess a commendable level of expertise in his field. ICE 3005 Development Objectives (2009) states that in order to acquire the title; one should follow a set of development objectives that will serve as a planning tool for learning and acquiring the desired level of expertise. These development objectives are not any assurance of the membership of the institution, but provide a strong base and foundation on the basis of which one can be confident when the level of expertise is to be judged by the professionals [2]. Fig.1 gives the membership process that is followed by ICE: In the above figure, it can be seen that ICE proposes two approaches for membership. One approach is through the individual himself and the other one is ICE approved company scheme. The common thing in both of these approaches is that development objectives are given utmost importance. If an individual comes for the ICE ‘Training under Agreement’ then a supervisor (SCE) will be appointed to him/her to help him and guide him through the process of increasing his knowledge and level of professionalism. On the other hand if the individual is not under any

Friday, July 26, 2019

Sexual harrassment in the workplace Article Example | Topics and Well Written Essays - 500 words

Sexual harrassment in the workplace - Article Example The writer believes that sexual harassment is a costly matter at company level and on a personal level for the victims. Consequences companies can face are in three levels: business consequences, legal consequences and personal consequences. Business consequences are such as low productivity among staff members. Sexual harassment reduces the victims’ morale. Some victims who were valuable to the company end up resigning from their jobs. Companies would also have to deal with unnecessary operational costs. In a hypothetical situation, these costs are identifiable when a senior member of the staff in the company goes on a business trip with a junior staff member. The senior member wants the junior member to satisfy their sexual needs and work related obligations. In that case, the cost incurred in funding the junior member’s trip is a waste of company resources (Prekel, 2010). The writer argues that the consequences also extend to a company’s reputation. For exampl e, the writer postulates a situation whereby somebody discovers that a company has cases of sexual harassment. The person finds out again that the management of that the company is lax in dealing with the harassment cases. The writer states that this revelation would dent the company’s image among clients and the public. Consequences under legal actions are such as costs the company will have to incur in litigation. By law, employers should account for any cases of sexual harassment under their purview regardless of their knowledge or ignorance of sexual harassment at the workplace. Another possible consequence could be that a harasser who has faced disciplinary action can take advantage of the fact that, the company does not have a clear sexual harassment policy to challenge the action taken against him. This reaction means that the company would have to incur the cost of defending their action in a court of law financially. On a personal level, victims get

Thursday, July 25, 2019

Virtual schooling, learning Research Paper Example | Topics and Well Written Essays - 250 words

Virtual schooling, learning - Research Paper Example The parent in such a system plays the role of a learning coach. Students from all over the state attend the virtual class. â€Å"In April 2010, K12 formed a joint venture with Middlebury College known as Middlebury Interactive Languages LLC (MIL) to develop online foreign language courses† (The New York Times, 2012). One of the most distinguishing features of K12 virtual schooling is that it customizes the education to meet the individualistic needs of children (k12.com, 2012). Learning in such a system protects the children from the negative external influences experienced by students in the brick and mortar schools like bullying and racism. In addition, virtual schooling is also very convenient for the students as the education can be received at home using the World Wide Web (Russell, 2001). Students can interact with other students through social media websites. Virtual schooling also enables parents to be involved to a great extent in the child’s studies. Many pare nts play the role of a teacher at

Wednesday, July 24, 2019

Starting Up A Business Essay Example | Topics and Well Written Essays - 1500 words

Starting Up A Business - Essay Example In the current business world, many regulations have been put to ensure that good business practices are maintained. According to Sarbanes Oxley (SOX) (2004), such regulations include the Sarbanes-Oxley Act that was enacted to enhance corporate transparency that would reduce cases of fraud and corruption. Therefore conforming to these regulations will help the business to be more accountable for its actions and financial statements being more reliable. The business will gain public confidence if such regulations are complied with.However, the cost of conforming to these regulations may be a challenge to the business since it will be very costly. For example, conforming to the Sarbanes-Oxley Act will enhance transparency in the business and hence the public will have confidence in it. This may not be felt immediately and therefore the business will enjoy the benefits after some time, say three to five years. These regulations also have an effect on decision-making. This is because, fo r every decision made, it has to match the standards of the regulatory framework hindering the flexibility in decision-making. This paper has concluded that starting up a business venture may be a challenging task considering the formalities involved, finding a source of capital and conforming to the regulations in the business environment. Starting up a business involves many activities but also operating the business is another task that if not well coordinated, may lead to the low performance of the business.

Tuesday, July 23, 2019

BARGAINING II - AT THE TABLE Assignment Example | Topics and Well Written Essays - 750 words

BARGAINING II - AT THE TABLE - Assignment Example The arising conflict issue for this paper is conflicts in performance review. There is no single employee who enjoys a negative review of his or her performance. However, it is difficult to avoid negative feedback depending on the actions of the employees during the time of the review. This is a major reason for workplace conflict in the organization. Employees become angry when they fail to get the expected pay rise, promotions, and any other performance related incentives. As a result, they lash out spreading their discontent through gossiping the management and having a negative attitude towards work. These employees often argue directly with their supervisors creating very tricky and sensitive situations that require effective communication methods to resolve. The underlying problem is the employees failing to maximize on their full potential in work due to negative performance review. In most cases, the employees trigger this negative feedback based on their actions during the period of the review. As a result, they end up getting angry with their supervisors and may even lash out at them. This creates a tricky situation that may worsen if not handled properly. Moreover, the employees might lose their jobs in the event that the situation worsens. The parties in conflict are the employees and the management or supervisors. Thus, the side I choose is that of the management or supervisors. It is up to the employees to ensure that their performance in the organization is up to the required standards of the organization. Failure to do so would result into a negative performance review that would not be taken lightly by the employees. In addition, there is no way a supervisor can give a positive performance review while the employee’s o utput is not satisfactory (Gramberg, 2006). The supervisors and the management exercised various forms of behavior during the discussion phase. One of them is

Monday, July 22, 2019

China Petroleum and Chemical Corporation Essay Example for Free

China Petroleum and Chemical Corporation Essay The net profit figure of RMB 19,011 reported under PRC GAAP was increased to RMB 21,593 under IFRS. The increase of RMB 2,582 under IFRS was due to the following reasons: Dep. and disposal of oil and gas properties RMB3,044 Acquisition of subsidiaries 443 Capitalization of general borrowing costs 389 Gain from issuance of shares by subsidiary 136 Gain from debt restructuring 82 Revaluation of land use rights 18 4,112 Unrecognized losses of subsidiaries (182) Pre-operating expenditures (169) Effect on taxation (1,179)(1,530) 2,582 The net profit figure of RMB 21,593 reported under IFRS was increased to RMB 25,577 under U. S. GAAP. The increase of RMB 3,984 under U.S. GAAP was due to the following reasons: Dep. of revalued PPE RMB 3,998 Disposal of PPE 1,316 Capitalized interest on invest.in associates 141 Reversal of deficits on revaluation of PPE 86 Foreign exchange gains and losses76 Reversal of impairment of long-lived assets 47 Exchange of assets23 Capitalization of PPE12 5,699 Deferred tax effect of U.S. GAAP adjustments (1,715) 3,984 2.The differences for CPCC between PRC GAAP and IFRS, and between IFRS and U.S. GAAP are given in the case. As mentioned in the case, treatments of the following items under PRC GAAP and IFRS are different: Depreciation and disposal of oil and gas properties Capitalization of general borrowing costs Acquisition of subsidiaries Gains from issuance of shares by a subsidiary Gains from debt restructuring Revaluation of land use rights Unrecognized losses of subsidiaries Pre-operating expenditures Impairment loses on long-lived assets Government grants (Refer pp.5-72 5-75 in the textbook) Treatments of depreciation and disposal of oil and gas properties seem to have a significant impact on reported profit. As mentioned in the case, treatments of the following items under IFRS and U.S. GAAP are different: Foreign exchange gains and losses Capitalization and revaluation of property, plant and equipment Exchange of assets Impairment of long-lived assets Capitalization of interest on investment in associates Goodwill amortization Companies included in consolidation Related party transactions (Refer pp.5-77 – 5-82) Treatments of depreciation of revalued property, plant and equipment, and disposal of property, plant and equipmentseem to have a significant impact on reported profit 3.U.K. readers of the financial statements may not find them very useful, as the information is not reconciled to the U.K. GAAP. There are differences between U.K. GAAP and IFRS, and between U.K. GAAP and U.S. GAAP. With the adoption of IFRS in the EU, this may not be a major problem anymore. However, UK companies use IFRS as adopted by the EU which in some cases differs from the IFRS issued by the IASB. 4.U.S. readers should find the information useful. However, it would be better for them if the information was reconciled directly from PRC GAAP to U.S. GAAP. 5.When a company is listed on a foreign stock exchange, it is always useful to explain the differences, if any, between accounting standards used in  preparing financial statements, and those that are stipulated by the listing requirements. The need for such explanation is reduced if the two sets of standards are comparable. However, differences can still exist due to different interpretations of the requirements. Therefore, the approach taken by CPCC can be recommended to other companies.

Study plan finished version Essay Example for Free

Study plan finished version Essay I was born over 24 years ago in Guangzhou, China. After graduating from high school I then proceeded to East Los Angeles College where I got an Associate degree in Business Administration. I later moved to California State Polytechnic University Pomona where I got a B. S. degree in Finance in August 2007. After graduating from Cal Poly Pomona, I went back to my hometown Guangzhou. I’m presently working as a human resources assistant at XXX College, Guangzhou, China, where I help research and evaluated management practices, I also engaged in various training and development programs, leadership principles and employee relations. My human resource assistant job also made me responsible for recruiting procedures, screening of candidates, coordinating interviews. Reason for Pursuing a Master degree Most of my coworkers got master degree, except me and their English are great too, most passed English at sixth level exam in China. Sometimes, I receive headhunting company call about some positions which are meant for my supervisor in international companies. The headhunting calls are meant to request for information about my boss’s. I have realize that China is a place with a lot of talented people, they have higher education and also very smart. There is increase in competitions among our youth, Hence an advanced education is necessary for me to succeed in this ever dynamic world. Secondly, China’s economic growth is rapid these years. I found that Chinese Corporations have large size of accounting department, Operation Department, Technical Department and Marketing Department, but they do not have appropriate size of Human Resources Department. The status is totally different in US. When I was studying in US, I did a lot of research program about the large Corporation in US, I then discover that the director of human resources may supervise several departments, each headed by an experienced manager who most likely specializes in one human resources activity, such as employment and placement; compensation, and benefits; training and development; or labor relations. As the global marketplace and rapidly-evolving technology are creating a new and more competitive business environment, I believe that professional human resources management is an increasing vital area in China. Therefore I decided to get my master degree. Why US When I plan to further my education, there are many places I can choose. There are three places in my decision, Hong Kong, Australia and US. I made some comparison here: Advantage Disadvantage Hong Kong Nearly my family and I can meet and take care of my parents easily. HK university require high GPA, my GPA is low. Hong Kong’s mother language is Cantonese; it is not a good environment to improve English. Australia Easy to apply a University and get a visa there. Good English Environment. There is few National University in Australia. They follow British education system. And tuition is expensive. USA Most mature and advanced education. I got my bachelor degree in US; I adapt the US education system. The tuition is expensive and very hard to get a student visa. After prolonged meditation, and communication with my parents, I made a decision to go back to US get the master degree. Study Plan I plan to study Master Degree in Human resource Management at Golden Gate University which last for one and a half year. Because I understand that my low GPA in undergraduate has weaken my application. But I strongly believe that Golden Gate University has high quality graduate program for me, and reasonable tuition. They gave me the foundation and in-depth training, what I needed for the contemporary marketplace as a human resource or personnel manager. They have dynamic classes and laboratories where you discuss theory and practice from real-life situations and problems. The Master of Science degree in Human Resource Management requires completion of 33 units in the graduate program. Each course listed carries three semester units of credit. The foundation program I took in undergraduate University can be waived 6 units. I still have 27 units to finish. I plan to take 12 units each semester, therefore I think I can finish the program in one and a half year. Financial Supporter I started working a couple of months ago, I do not have enough money, but my mum will support my tuition. She is working at a famous, well paid company in China and also she is a superintendent, she has enough money to support my education. Also she believes now it is the best time to go out to further education, because she will retire in 5 years time. At that time if I need her support, she said she might not have enough money to give me. Returning After I accomplish my studies in US, I will go back to China. Personally, I am an extremely miss-home girl; I enjoy staying with my parents and family eating and drinking every week in Guangzhou. I remember when I was studying in US, I used to talk to my parents on the phone everyday. Furthermore, I believe in the developmental potentials of Human resource in China, after I graduated I think there are more opportunity waiting for me.

Sunday, July 21, 2019

Importance of Ethical Hacking

Importance of Ethical Hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avo id attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers are nothing but authorized users for the sensitive information or networks of an organization. Using hacking techniques for handling employees in organization and for solving critical judicial cases is not a crime. An ethical hacker use same tools and actions as performed by normal hacker. The main aspect in ethical hacking is that target permission is essential for performing hacking on the information. Ethical hacking can be used while performing security audits in the organization (Kevin Beaver, 2010). Thus, ethical hacking can help in testing the networks by finding out various vulnerabilities. In ethical hacking, a user will get permission to access the important data. Aims and Objectives Aim To investigate the importance of ethical hacking and its implementation in organizations Objectives Finding the importance of ethical hacking tools Understanding the ethical hacking process Implementing ethical hacking tools in an organization Purpose of Study The main of this research is to recognize ethical hacking tools that can be used in organizations and government agencies. Testing the networks is essential in order to maintain security for the organizational information. The difficulties in networks have to be recognized by the security professional so that they can be solved before effecting the organization operations (James S. Tiller, 2005). This research also focuses on carrying out the ethical hacking tools in a particular organization. The advantages of using ethical hacking in business firms can be evaluated by this study. Ethical hacking tools can be implemented in various fields of applications. Various security professionals can be efficient in ethical hacking tools by undergoing a training process. Another major intension of this research is to identify the importance of ethical hacking professionals in providing security to the networks. (Nina Godbole, 2008). Thus, this research entirely focuses on ethical hacking tools which can be implemented for testing the networks. Research Context This research on ethical hacking can be very useful to many organizations as it can provide clear idea about hacking tools. Security professionals and normal users have to be trained well in order to use hacking tools. The importance of ethical hacking while solving many judicial cases can be identified with the help of this research. Management of an organization can be benefited largely through implementing hacking tools. Hacking tools implementation process can be understood with the help of this research (Ronald L. Krutz and Russell Dean Vines, 2007). Network security or data security engineers in organization will come to know about new ethical hacking methods and techniques that are available in the present market by concentrating on this research. The concepts in this study provide knowledge related to security improvements. Business users can hack the data in order to use it for the purpose of evaluating a correct process. Management has to take precautionary measures while a llowing the professional to hack ethically because data may be misused (Rajat Khare, 2006). Scholars who concerned with information security can take the help of this study for attaining the knowledge on hacking systems. Many organizations are encouraging ethical hacking professionals in order to control their business operations effectively. Email systems, data bases and communication applications can avoid or identify attacks by adopting the hacking tools. Malicious attacks on the information or software can be prevented by implementing this research while using ethical hacking tools. The organizations that concerned with security in networks have to use ethical hacking tools (Greg Meyer and Steven Casco, 2002). Hence from the above discussion it can be understood that, business firms, investigating agencies, government systems and web users can make use of this research to achieve the important information in authorized manner. Chapter 2: Literature Review Ethical Hacking and its importance The word hacking is defined as an illegal use of the others computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. This is mostly found in the countries like United States and many other countries. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system (Rajat Khare, 2006). The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into others system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking (Kevin Beaver, 2010). In the types of hacking system one of the most common h acking is ethical hacking. This is defined as the services that provides the securities for the customers networks, information assets and identifies the vulnerabilities to maintain the reputation of the corporate sectors before it exploit the company. This type of the hacking system provides the high securities to the customers methodologies and techniques to yield high qualities of infrastructures. The ethical hacking system includes some of the service like: Application Testing War Dialing Network Testing Wireless Security System Hardening Application Testing This is an uncover design or the logic flaws which result in the compromising with the unauthorized accessing of the systems, networks, applications or the information regarding the systems. This application testing is used for investigating and identifying the extent and the criticality of the problems exposure to the thick client (Java) and thin client (web browsers) applications. This application testing includes the services like client-side application testing and web application testings (Joel Scambray, Mike Shema and Caleb Sima, 2006). The client-side application testing is the process of developing the software that is used for the measuring the integrated security into the client software constituents. In this system this testing application is based on the gathering of the information by observer using the reverse engineering system. War Dialing This is one of the services that are provided by ethical hacking. War dialing is a method of dialing a modem number to identify open modem connection that supplies access in a remote way to a network for targeting a particular system (Kimberly Graves, 2007). This word is originated from the day the when the internet has come into the existence in most of the companies. This follows the method of scanning to find the strength of the network connection. The tools of War dialing work on the concept that organizations do not pay attention to dial-in ports like they do towards the firewalls. Network Testing The networking testing services of the ethical hacking provides the information on the exposures of the network, services, and solutions on the convergence, protocols and system devices including the virtual private network technologies. This testing process includes a number of constitutes in external and internal devices. It also analyzes the applications of the voice over Internet protocol within the environment of the organization (Greg Meyer and Steven Casco, 2002). The main goal of the network testing application is to make obvious demonstration of the political effects on its development. By making use of this application into the organization, it provides a complete enlightenment to the work for determining the result in the organization. Wireless Security Wireless security services measures the security in the available architecture to provide a guidelines to ensure the system integrity and accessibility of the resources. The working of wireless security is based on the three phases. In the first phase of the operation it identifies the activeness of the wireless networks (Cyrus Peikari and Seth Fogie, 2003). The team of the ethical hacking demonstrates the exposure to the attackers with the space in the wireless network. In the seconds phase of this system it implements a normal users to evaluate the measures of the security that secures the infrastructures of the organization to control the accessing of the devices. During the third phase the team will try to utilize the discovered threats to gain access on other networks. This provides the security in wireless local area network, virtual private network, intrusion detection system and wireless public key infrastructure. System Hardening The system hardening stresses on the network vicinity. Security is the prime factor that determines the level of integrity of the information and resources used in the computing. Effective deployment of the security controls unauthorized, accidental disruption if resources in information technology (Kevin Beaver and Peter T. Davis, 2005). The system hardening assessment is complemented in three phases. The ethical hacking team will analyze the network to identify the loop holes in security updates and other frequent security defects. Scanning of the remote access devices is done for finding out the vulnerabilities. The configuration vulnerabilities and missing security updates are determined in the initial phase. In the second step the host operating system is examined to determine the services available for remote users and their level of impact. All the TCP/IP services and also the Telnet, FTP, Send-mail, DNS and others are tested (James S. Tiller, 2005). The packet fragmenting and loose source routing are used in an attempt to bypass filtering routers and firewalls. The last phase is complicated as the team uses the information gathered from the first two steps to mine the weaknesses and threats that were identified to gain access to the host system. Before the start of the three steps the boundaries for actions and events are determined. Hence from the above context it can be stated that ethical hacking is a methodology that is used for gathering the information on the hacker. The ethical hacker is the expert who is hired by an organization to solve the problems related to hacking in their network and computer system. Need for Ethical Hacking The process of employing someone to hack ones company is ethical hacking. Ethical hacking is one of the tools that are used to judge the security programs of the organizations. It is also referred as penetrating testing, red teaming, intrusion testing, vulnerability and even security judgments. Each one these has different meanings in different countries. Hacking is also described as new development of the existing programs, software and code. It makes them better and more efficient (James S. Tiller, 2005). Ethical hacker can know the details of computer while hacking and become the security professional. It involves in foot-printing, scanning, tacking all the secured information. Ethical means a philosophy with morality. Hackers hack systems to detect dangerous, unauthorized access and misuse (Shon Harris, Allen Harper, Chris Eagle and Jonathan Ness, 2007). Threat and vulnerability are the two dangers the hacker has to face. The hacking report must be confidential as it should face the organizations security risks. If this goes wrong in any way the organization results in fatal, penalties and loss. For example: computer crime is done by misuse of their hacking skills. The need to hack is for catching the thief. Ethical hacking is the correct method to make your computers work properly (Kevin Beaver, 2010). Ethical hacker needs higher level skills compared to penetration testing. Penetration testing is same as ethical hacking but the hacker uses the penetrating tools and tests the security danger. Ethical hacking is known as White Hat in some of the literature. It tests both the security and protective issues whereas penetrating test mainly leads with the security issues (Asoke K. Talukder and Manish Chaitanya, 2008). Some of the websites and companies offer the training, but they cannot be created they are self-made. Various types of testing need different types of softwares and tools. Game freaks use hacking technology in order to win the game. Hackers will d iscover many ways to hack like trial and error method, operating systems, online and determining the threats. Ethical hacking is done by hackers on behalf of the owners, and in normal hacking they use their skills for personal use (Debra Littlejohn Shinder and Micheal Cross, 2008). Cyber terrorism includes common hacking techniques such like viruses, email bombs and natural disasters. Thus ethical hacking is done by hackers on owners request. Mainly this is seen in corporate companies and organizations. Ethical hacking techniques are used for game cheat codes, hacking accounts and other for good result. Majorly used for fight against cyber terrorism and to take preventive action on hackers Types of ethical hackings Ethical hackers use various methods for breaking the security system in the organizations in the period of cyber attack. Various types of ethical hacks are: Remote Network: This process in especially utilized to recognize the attacks that are causing among the internet. Usually the ethical hacker always tries to identify the default and proxy information in the networks some of then are firewalls, proxy etc. Remote dial up network: Remote dial up network hack identify and try to protest from the attack that is causing among the client modern pool. For finding the open system the organizations will make use of the method called war dialing for the representative dialing. Open system is one of the examples for this type of attacks. Local Network: local network hack is the process which is used to access the illegal information by making use of someone with physical access gaining through the local network. To start on this procedure the ethical hacker should ready to access the local network directly. Stolen Equipment: By making use of the stolen equipment hack it is easy to identify the information of the thefts such as the laptops etc. the information secured by the owner of the laptop can be identified (Kimberly graves, 2007). Information like username, password and the security settings that are in the equipment are encoded by stealing the laptop. Social engineering: A social engineering attack is the process which is used to check the reliability of the organization; this can be done by making use of the telecommunication or face to face communication by collecting the data which can be used in the attacks (Bryan Foss and Merlin Stone, 2002). This method is especially utilized to know the security information that is used in the organizations. Physical Entry: This Physical entry organization is used in the organizations to control the attacks that are obtained through the physical premises (Ronald l. Krutz and russel dean Vines, 2007). By using the physical entire the ethical hacker can increase and can produce virus and other Trojans directly onto the network. Application network: the logic flaws present in the applications may result to the illegal access of the network and even in the application and the information that is provided in the applications. Network testing: In this process it mainly observes the unsafe data that is present in the internal and the external network, not only in the particular network also in the devices and including the virtual private network technologies Wireless network testing: In this process the wireless network reduces the network liability to the attacker by using the radio access to the given wireless network space. Code review: This process will observe the source code which is in the part of the verification system and will recognize the strengths and the weakness of the modules that are in the software. War dialing: it simply identifies the default information that is observed in the modem which is very dangerous to the corporate organizations. Techniques and tools required for ethical hacking Ethical hacker needs to understand how to find the network range and subnet mask of the target system. IP addresses are used to locate, scan and connect the target systems. Ethical hacker also should find out the geographical location of target system. This can be done by tracing the messages that are sent to destination and the tools used are traceroute, Visual route and NeoTrace to identify the route the target (Kimberly Graves, 2007). Ethical hacking should use right tools or else task accomplishment of task effectively is difficult. Many security assessment tools will produce false positive and negative or may they even miss susceptibility to attacks. In case of tests in case of physical security assessments they miss weakness. In order for ethical hacking specific tools have to be used for the task chosen. The easier the ethical hacking will become if many tools are used. The right tool must be used at right place. The characteristics in tools for ethical hacking is it should ha ve sufficient document, detailed reports should be there on the discovered attacks regarding their fixing and explosion, Updates and support. The general tools used for ethical hacking in case to find passwords are cracking tools such as LC4, John the Ripper and pwdump (Bragg, Mark Phodes Ousley and Keith Strassberg, 2004). The general tools like port scanner like SuperScan cannot be used to crack passwords. The Web-assessment tools such as Whisker or WebInspect tools are used for analysis of Web applications in depth. Whereas network analyzer tools such as ethereal cannot give good results. While using the tools for any particular task it is better to get feedback from the simple Google searches such as SecurityFocus.com, SearchSecurity.com and Itsecurity.com will give nice feedback from the other security experts which makes ethical hacking easy and to select the right tool. Some of the commercial, freeware and open source security tools are Nmap (Network Mapper), Etherpeek, Super Scan, QualysGuard, WebInspect and LC4, LANguard Network Security Scanner, Network Stumbler and ToneLoc. The capabilities of many security and hacking tools are often misunderstood, such as SATAN (Security Administrator Tool for Analyzing Networks) and Nmap. The other popular tools used in ethical hacking are Internet scanner, Ethreal, Nessus, Nikto, Kismet and THC-Scan (Kevin Beaver, 2007). Cain and able is a ethical tool used for recovery of windows UNIX problems. This is only password recovery tool handles an enormous variety of tasks. It can recover the password by sniffing the network, cracking the encrypted passwords using Dictionary and Cryptanalysis, recording VoIP conversations, decoding scrambled passwords, revealing the password boxes, uncovering cached passwords and analyzing routing protocols. Ethereal is a fantastic open source tool used as network protocol for UNIX and Windows. It allows examining the data which is present in disk or file and can capture the data. This is also known as Wire shark. It has many powerful features which have very rich display filter language and ability to view the TCP session. Another cracking tool Aircrack is the fastest available cracking tool (John Hyuk Park, Hsiao-Hwa Chen and Mohammed Atiquzzaman, 2009). Thus proper tools and techniques has to be used for better hacking and it will be easier by using more and more tools required. Hacking operating system Linux is the operating system which is most useful software that supports and will be helpful to identify the passwords and uses in detecting interruption there are many software tools are utilized for the hacking and security tools are used for the Linux. The tools which are using in this are not harmful tools this is especially used to protect. John the ripper: John the ripper is nothing but password hacking software technique which is usually used to develop for the UNIX operating system. This the most significant process which is used for password testing as it joins all password crackers into single package and the auto detects password hash types which involves the customizable cracker (Ryan, David R. Mirza Ahmad, 2002). It can be run among the different encrypted password methods which involves various crypt password hash forms where usually found on the different UNIX operating systems that is based on the DES, MD5 etc, Kerberos AFS and windows like XP, 200etc.Generally passwords are placed in the LDAP and other tools. Various types of components are used to expand the capability and for involving the MD4 related password hashes. The other one is the NMAP; Nmap is the used to protect the network. It is especially used to identify the network related services on the computer network by generating the map of the network . Nmap is having the ability to identify the services on the computer network instead of this it never advertises its service detection protocol (James turnbull, 2005). However the Nmap can collect many details regarding the remote computers. This will involve the operating system, and uptimes etc are the software products that are used to execute the service, and are used to involve on the local area networks and also on the dealer of the remote network card. Nmap can be run on the linux. Linux is the most important operating system and the windows are the second most important operating system. The other operating system used is Nessus, this software is used to scan the virus. The main aim of this software is used to identify the virus on the tested system such as; the virus will permit the data on to the network (Mark Carey, Russ Rogers, Paul Criscuolo and mike Petruzzi, 2008). Default passwords are utilized on the network accounts. This software is also called as the external to ol which is used to launch the attack. By making use of the mangled packets rejection of the service among the TCP/IP can be done. Nessus the best software used to scan the virus. Many organizations through out the world are using this software. The check Rootkit is the normal program which helps the administrator to check their system for the known rootkits ( James Turnbull, 2005). This program is the shell script by using the LINUX tools similar to the strings and the grep commands to seek out to carry out the core programs for the signatures with the executed process status command to look for inconsistency. This program alternatively use own commands to run. This tool will permit check rootkit to get confident the commands upon which it depend a bit more. Applications and resources Ethical hacking is nothing but the one which performs the hacks as security tests for their systems. Ethical hacking can be used in many applications in case of web applications which are often beaten down. This generally includes Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) applications are most frequently attacked because most of the firewalls and other security are things has complete access to these programs from the Internet. Malicious software includes viruses and Trojan horses which take down the system. Spam is a junk e-mail which causes violent and needless disturbance on system and storage space and carry the virus, so ethical hacking helps to reveal such attacks against in computer systems and provides the security of the system. The main application of this is to provide the security on wireless infrastructure which is the main purpose of present business organization (BT, 2008). Ethical hacking has become main stream in organizations which are wishing to test their intellectual and technical courage against the underworld. Ethical hacking plays important role in providing security. Resources are the computer related services that performs the tasks on behalf of user. In Ethical hacking the resources are the core services, objects code etc (James Tiller S, 2005). The ethical hacking has advantages of gaining access to an organizations network and information systems. This provides the security in the area of Information technology called as Infosec. This provides security to the high level attacks such as viruses and traffic trough a firewall. This has been providing the security for various applications which are even bypassing the firewalls, Intrusion-detection systems and antivirus software. This includes hacking specific applications including coverage of e-mails systems, instant messaging and VOIP (voice over IP). The resources i.e. devices, systems, and applications that are generally used while performing the ha cking process are Routers, Firewalls, Network infrastructure as a whole, wireless access points and bridges, web application and database servers, E-mail and file servers, workstations, laptops and tablet PCs, Mobile devices, client and server operating systems, client and server applications (Kevin Beaver, 2007). Ethical hacking tests both the safety and the security issues of the programs (Ashoke Talukder K and Manish Chaitanya, 2008). Hence from the above context it can be stated as the ethical hacking is important in the present scenario as providing security is very important now a day. This is very important in web applications as the hacking can be easily done in this case. Problems Ethical hacking is the backbone of network security. The basic problems with this is trustworthiness of the Ethical hacker because lets take an example if a person has been appointed to do Ethical hacking, to provide security for the bank financial issues if the person is not trust to believe this is not safe as the person only considered as thief. Sometimes the big organizations face any problem like there passwords has been hack, this case hiring professionals is very expensive and the organization need to spend a lot on this (Ethical Hacking, 2009). Ethical hacking is just the security to the problem it is not the ultimate solution to it. Ethical hacking report must be kept confidential because they highlight the organizations security risks and attacks. If this document has been falls into the wrong hand the result would be very disastrous for the organization, the main drawback here is the entire information of the organization will be in hands of wrong person and which leads to the loss of the company (Kimberly Graves, 2007). Ethical hacking generally involves breaking down the computer applications and by collecting specific information from the target the ethical hacker can successful to access the information and can reveal it. This results in that highly sensitive information about the targets security capabilities is collected and maintained far away from the owners control. If this information fall into wrong hands results in real attack on the company and another problem is if the information is leaked to the public or stockholders, the business will be in risk, which results in all types of disasters, including negative character by media, loss of customers and legal consequences (James Tiller S, 2005). Ethical hacking use tools while it performing the activity, if the methods and tools are used incorrectly they cause damage (Dr. Bruce Hartly V, 2003). Hence from the above context it can be stated as Ethical hacking provides security but behind th at it provides the disadvantages like the Ethical hacker should be trusted by the organization or business and in case sometimes highly professionals may cost the organization very much so that company has to provide from the unplanned budget and if it goes into the wrong persons hand the business will be in danger and loss of the organization will takes place. Chapter 3: Research Methodology of Hacking Data types: Data type is defined as the format of a data storage which is used to store different set of values. It tells about which type of data to be stored and where to be stored. Data is stored in computer memory. There are two types of data. They are primary data and secondary data. Both primary and secondary data illustrates the gathering of information and to satisfy the goals of business. Primary data is nothing but it is the data which is collected newly and for the first time. The primary data is original. It is the fresh data and is never gathered before. Secondary data is the data which is collected by others (Norman Blaikie, 2009). The data is collected from newspapers, magazines and journals. Secondary data is gathered before primary data since it is time consuming. Data is gathered newly in case of primary data so it takes much time. Secondary data consumes less time. Primary data is used in ethical hacking since the data gathered in this type of data is very efficient. Ethical h acking is used legally for the official purposes. Since primary data is unique and is not compared with any one, it is used in the process of ethical hacking (Rajat Khare, 2006) Hence from the above context it can be said that data types are useful in the ethical hacking. Case study: According to media and people the word hacking denotes misuse and collapse of computers. They describe it as unfair method of solving the problem. In the view of ethical hackers the word hacking refers to creative. One of the organization namely Amazon, it is not proposed to point out the lesser features but deals with tricks for working the company efficiently. Hackers and developers will create new characteristics for Amazon. They bring out the creative thinking and innovative ideas by their work in company (Paul Bausch, 2003). Mainly the ethical hacking is the good way to improve the existing methods and qualities. Many organizations follow these because one can know the administrative password of employees, can reach the behaviour of them and working performance. Employee performance and his project carryout can be studied through ethical hacking. These hackings look easy for them since they are engaged with the security firms to protect the Amazon fields. Not only in Amazon in e ach and every org

Saturday, July 20, 2019

Asian Crisis Essay -- essays research papers fc

The beginning of the Asian financial crisis can be traced back to 2 July 1997. That was the day the Thai Government announced a managed float of the Baht and called on the International Monetary Fund (IMF) for 'technical assistance'. That day the Baht fell around 20 per cent against the $US. This became the trigger for the Asian currency crisis. Within the week the Philippines and Malaysian Governments were heavily intervening to defend their currencies. While Indonesia intervened and also allowed the currency to move in a widened trading range a sort of a float but with a floor below which the monetary authority acts to defend the currency against further falls. By the end of the month there was a 'currency meltdown' during which the Malaysian Prime Minister Mahathir attacked 'rogue speculators' and named the notorious speculator and hedge fund manager, George Soros, as being personally responsible for the fall in value of the ringgit. Soon other East Asian economies became involved , Taiwan, Hong Kong, Singapore and others to varying degrees. Stock and property markets were also feeling the pressure though the declines in stock prices tended to show a less volatile but nevertheless downward trend over most of 1997. By 27 October the crisis had had a world wide impact, on that day provoking a massive response on Wall Street with the Dow Jones industrial average falling by 554.26 or 7.18 per cent, its biggest point fall in history, causing stock exchange officials to suspend trading. Countries such as Thailand, Indonesia, Malaysia and the Philippines have embraced an unusual policy combination of liberalisation of controls on flows of financial capital on the one hand, and quasi-fixed/ heavily managed exchange rate systems on the other. These exchange rate systems have been operated largely through linkages with the United States (US) dollar as their anchor. (1) Such external policy mixes are only sustainable in the longer term if there is close harmonisation of economic/ financial policies and conditions with those of the anchor country (in this case, the United States). Otherwise, establishing capital flows will inevitably undermine the exchange rate. Rather than harmonisation, there seems to have actually been increased economic and financial divergence with the US, especially in terms of current account deficits, inflation and interest rates. The... ..., 'Crisis into Catastrophe?' Financial Times (London), 31 October 1997, p. 15. 8.Max Walsh, 'Aid Parcels to Japanese Banks', The New Zealand Herald, 18 November 1998, pp. 25-26; Max Walsh, 'Time for Japan to Save the World', The New Zealand Herald, 21 November 1998, pp. 29-30. 9.John McBeth, 'Big is Best: Indonesia's Rescue Package Draws on the Thai Experience', Far Eastern Economic Review, 13 November 1997, pp. 68-69; Greg Sheridan, 'The Asian Malaise is Curable', 28 November 1997, p. 13. National Business Review 10.Charles Lee, 'The Next Domino?' Far Eastern Economic Review, 20 November 1997, pp. 14-16. 11.Eric Ellis, 'Kim Inspects Mouth of IMF Gift Horse', Australian Financial Review, 24 November 1997, p. 12. 12.Teresa Wyszomierski and Christopher Lingle, "Fortress Japan Under Siege', Australian Financial Review, 19 November 1997, p. 20. 13.Ian MacFarlane, Forbes Magazine Business 1998, pp24-27. 14. Forecasts Lowered', The New Zealand Herald, 20 November 1998, pp. 29-30. 15.Reserve Bank of New Zealand, semi-annual Statement on Monetary Policy, November 1997, pp. 2-13. 16 A New Revolution by Peter Smith As published in NZBUSINESS, August 1998, PP

Friday, July 19, 2019

Personal Narrative- High School and Church Youth Group Essay -- Person

Personal Narrative- High School and Church Youth Group The most distinguishing and memorable moment of my life was entering high school for the first time. I feel that the event of starting high school was the starting point of what kind of person I was going to become. Not only did I start going to a new kind of school, but I started attending the high school youth group at my church. I also had the privilege to start working on my first car. Without this experience, I feel that I would not be where I am right now. This memorable moment started with my transition to the high school youth group at church. Moving up to the high school group at my church was exciting yet frightening. Fortunately, I was welcomed with great joy and fellowship. I got involved in the activities very quickly. I made many friends, which gave me an incentive to actually go to church. I went on two mission trips before starting school. This helped me to see God work through me and through my youth group. Within our youth group, we had a youth choir called Deliverance. Because of my involvement in that ...

The Right Stuff :: Essays Papers

The Right Stuff In the past couple of semesters the topic of expatriates has come up a lot. I’m beginning to see that’s it’s an important issues since we now live in a global market. I do believe that if your successful in your career the likely hood of receiving an expatriate assignment is high. The Houston Business Journal conducted a survey of one hundred companies and sixty percent predict that the expatriate population will increase, while twenty-five percent said it will stay the same (HBJ, June 98). Since the probability is high that I will be asked to go to another country, I’ve had to do some serious reflecting. Would I be a good expatriate employee? There are qualities one must have in order to become a successful expatriate. According to Jeff Freeburg a consultant for H.R. International certain qualities one should have are motivation, receptiveness, Patience, sense of humor, initiative, confidence, dependable, savvy, persistent and decisive (Freeburg 99 ). I feel that I do have most of these qualities but is that enough? I am fortunate that I’m able to speak Spanish fluently, I can also read and write it. It was easy for me to pick up different languages since I’m a first generation U.S. citizen; I grew up with my family members speaking both languages to me. Because of that exposure I have the desire to learn other languages, I can read French and hope to learn Italian and Japanese if time allows me to. Even though I speak a different language I have never left the states to visit other countries either for personal or business reasons. Shannon Roxborough author of The Guide to International Work Success lists other important things one must do before venturing abroad. An expatriate should learn some history in order to deal better with the cultural differences. Learn the business culture, as we have read in the case study of Buckeye Glass Company in China, we have learned the importance other cultures place on building a personal relationship that goes beyond the normal business relations in this county. Learn how to negotiate, American business professional must learn how to conduct proper negotiations in other countries, not every one rushes to the table to hammer out an agreement. Also as we’ve read other countries use tactics such as long pauses or touching during negotiations that seem strange to us but are perfectly normal for them.

Thursday, July 18, 2019

Supporting Career Women

Salvaging Sisterhood: Supporting Career Women Women and the Labor Market: the link grows stronger, by Susan Shank examines women and the emergence of their attachment to the labor market. This article takes a look at the labor market changes of women between the ages 25 and 54. Changes with these ages began throughout the post-World War II period and the rate of increase accelerated in the mid-1960's (Shank, 1988). The author links the rapid changes to various social and economic changes that have occurred in the United States.Historically women stayed home for the large part of their childbearing years, owever during the first world war women entered the workforce after the GI's returns women focused more on traditional family duties. After the Second World War far more women entered the workforce and even upon the return of the soldiers continued to stay in the workforce and those that did leave soon returned to work a few years later. According to age women in the 45 to 54 lead th e return to work postwar period. Rates for the 34 to 44 age group increased as well while 25 to 34 age group hardly changed at all.These were the postwar baby-boom years and most married women orking outside the labor force because of their child and family responsibilities (Shank, 1988). In 1960 women of childbearing in large number numbers began to enter the labor market. The spike in women workforce participants showed a very sharp decline in birth rate during this time period as well. Women began to show greater interest in education and work as time progress and delayed traditional familial norms. Black women had a much higher rate of activity in the workforce postwar than that of white women.The gap has since then narrowed by 1987 the rates for both whites and black women were similar. Hispanic women however were much less likely than black or white women to be apart of the workforce due to high birth rate, generally low educational attainment, and cultural roles that emphasiz e women's home and family roles. Women who where married stayed outside the workforce much longer than those that were single especially with the emergence of divorce and single women pregnancies. In 1987, 79 percent of women under the age of 18 were in the labor force compared to 67 percent for women with children (Shank, 1988).Working women generally were working full time hours 35 hours or more per week, to support heir families voluntarily while only 17 percent worked part time. Sixty-eight percent of women 25 to 54 worked for a full year and an additional 10 percent worked 40 to 49 weeks (Shank, 1988). The article written in 1988 states that there will be a future spike in women's participation in the workforce over the next decade is expected to increase 10 percentage points. I feel this article is an accurate picture of how I see the work force nas changed and the picture ot women today.Women nave become more involved in the workforce, bill paying, as well as family managemen t. This article interests me in terms of career and women because my significant other is the single working woman. From a personal perspective women planning a wedding and participate in pre marriage counseling, may try to examine and resolve some of their feelings about work and â€Å"women's work†. Their partner may have some more traditional views about work while she love it and find herself consumed with the high of a fast-paced extremely full life.I recognize the strain of stretching oneself too thin and figuring out how to manage married life, the balance of spousal needs and her routine eelings of her independent self. Controversies have held back improvements for training new counselors and development of treatment systematic treatment procedures. In order to explore treatment protocols, the debate must be addressed to help validate the suggestions of the impact of mothers' employment on family relationships. These consist of exploring the criteria development of th e designation, and effectively learning how to implement accountability for working career mothers'.The literature-based debate indicates how stresses in family relationships dynamics an be stabilized between home and work time, for full-time or part-time working mothers. Today, working mothers symptoms of normality are constructed in a wide variety of ways as viewed by other counseling colleagues, legislators, and the media. These criteria serve to indicate what can be considered the channel of communication for mother's expression of her genuine identity in the American culture.The Journal article read for this assignment related to career mothers, is entitled, â€Å"The impact of mothers' employment on family relationships† and was centered on my personal life style. The study was conducted by South Bank University as a qualitative case study of mothers working in an accountancy firm in both in the hospital and in the accountancy firm setting, in the London area. The inter views for the case study were completed in 2001 utilizing 37 mothers and 30 fathers in couples who had at least one pre-school age child.The information collected from the study revealed surprising results from the mothers, as well as, the fathers perspective. The case study focused on certain highlighted areas such as, how stresses in family relationships could arise as much from the quality of time pent at work by mothers as well as the amount of time they spent at work (emphasis added). During the interview process mothers and fathers were interviewed separately, in order to gain ‘her' and ‘his' perspective on the relationships, (Callender, Edward, Reynolds, 2003).The sample contained a spread of mothers working full- time or part-time in both the workplaces, and across higher, intermediate and lower status Jobs in the two organizations. The majority of the fathers were employed full- time. The study revealed interesting facts in reference to the dynamics of home and work time for mothers. The case study focused mainly on the management of mothers work time versus the amount of time they spend at work. Family-friendly policies and flexible working practices were the key components, as they have an impact on family life.More focus was given to the extent of autonomy and control that mothers experience in the workplace. The article stated that hospital mothers in higher status Jobs were perceived as having low â€Å"time sovereignty' because of an increased emphasis on managerial roles (Callender, Edward, Reynolds, 2003). It also states, by contrast, that in a devolved organizational structure, mothers in lower tatus Jobs in the accountancy firm tended to see themselves as having high levels of time sovereignty (Callender, Edward, Reynolds, 2003).These are key concerns from the case study that employers may consider addressing in the future (Callender, Edward, Reynolds, 2003). The most interesting facts, revealed from the case study, were the fat hers perspective of the impact mothers working and family relationship. A large portion of fathers established that it was beneficial and enhancing to their relationship. Other qualities that enhanced some relationships were the appreciation nd recognition that enabled their partners to express different aspects of her identity.This finding was impressive because the positive response acknowledged the fact that mothers are appreciated and respected for helping their partners financially as well as with raising a family. The fathers also gave an excellent confirmation that mothers are good partners as well as being ‘good' mothers. Fathers also expressed and recognized that the quality of the mother-child relationship enhances the child's ability to develop useful skills, and to provide them with a ositive role model (Callender, Edward, Reynolds, 2003).In contrast, some fathers were not proud or supportive of their partner's Job. A few fathers had mixed feelings or expressed a n egative reaction because enough time was not being devoted to the family (Callender, Edward, Reynolds, 2003). The fathers expressed that the demands of the mother's work load, and not being able to meet the children's needs completely, caused extreme tension in the household (Callender, Edward, Reynolds, 2003). Personally, the choice of a qualitative study to do the research was very informative.Utilizing 37 mothers and 30 fathers, with at least one pre-school child, was a well-balanced statistical advantage in the research of the case study. Women's contribution in the workforce has conduct to the study of career aspirations of women. Career aspirations are impacted by dynamics such as gender, socioeconomic status, race, parent occupation and education level, and parental expectations. Women have become progressively more engaged in the workforce, and salaried employment of women has shifted from partly traditional female-oriented Jobs to more non-traditional, more formerly male-or iented careers.This analysis of literature presents an impression of women's contribution in the workforce and the evolution of women's career development and career aspirations in the latter half of the 20th century. Despite their increasing numbers, women have tended to enter the workforce in lower-status, lower-paying Jobs, and remain clustered in a limited number of conventional careers (Tinklin, Croxford, Ducklin, & Frame, 2005). Because women's career choices were restricted, their earnings lagged behind their male counterparts with comparable education and experience (Farmer, 1985; Stephenson Surge).Income earnings have been found to increase with educational level and years employed (Day ; Newburger, 2002). However, women earned roughly two- thirds the income of their male counterparts. This discrepancy in income was partially attributed to the disparity between traditionally male and traditionally female occupations. For example, women are less likely to be employed in scie nce or engineering Jobs, as these are considered traditionally male occupations. However, females who are employed in these Jobs earn roughly 20% less their male counterparts (Graham ; Smith, 2005).A barrier is any obstacle that prevents forward movement or any event or condition that makes career progress d tticult (Brown ; Barbosa, 2001). Barriers are considerable factors in the career development process, and the start of such barriers often begins when women are children. Such barriers are reinforced throughout women's schooling, college, and work, and they become more complex over time (Brown & Barbosa; Stephenson & Burge, 1997). In contrast, career aspirations characterize an individual's direction toward a desired career goal under epitome circumstances.Career aspirations are influenced by factors such as gender, socioeconomic status, race, parent's occupation and education level, and parental expectations (Khallad, 2000; Watson et al. , 2002). The literature review provided an overview of the research evidence in examining such factors as the parent's role in career behavior and how they affect individual's career decisions. In recent years, studies such as these indicate the increased awareness of the impact of socioeconomic status, race, gender, and on the career decision-making process and career development of women.Results of studies examining the effects of race on career aspirations have been mixed (Mau & Bikos, 2000; and Hellenga et al. ,2002) noted that previous research typically found African Americans to possess lower career aspirations than their European American counterparts. (Osipow and Fitzgerald, 1996) supported this notion, stating African Americans, Hispanics, and Native Americans exhibit considerably lower educational and occupational outcomes than Caucasians.Additional studies asserted people from minority groups, particularly those from lower class backgrounds, had more restrictive factors nfluencing their career aspirations comp ared with Caucasian persons from higher class backgrounds. In contrast, a study conducted by Arbona and Now (1991) determined there were no ethnic differences with regard to their career aspirations and socioeconomic status. Although few studies exist regarding effects of socioeconomic status on career choice, researchers agree socioeconomic status influences career choice (Gottfredson, 1981; Sellers et al. , 1999).Mau and Bikos (2000) cited previous findings showing a positive association between a familys socioeconomic status and aspirations. Youth from upper socioeconomic statuses were more likely to be well informed of and decide on professional career occupations. In contrast, Brown and Barbosa (2001) found career aspirations of young females who came from low-income families were confined to experiences of their relatives and friends. Influential siblings are thought to play a key role in the career development of adolescents from lower socioeconomic backgrounds (All, McWhirte r, & Chronister, 2005).The differences in findings relative to this literature review indicate more information is necessary and that the target population must be tudied relative to key components such as the focus on successes, achievements, strengths, weaknesses, resources, and the abilities and acquired skills of the children, youth and working mothers. In conclusion, it appears that it is imperative that all of these areas be further studied for working mothers to have effective and successful career development outcomes.