Saturday, August 31, 2019

Smart Phone

Smartphone Security Survey of U. S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute © Research Report Smartphone Security Survey of U. S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones.In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above.We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure such sensitive information. We also recommend that security policies state these precautions and ensure they are enforced. Following are the most salient research highlights: ?Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of business and personal usage means much more sensitive and confidential data is at risk and suggests that the smartphone is with them most of the time. Sixty-six percent admit they keep a moderate or significant amount of personal data on their smartphones. Such personal data include email address, name, contact lists, photos, videos, anniversary and personal dates, music, Sixty-seven percent of consumers surveyed say they are concerned about receiving marketing ads and promotions.However, less than half (44 percent) are concerned about having a virus attack on their smartphone when it is connected to an insecure Internet network. In addition to using it as a phone, 89 percent use their smartphone for personal email and 82 percent use it for business email. A smaller percentage of consumers use their smartphones for financial transactions including payments. In fact, 38 percent of consumers use the smartphone to make payments and 14 percent use it for banking. Sixty-six percent of consumers have paid at least once for an item using their smartphone.In addition, 12 percent of consumers say they have experienced a f raud attempt vis-a-vis a mobile payment scheme. Despite this fact, only six percent say they check their mobile bill or statement every month and eight percent check the statement when the bill is higher than usual. Fifty-eight percent of consumers say that based on how they used the smartphone for purchases, Internet browsing and location they were targeted by marketers. Accordingly, 67 percent say they are very concerned or concerned about aggressive or abusive marketing practices. ? ? ? ? ? Ponemon Institute © Research Report Page 1 ?Despite security risks, less than half of consumers use keypad locks or passwords to secure their smartphones. In addition, only 29 percent of consumers said they have considered installing an anti-virus product to protect their smartphone. Forty-two percent of consumers who use social networking apps say they allow smartphone versions of well-known social networking applications such as Facebook to access the same key chains, passwords and log-ins that they use of their desktops, laptops or tablet. Only 10 percent of consumers say they turn off Bluetooth â€Å"discoverable† status on their smartphone when not in use. ? ?Ponemon Institute © Research Report Page 2 Part 2. Key Findings In this report we have organized the findings from the study according to the following topics: Consumers’ use of smartphones, consumers’ awareness about the security risks that accompany their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are not managing these risks. Consumers’ use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 percent use it for personal but some business use (Bar Chart 1).Only 6 percent of consumers surveyed use their smartphone exclusively for business. Bar Chart 1. What best describes your smartphone use? Both busine ss and personal use equally 40% Mostly personal but some business use 25% Personal use only 16% Mostly business but some personal use 13% Business use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in Bar Chart 2, 35 percent say they purchased it without any reimbursement.Bar Chart 2: Who purchased your smartphone and who pays the monthly service fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute © Research Report Page 3 Smartphones can perform a wide range of tasks. However, the most popular use next to the phone is business and personal emailing.The mo st popular smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to music (Bar Chart 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding may indicate why many in our study are not concerned about the security risks. Because consumers believe its primary use is as a phone or to email they may think (incorrectly) that there are negligible security or privacy risks.Bar Chart 3: Tasks that consumers do on their smartphone Phone Personal email Business email Address book Texting Store or move data Internet browsing Obtain documents Calendar View documents Listen to music Schedule tasks Shop Camera Social networking 0% 20% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% 100% 120% As reported in Bar Chart 4, 66 percent have paid for an item via their smartphone once, irregularly (once every two months) or regularly (maybe once a month). Fifty-one percent were surprised that they were charged for a service of product they signed up for.Bar Chart 4: Key questions about smartphone use Each bar defines the percentage yes response Did you ever pay for an item via the mobile phone? Did you every sign-up for a service or product on a mobile without realizing that there would be a cost? Have you ever signed a terms and conditions request on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute © Research Report Page 4 Consumers store confidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a significant amount of personal data.Bar Chart 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar Chart 5: How much p ersonal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned future purchases, purchase history, health data and security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6: What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary & personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% 100% 120% Ponemon Institute © Research Report Page 5 Many consumers surveyed have used email and text to sign u p for services or products without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent made what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7: The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website Other 12% 34% 31% 46% Despite these unexpected charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills every month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8: Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it every month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not certain. Ponemon Institute © Research ReportPage 6 Consumers’ awareness about the security risks that accompany their use of smartphones Marketing messages—not privacy and security risks—worry consumers. While the majority of consumers do not feel their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unwanted marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9: Attributions about privacy and security risks The agree response is a combination of strongly agree and agree.The disagree response is the sum of unsure, disagree and stro ngly disagree. I worry more about the security of my desktop or laptop computer than my smartphone. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a hacker will attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone while traveling. I do not worry about being tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% Agree Disagree They also worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the surv ey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are aware that what is described in the scenario could happen to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios: 1. Location data embedded onto image files can result in the tracking of the smartphone user. 2. Smartphone apps can transmit confidential payment information (i. e. credit card details) without the user’s knowledge or consent. Ponemon Institute © Research Report Page 7 3.Smartphones can be infected by specialized malware called â€Å"diallerware† that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. 5. Financial apps for smartphones can be infe cted with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. . A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet through a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain basic security protections that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based o n how the phone is used for purchases, Internet browsing and location. As a result, the user may receive unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers’ level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local WIFI network is insecure (35 percent). Bar Chart 10: Are you aware of the following smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Jailbreaking Spyware Social network snafu Auto transmission Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 4 0% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute © Research Report Page 8 Bar Chart 11 reports consumers’ actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk – wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11: Have any of these situations happened to you? Each bar defines the combined very concerned and concerned responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers’ level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very concerned or co ncerned about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12: Are you concerned about of the following smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware Unwanted marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disabled through â€Å"jailbreaking† but generally are not aware of this risk.In Ponemon Institute © Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While the re is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone: the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, â€Å"diallerware† infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. Line Graph 1: Summary of consumer responses to eleven smartphone securi ty risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute © Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be important when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13: How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have neither keypad locks nor passwords on their smartpho ne. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14: Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute © Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn off Bluetooth â€Å"discoverable† status on their device when they are not using it. Only 10 percent set up download controls on their smart phone to protect against apps and games that may contain malware. Bar Chart 15: Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute © Research Report Page 12 Part 4. Methods Table 1 summarizes the sample response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers located in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A total of 793 respo nded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final sample of 734 consumers (2. 5 percent response rate). Table 1: Sample response Sample frame Invitations sent Total returns Rejections Final sample Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are Apple’s iPhone, RIM Blackberry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows Mobile. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 Sprint HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other Total Pct% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% 100% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure Total Pct% 24% 19% 12% 9 % 3% 3% 2% 2% 1% 1% 25% 100%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full or part-time position. Pie Chart 1: Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2: Employment status 5%2% Employee Homemaker Retired Student Unemployed Business owner Active military 13% Ponemon Institute © Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their region in the United States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3: Household income Pie Chart 4: Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast Mid-Atlantic 14% 20% 61 to $80k 81 to $100k 101 to $150k 12% 18% Midwest Southeast Southwest 15% 17% Pacific west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute © Research Report Page 14 Part 5. Conclusion The key finding from this research is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being published about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more worried about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if lost or stolen could result in financial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that auditors who did not pa rticipate are substantially different in terms of underlying beliefs from those who completed the survey.Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute © Research Report Page 15 Appendix: Detailed Survey Responses Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sa mple frame Invitations sent Total returns Rejections Final sample Part 1. Background Q1a. Please select the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) Total Q1b. Please select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other Unsure Total Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally Total Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. % 2. 5% Pct% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% Pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% Pct% 6% 13% 16% 25% 40% 100% Ponemon Institute © Resea rch Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges Total Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking Travel assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never Total Q6a. Have you every signed u p for a service or product on your mobile without realizing that there would be a cost?Yes No Total Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other Total Pct% 35% 13% 10% 8% 34% 100% Pct% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 51% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute © Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No Unsure Total Q9. Have you ever been the victim of mobile payments fraud? Yes No Unsure Total Part 2. Attributions Q10. Please rate each one of the following statements using the scale provided below each item. Strongly agree and agree shown . Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute © Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? Concerned and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the user’s knowledge or consent. Were you aware that this could happen?Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? Concerned and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called â€Å"diallerware† that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. We re you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? Concerned and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total Very concerned 29% Concerned 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% Very concerned 31% Concerned 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute © Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Res ponse Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute © Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, p eople use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute © Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone’s security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute © Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases Purchase history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I don’t have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute © Research Report Page 23 Q28a. Do you synch your smartp hone with any of the following devices? Laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly Daily Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I don’t use social networking apps Total Q30. Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes No I don’t have children Total Q32b. If yes, do you use your children’s smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute © Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? Full-time employee Part-time employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual household income? Below $ 20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute © Research Report Page 25 D4. What is your highest level of education attained? High school Vocational University or college Post graduate Doctorate Other Total D5. Please check gender: Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my lifestyle I often give advice to others about how best to use computers and software I need to ask for help if something goes wrong with my computer I always try to spend as little time as possible online I am often confu sed when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I don’t feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute © Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to [email  protected] org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Resea rch Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute © Research Report Page 27

Friday, August 30, 2019

Reliance Communications Essay

Reliance Communications is capable of delivering services covering entire gamut of information and communication value chain. Their products and services include infrastructure setting, applications and consultancy. Its corporate clientele includes 600 Indian, 250 multinational corporations and over 200 global carriers and owns and operates the world’s largest next generation, IP enabled connectivity infrastructure, comprising over 150,000 kilometres of fibre optic cable systems in India, Europe, Middle East and the Asia Pacific region. Our project is on gaining market share in the field of Postpaid Division & Data Services (GPRS & 3G) and the strategic decisions involved in it. The division that we will be working on is the Direct & DST-Postpaid division. We have Mr. Anil Das (Head-postpaid and 3G services for Rcom Odisha) mentoring us on this project. The initial idea is to explore the scope of this project from various angles and evaluate the decisions taken by RCom to achieve their desired market share. We found out that globalisation has made telecommunication an integral part of the infrastructure of the Indian economy. The telecom sector in India has developed as a result of this. The telecom sector experienced a rapid growth over the past decade on account of regulatory liberalisation, structural reforms and competition, making telecom one of the major catalysts in India’s growth story. Much of this growth can be attributed to the growth in mobile telephony (number of mobile subscribers grew from 10 million in 2002 to 392 million in 2009) and the growth in the service and IT and ITeS sector. Telecom has emerged as a key factor for economic and consumer growth. The contribution of the sector to GDP is growing (more than doubled). Telecom is one of the fastest-growing industries in India (on an average 8 million wireless subscribers are added every month)

Thursday, August 29, 2019

Critically Evaluate The Sustainability Strategy Of Coca-Cola Company Coursework

Critically Evaluate The Sustainability Strategy Of Coca-Cola Company - Coursework Example This is different from the convectional business model where it was relegated outside the business strategy, being left for business experts, innovators and perfectionists. Coca-Cola is a multinational non-alcoholic beverage company headquartered in Atlanta, Georgia, with over 200 foreign subsidiaries. The company has a market capitalization of 178.67B USD and an enterprise value of 193.97B USD (Isdell, N. & Beasley, 102). It has maintained competitiveness in the contemporary business environment due to its corporate sustainability program integrated in its business strategy. This paper presents a critical evaluation of how effectively the company is integrating sustainability issues in to business strategy. It also explains the specific reasons the company is adopting sustainability. The paper also highlights some failures experienced in maintaining a competitive sustainability strategy as well as an action plan to improve its performance. Coca-Cola Business Strategy Statement of Lo ng-Term Intent Coca-Cola Company has a long term intent for sustainability that is supported by the presence of the position of Chief Sustainability Officer since 2011, which has significantly contributed to its sustainability agenda with the theme dubbed ‘Live Positively’, which is focused on three pillars of people, society and environment (Lester & Tice, 59). The theme is accomplished through partnership with governments as well as non-governmental organizations. The sustainability efforts have been entrenched in all aspects of business, including the company’s affiliates and subsidiaries. Sustainability reports are published annually, which indicates the company’s commitment to its long-term intent (Jean et al, 82). To accomplish long-term sustainability, the company has set smart objectives such as promotion of healthy living, livelihood improvement in poor communities, empowerment of vulnerable groups that are shared among the business linkages. Redu ction of the calorie level in its beverages is aimed at addressing the health concerns of consumers with regards to high calories in the diet. Product differentiation has successfully led to the development of over 800 beverages that have little or no calories, such as Diet Coke (Allen, 8). Moreover, the company has strived to achieve a 9% reduction in calorie per portion globally. This strategy has positioned its products competitively by expanding the market share to new consumers who prefer low calorie drinks Further to promote healthy living, the company focuses on establishing a physical health and nutrition program in every nation where it has set up business (Webb, 61). The company recognizes the

Wednesday, August 28, 2019

American Policy, Judicial Activism and Restraint Assignment

American Policy, Judicial Activism and Restraint - Assignment Example In giving its ruling, the conservative group of the Roberts Court improved the cause of "corporate personhood" through giving large corporations the capacity to drown out the voices of the electorate by the production and circulating of quasi-media messages promoting or demeaning certain political candidates. In giving corporations this power, the Court opened the door to making them the most powerful purveyors of public opinion, devoid of requiring accountability or truthfulness (Manje 102). This is a power that should not be granted to corporations, thus I close this question is support of judicial restraint powers. In Furman v. Georgia, the justices considered the death penalty as a violation of the Fourteenth Amendment because these death sentences were cruel and unusual in the same manner that being struck by lightning is unusual and very cruel (Griffins 304). They argued the fact that people charged with rape are simply convicted, but those charged with petty crime want to be executed. I feel that the death penalty is a deterrent to crime so long as it is imposed on the necessary crimes that deserve to be punished with the death penalty. For instance, rapists, people who are charged with more than three counts of any crime. This will work as a very good example of deterring crime rates (Griffins 305). What would make one form of capital punishment cruel and unusual is the virtual belief that genuinely innocent individuals will be executed and that there is no likely way of repaying them for this miscarriage of justice? What constitutes cruel and unusual punishment, for instance, is the agony the innocent friends and family of criminals have to also undergo during the execution. However, the judges took into consideration the message they were sending to likely culprits in order to deter crime. (Griffins  304) Haidt’s research gives me greater insight into why people feel differently than I do about politics and government due to the simple fact that their always opposing views about politics that is why there are liberalism and conservatism.

Tuesday, August 27, 2019

SA Adventures Unlimited Essay Example | Topics and Well Written Essays - 1250 words

SA Adventures Unlimited - Essay Example The first organized trip by SA Adventures Unlimited which was a three-week excursion across Ecuador and Peru that became a resounding success which prompted the business to expand its size and scope. From that single trip, it has grown to having 16 different excursions scheduled that includes trips to Central America. Additional personnel were also recruited that shared their similar passion for South America and the outdoors. As the business grew, the Rodriguez’s however are beginning to experience problems. Two of the tours were beyond the budget because of unanticipated costs which eroded the year’s profit. They also had to refund 30 percent of the tour fee because the group was stranded for five days in Blanco Puente after missing a train connection. Customer satisfaction is declining as customers were beginning to complain about the quality of accommodation and the price of the tours. The Rodriguez’s were also having hard time tracking cost across their projects and did not know their financial position until after their taxes were prepared. Clearly, the Rodriguez’s are having hard time coping with the demands of their expanding business. Excursions were poorly planned resulting in missing train connection and poor accommodation which severely undermined customer’s satisfaction that ultimately reduced their profits. Worst, their inability to track their costs across projects made it more difficult for them to plan future excursions which could undermine the business’s viability.... Each excursion or project that SA Adventures organizes is unique, complex, non-routine, one time effort that is limited by time, budget, resources with the objective of satisfying the customer (Gray & Larson, 2011). Thus, it is imperative that SA Adventures Unlimited must have a good grasp about Project Management to effectively and efficiently utilize human and nonhuman resources to reach predetermined objectives (Gray & Larson, 2011). Such, the extent of the application of Project Management to SA Ventures Unlimited is pervasive in all its operation due to the very nature of business which is organizing excursions that is project based. Project Management is complex. Unlike the traditional task in an organization where functions are segmented, Project Management is non-routinary and requires a lot of  problem  solving, coordination and time management to get a project done on time, within budget and in accordance to customer’s specification  (Gray & Larson, 2011).   The repercussion of failing to define, plan, executive and deliver the service is already obvious in the SA Adventures Unlimited case that it resulted to an erosion of profit and uncertainty to plan future excursions. The nature of the job at SA Adventures Unlimited also required interfacing between the customer and the companies capabilities. Being the interface between the company and the client, SA Adventures Unlimited personnel have to reconcile customer expectation with what is feasible and reasonable  (Gray & Larson, 2011)  and have to resolve issues that may arise as they execute the project. In executing the project, this would require a delicate balancing act between the trade-offs of time, cost and performance to get a

Monday, August 26, 2019

CVS Essay Example | Topics and Well Written Essays - 750 words - 1

CVS - Essay Example To keep growing its elderly client base, the areas that it should emphasize on include, optimal satisfaction, accuracy and speed, helpfulness and courtesy, and improve knowledge of the pharmacists. This way, the elderly population in need of confrontational services from qualified pharmacists can get personal advice with regard to understanding their personal health concerns, get consistent access to appropriate medication, receive customized services, and encounter short wait times. By engaging in these practices, CVS would be in a position to outperform major competing drug stores and address the needs of the elderly appropriately (Smart Retailing, 2014). To encourage older people to visit CVS Pharmacy, it should engage in practices that allow it to market its services actively to attract new clients. The store should lay emphasis on the advantages that its services bring in all the marketing activities it undertakes, mostly mailings, advertisements, and Internet marketing. For instance, allowing senior citizens to question their prevailing drug choice is vital in encouraging them to keep visiting the store. Although costs as well as convenience play a key role in determining the ways that older patients choose a pharmacy, care is a key determinant. Hence, it is vital for CVS to consider embarking on strong marketing through advertisements, mails, and other strategies that are appealing to old people. This way, the store would manage to ask whether clients are getting the care and convenience they need from the pharmacy (Smart Retailing, 2014). Promoting what makes a drug store unique is vital in encouraging senior citizens with medical problems to consume products from the pharmacy. The company can market low prices or 24/7 service provision. The pharmacy needs to play its key strengths as well as implement a messaging initiative to enforce the unique services it offers, such as service delivery

Sunday, August 25, 2019

What are the effects of enforced codes in our society Essay

What are the effects of enforced codes in our society - Essay Example However, there are also codes that are enforced by virtue of principles that do not necessarily provide benefits to the individuals. These often come as offshoots of certain principles that emphasize more on the supposed well-being of society when, in fact, are not beneficial for its members. Many of these are hidden in the seemingly good intentions of the basic and secondary school systems as well as in the manner that parents raise their children. Unfortunately, these happen to be the enforced codes that are most influential to young individuals. Concepts regarding the existence and effect of such enforced codes are discussed John Taylor Gatto’s Against Schools and in Michael Kimmel’s Bros before Hos: The Guy Code. Both Gatto and Kimmel raise the points of these rules in the school and in the home respectively. Gatto explains that the public system in the US is producing individuals who are schooled but not educated, people who are much easier compelled into submissio n to authorities, whether state or corporate, due to the lack of analytical capabilities. On the other hand, Kimmel argues that the initial phase of the development of the sexist concept of masculinity is right at the point of boyhood, that this is further reinforced by the popular notions on male bonding and interaction, and that this has also led to certain emotional weaknesses of the male. Both discuss the enforcement of certain codes that have profound effects on the individuals and ultimately on society itself. While Gatto expounds on the instilling of the wrong kind of attitude and the mis-education of American public school students through state school policies, Kimmel writes about the upholding of the concepts that are unhealthy emotionally and socially. The enforced codes channeled through the schools and homes are far more powerful than those done through laws written by any other institution to which individuals belong. Such

The Next five years Essay Example | Topics and Well Written Essays - 4500 words

The Next five years - Essay Example According to Mitroff (1995) the use of Inductive-Consensual IS is undemocratic. In this allegation, democracy's fundamental purpose is to have unrestricted discussion of key issues, intense arguments and debates by those on opposing sides. "Democracy becomes perverted when it is not only confused with consensus but reduced to numbers" (Mitroff 1995). It should also be noted that Inductive-Consensus IS is not the only one making use of agreement. Each mode of enquiry, IS has a different/independent definition and concept of agreement. Inductive-Consensus IS is the only IS that is essentially dependent on the concept of agreement. As a final point, though agreement and consensus are essential in attaining conclusions, they should not be trusted fully nor considered as the final consideration for deciding all essential questions. The first part of the modeling of Analytic-Deductive IS in human behavior is incorrect. Human beings do not initiate their inquiries into vital social problems but instead begin with already complex inputs. Generally, all human inquiries starting points are messes. The root word "mess" means that every human problem is associated and involved inextricably with every other human problem (Ackoff 1972). The approach of breaking down a complex problem into its separate parts doesn't hold for human problems of any importance. Accordingly, mess actually means a system of interacting problems as the inputs into any process of human problem solving are certainly "messes". Dialectic (Conflict) Dialectic IS is not limited to only problems related to technical or business but is applicable to all problems that human face. This involves the use of the dialectic inquiry system. Under this, an objective outcome is produced as a result of an intense argument and discussion between two opposing positions. This makes it different from inductive-consensual inquiry system that produces agreement prior to or during an intense deliberation. Although the Dialectic form obviously comes from the long and rich history of philosophy, it is not firmly a product of it. Dialectic system is used as a tool for practical decision rather than an abstract idea. Moreover, Dialectic system serves as the bridge that binds to the contemporary thinking. Multiple realities (Multiple views of problems) Under multiple realities, data and facts about a problem are greatly dependent on the model that when taken together will form an "inseparable whole". Apart from the assumption of inductive-consensual IS, data from multiple realities are not independent or self-organizing entities. Moreover, Multiple Realities do not have the assumption that there is only one way of defining important problems, which significantly separates it apart from Inductive-Consensual and Analytic-Deductive IS. This system focuses on executive (person) as critical aspect that cannot be purely formalized due to its dependence on the application of wisdom. "The absence of wisdom will result in system degeneration into a monumental exercise in nonsense" (Churchman 1982). This is one

Saturday, August 24, 2019

How can the child's position in the family and the size of the childs Essay

How can the child's position in the family and the size of the childs family influence his or her development - Essay Example r of significant studies dealing with family size and child’s IQ development, it has been noted that a large number of studies routinely show that family size is related considerably to children’s IQs: the larger the family, the lower the children’s IQ is likely to be (Zajonc 1976). This can be because of the reason that less crowded families gets parents to be more involved with their children giving them more attention than larger families. Size of the family has had a depressing effect on children’s IQ in Scotland and France alone with families of four or more children scoring below the mean for the general population. In a separate study in France and Holland, family size has been found to operate somewhat independently of socioeconomic status when it comes to children’s IQs. This is to say that children from smaller families have the advantage when it comes to cognitive development irrespective of their parents’ economic status, and large families tend to depress children’s IQs irrespective of their parents’ economic status. Moreover, as family sizes get larger, the child’s percentage of passing an admission test automatically drops according to Zajonc analysis index. There are already literary supports on the importance of birth order in the family that affect the child’s personality and other characteristics. Child’s position in the family proves to be significant according to detailed clinical studies, however factors are so numerous and varied in defying statistical generalization. There is still much doubt whether the child’s status constitutes a psychological entity accounting to the share of attention from parents. Children in the family may have the same physical environment they are exposed to but receive different attitudes and expectations for each from others depending on the child’s birth order and sex (Lindgren & Watson 1979). Reading Development. In a study concerning child’s reading influences, ordinal

Friday, August 23, 2019

Dental Coverage Article Example | Topics and Well Written Essays - 1000 words

Dental Coverage - Article Example 23% of the total population have moderate to severe gum disease while 15% of the entire population experience toothache very often (Government of South Australia n.d p. 5). Mostly the adult population is the working people in the society. The high numbers of people affected by oral health affects their total out capacity. As the population suffers from the poor health their productivity levels are very low due to lack of concentration. Additionally, not only do they waste a lot of time while seeking medical attention, they also have low self-esteem, a factor that significantly contributes to the low output of employees. Consequences of poor performance in any job position are either facing the cask or demotion, which is a rather lighter charge. The article, â€Å"Trends in access to dental care among Australian adults 1994–2008† looks at the relationship between access to dental care and the time taken by adults in Australia over a number of years. As the trends improve among the people, so do the people’s oral health condition, which subsequently leads to the people job performance. Poor dental health is associated with poor job performance among the employed people. According to the article, with time, people have increasingly had access to dental care, as statistics reveal. ... Further in 1999, it maintained a downward trend and was reported at 36.2%. Over one in every two adults made a dental visit to the dentist in the 12 months before the study that took place between 1994 and 2008 (Harford, Ellershaw & Spencer 2011, p. 6). These statistics show deteriorating dental health coverage. A person with a dental problem does not exhibit high concentration levels when working. Statistically, the high rate of people visiting the dentist is alarming. The more people visit the dentist, the more the time they spend away from their work. Promotions based on attendance are likely to escape these individuals. The higher the numbers of hours these people spend at the dentists’ the more they lose promotional opportunities at their job places. The lack of insurance among the employed people has also negatively impacted on job retaining capacity among the employees. They also lose in their motivational packages. Oral health is a major determinant of the general heal th and hygiene of a person. The report, â€Å"Projected demand and supply for dental visits in Australia: analysis of the impact of changes in key inputs† shows the various effects and factors that are likely to take place in case the number of dentists increase in Australia. Definitely, just as the economic law of demand and supply illustrates, the increase in supply of dentistry services leads to a positive increase in the people’s job retaining capacity as well as their chances of promotion. The report indicates that the number of dentists is likely to increase by 33% from what it was in 2005 to a larger figure in 2020. Experts anticipate that the number of dentists will grow from 10,104 to 13,465. Subsequently, the total aggregate supply of dental visits is expected to

Thursday, August 22, 2019

Religious and Ethnic Groups Paper Essay Example for Free

Religious and Ethnic Groups Paper Essay Mahayana Buddhism is considered to be a emanation or illusion of the highest power which is referred to as Buddha. They also believe that there has been many Buddhas on earth and in the whole universe. There are 3 bodies (forms) of Buddha: 1, Body of essence. The indescribable, impersonal absolute reality, or ultimate truth that is nirvana (infinite bliss). 2, Body of bliss or enjoyment, Buddha as divine, deity, formless, celestial spirit with saving power of grace, omnipotence. 3, body of transformation or emanation. An illusion or emanation in human form provided by the divine Buddha to guide humans to enlightenment. Anyone can achieve Buddha hood and those who choose this path to help others to become liberated are worshipped as gods or saints to some. Mahayana Buddhists believe that when you die, one becomes selflessness resulting in ultimate bliss known as the deathless state and doesnt believe in literal rebirth. They extinguish themselves from all worldly cravings, desires and attachments, through loving- kindness, compassion, charity, moral conduct, wisdom and meditation. Mahayana Buddhism deferrers from many religions. Christianity being one. Christians believe that there is only one god (not several) and there is life after death in heaven where all is good. Jesus is Gods son who was sent to earth by god to become human and live amongst us which was in human form. Hinduism is a dominate religion of the Indian subcontinent. When I think of Buddhism I think a foreign religion from another country but there in America and many other countries. As a matter of fact, Buddhism is one of the largest religions in the United States following Christianity, Judaism and nonreligious and close to being equal with Islam and Hinduism. Most Buddhism are Asian Americans. Its estimated there are around 1.2 million and 40% of them live is Southern California. The Mahayana Buddhist are not supposed to discriminate and usually they hold true to that if they are a TRUE Buddhist. Thats not to say that Americans dont discriminate against them. In February 2011 the Lao-Buddhist Association attempted to open a temple in Olathe Kansas but was denied. Residents said that the location was zoned for residential only. Christian churches are located in residential neighborhoods all over the country so Buddhists are saying its discrimination against their religion. Another instant of discrimination on them took place in Southern California. Buddhist wanted to put in a worship center but the government rejected it and said there isnt enough room but later built a mall there. The Buddhist people sued them saying it was discrimination on their religion. In America we have the right to express our religion but the government and prejudice people are making that amendment more and more difficult for some religions. Before I researched this religion, I knew nothing about it or the people. I know have a much better understanding what they believe in and how they live. They are a very peaceful and caring religion and people should be educated about them before they judge them. Part 2 Racial/ethnic groups: I chose Hispanic and Latino descend. Hispanics differ from white people in many different ways. Their way of life, language, and all around culture. They seem to get singled out by many races due to the overwhelming illegal entry into the states. It doesnt seem to matter it they are here illegally or not, they are all looked at the same by certain people. They are stereo typed all the time for stealing jobs and collecting welfare not to mention healthcare. A lot of them are working in the states under the table and sending the majority of their money earned back to their families in Mexico. The money made is not spent here to help benefit our economy. Hispanics are discriminated against often. I think Americans feel like they are paying a lot in taxes to help them financially when they should focus the help on legal Americans that actually pay their taxes. Employment is another reason behind the discrimination. In the landscape, nursery and construction trade, they seem to be taking over a lot of these positions because its cheaper labor but it still takes work away from legal Americans. After researching this topic I have learned that Hispanics have too many sources that are offered to them when legal Americans could use it more since we spend our money here in taxes. Comparing my racial and religious groups I can see how they are somewhat similar. Both struggle to find a place where they can be accepted. http://www.beliefnet.com/Faiths/Buddhism/Galleries/What-Do-Mahayana-Buddhists-Believe.aspx?b=1p=10 http://prezi.com/onqasvrjg9ey/discrimination-against-buddhism/

Wednesday, August 21, 2019

Radio Frequency Identification (RFID) System

Radio Frequency Identification (RFID) System Literature review 2.1 RFID The Radio Frequency Identification (RFID) system is a technology for automated  identification. Exploration of RFID technology dates back to 1948 when Harry Stockman published his  research titled Communication by means of the reflected power. Unfortunately technologies such as  integrated circuits, transistors and microprocessors were not yet available and RFID had to wait another  20 years for its first commercial application (Landt 2005). Between 1970 and 1980 several research  laboratories and academic institutions carried out work on RFID implementations for animal tracking,  theft prevention, item labelling and access control systems (Want 2006). Regardless of these  applications, RFID systems remained obscure for many years. The first significant change to this  occurred in the early nineties when companies across the world began to use RFID tags on a large scale  due advancements in their energy efficiency and size reductions (Landt 2005).   Todays systems are usually composed of either passive or active RFID tags and RFID readers.  Active tags contain their own power source and thereby can transmit stronger signals and can be  accessed from further distances. Most commonly they operate on the ultra-high frequency (UHF) band  and can achieve up to 100 metres range depending on the surrounding environment (Weinstein 2005).  There are currently two types of active tags. Transponders, also called semi-active tags, and Beacons.  Transponders stay in standby mode until receiving signal from the reader and then transmit a signal  back. Beacons emit signals and advertise their presence at pre-set intervals. Because of their on board  power source, active tags are expensive, priced from $20 to $70 and vary in size from 2 centimetres  upwards (Williams et al. 2014). Passive tags do not incorporate a power supply and are powered by the  electromagnetic signal received from the reader through the tags antenna. The y operate on low, high  and ultra-high frequency with signals ranging up to 10 metres depending on the tags backscatter power  (Weinstein 2005). The smallest passive tags can be size of a grain of rice and cost 1/10 of the price of  the active tag (Williams et al. 2014).   Silva, Filipe and Pereira (2008) proposes a RFID based student attendance recording system  that comprises of RFID readers operating at the 125 Kilohertz (KHz) frequency with an effective read  range up to 10 15 centimetres and passive RFID tags embedded into plastic cards. The tags store a  binary identifier which is unique to each student. Readers are connected to the local network with RJ45  connector through which they transfer scanned tag id to the server using the Transmission Control  Protocol / Internet Protocol (TCP/IP). At least one reader is mounted in each of the classrooms and  students need to take their card out and place it near the reader in order to register their attendance.   Nainan, Parekh and Shah (2013) claimed that a similar RFID attendance registration system setup  decreased the time needed to record a students attendance by 98% compared to the manual entry  method. Collected data shows that the RFID system was able to record the attendance of 5 students per  second, however considering the short effective read range we have to conclude that multiple readers  were used during that experiment to achieve such result. Despite advances over the paper based  registers, efficiency of attendance systems based on passive RFID tags is limited by the number of  readers located in the classroom. Analogous systems based on the active RFID technology could  increase ids collection efficiency by scanning multiple tags simultaneously from a further distance  (Yoon, Chung and Less 2008), however such systems would introduce a number of additional  technological and social issues. Bandwidth limitations coerce RFID tags to share a common broadcast  frequency and as a consequence multiple tags responding concurrently to the same reader can cause  packet collisions. Therefore to solve these issues, advanced anti-collision algorithms and methods must  be employed during development process (Bin, Kobayashi and Shimizu 2005). Increased reading range  additionally raises serious privacy concerns as the users location could be tracked without their own  consent (Ferguson, Thornley and Gibb, 2014). 2.2 Biometrics Numerous properties must be satisfied to categorise the biological measurement of a human  physiological or behavioural characteristic as biometrics. The characteristics should be unique, every  person should have it and it needs to be accessible so it can be measured. There are a number of different  studies exploring biometric authentication for attendance registration systems. 2.2.1 Voice recognition Recent experiments by Dey et al. (2014) explore the capabilities of an attendance registration  system based on voice recognition. The main core of the system is a Linux OS server integrated with a  computer telephony interface (CTI) card and pre-installed with interactive voice response (IVR)  software. The server is accessible only from the previously pre-defined phones which are installed in  the classrooms. Using installed phones users have to record a reference voice sample to enrol into the  system. During enrolment users are provided with a unique four digit speaker identification then they  are asked to read for 3 minutes text of their own choice. Enrolled users can register their attendance by  entering the previously received speaker identification number and then answering some simple random  questions generated by the system. The system logs user attendance if the recorded speech matches the  stored reference sample. Initial system evaluation performed o n the group of 120 students indicated  very low efficiency. In order to achieve 94.2% recognition rate, each user needs to produce at least a 50  seconds sample. Authentication time is additionally extended by an average 26 seconds computational  time needed to analyse provided speech sample. Additional limitations come with the maximum number  of 32 concurrent calls that each server can handle. In essence, a long compulsory enrolment process,  the unnecessary burden of remembering a personal speaker identification number and the poor  registration efficiency time make the system a poor candidate for large group registers.   2.2.2 Fingerprints According to Akinduyite et al. (2013) fingerprint attendance management systems can be more  reliable and efficient than the voice based equivalent. They have achieved 97.4% recognition accuracy  with an average registration time of 4.29 seconds per student. The system implements fingerprint  scanners connected to a centralised server through the existing Wi-Fi infrastructure. As with the voice  recognition system, an administrator has to capture reference fingerprint data from every user before  the system can be used. Collected fingerprint templates are stored on the server in a Microsoft SQL  Server database and later used to match scanned samples. Almost identical recognition rate of 98.57%  was achieved by Talaviya, Ramteke and Shete (2013) in the similar fingerprint system setup. Analogous  to the RFID based systems, the efficiency is closely related to the total number of the available scanners.   2.2.3 Automated Face recognition All of the prior systems require users to provide a biometric sample manually by using one of  the available scanners located in the environment. Kawaguchi et al. (2005) proposed a considerably  different solution which automates sample collection. They introduced a face recognition method based  on continuous observation. The system requires two cameras streaming live data to the centralized unit  with preinstalled face detection and recognition software. The first camera, called the sensing camera  is installed on the ceiling and points towards the rooms sitting area. The second camera, called the  capturing camera is located in front of the seats to capture students faces. The sensing camera scans  over the room in order to detect seats occupied by the students. Received image data is analysed using  the Active Student Detecting (ASD) method developed by Nishiguchi et al. (2003). Once a student is  detected, the system directs the capturing camera to the found lo cation. The face image collected from  the capturing camera is then processed by the system and the students attendance is recorded if a  matching template is found. Experiments in which the described system was evaluated on a group of  12 students revealed 80% accuracy in engaged seats detection and the same level during face detection.  The whole experiment took 79 minutes in which 8 scanning cycles were performed, resulting in 70%  total accuracy for the attendance registering. Despite advances in automated biometric samples  collection, the described system seems to be inefficient, especially if we consider time required to  collect and analyse samples on such small group of students. Additional issues may arise if there are  any obstructions in the room which can restrict the cameras view or if a low ceiling prevents sensing  camera from covering the entire seating area. 2.2.4 Summary The biometric systems have many advantages over the other authentication technologies. The  biometric characteristics are tightly linked to the owner and can prevent identity theft, are difficult to  duplicate and are very convenient as they are always available. Despite all these advances, all the  biometric systems share serious ethical, social and security implications. It was evidenced by many  researchers that there is a fear of biometric technologies on the whole. The individuals and potential  system users are concerned about privacy, autonomy, bodily integrity, dignity, equity and personal  liberty (Mordini and Tzovaras 2012; Kumar and Zhang 2010). The system administrators have  additional overhead with the security of the collected biometric data. The individual biometric  characteristic cannot be replaced if they get stolen, therefore the legal responsibilities whilst storing this  kind of data are colossal. 2.3 Wi-Fi An interesting and novel attendance registration method was proposed by Choi, Park and Yi  (2015). The authors created a system which incorporates Wi-Fi technology built into smartphone  devices. They had developed two versions of a smartphone application, one for the lecturers and one  for the students. When a class session starts the lecturer has to create a Wi-Fi Access Point (AP) using  his version of the application. The students attend the lecture and scan for the available Wi-Fi Access  Points and if the lecturers AP is discovered and students device stays in its range for specified amount  of time then attendance registration process is triggered. To overcome limitations with the maximum  number of concurrent connections that single AP can handle, the created students version scans only  for the nearby networks but never connects to the found APs. Attendance is registered by submitting a  Message Digests 5 (MD5) hash token that combines a Service Set Identif ier (SSID) of the found AP  and students smartphone Media Access Control (MAC) address. The hash token is uploaded to the  server which verifies submitted data and registers the students attendance in the local store. The system  architecture requires collection of the reference MAC address of all the students for the purpose of the  later validation. The study does not describe what smartphone models were used throughout the  experiment, but it seems that they did not consider privacy features on iOS devices. According to Apple  (2013), since the release of iOS 7.0, the MAC identifier is no longer accessible through third party  applications, moreover after iOS 8.0 release, real device MAC address is hidden from the access points  and swapped with a randomly generated one (Apple 2015 A). Taking into account that over 98% of  iOS devices run on iOS 7.0 and above (Apple 2015 B), only confirms that the proposed system design  should be reviewed again. 2.4 Other 2.4.1 QR Code with face recognition Fadi and Nael (2014) combined biometrics with Quick Response Codes (QR). The proposed  methodology requires lecturers to generate a unique QR code and display it in the class. In order to  register their attendance, students need to download a mobile application, install it on their smartphones  and use it to scan the presented QR code. The scanned code is then submitted to the server via the  existing University Wi-Fi infrastructure. Furthermore the application performs an identity check by  scanning the students facial image which is later used to create matching score by analysing a reference  image stored on the servers. Lecturer can manually validate submitted images to confirm a students  identity if a low matching score raises any concerns. The QR code image could be effortlessly forwarded  to other students outside the classroom, therefore the system also collects a location stamp on the code  submission. The apparent vulnerability of the system lies in the number of technologies that it depends  on. Authors assumed that every student will have a smartphone device with front and back facing  cameras for the facial images and the QR scans and also a Global Positioning System (GPS) module  which will be accessible during the registration stage. Each classroom has to be also equipped with a  large screen to present codes to the students and this may not always be available.  

Tuesday, August 20, 2019

Informatics In Public Health Information Technology Essay

Informatics In Public Health Information Technology Essay Yasnoff et al(2000)stated that effective public health requires timely, accurate, and informative information from a wide variety of sources. Not surprisingly, public health professionals have been among the earliest users of computers , other information technologies from which numerous and useful computerized information and surveillance systems have been developed(Yasnoff et al, 2000).A more systematic and informed approach to the application of information science and technology needs to be utilized in order to take full advantage of its potential to enhance and facilitate public health activities(Yasnoff et al, 2000). However, OCarroll et al(2002)defined public health informatics as the systematic application of information and computer science and technology to public health practice, research, and learning. Public health informatics is primarily an engineering discipline and a practical activity ungirded by science and oriented to the accomplishment of specific tasks(OCarroll et al, 2002). How informatics impact or improve public health? The scope of public health informatics includes the conceptualization, design, development, deployment, refinement maintenance, and evaluation of communication, surveillance, information, and learning systems relevant to public health(OCarroll et al, 2002). Using strategies and standards, practitioners employ public health informatics tools and training to maximize health impacts at local, state, and national levels(CDC, 2006).They develop and deploy information technology solutions that provide accurate, timely, and secure information to guide public health action(CDC, 2006). Public health informatics involves the application of knowledge and practice from numerous disciplines that contribute to public health(OCarroll et al, 2002).Advances in public health informatics resulted in public health innovations and added value to interventions by providing the capability for more timely detection of health problems and more complete and efficient health communications (CDC, 2006). Surveillance is an aspect of public health that can be dramatically transformed by the application of information technology(Yasnoff et al, 2000). How public health informatics is different from medical informatics? The primary focus of public health informatics is on the applications of information science and technology that promote the health of populations while the primary focus of medical informatics is on the health of specific individuals who presents with a specific disease or condition requiring diagnosis and treatment(OCarroll et al, 2002). A primary focus of public health informatics is on the applications of information science and technology that prevent disease and injury by altering the conditions that put populations of individuals at risk while whereas medical informatics is on the application of information science and technology for the treatment of individuals who already have a disease or high risk conditions(OCarroll et al, 2002). Prevention approach in public health informatics is not predetermined by professional discipline, but rather by effectiveness, expediency, cost, and social acceptability of intervening at various potentially vulnerable points in a causal chain whereas medical informatics preventive interventions is within the context of each professional discipline with focus on one or a few points in the causal chain(OCarroll et al, 2002). Public health informatics is not restricted to particular social, behavioral, or environmental contexts whereas medical informatics is restricted to clinical and surgical encounters(OCarroll et al, 2002). Public health informatics involves operation within a governmental context requiring responsiveness to legislative, regulatory, and policy directives whereas medical informatics involves operation through private practices, clinics, hospitals, with governmental direction primarily in terms of quality assurance (OCarroll et al, 2002). References. OCarroll, P,W; Yasnoff, W, A; Ward, M,E; Ripp, L,H; Martin,E;L.(2002).Public health informatics and information systems. Springer. Yasnoff, W, A; OCarroll, P,W; Koo, D; Linkins, R, W; Kilbourne,E;M.(2000).Public health informatics: Improving and transforming public health in the information age. Journal of Public Health Management Practice Vol 6(6); p67-75. CDC(2006).Informatics and public health at CDC. MMWR Vol 55(SUP02); 25-28. Retrieved from http//www.cdc.gov/mmwr/preview/mmwrhtml/su5502a10.htm Top of Form Week 1: Introduction to Informatics in Public Health Discussion It was not until 1988 that efforts by the Institute of Medicine described public health with a working definition that outlined its mission, components, and core functions, as a result, the focus began to shift from medicine and treatment of disease to public health and its goals of prevention and health promotion (Schneider 2006). As noted by OCarroll (2003), with public health reform, an increase in managed care and the revolution of new technology, public health professionals increased the need of public health informatics forcing the transition of traditional methods of information storage to the development of technological software. Prior to the emergence of public health as a discipline, medical informatics was employed in various healthcare institutions. Hasman and Haux (1996) described medical informatics as discipline that intersects information science, computer science, and health care to address the storage, retrieval, and use biomedical information for problem solving and decision making. To keep abreast of an ever changing technological society, public health informatics emerged. OCarroll, 2003 noted that public health informatics is defined as the systematic application of information and computer science and technology to public health practice, research and learning (p5). According to OCarroll (2003), it is different from medical informatics because it focuses on populations, disease prevention, preventative interventions, and governmental operations. Informatics is now a discipline that is increasing being integrated into the field of public health. The National Center for Public Health Informatics (NCPHI), for example, is one of the national centers of the Centers for Disease Control and Prevention (CDC). Started in 2005, the NCPHI in composed of five divisions and seeks to use information technology to aid in surveillance, outbreak response, and laboratory reporting and other aspects of public health. The goals of the center is to enhance monitoring and research and increase real time access to health information. The National Centers for Public Health Informatics although a fairly new have several tools in place to maximize access to health information (CDC 2009). The use of informatics of found throughout the field of public health. With the development of new technology, public health informatics seeks to further incorporate new software to enhance the effectiveness and efficiency of the collection, analysis, and reporting of public health information. To fully embrace the impact informatics can have on public health OCarroll (2003) claimed that education and training is imperative to decrease the sense of inadequacy among public health professionals and promote the widespread implementation of public health informatics as a discipline.

Monday, August 19, 2019

If You Want to View Paradise :: Personal Narrative Cane Fields Papers

If You Want to View Paradise When the sugar cane burned a thick pillar of black smoke twisted and grew up from the fields. The beanstalk of cloud was seen from anywhere on the island and for an afternoon everyone stopped their chores, their cars, their machines to exhale at the desecrating monster. The fire lifted soil, plant debris, worker's gloves and t-shirts forgotten in the fields, insects and rats, children forgotten in the fields, all charred to ash, into the air, stirred it up and threw it back to earth to be interpreted by a more creative voodoo. Cane ash cycloned up in the pillar and blew onto nearby communities with the tradewinds. Curled black ash rained down on my brother and me playing basketball in the driveway. The ash, light, tossed in the wind, collected curled in corners like loose pubic hair. The farmers burned the cane purposefully. They followed the flame, directing it to burn row after row. Late into the night they followed the fire in a semi-circle on the upwind side wearing Hula Bowl t-shirts around their faces like bandits to filter the smoke. Train robbers trying to control the steam locomotive with shovels. Trains have a tendency to run away. The fire husked the cane for them and though it burned a portion of the precious sugar it also burned the glass hairs along the stalk that itched skin and throats for days. The cane fields spread in rows like radio waves echoing out from the base of the Waianai mountain range. On these mountains, closer the peaks at the topmost corner, was a preserve, a deathbed for the last pristine area on the island. Here the rarities mingled in an elite cocktail party for the terminally ill. The Ohia Lehua rooted shallow on the cliffsides, its wood trunk dry like beach wood and its blossoms a blood red exploding out like firecrackers from light green dime shaped leaves. Ala ala wai nui crawled out of holes in boulders. It is called a succulent, its leaves absorb water and are thick and peach fuzzed for it. It is strong enough to break rocks but can not conquer a field of pili grass. The Manono's leaves come out two at a time, opposite each other on the same node. They look like cho cho lips, fat lips, puckering up. They are not plants that grow together supporting and encouraging one another to grow.

Changes in Class and the Labor Force within Society :: History Marx Communism Essays

Changes in Class and the Labor Force within Society Introduction: Though the Industrial Revolution changed the course of modern history, the consequences that accompanied it divided society. The radical change in the division of class and labor within society because of industrialization disgusted many who witnessed it, including Karl Marx. Their contempt for the new composition of class and labor led to intellectuals proposing improvements and reversing changes, through their writings to the masses, introduced by the Industrial Revolution. The Communist Manifesto and writings by Karl Marx and Frederick Engels are specific in their views on the class and labor structure in Europe and abroad. Class Structure Marx saw three classes emerge from Capitalist industrial society: labor power, ones who possessed the means of production, and those who owned the land. Their incomes consisting of wages, profit from industry, and rent collected from their land. Industry created by the Bourgeois revitalized society into two separate classes, the bourgeois and the proletariat. Communism offered the opposite, no division of labor or class. Marx believed that by eliminating personal gain from society, the class structure of Capitalism would be broken. Marx proposed the individual would receive from the greater society an equal amount of the shared commodities in comparison to his production of work benefiting the whole. There is an exchange of equal values. Each person receives equal share in the possessions of the whole for equal work. The bourgeois dissolves as personal profit is eliminated. Thus, granting rule over society to the proletariat. Class disappears because everyone is the sam e. Everyone is a worker. Free economic markets separates the means of production and the labor force. The result is the formation of an economically ruling class. The ruling class finds that labor equals only the means of production. Thus, the bourgeois pays the workers only the amount needed to sustain life. The proletariat is reduced to a life whose sole purpose is to find work. They only find work if their labor increases capital. Communism's Answer to Class Structure Communism offered the opposite, no division of labor or class. Marx believed that by eliminating personal gain from society, the class structure of Capitalism would be broken. Marx proposed the individual would receive from the greater society an equal amount of the shared commodities in comparison to his production of work benefiting the whole.

Sunday, August 18, 2019

Reconstructing My Father Essay -- Personal Narrative, essay about myse

Reconstructing My Father Most of the memories I have of my father are bad. He was a withdrawn binge alcoholic, sometimes given to violent episodes in which he physically assaulted my mother. He never took us anywhere, and he rarely spoke to us, although sometimes, late at night, he would play cards with me or we would watch an old movie together. He loved Barbara Stanwyck. When I was a small child, Eddie (his actual name, though his relatives called him "Lec") did help me with my school projects. A knowledgeable outdoorsman, he taught me the names of all of the trees, took me fishing in a boat he built himself, and showed me how to till the worm bed in the back yard. But as I grew older, my needs changed. If my car broke down, I needed a ride. If there was a special trip or project at school, I needed money. He not only refused to help me with these things, but he refused belligerently, which led to more fights with my mother. My father's past was somewhat of a mystery. I knew he'd grown up in northwest Louisiana, that he had a brother who had died and two sisters, and that he had served in the Army during World War II. His father died before I was old enough to meet him, possibly before I was born, and his mother, who lived with us for a brief period, was a bloodless, stone-faced woman who was frightening in her lack of warmth. I saw one of my aunts only once or twice, and the other one was so grim that I preferred to avoid her. When I was twenty-four, an aneurysm burst in Eddie's brain; he was in a coma for three days, and then he died. He was sixty-two, and at the time of his death, had more physical strength than some men half his age. I have often wanted to fill in ... ...ngineers to have the railroad leading from St. Lo into Le Mans and Laval, ready to receive ammunition trains -- on August 15. The men had to rebuild seven railway bridges, repair and lay new main lines in three marshalling yards, lay miles of track, and provide service and water facilities along the lines. They did it. "The engineers can go under, over or through anything, or get it out of the way," the pamphlet states. That is a phrase that certainly suits my father, a tough, stubborn man who could build and who could destroy. I wish he were alive because there are a lot of things I would like to tell him, and even more that I would like to ask him. But at least now I have a better idea not only of who he was, but who he might have been. The Eddie who has emerged since my mother's death four years ago is still a shadow, but I can at least see his outline.

Saturday, August 17, 2019

Chemistry Stpm Essay

A – Structural Questions: Question 1. (a)(i) The presence of isotopes 1M (ii) Let the abundance of 63X be a %. The % abundance of 65X. = ( 100 – a ) 1M Relative atomic mass = ( 62. 93 x a) + ( 64. 93 x ( 100 -a) ) 1M 100 63. 55 = 62. 93a + 6493 -64. 3a 100 6355 = -2a + 6500 a = 69. 0% 1M The % abundance of 65X = 100- 69. 0 = 31. 0 % Relative abundance 63X : 65X 1 : 2 1M (iii) Relative Abundance 63 64 65 Relative mass /m/e 2M SpeciesprotonsneutronsElectrons 20 Ne 10 10 10 10 16O2- 8 8 8 10 2 M The species have same number of electrons or isoelectronic. M —————- 10M 2. (a) (i) H2O2 + 2H+ + 2 I- > 2H2O + I21M (ii) Rate = k [H2O2] [I-]1M (iii) 0. 21M 0. 11M (iv) second order1M (b) (i) 121M (ii) 1s2 2s2 2p6 3s2. 1M (iii) +2 , X has two valence electrons2M (iv) X is a better electricity conductor. 1M —————- 10M 3. (a) Atomic size increases, screening effect increases with more inner shells of electrons 1M effective nuclear charge decreases, ionisation energy lowered, valence electrons are more easily removed. 1M (b) i. Be2+ (aq) + 4H2O (l) > [ Be (H2O)4 ]2+ (aq)1M ii. It is acidic, acting as a Bronsted-Lowry acid1M The Be2+ ion has a high charge density 1M and can strongly polarise large anions due to its smaller size. 1M The ions of other Group 2 elements have larger sizes and charge densities and weaker polarising power (d)i. platinum and rhodium1M ii. 4NH3(g) + 5O2(g) ? 4NO(g) + 6H2O (g)1M iii. low temperature1M low pressure1M ( Note : The reaction is exothermic reaction. According to le Chatelier principle, a low temperature will favour the formation of NO. For gaseous equilibrium, a decrease in pressure will favour the reaction which produces more gaseous molecules. Thus in the above equilibrium a low pressure will avour the formation of NO. ) ________ 10M 4. (a) i. A is CH3CH2CH2COOH1M B is CH3CH2CH2COCl1M C is CH3CH2CH2COOCH2CH 1M ii. butanoyl chloride1M iii. Formation of ester: CH3CH2CH2COCl + CH3CH2OH > CH3CH2CH2COOCH2CH3 + HCl1M (b) i. H3N+CH2COOH + H2NCH(CH3)COOH > H2NCH2CONHCH(CH3)COOH + H2O1M Glycylalanine1M ( Note: Alanylglycine can also be formed ) ii. The amino group –NH2 which is basic group reacts with hydrochloric acid to form the ammonium chloride salt of alanine1M HOOCCH(CH3)NH2 + HCl > HOOCCH(CH3)NH3+Cl- 1M ___________ 10 M SECTION B – ESSAY 5. (a) (i) Orbitals with the same energy1M Example : 2p or 3d s orbitals1M ii) Nitrogen atom has 7 electrons 1M Fill 1s orbital with 2 electrons1M Fill 2s orbital with 2 electrons1M Fill 2px,2py and 2pz orbitals with 3 electrons1M / 6 1M (b) Fe 2+ 1s2 2s2 2p6 3s2 3p6 3d4 1M Fe 3+ 1s2 2s2 2p6 3s2 3p6 3d5 1M In terms of electronic configuration, Fe 3+ is more stable than Fe 2+ 1M Because it has half-filled 3d orbital which is more stable1M. / 4 (c ) The valence electronic configu ration of the electrons for nitrogen atom is 2s2 2px1 2py1 2pz11M Nitrogen atom uses sp3 hybrid orbitals for forming covalent bonds between N and H atoms. Energy 2p sp3 hybrid porbitals N(ground state) 1M In sp3 hybrid orbitals of nitrogen atom,one of the orbitals Is occupied by a lone pair of electrons and three sp3 orbitals are half filled 1M Each N-H atom is formed by the overlapping of the s orbital of hydrogen atom with one of the half filled sp3 orbitals to give the ammonia molecule 1M Diagram of the bond formation in NH3 molecule. M /. 5 ——————- Total : 15 M 6. (a) Dyanamic equilibrium †¦. a reversible reaction , in a closed system forward and backward reactions have the same rate of reaction. 2M (b) (i) N2O4 – 2NO2 Kc = [NO2] 2 = [0. 12] 2 [N2O4] [0. 04] = 0. 36 mol dm-3 5M (ii) Using PV =nRT where n = 0. 12 +0. 04 = 0. 16 mol P = 0. 16 (8. 31) (383) 10 -3 = 509. 24 kPa. 3M (c) N2(g) + 3H2(g) 2NH3(g) – at low temperatures, % NH3 is higher – forward reaction is exothermic equilibrium position shifts to the right at higher temperature -forward reaction is accompa nied by a reduction in volume of gas -at higher pressures, equilibrium position shifts to the right -at high pressures, % NH3 is higher5M ————— Total : 15M No. 7 (a)(i) Aluminium metal is extracted by electrolysis The electrolyte is molten bauxite in sodium hexafluoroaluminate. The electroyte has aluminium ion and oxide ions. Anode : 2O2- — > O2 + 4e Cathode : Al3+ + 3e — > Al5M (ii) (Any 2 points) light Resistant to corrosion Strong alloy2M `(b)aluminium : A giant metallic structure, strong metallic bonf. Silicon : giant 3 D covalent structure. Strong covalent bond between silicon atomes. higher melting point Phosphorus and sulphur – Both are simple molecules. Weak van der waals between molecules Sulphur has a stronger intermolecular forces – S8 larger than P48M No 8. (a) chlorine – strong oxidation agent Bromide is oxidized to bromine E ° of chlorine is more positive than that of bromine. Cl2 + 2Br- —- > 2Cl- + Br24M (b)iodine forms triodes complex in KI. I2 + I- —- > I3- Iodine does not form any complex ions in water. I2 + 2H2O — > I- ¬ + HIO + H3O+4M (c)HCl is released in cold acid NaCl + H2SO4 a NaHSO4 + HCl If heated more HCl released. NaHSO4 + NaCl -a Na2SO4 + HCl4M (d) Iodide is oxidized to iodine Purple Iodine is released Pungent smell of H2S is detected3M ————– Total : 15M 9. ( a ) ( i ) order : W, Y, X W, Y, X act as Lewis bases. X is the strongest base because ethyl group is an electron donor by inductive effect. Y is more basic than W because the lone pair electron on the N atom is not delocalised. W is less basic than Y because the lone pair electron on the N atom is delocalised into the benzene ring. M ( ii ) pKb value > 9. 39 Z is a weaker base than W. Presence of Cl – an electron withdrawing group reduces the donating potential of lone pair electron on the N atom through inductive effect. 4M ( b ) Concentated H2SO4 and HNO3. , 550C Mechanism: HNO3 + H2SO4 NO2+ + HSO4– + H2O NO2+ is an electrophile. H + NO2+ NO2 H NO2 + HSO4– –NO2 + H2SO4 + HNO3 –NO2 + H2O 6M Total : 15 marks 0 . ( a ) ( i ) Terylene/Dacron ~~~~O – CH2 – CH2 – O – C – –C – O – CH2 – CH2 – O – C – –C~~~~ 3M || || || || O O O O ( ii ) Condensation polymerisation To make cloth/sleeping bags, etc 2M ( b ) ( i ) K: functional group : -OH isomers : CH3CH2CH2OH and CH3CHCH3OH arm isomers separately with alkaline iodine, CH3CHCH3OH gives a yellow precipitate but CH3CH2CH2OH does not. CH3CH2CH2OH + 4I2 + 6OH– CHI3 + 5I– + 5H2O + CH3COO– 5M (ii ) L : functional group : ? C = O | Isomers : CH3CH2CHO and CH3COCH3 warm isomers separately with Tollen’s reagent. CH3CH2CHO gives a silver mirror but CH3COCH3 does not. CH3CH2CHO + 2[Ag(NH3)2]2+ + OH– CH3CH2COO– + 2Ag + 2NH4+ + 2NH3 5M Note: Can also accept other suitable chemical test. Total : 15 marks