Featured Post

Evaluation of London 2012 Olympics Sustainability Plan Free Essays

Official Summary Before the London Olympics that were facilitated in London in 2012, the International Olympics Committee (IOC) distribut...

Wednesday, December 25, 2019

Business Research - 786 Words

Business Research Ethics University Of Phoenix RES/351 PA12BSB01 Instructor: Dr. Jay Deb Workshop/ Week No.: 2 September 4, 2012 Business Research Ethics â€Å"Many patients volunteer for research in the hope that the knowledge generated will benefit others. When a company deceives them into volunteering for a useless study, it cynically exploits their good will, undermining the cause of legitimate research everywhere (Elliot, 2011).† Last year, the Archives of Internal Medicine published a scornful re-evaluation of a 12-year-old research study of Neurontin. Neurontin is a seizure drug made by Pfizer. This particular research included more than 2,700 subjects and was carried out by Parke-Davis which is now a part of†¦show more content†¦According to Elliot the litigation documents showed that this study was conducted by Merck’s Marketing Department. How can studies that cause danger to human subjects draw so little attention? The answer is given to us by Elliot (2011). He says, â€Å"In an age of for-profit clinical research, this is the new face of scandal. Pharmaceutical companies promote their drugs with pseudo-studies that have little if any scientific merit, and patients naively sign up, unaware of the ways in which they are being used. Nobody really knows how often companies conduct such trials, but they appear with alarming regularity in pharmaceutical marketing documents.† In the past most research studies were conducted in academic settings. Due to the costs of such studies, pharmaceutical companies realized that it would be faster and less expensive to conduct trials in a more private setting. The outcomes for these studies are not for knowledge but for profit. This unethical approach to research studies should be identified and put to an end. Research subjects should be protected and acknowledged for their courage to partake in such studies not be forgotten. The main source of protection for research subjects is a patchwork system of ethics committees known as institutional review boards, or I.R.B.’s (Elliot, 2011). To ensure that research studies are ethically sound the I.R.B., a small, federally empowered group, reviews researchShow MoreRelatedBusiness Research : Business And Management Research1396 Words   |  6 PagesBusiness Research Assignment 1 ‘Business and management research is a systematic inquiry that helps to solve business problems and contributes to management knowledge. It is an applied research.’ (Wiki) According to Easterby-Smith (2008), business and management research focuses on four factors: - Information access is very important for managers. It makes competitive advantage for them, especially in the era of information technology. - Managers need information produced by the classical researchRead MoreBusiness Research1332 Words   |  6 PagesBusiness Research Method RES/320 Business Research Methods Chapter 7: 2. How do data from qualitative research differ from data in quantitative research? The difference in data from qualitative research and data from quantitative research is found in their root words, quality and quantity. Qualitative research data is the opinions of a certain group. This research also captures the why, would, and how the target audience react to certain issues, situationsRead MoreBusiness Research Methods1575 Words   |  7 PagesBusiness Research Methods Ââ€" BU2S01 2006/7 Academic Season Assignment 1 Cut off date: Friday, 15th December 2006 You are required to evaluate the in terms of purposes, audiences and general strengths and weaknesses. The essay will account for 40% of the overall mark. Indicative word count: 1500 words. Note that you will need to submit your coursework to the Business School reception by 12pm (noon). Research Ââ€" an investigation involving the process of enquiry and discoveryRead MoreA Research Study On Business Research2469 Words   |  10 PagesCHAPTER 3 RESEARCH METHODOLOGY 1. Introduction Business research is considered as a truth seeking function that collects, analyses and reports information which enables decision makers to become more effective in their decision making (Alvesson and Deetz, 2000). Conducting primary research is inevitable as far as the aim of this research is concerned. However it is vital that the right kind of methodology be adopted which helps the researcher to achieve the research aim properly. In the selectionRead MoreResearch of Restaraunt for Business Research Essay2399 Words   |  10 PagesTable of Contents Introduction 3 Research Objectives 3 Research Questions 4 Answers to Research Questions 5 Answer to Research Question 1. 5 Answer to Question 2. 6 Answer to Question 3. 7 Answer to Question 4. 8 Answer to Question 5. 9 Answer to Question 6. 10 Recommendations for the Remington’s Restaurant 11 References 14 Introduction The Remington restaurant, located in Tampa Florida, wanted to better understand their customer’s views and opinions of the restaurantRead MoreBusiness Research Design5304 Words   |  22 Pagesï » ¿BUSINESS RESEARCH DESIGNS Topics to be covered Business Research Design : Exploratory, Descriptive Causal Research Exploratory Research: Meaning, suitability, collection, hypothesis formulation Descriptive Research: Meaning, Types of Descriptive studies, data collection methods Causal Research: Meaning, various types of experimental designs, types of errors affecting research design Business Research Design - A research design is a framework or blueprint for conducting the marketingRead MoreApplied Business Research3553 Words   |  15 PagesThe University of Liverpool The Management School Applied Business Research Methods (ULMS515) Research Proposal PROPOSAL TITLE: Supermarket discounts: do they offer genuine benefits or are they â€Å"buying traps† Name: HU LIXIANG Student Number: 200908448 MSc Major: Consumer Marketing 1. Project Title Supermarket discounts: do they offer genuine benefits or are they â€Å"buying traps† 1.1. Introduction Generally speaking, people believe a discount in the supermarket is somethingRead MoreBusiness Research Methods2735 Words   |  11 PagesBUSINESS RESEARCH METHODS Subject: Common problems, issues and constraints faced by business researchers during the Research Process Introduction: Business research involves the systematic and objective process of gathering data and transforming it into useful information. The research process is not confined around a single universal methodology. Infact it differs from one research study to another depending on the purpose of the research, the industry/ sector of the client company concernedRead MoreMarket Research Methods For Business1361 Words   |  6 PagesMarket research methods in business Primary research is data that is gathered first hand from an original source, and has not been collected before. It often involves going out and asking people for information, hence its alternative name field research. Observational research involves watching and observing people’s activities. For example, businesses use cookies on their websites in order to track what pages users are visiting on their website. By using cookies, businesses will be able to knowRead MoreBusiness Research3093 Words   |  13 Pagesfor a last ten-five years literature * key word(s) searching in present I used words such as ‘Globalization†, â€Å"Sustainability, etc. * refining the search on stakeholder theory. I selected articles from journals in ABS (Association of Business Schools) list rated level â€Å"3† and â€Å"4† only. (ABS,2012) During this log I passed some stages: * search literature on the stakeholder theory * review the literature * select articles Google Scholar Thus, my search began with a preference

Monday, December 16, 2019

Consciousness Is The Subjective Perception Of The Self Essay

Consciousness has been referred to as ‘‘the hard problem’’ and still remains to be one of the most baffling conundrums of our generation. Consciousness is the subjective perception of the self. Consciousness allows us to feel happy, to solve problems, and to create memories. Consciousness has historically laid beyond the confines of science. Rene Descartes, a French philosopher, laid down the foundation of the study of consciousness by reflecting on what it meant to be conscious. Descartes was the one who introduced the idea of the mind as separate from the body, otherwise known as Cartesian Dualism. Descartes’ several theories sparked major controversy and discussion about consciousness. During the twentieth century, consciousness was seen as a taboo because usage of the word became overused and there was no precise way to describe it, so the word was ‘banned’. Consciousness is a psychological construct because of its difficulty to be observed and measured, which is why it can easily be seen as a taboo. Consciousness has gradually became easier to define, and because it is now accepted in the world of science, it has begun to address some of the most challenging questions of our time. Since consciousness is now at the forefront of neuroscientific research , neuroscientists are able to address daunting questions like that of vegetative patients and whether they are conscious, how to diagnose these patients, and whether or not there are therapeutic interventions available,Show MoreRelatedConsciousness: Our Portal to Fulfillment 977 Words   |  4 Pagesexpands rapidly and our concept of consciousness is rapidly evolving with it. Philosophers have filled the void concerning the true nature of consciousness not yet determined by science. Despite the subjective nature of consciousness, perceived by many to be a personal and private aspect of human existence, neurobiologists are investigating and measuring objective characteristics of introspective reasoning and associated elements of morality. Most agree that consciousness is key to human happiness andRead MoreI m Still Working On A Good Title1330 Words   |  6 Pagesphysical observation that leads to abstract co ncepts. How perception transitions into cognition is a mystery, but this process, influenced by subjective experience, is consciousness. However, perceptions and senses could oftentimes be false, but the ability to introspect helps one to regain clarity on his or her environment. Thus, one essential condition of human consciousness is that one must be able introspect and have a sense of self. Rene Descartes’ famous â€Å"I think, therefore I am† is an exampleRead MoreSummary Of Lifting The Veil By Rabindranath Tagore1730 Words   |  7 PagesLifting the veil: society’s self-perception in Rabindranath Tagore’s short stories. Chapter- I (Introduction: Exploring new possibilities )----- â€Å"This world appears to us as an individual, and not merely as a bundle of invisible forces. For this, as everybody knows, it is greatly indebted to our senses and our mind. This apparent world is man`s world. It has taken its special features of shape, colour and movement from the peculiar range and qualities of our perception. It is what our sense limitsRead MoreBeing A Mental State Of Awareness1694 Words   |  7 Pagesstate of awareness while awake whereas there seems to be varying levels of consciousness that describe most mental states. If information can be perceived (knowing or unknowingly) then it is likely that you are conscious, e.g. even when in light sleep we can dream and may even wake up on hearing a loud noise, therefore the brain still processes information, however in deep sleep this is not the case. When looking at consciousness, there is what Levine described as the explanatory gap (Levine, 1983).Read MoreDefining the Conscious State Essay971 Words   |  4 PagesIn order to do so, I shall be looking at different sources and reviewing various definitions and interpretations of consciousness and distinguishing the methods approached to the study of the topic in the way it is measured. The original source of the concept of consciousness is considered to come from the English Philosopher John Locke who perceived the term to be â€Å"the perception of what passes in a man’s own mind† (Locke 1690). The challenge of defining the term is even considered daunting asRead More Consciousness Essay example1315 Words   |  6 PagesConsciousness To define such a universally experienced phenomena as consciousness may seem on the most superficial level rather unnecessary. Yet a more scientific, and at times philosophical, investigation into the phenomena demands some sort of confirmed interpretation which supercedes any such common understanding. For our purposes the content of consciousness may be deemed those things of which one is aware and thus can report. Thinking, as well, and the higher-level mechanisms associatedRead MoreWhat Is Consciousness, The Subjective Quality Of Experience1052 Words   |  5 PagesThe closest way to explain consciousness is the subjective quality of experience. Creative points of perception are perceptions that turn new and imaginative ideas into reality by the ability to perceive the world in new ways, to find hidden patterns, to make connections between seemingly unrelated phenomena, and to generate solutions. Consciousness creativity is fluid thoughtlessness which can take on any form. The e ssay will explain consciousness, prove its existence and show a path to awakeningRead MoreCartesian Rationalism Vs. Locke s Empiricism Essay1632 Words   |  7 Pagesempiricist like Locke believed that knowledge of the world came through senses. Descartes from his meditations deduced from intuitive first principles the existence of self, of God, of the mind as a thinking substance and the extended body as a material substance whereas Locke, asserts that knowledge is acquired through perception, direct sensory of the world, reflections, the mental processes of breaking down complex impressions into simple ones and comparing them, conceptualizing them and recommendingRead MoreConsciousness : A Complex Theory Of Thought And Or State1529 Words   |  7 PagesConsciousness is a complex theory of thought and/or state. Throughout the semester I altered my consciousness, or awareness of consciousness, by paying attention and changing certain â€Å"default† consciousness aspects. Th e semester projects and recordings allowed me to focus on different facets of my own consciousness day-to-day and throughout each day. By having different projects through the semester, I was able to restart my awareness of my â€Å"normal† consciousness and bring it to the forefront ofRead MoreDifferences Between Object And Colour Essay1667 Words   |  7 Pagesobject displayed in the installation will not point out any symbolic connotations. Should object be with subject? 1. under gloabalisation, no more aesthec requirements 2. compromise to the mechanical reproduction p21 without the honesty of subjective expression (Simek) objects that challenge our expectations or definitions of sculpture, while their tangible presence grounding our experience of both the art and the space in their particular materiality, Her works do not point out

Sunday, December 8, 2019

None Essay Example For Students

None Essay As a parent of three kids ( two boys, one girl) the only thing i worry about is if they are healthy, have food on the table, have clothes to wear, have a roof over their heads, and are they getting a good education. in the essay that Yona Zeldis McDonugh wrote What Barbie Really Taught Me she states ive heard all the arguments against Barbie. she then goes on and tells us about them. she said shes an airhead, shes an insatiable consumer-of tarty clothes, a dream house filled with pink furnisher, a Barbie-mobliewho teaches girls there is nothing in life quite so exciting as shopping. now lets look at another very controversial topic Toy Guns, are they just what the name says they are or can a toy gun be deadly.akjdfakljsdfklajakfj akfjaklsdjfkajsdklfjakljfklajfi kdjfkaljfklajkfljakljfkla ajfka fakfj fjfkafja fjkfadfj ajfkaljfkla fajfkadjfak fasj fklaf a fafj akf akfjklafjlkasjf aklfjasklfjasdklfjakljklejlkaf als fasjfka fakjakf asf kajdfkladjsfl asdfj askfj fjasd fkajfaklsfjklajqiowejioqjrifkqwe fiejkdf asnmfoqweijrkla fasdkf asdjfoiqjwioejfkadjfkladf ajfiajeoifajef adkljfaoidjfioaewjf aiodjfakdsfj aioej faioejf akdjfaksdlfj aoiwejalkjdfklajd faoieujfioajekaldj lakdsjfoaiejioawjfaldksj faaoiejafo fakdjfiaeujf aoij adfj akdsjfioawejaoi akdjfkadjf aoiwejf ao fkadjfakjaoej af fa fkajief a fakdfjeijfa fkadjfoweiuqf nmk vcaif fnaefjif iji fajeinfamiaejfia aif ajfiajf aifua faoifua faiufa fajkfjie fajkdjf afiua faof a faifjaifjoie faifaikjfaief a aifiajef aofjaiujfia e a f oid a jfiae fa idjfaoie fa dfuaie faiefafi aifaefa adfijf adifjoaferk afijaojrff af aoeir and andkand adn and and and and and and and and and and adn and and adn adna nda nda nda nda dna dna nda nda dn adna nda dna dna dna nda dn adna dna dna dna dna dnad d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d dd d dd d d d d d d d d

Sunday, December 1, 2019

Title Of Paper J.S. Bach Essays - German Lutherans,

Title of Paper : J.S. Bach Grade Received on Report : 88 Johann Sebastian Bach Since the dawn of music, there have been many great composers throughout the world. However, no composer had a greater impact to music than Johann Sebastian Bach from the Baroque era (1600 ad. -1750 ad.). Johann Sebastian Bach was a forefather to music as the author Homer was a forefather Western literature. Yet, unlike Homer's uses of words and verses in his literature, J.S. Bach used notes and chords in his music which to him was an apparatus of worship. Johann Sebastian Bach was born on March 21, 1685, in Eisenach, Thuringina, into a family that over seven generations created at least 53 outstanding musicians. He first received musical training from his father, Johann Ambrosius, a town musician. Stricken by his father's death at the young age of 10, he went to reside and study with his older brother, Johann Christoph, an organist in Ohrdruf. In 1700, Bach began to earn his own living as a chorister at the Church of Saint Michael in Luneburg. Later in 1703, he became a violinist in the chamber orchestra at the Church of Prince Ernst of Weimar, but later moved to Arnstadt, where he became a church organist. In October 1705, Bach went to Lubeck to study with the distinguished Danish-born German organist and composer Dietrich Buxtehude which largely affected Bach. Bach was then criticized for the new lavish flourishes and bizarre harmonies in his organ accompaniments to congregational singing. He was already too highly respected, nevertheless, for either objection to result in his dismissal. Then in 1707, he went to Mulhausen as an organist in the Church of Saint Blasius. The next year, he went back to Weimar as an organist and violinist at the court of Duke Wilhelm Ernst and abide there for the next 9 years, becoming concertmaster of the court orchestra in 1714. In Weimar he composed about 30 cantatas, and also wrote organ and harpsichord works. In 1717, Bach began a 6- year employment as chapelmaster and director of chamber music at the court of Prince Leopold of Anhalt-Kothen. During this time he basically wrote secular music for ensembles and solo instruments. In addition, he prepared music books with the intent of teaching keyboard technique and musicianship. These books include the Well- Tempered Clavier, the Inventions, and the Little Organ Book. In 1723, Bach moved to Leipzig were he spent the rest of his life. At Leipzig, he became the music director and choirmaster of Saint Thomas's church. Life at Leipzig however was unsatisfactory. He continually quarreled with the town council, and neither the council nor the critics appreciated his musical genius. They saw him more a stifling elderly man who clung stubbornly to obsolete forms of music. Regardless, the 202 cantatas surviving from the 295 that he wrote in Leipzig are still played today, whereas a lot that was new and in craze at the same time has been forgotten. Nearly all of the cantatas start with a section for both chorus and orchestra, continue with alternating recitatives and arias for solo voices and accompaniment, and end with a chorale based on a simple Lutheran hymn. Among these works are the Ascension Cantata and the Christmas Oratorio, the following including of six cantatas. The Passion of St. John and the Passion of St. Matthew also were composed in Leipzig, as was the momentous Mass in B Minor. Among the works written for keyboard during this period are the famous Goldberg Variations, Part II of the Well- Tempered Clavier, and The Art of the Fugue, a grand exhibition of his contrapuntal ability in the form of 16 fugues and 4 canons, all on a single theme. Bach's sight began to deteriorate in the concluding year of his life, and he died on July 28, 1750, following undergoing an failed eye operation. J.S. Bach's greatest impact to music was his own music. The importance of Bach's music is due in a big part to the magnitude of his intellect. He is the best recognized as a ultimate master of counterpoint. He was able to understand and use every resource of musical language that was available in the Baroque era as Homer did with the Greek language of Archaic Greece. At the same time, he could compose for voice and the different instruments so as to take advantage of the peculiar characteristics of the make up and tone quality in each. Also, when a text was associated with the music, J.S. Bach could compose musical equivalents of verbal concepts, such as expanding melody to characterize the sea,

Tuesday, November 26, 2019

Enduring Love by Ian McEwan essays

Enduring Love by Ian McEwan essays In his novel, 'Enduring Love,' Ian McEwan presents to the audience a character which goes by the name of 'Jed Parry.' Parry's character has an incredibly important role in the book and develops a very obsessive love with the book's narrator, Joe Rose. Throughout the book, Parry's love is presented in many ways, which include being irrational, delusional, random and, like the title, enduring. McEwan does this by using different narrative techniques, structure, punctuation, imagery and sentence structure. A way that McEwan presents Parry's love is by using narrative techniques. Being a theme of the book, narratives and points of view play an important role in the novel and tell us a lot about characters true feeling and motivations. By using love letters to Joe, McEwan can give the reader an insight into Parry's true feelings of affection towards him. An example of this is the letter from chapter sixteen, "My love for you is hard and fierce, it won't take no for an answer, and it's moving steadily towards you, coming to claim you and deliver you. In other words, my love – which is also God's love – is your fate." (Page 136) By using the words "my love," it is made obvious that Parry is referring to himself, and therefore giving his perspective of the way that he feels. This is an effective way for McEwan to present his love because this narrative offers first-hand information that has not been clouded by another characters judgment of it. For example, if Joe were to describe Parry's love for him, his paranoia would cause him to over exaggerate it, thus causing it to be incorrect. By using the way that the novel is structured, McEwan can effectively present Parry's love. A way that he does this is by giving constant hints of Parry's feelings, as well as entwining the letters into the narratives. For example, this is shown when Joe shows Clarissa one of Parry's first letters, "She put down the page she had been hol...

Friday, November 22, 2019

How To Make Giant Unpoppable Bubbles

How To Make Giant Unpoppable Bubbles Ordinary soap bubbles are beautiful  but fragile. You can make stronger bubbles by using a homemade bubble recipe. These bubbles are thicker and sturdier than regular soap bubbles, so you can pick them up and examine them. Heres how to make giant bubbles that are harder to pop: Unpoppable Giant Bubble Recipe 1 cup regular dishwashing liquid1/2 cup light corn syrup Mix together the ingredients to make the solution. You can double the recipe for more solution. Another option is to mix corn syrup into your regular bubble solution. This thickens the liquid so it sticks better to a bubble wand and forms thicker bubbles that are easier to blow into large shapes. Its easier to pick up smaller bubbles than larger ones, so choose regular-sized bubbles to pick up and handle. Another trick is to wet your finger or the back of a plastic spoon in the solution so you  wont be as likely to burst the bubble when you catch it. How It Works Ordinary soap bubbles trap a thin layer of water between soap molecules. Often glycerin is added to bubble solution to slow down the rate of evaporation of the water so bubbles last longer. Corn syrup also helps prevent bubbles from popping when they dry out. When you combine detergent and corn syrup you get a strong bubble that is a cross between a regular soap bubble and a sugar polymer bubble.

Thursday, November 21, 2019

Summary on Creep Behavior of Discontinuous SiC-Al composites Essay

Summary on Creep Behavior of Discontinuous SiC-Al composites - Essay Example The first experiment tested compressed creep on SiC with 3-5 wt. percentages of Li at a temperature of 505-866k. The results showed that Li increases the strengthening power of SiC and its wetting behavior. The second experiment tested the creep behavior of SiCw and SiCp covered with aluminum alloy at a temperature of 505-644k. The results showed that both composites were steady but SiCW was more resistant to creep compared to SiCp. The results were because of the variations in the components load bearing abilities, their strengths and the applied temperatures. The conducted experiments revealed that the quality of creep rates depend on the applied temperatures and stress (Mohamed, Park & Lavernia 22). The article also used the shear lag method to test the creep rate of discontinuous composites by applying stress and geographic parameters. In this method, the composite has short fibers inserted in the creeping matrix; the shear transports the load from the matrix to fiber and this ap proach applies creep power law. This method is efficient in transferring the load from matrix to fiber and handling stress level within the fiber. ... In the experiment, the composite phase acted as a regular aligns and there was periodic array of fibers. The experiment applied the creep power law by ensuring that reinforcement phase remains elastic (Mohamed, Park & Lavernia 26). The results indicated that matrix develops higher stress, which reduces composites creep rates. It also showed that geometry arrangements affect the quality of the creep rate. Indeed, the results note that creep law favors the Ag-40wt. percentage composites only but not the composites of SiC-Al (Mohamed, Park & Lavernia 27). Considering the obtained results, the article explains the deformation models using dislocation motion. It analyses whether similar dislocation processes can be applicable for both DS alloy creep and the SiC-Al composites creep. In addition, the article also evaluates successfully the characteristics of deformation process on DS alloys and SiC-Al composites. The article highlights the strain exponent of creep and identifies the followi ng assumptions. Firstly, the high stress exponent and variations results from threshold stress. Additionally, the threshold stress and strength applied on the creep depends on applied stress and lastly, the activation energy for SiC-Al composites and DS alloys are similar (Mohamed, Park & Lavernia 30). The article concludes that SiC-Al composites and DS alloys have similar creep behaviors regardless of their stress exponent and activation energies. Importantly, the article identifies that shear log assumptions on the creep behavior of SiC-al are inconsistence. Indeed, the study offers the similarities in the creep behavior among composites, the evidential calculations and dissimilarities among activation

Tuesday, November 19, 2019

Care Analysis Essay Example | Topics and Well Written Essays - 3000 words

Care Analysis - Essay Example He lives in a rented house with his mother. He has no siblings, and all his close relatives live over 150 miles away. The family relocated after the divorce of his parents. His father has a history of mental illness (type of illness unknown), and his mother has cited domestic violence being the major factor in their marriage breakdown. Joshua has not seen his father since December 2007. The separation/divorce was believed to have been very acrimonious . Hence the family relocating north by 150 miles. Joshua and his mother have no contact with the paternal family, and only limited contact with his mother’s family. Joshua’s mother used to be a manager of a day nursery. But since Joshua’s illness, she has had to give up work, and become his carer. They have currently been turned down for DLA (Disability Living Allowance), due to Joshua, occasionally being able to walk home from school (note that school is only 2 minutes walk away). This highlights the fluctuations in his condition, some days he is unable to move and others he can just about get by. Joshu’s mother is appealing against the decision. Currently they are struggling financially , and they are also isolated from their family, and their normal family activities have been dramatically affected. Currently he is on reduced timetable at school (timetable was negotiated with specialist nurse and senco and Joshua and mother). Whilst at school, he has the option of going into a quiet room, to get some rest. Initially this was the library but it was found that this still had too much stimulus around (eg, bright lights, and the disturbance from the hustle/bustle of students).People involved in his care are (specialist CFS/ME nurse, consultant,

Sunday, November 17, 2019

External World Skepticism Essay Example for Free

External World Skepticism Essay ‘’Locke and Descartes have very different ideas about how to defeat external world skepticism.’’ Whose views are more valid about the realiability of sense perception for understanding the external world? The knowledge, the idea of the existence of external world and the way it is perceived by human being has been controvesy issue for centruies. Descartes and Locke also two very important name who proposed some viewpoint, even it can be said some theories, on the issue. The existence of external world and external bodies are true without us? Or do they exist as long as we perceive them? The idea of existence of external bodies, the knowledge of them can be attained through the way they reach us in any form. The most common and the easiest, as it will be discussed later as the only, way is the senses through them we perceive the material objects and arrive at the information they exist or not. Every existential material being has some spesific physical qualities that appeal to our senses, and through this way we experience them. It is an obvious fact that something that does not exist can do nothing to us or can show no quality to be noticed by us. Famous philospher Descartes also, basically based on this perspective, put forward that what we are perceiving through our senses are the external bodies that caused the ideas in us. As the ideas of external bodies caused in us by their perception through our senses, they exists outside independent of us. This means that whether or not we perceive any material being, it keeps to process of existence. Only, the idea of it, in us, begins with our noticing, perceiving and putting in a place in our mind. To be more clear, the part of it, its existence to us is this: our getting the idea of it. And getting an idea of an objects is provided through experiencing it by our senses independent of our will and desire. When we notice an object it has been realized that it reached us with one or more physical qualifications of it; thus we perceived it through our sense organs and have an idea about its existence. So, tt the very moment we perceive an object, its existence accepted by us in my opi nion. However, Descartes claims that sensory ideas must be produced by some substances other than us as we have a passive faculty of sensory perception and only active faculties can use them. It is worth to noting that it is totally wrong as it is possible our having an idea that produced without us. The ideas are produced, no matter what they are about, in our mind. And, ideas of external things comes into being in our minds just because we can notice them in a way. After their idea, their knowledge is reached with the way their qualities are perceived by senses. On the other hand, Locke makes his theory depend on a more assured ground. The Knowledge of the Existence of any other thing we can have only by Sensations. The only way to know any external thing is to experience it through our sensory organs. Because their realization in our minds or their existence in us is created by the testimony of our sensory organs. It can be said that our understanding of the external things pass through our reliability on our sensations. However, it also is worth to note that whenever we perceive something through our sensory organs, a certain quality of them affects us in a specific way. After their perception realizes in our mind, we makes reasons about them and understand that there are material objects that exists outside, independently. So mean, there are external material things that exists without and independent of us. Furthermore, the knowledge of them can be gained only through sensations and perceptions. First of all, when we face with an object, we perceive it through our sense organs. This perception is moved on to our brain, and with its interpretation of the object, an idea of it takes place in us. For instance, my perception of a book, my knowing of a book is provided me with the certain qualities of it. Its shape and color could be an example for this. It has a shape and a color and i can see it with my eyes, so the idea of the book reach me through the testimony of my eyes. In this example the color and the shape of the book helps me to define it in my mind with some specific qualities. Again, let’s consider a flower which has a good odor and pink color. Using our sensory organs we can ascribe the flower color and odor qualities. In a more detailed way, thanks to its odor i know that there is a thing independent of me which has a color and an odor. It already has been there with its color and odor but we were not aware of it before perceive it. Otherwise, because our sensory organs do not have the capability of producing some senses without getting any stimulus from outside, it would be a fallacy to believe that we create the ideas of external objects in our own mind without their existence, even though in some situations stimulus may leads us to have wrong ideas about the reality. Additionally, it is also another possible situation that we may have the idea of an object, without getting any cause from it at the very that moment depending on past experiences. As an illustration, let’s consider a nomad traveler who passing through a desert. The weather is so hot, everywhere is yellow and the tiredness of walking very long time increases the desire to have some water but he does not have. In this while, within this deprivation he sees a puddle. But as far as he gets close to it, the puddle becomes distant, and the nomad realizes that it is not a real, existed puddle but just a mirage. His eyes tricke him and he sees an object which, in fact, does not exist there at that moment. With the effect of other stimulants like hot weather, yellow color etc. the thirst increases to the extend that it gives rise him to see an unexisted thing as it exists there. The idea of a puddle comes into being in the mind of the nomad at the result of the causes come from the ou tside existed things, but it drags him to be under the illusion of an unexisted thing at that moment. To be more clear, it is not the situation that the nomad sees a never existed thing as existed at that moment; on the contrary, he sees an image of an existed thing which existed in fact on this world, but unexisted there and for that moment. The appearance of a puddle is a consequence of the perception of hot and the vast desert. Perceptions of their being truly creates a false idea of another object. So to speak, her brain plays a game with the nomad and brins up the idea of a previously perceived object. The nomad has the notion of puddle. He has the idea about how a puddle looks like. And at that moment with the wrong association of ideas, he had wrong idea about the puddle’s to be there at that moment. Nonetheless, it does not change the reality that there is a puddle thing outside him and the perception of it realized before, the idea of it comes into being in the mind of the nomad, thus he can recall it among from all the ideas he has thanks to previous perceptions. The perception of the puddle came to existence in a moment his previous life. Consequently, our sensory organs may lead us to have wrong perception in a moment of our life, but it cannot be deniable that this wrong perception also comes from a true perception of the object in another moment, so it exists for another moment even though it does not exist for that moment. Locke has a claim related to this: ‘’ As when our Senses employ’d about any Object, we do know that it does exist; so by our Memory we may be assured, that therefore Things, that affected our senses, have existed. And thus we have knowledge of the past Existence of several things, whereof our senses informed us, our memories still retain the ideas; and of this we are past all doubt, so long as we remember well.’’ We believe the existence of some objects as we have past experiences with them, even though at the moment we think about them we do not have any physical relation with them. Moreover, as another point of view, if it would be thought for things that cann ot be sensed by our sensory organs but material, it can easily be said that it is impossible that there such a being exists, as the material objects are the ones that have some physical qualities that affect us through sensory organs of us. When it comes to abstract things or their ideas in us, the situation is totally different and we cannot be so sure about their existence and we cannot have a definite, true knowledge of them. They are not physical obejcets nor are qualified with the features that can be comprehended through perception. As i agree with him to some extent but do not completely, Locke thinks that the idea of spirits does not make us know that any such thing do exist without us, but Eternal God. And according to him we must believe existence of some spiritual things, even though we cannot perceive and discover them in any way, as God created them and we informed about them with revelation or for other reasons. The spirits or abstracts that we have idea about them are known by us, as some of us experienced them. We are tend to believe in what majority believes. Although we do not perceive them with our own senses, we may be persuaded to have the idea of their existence. It also is related to our beliefs. If God informs us that they exist even though we do not experience them, we may believe as we faithfully trust and obey Him. However, It is not certain that some spirits are around exists. They may be there for the ones who believe in them, and not for the others who do not believe. These kind of knowledge depends on belief and it would not be logical to say something certain about them. Descartes on the other hand, links the knowledge of non-material things to God. According to him, if God had not give us a way to recognize such ‘higher forms’, we has been strongly inclined to believe that bodies produce them. And so if the ideas were transmitted from a source other than corporeal things, God would be a deceiver; and he is not; so bodies exists. This claim again would be true if one believe in God without any doubt, but s/he may not. So it shoul have more logical explanation that do have a common validity for everyone. As i mentioned above, since the ideas of abstracts cannot be thought independent of belief, their existence might be related to the believing them directly. As an example, think about Deism; those who believe in it consider God as the only holly one. They believe in God, but they rejects the religions, reveletion and all the other things which are mentioned in religions as things created by God. So in short, the existence of things other than the material things cannot be known clearly and certainly as they might be accepted by the ones who believe and might not be accepted by the others who rejects. Last but not least, it can be said that having knowledge about any issue begins with knowing and knowing with understanding. To understand something, it is a must that its being left an impact on us in such a way that we perceive it through sensations. Addition to this, it is a fact that an impact comes with a feature that belongs to an object and helps us to perceive the object, thus we comprehend its existence and have the knowledge of it. [ 1 ]. Descartes, Meditations 6 , p 43 in textbook. [ 2 ]. Descartes, Meditations 6 , p 45 in the textbook [ 3 ]. Knowledge of the Existence of other Things p. 630 (in textbook) [ 4 ]. Knowledge of the Existence of other Things (p 636, p 134 in textbook) [ 5 ]. Knowledge of the Existence of other Things (p 637, p 134 in textbook) [ 6 ]. Descartes, Meditations 6, p 45 in textbook.

Thursday, November 14, 2019

Harrison Bergeron - Movie and Story :: Movie Film comparison compare contrast

Harrison Bergeron  - Movie and Story  Ã‚   Awakening the Zombies â€Å"Everybody was finally equal. They were not only equal before God and the law. They were equal every which way. Nobody was smarter than anybody else. Nobody was better looking than anybody else. Nobody was stronger or quicker than anybody else.† This is a short, but powerful excerpt from the short story Harrison Bergeron. Not only does it make you wonder why everyone is equal, but as well makes you wonder how did everyone become equal? In the short story and the movie, Kurt Vonnegut presents a scary view of human society in the United States in the future, in which United States citizens are all uniform. This then leads to their loss of individuality, and therefore to the absolute deformity of humanness. Both the movie and the short story share these themes, they also have a multitude of other similarities, but also have just as many differences. These differences, irony and the symbolism between the two, are what I will be attempting to explore. The first apparent difference between the movie and the short story is that the short story takes place in 2081. In the story the government regulates everything, not just intelligence, but strength and beauty as well, and handicap people appropriately. The strong are forced to wear bags filled with lead balls; beautiful people are forced to wear masks so others would not feel unequal to them in looks. The overly intelligent are forced to wear radio transmitters in their ears, that are tuned to a government station that constantly bombards them with horrible sounds to scramble their thoughts. In the movie, the year is 2053 and everyone is forced to wear mind-altering headbands that rest on their temples. These headbands electronically modify intelligence, effectively decreasing everyone’s IQ to the desired â€Å"average† point. Unlike the story, in the movie, no one wears masks to conceal their looks and some are better looking than other making them unequal in appearance to everyone else. Also the only â€Å"weight bags† that are worn, is by one dancer on the television that wore a small ankle weight with no resemblance to the enormous weight bags that are described in the story. Another difference is that in the story Harrison Bergeron had the apparent status of a god among these average people. He was fourteen years old, seven feet tall, athletic, good looking, and a genius.

Tuesday, November 12, 2019

Florence Nightingale

Abstract On her death in 1910, Florence Nightingale left a vast collection of reports, letters, notes and other written material. There are numerous publications that make use of this material, often highlighting Florence’s attitude to a particular issue. In this paper we gather a set of quotations and construct a dialogue with Florence Nightingale on the subject of statistics. Our dialogue draws attention to strong points of connection between Florence Nightingale’s use of statistics and modern evidence-based approaches to medicine and public health.We offer our dialogue as a memorable way to draw the attention of students to the key role of data-based evidence in medicine and in the conduct of public affairs. 1. Introduction 1. 1 Who Was Florence Nightingale? Florence Nightingale (1820 – 1910), hereafter referred to as FN, made remarkable use of her ninety years of life. She was the second of two daughters, born in England to wealthy and well-connected parents. There were varied religious influences. Her parents both came from a Unitarian religious tradition that emphasized â€Å"deeds, not creeds†.The family associated with the Church of England (Baly 1997b) when property that FN's father had inherited brought with it parochial duties. A further religious influence was her friendship with the Irish Sister Mary Clare Moore, the founding superior of the Roman Catholic Sisters of Mercy in Bermondsey, London. Her father supervised and took the major responsibility for his daughters’ education, which included classical and modern languages, history, and philosophy. When she was 20 he arranged, at FN’s insistence, tutoring in mathematics.These and other influences inculcated a strong sense of public duty, independence of mind, a fierce intellectual honesty, a radical and unconventional religious mysticism from which she found succour in her varied endeavours, and an unforgiving attitude both toward her own faults and towar d those of others. At the age of 32, frustrated by her life as a gentlewoman, she found herself a position as Superintendent of a hospital for sick governesses. Additionally she cooperated with Sidney Herbert, a family friend who was by now a Cabinet minister, in several surveys of hospitals, examining defects in the working conditions of nurses.On the basis of this and related experience she was chosen, in 1854, to head up a party of nurses who would work in the hospital in Scutari, nursing wounded soldiers from the newly declared Crimean war. Her energy and enthusiasm for her task, the publicity which the Times gave to her work, the high regard in which she was held by the soldiers, and a national appeal for a Nightingale fund that would be used to help establish training for nurses, all contributed to make FN a heroine.There was a huge drop in mortality, from 43% of the patients three months after she arrived in Scutari to 2% fourteen months later, that biographers have often att ributed to her work. Upon her return to England at the end of July 1856 FN become involved in a series of investigations that sought to establish the reason for the huge death rate during the first winter of the war in the Crimea. Theories on the immediate cause abounded; was it inadequate food, overwork, lack of shelter, or bad hygiene?In preparation for a promised Royal Commission, she worked over the relevant data with Dr William Farr, who had the title â€Å"Superintendent of the Statistical Department in the Registrar-General’s Office†. Farr’s analysis persuaded her that the worst affects had been in Scutari, where overcrowding had added to the effect of poor sanitation. Sewers had been blocked, and the camp around had been fouled with corpses and excrement, matters that were fixed before the following winter. The major problem had been specific to Scutari.FN did not have this information while she was in the Crimea. The data do however seem to have been re adily available; they were included in a report prepared by McNeill and Tulloch (1855). The strain of FN’svarious involvements, and perhaps residual effects from an illness that she had suffered while in the Crimea, in due course took their toll. A year after her return to England, she suffered a nervous breakdown, emerging from this personal crisis with views that were often remarkably different from those that she had held earlier.Of particular interest is a change from her demand that nurses should follow to the letter instructions from doctors, to her view that nurses ought, within their proper area of responsibility, to make their own autonomous judgments. Small (1998, pp. 119 – 127, 178) has extensive and perhaps overly speculative comment on the reasons for the nervous breakdown, and an interesting analysis of ways in which her views changed. The data that showed that the high mortality was specific to Scutari were included in FN’s 1858 report, but omitte d from the 1857-1858 Royal Commission report.It was feared that continuing and acrimonious attempts to assign blame would jeopardise ongoing efforts at army reform. FN, unhappy at this suppression of her evidence, sent copies of her report to a number of carefully chosen recipients, each time with instructions to keep it confidential. One of the recipients was the freethinking popular journalist Harriet Martineau. With FN’s help, she wrote a book (Martinueau 1859), ostensibly based on information from public documents but using FN’s confidential report for additional background information, that gave the facts as FN understood them.FN’s biographers, perhaps relying too much on official documents, have not until recently been mindful of these nuances. See Small (1998, p. 198 – 200) for further discussion is one of the first to recognise them. A comprehensive biography of FN, that will do justice to the wide-ranging sympathies and interests of this remarkab le woman and show how her views changed and developed over time, has yet to be written. Small (see the note on his web site) and Baly (1997b, pp. 1-19) both draw attention to inaccuracies in earlier biographical accounts.Vicinus and Nergaard (1989) have much carefully documented biographical information. Among the numerous web sites that have material on FN note C. J. McDonald (2001) who emphasises connections between Nightingale and the experiences of soldiers in the Vietnam War; L. McDonald (2002) who is leading a project to publish all Nightingale’s writings; and Small (1998). Small’s web site has the data (from Nightingale 1858) that the Royal Commission suppressed. 1. 2 Hospitals and Hospital Nursing FN had remarkably radical views on hospitals and on hospital nursing. Both in 860 and in 1876, she describes hospitals (Baly 1997b, p. 25; Nightingale 1876) â€Å"as an intermediate stage of civilisation. † In 1867 she wrote (Baly 1997b, p. 21) â€Å"my view y ou know is that the ultimate destination is the nursing of the sick in their own homes. †¦ I look to the abolition of all hospitals and workhouse infirmaries. But it is no use to talk about the year 2000. † Consistent with these views, FN’s Notes on Nursing (1859) are not intended â€Å"as a manual to teach nurses to nurse†, but are â€Å"meant simply to give hints for thought to women who have personal charge of the health of others. It may thus seem ironic that, in her work with the Nightingale fund, FN was deeply involved in the development of hospital nursing training. She opposed the British Nurses’ Association’s 1890 proposals to make nursing into an accredited profession (Baly 1997b, pp. 184-196). She noted that there was no widespread agreement on what constituted an adequate training or what the minimum qualification should be, and argued that a much longer experience was needed before a register could be contemplated. The qualities t hat were required in nurses were not amenable to test by public examination.FN did however see an important role for women medical professionals. She wanted women to take leading roles in midwifery and in the diseases of women and children, and to be as well or better trained for these tasks as the men who at that time had a professional monopoly. It was her view that â€Å"There is a better thing than making women into medical men, and that is making them into medical women† (Nightingale 1871). She looked to a time when, as had happened in France, women would be professors of midwifery.She set out the immediate steps that she thought would best achieve that end. FN worked relentlessly for reform, in the army, in the hospitals, and in public health. She was meticulous in researching the reforms that she proposed. Where, as often, data were unavailable or inadequate, she pressed for their collection. Data inadequacies are strong themes in her Notes on Hospitals and in her Intr oductory Notes on Lying-In Institutions, i. e. , on maternity institutions. She made strong, consistent and carefully argued cases for enlightened and data-based public decision-making.This is not to say that FN was always correct in her judgments. In her next to final contribution to the dialogue, FN comments on a controversy that erupted following the publication of the third edition of her Notes on Hospitals. Her use of the term mortality percent for deaths per hundred beds per day, which she copied from Farr's report as Registrar-General, was unfortunate. As she seems to admit a page later in the Notes, these figures were not a good basis for comparing the sanitary states of different hospitals. Florence Nightingale I was really moved when Dr. Howe advised Florence that â€Å"If you have a passion, the only way to satisfy it is to pursue it. † Yes, you will only be satisfied in your life when you pursue your passion on something because if not, you will only regret it and in the end you weren’t able to help other people as well as yourself. Florence really did not neglect God’s call to her and this really demonstrated the passionate side of her. Thanks to Dr. Howe, she found out that nursing is really her calling. I also admired Florence’s determination when she rejected Mr. Milnes and preferred to concentrate on her career. For me, to have a passion the same as her, marriage would really interfere with her ability to follow her calling. This is because it would really be difficult for Florence to manage a family when she is definitely drawn into helping other people. Florence is a good leader because she is understanding to the other nurses and all of them will really follow her orders. She is smart and knowledgeable in the proper health care. Florence has that â€Å"magic† in healing and also she has a strong persona when she is dealing with dying patients. Furthermore, who knew how much prejudice there was against nurses before? It was really a terrible prejudice, considering nurses as little more than â€Å"hangers-on† and the prejudice in the army was shocking. The head doctors would prefer to see soldiers die than let the nurses trained by Florence work in the military hospitals. Compared to nowadays, nurses are really respected and honoured because of the love and care they give to their patients. It is good to be reminded of the damages prejudice can cause and just how powerful it is as a social force The film was outstanding for me. The portrayal and the flow of the story were good. Jaclyn Smith was very good as Florence Nightingale. And the film really showed the complete detail of Florence Nightingale’s works in the field of nursing.

Saturday, November 9, 2019

Mckinstry Advertising Agency Essay

You are the president of the McKinstry Advertising Agency, a medium sized firm that specializes in preparing the marketing strategies, performing the market research studies, arranging the distribution channels, and designing the advertising and promotional materials for industrial companies that have developed †off-shoot† consumer products. You obviously serve a very specific niche. Your clients are industrial companies- that is, they sell primarily to other manufacturing firms and government agencies- that have developed- as unintended outcomes of their R&D programs- products for the retail trade. Dow Chemical Company, while not a client of your agency, is an almost ideal example of this type of firm. They have developed and currently produce and market such consumer products as Dow Bathroom Cleaner and Ziploc Bags that in total amount to only 5.8% of Dow’s total sales. You clients tend not to be as large as Dow Chemical Company nor as well established in consume r marketing. Most have had very little experience in retail sales, and they generally are not very sophisticated in advertising methods. They tend, therefore, to rely heavily upon the advice of the account executives and advertising experts at your agency, and to develop relationships with those people that are far more permanent and personal than is common in the â€Å" what have you done for me lately† culture of the consumer products advertising industry. The â€Å"permanent and personal† relationships that are typical of your company but not of industry in general seem to be the cause of a major problem that you have recently encountered. One of your large clients developed a new type of radar detector. Radar detectors, also known as â€Å"fuzzbusters† are simple but extremely sensitive radio receivers that are tuned to the wave length of the police radar. When a car equipped with a enabling the driver to slow down, if necessary, before the speed of the car can be calculated by the police equipment. The use of radar detectors, thus enables drivers to avoid being stopped and fined for speeding. Speeding is alleged to be responsible for many traffic accidents. There were 27.7 million traffic accidents involving passenger car in 2000, and 6.1 million traffic accidents involving trucks. These 33.8 million traffic accidents resulted in 46400 deaths, 1.8 million sever injuries that required  hospitalization, 7.8 million moderate injuries that required attention by medical personnel, extensive slight injuries, uncounted personal traumas, and huge financial losses. Speeding was said to be a factor in 65 % of all traffic accidents and 87% of those that caused deaths and serve injuries due to the greater impacts that come from the higher speeds, but it has to be admitted that neither statistic is totally reliable. Police estimate speed based upon the length of skid marks and the extent of physical damage, but those estimates obviously are inexact. Further, â€Å"speeding â€Å" is defined as any vehicle velocity above the posted limit, and it is claimed that the posted limit is considerably below the safe capability of modern car and high way in many instances. Vehicle speed, moreover, is only one of the factor that cause traffic accidents. Alcohol intoxication is believe to be associated with 28% of all accidents and 48% of all accidents that result in death and severe injury. Often speed and intoxication together are held to be the cause. Again, though, there is a problem in measuring intoxication. The percentage of alcohol in bloodstream that impairs physical response time and personal judgment varies with the body weight, physical conditioning, and drinking history of the individual. Police and medical attendants use a test that takes into account only body weight and, further, it is said by representatives of the licensed beverage( that is, beer, wine, and liquor) industry that the legal threshold for intoxication has been set much too low. Most drivers would be considered to be â€Å"driving under the influence† of they consumed two to three glasses of beer or wine within 30 minutes of and accident. In summary, it cannot be sai d that exact cause of most severe traffic accidents are known with certainty but it is believed that speeding and drinking, jointly or separately, play some role in the events that lead up to those accidents. Also to blame, in many instances, are the design of the highway, the condition of the weather, the maintenance of the vehicle, the time of the day (many severe accidents occur at dusk, with poor lighting and tired drivers), and the presence of radar detectors. A study by the Ohio State Police found that radar detectors were present in at least one of the vehicles involved in 69% of all severe traffic accidents on the highways of that state in 2005. Studies in other states have confirmed that finding, with some estimates of the relationship running as high as 75%. The use of radar detectors is illegal in many if not most states, but neither the  manufacturing nor the marketing of the units has ever been banned by the federal government which, of course, is the sole authority which could regulate their interstate trade. The U.S. constitution forbids any state from restricting† imports† from any other state. Currently, therefore, there often occur an unusual situation in w hich the use if the radar detector sets may be illegal within a given state, but the sale of those sets is not illegal and cannot be prohibited within that state. The manufacture and marketing of radar detectors was expanding industry, with total sales revenues reaching $67 million in 1991, until the police in a number of states began to uses lasers rather than radar to apprehend speeders. Lasers project focused beams of light waves rather than focused beams of radio waves, and consequently they cannot be â€Å"picked up† by most radar detectors. Your client, as an offshoot of contract research for the defense industry, has developed a new technology that does â€Å"pick up† the light waves far enough away from the source so that drivers can slow down. A full explanation of the technology is not needed; it is probably sufficient to say that the device works on the principle that the light waves from a police laser interfere with a certain spectrum of exceedingly short-range radio signals broadcast from the detector set in the owner’s car is out of sight, perhaps 1/4 mile ahead in the highway, and the police laser is not ta rgeted on this particular car. The proposed design also picks up the interference from a police radar device equally well. The electronics firm that developed the new radar/laser detection came to the account executive at your agency and requested a marketing plan supported by market research. The marketing plan was developed; it had a heavy emphasis upon direct distribution supported by extensive advertising. The market research was completed; it showed that the first entrant into this field with a new technology could rapidly build market share. The client requested that a young associated who had prepared a very successful advertising program for one of their earlier products be assigned to design the promotional materials for this new one. The associate, Marilynn Schaefer, refused, saying privately that she felt that it was not â€Å"right† to market radar and/or laser detectors that led to more numerous and more severe highway accidents and to greater incidents of death, suffering, and injury. The program director proposed other employees at the associate level within the  creative segment of the firm, but the client’s representative wanted Marilynn Schaefer to do the work. She continued to refuse, though expressing her reasons only to the account executive, George Sarbo. Eventually the conflict between these two people reached the stage at which George said to Marilynn, â€Å"either work on this account for me or don’t work at this agency for anyone† and fired her. Marilynn Schaefer immediately came to you, as president of the agency, saying that it was not right to fire a person because of her moral beliefs. George Sarbo quickly followed, saying that for 20 years he had followed the stated agency policy of providing clients with personalized service, and that if Marilynn did not want to so she could not work for him and she should not work for company. He also said that if Marilynn were retained at the agency he would leave. You realize that George Sarbo is one of only three account executives at your firm, that he has a very loyal following of clients with him if he indeed did decide to leave. Further conversations with both of the participants in the dispute and with the industrial client on the following day showed no change in their positions. The client’s representative clearly felt that the delay in assigning Ms. Schaefer to work on the needed advertising was due only to the press of other accounts upon her time; he stated that he felt that he was â€Å"owned† her assistance on this project.

Thursday, November 7, 2019

A Place to Belong Professor Ramos Blog

A Place to Belong 1939 Marissa Diaz English 261 8 April 2019 A Place to Belong Family is the most important influence in one’s life. Family can provide support during moments of suffering and they are there to celebrate great triumphs. During the Great Depression many families suffered, and unemployment rates rose leaving families financially ruined and homeless. â€Å"Babylon Revisited†, by F. Scott Fitzgerald, follows Charlie Wales during the aftermath of the depression, on his path of redemption, as he attempts to reclaim custody of his daughter. â€Å"Barn Burning†, by William Faulkner, follows a struggling family, trying to stay together and hold onto their dignity during the Great Depression. The short story of â€Å"Babylon Revisited†, F. Scott Fitzgerald and â€Å"Barn Burning† by William Faulkner examine American Identity during the Great Depression, both view family as a defining factor of American identity. In â€Å"Babylon Revisited†, by F. Scott Fitzgerald, family is major factor in American identity. The story begins with Charlie Wales, revisiting the bar he once frequented. He used to be a heavy drinker, this is revealed when the bartender mentions, â€Å"[Charlie was] going pretty strong a couple of years ago† (Fitzgerald 981). This is indictive of the main character’s personal growth. He has moves past the days of partying and he has done this in the hopes of gaining custody of his daughter Honoria. He confesses to his sister-in-law, â€Å"[he is] awfully anxious to have a home†¦ to have Honoria in it† (987). His daughter is all he has left after the death of his wife, Helen, and he has come to realize how important family is. Before the crash of the stock market, â€Å"[Charlie] and Helen were tearing around Europe throwing money away†¦Ã¢â‚¬  (990). Charlie and his wife quickly burned through their money and when it was all gone Charlie was left with nothing. Honoria is the only family that remained, and he knows time with her is invaluable. This first becomes evident when he tells Honoria, â€Å"Youll grow up and meet somebody your own age and go marry him and forget you ever had a daddy† (986). Charlie knows he does not have much time with his daughter for she will one day leave the nest. He expresses this concern to his brother in law, â€Å"if we wait much longer [he’ll] lose Honoria’s childhood and [his] chance for a home† (989). Charlie is exasperated, because time is moving, and he is not part of his child’s life and he’s losing his chance of starting a family. Honoria is important to Charlie’s identity. She is part of him redeeming his self and reclaiming his identity. He no longer wants to be classified as an alcoholic. This is apparent in his disgust of the sudden appearance of his old acquaintances and he wants nothing to do with them (992). Charlie is willing to change for his family and he has grown. Sadly, he is not given the chance to prove himself and he is left in loneliness. William Faulkner’s â€Å"Barn Burning†, examines how the union of a family is sacred to American identity. The story starts at the trial of Abner Snopes, charged with burning down a barn. Though there is no physical evidence, the judge orders Abner to, â€Å"leave this county and don’t come back to it† (Faulkner 1005). This exile not only affects him, but also the rest of his family, as they must pack up and leave him. Abner first show’s his appreciation for family loyalty when he confronts his son, Sarty Snopes, about the events of the trial. He warns Sarty, â€Å"you got to learn to stick to your own blood or you ain’t going to have any blood to stick to you† (1007). This threat gives the reader insight into the father’s high esteem of loyalty and how much family matters to him. The family is financially ruined, because of the stock market crash and all they have left is each other. Abner Snopes again find’s himself in court and the judge imparts, â€Å"†¦ if Major de Spain can stand a ninety-five-dollar loss on something he paid cash for, [the father] can stand a five-dollar loss [the father hasn’t] even earned† (1012). Family is very important to Abner because without one another life, would be bleak and meaningless. Sarty does not understand this, so when the father tries to burn another barn down, he betrays his father and tells the land owners of his father’s plan (1014). Though Sarty does not understand his father’s decisions, the father was always loyal to his family. Abner always tried to provide for his family instead of leaving them behind. The story ends tragically with son walking off into the woods after witnessing the death of his father (1016). He has betrayed his family and walks off is solitude. Both â€Å"Babylon Revisited† and â€Å"Barn Burning† reflect America’s values at the time of the great depression. President Herbert Hoover classified the depression as, â€Å"as an emotional or psychological problem, rather than an economic reality† (Hess). Though for families such as the Snopes’ the great depression, was a harsh reality that stripped them of their economic wealth. Research shows that, â€Å"suicide mortality which increased during the Great Depression†¦Ã¢â‚¬  (Granados). This was the grim reality for many Americans, as so many people saw no end to the economic crisis that plagued society at the time. Though neither of the father’s in these short stores go out of their way to take their own life’s. They continue to fight for their families. The differences between â€Å"Babylon Revisited† and â€Å"Barn Burning† is where each family stands economically. In â€Å"Babylon Revisited† Charlie Wales is financially stable despite the toll it has taken on others in his family. This is revealed when he mentions, â€Å"[he hasn’t] been to America in months, [he has] business in Prague† (Fitzgerald 981). Charlie has abandoned his way of life in America and prospered in another country. He came from a place of privilege. It is imparted that, â€Å"[Charlie] and Helen were tearing around Europe throwing money away†¦Ã¢â‚¬  (990). He had money and he wasted all of it. It took the death of his wife for him to see how important Honoria, is important to him. In contrast the family in â€Å"Barn Burning† has nothing and most likely started out with nothing. This is indicated by the father’s bitterness towards those who have wealth during this economic depression. The narrator describes seeing, â€Å"the stiff foot come squarely down in fresh droppings where a horse had stood in the drive and which [Abmer] could have avoided by a simple change of stride† (Faulkner 1008). Abner deliberately steps into the manure just to smear it in Major de Spain’s house, which is lavishly furnished. The narrator details, â€Å"a suave turn of carpeted stair and a pendant glitter chandeliers and a gleam of gold frames† (1008). The house flaunts the wealth of the de Spain’s while Abner and his family have to suffer in merger living situations. While also having to work for little to nothing. Family is the connection between these two short stories. Families come in many forms. Some people have a one parent or live with other relatives. Family but a sense of belonging is what people yearn for. Roots and being proud of the place one come’s from are part of one’s American Identity. F. Scott Fitzgerald’s â€Å"Babylon Revisited†and William Faulkner’s â€Å"Barn Burning† are both tragic tales of trying to keep family together and of loss. Both these stories illustrate that in the end family is all that matters, and one should appreciate their family while they still have it. This was especially true during the Great Depression as it is true now. Faulkner, William. â€Å"Barn Burning.† The Norton Anthology of American Literature, edited by Nina Baym and Robert S. Levine, 8th ed., vol. 2, W.W. Norton Company, 2013, pp. 1004-1016. Fitzgerald, F. Scott. â€Å"Babylon Revisited.† The Norton Anthology of American Literature, edited by Nina Baym and Robert S. Levine, 8th ed., vol. 2, W.W. Norton Company, 2013, pp. 980-994. Granados, Josà © A. Tapia, and Ana V. Diez Roux. Life and death during the Great Depression. Proceedings of the National Academy of Sciences 106.41 (2009): 17290-17295. Hess, Heather L. N. â€Å"‘The Crash!’: Writing the Great Depression in F. Scott Fitzgerald’s ‘Babylon Revisited,’ ‘Emotional Bankruptcy,’ and ‘Crazy Sunday.’†Journal of Modern Literature, vol. 42, no. 1, Fall 2018, pp. 77–94.EBSCOhost, doi:10.2979/jmodelite.42.1.06.

Tuesday, November 5, 2019

How to Quit College and Drop Classes with Minimal Risk

How to Quit College and Drop Classes with Minimal Risk No one wants to quit college, but sometimes dropping out is the only option. Illness, family issues, financial problems, or other hardships may make it impossible to continue with your classes. When it comes to quitting college, there’s a right way and a wrong way to go about it. Don’t just stop showing up and turning in your assignments. The long-term consequences of a disappearing act may haunt you for years to come. Instead, use this time-tested advice: Talk to Your Teachers Depending on your situation, professors may be able to cut you a bit of slack and make it possible for you to have an extension on your work instead of dropping out. Many colleges allow professors to create a contract with students, allowing them up to a year to complete late assignments. This might give you enough time to resolve outside issues and still stay on track. Extensions are less likely at the beginning of the semester, but if you only have a few weeks or one big project left, there’s a good chance your teachers will show leniency. Meet with a Counselor If receiving an extension from your professors won’t work, college counselors can walk you through the steps necessary to withdraw from the university. Be sure to ask about any tuition and fees that you’ve paid. Will you receive the full amount or a prorated portion back? Will you be expected to pay back any ​financial aid or scholarships if you leave university? Does a hardship situation change the way the school treats cases like yours? Don’t take your name off the rolls until you have solid answers.​ Try to Get Away with a Clean Record Aside from getting an extension, the best thing you can do for your future college career is to make sure that your transcript stays spotless. If you simply stop going to class (or logging in to your assignments), you’ll probably receive an entire semester of F’s. That’s bad news if you ever want to come back to college, enroll in another school, or become a grad student. Recovering from a semester of F’s is extremely difficult, and your college may even put you on academic probation or suspension. You may not care now, but it could become a problem years down the road. If you’ve passed the deadline for a clean record, you may be able to get a special exception if you’re going through some sort of hardship. If That Doesn’t Work, Aim for a â€Å"W   If you cannot get away with a clean record, at least try to get a line of W’s on your transcript in place of failing grades. A â€Å"W† means â€Å"withdrawn.† While a lot of W’s may indicate unreliability on the student’s part, they generally have no effect on your GPA. Your transcript won’t be pretty, but it’s better than being put on academic probation or having difficulty re-enrolling in college. Ask About a Leave of Absence or Deferment Do you think you might want to return to college? If there’s any question in your mind, ask about a leave of absence or deferment before you withdraw from the university. Many schools have a program in place to allow students to leave for up to a year and return to the school without re-applying. There are programs designed specifically for hardship cases. There are generally also programs available for students that don’t have any extenuating circumstances. That means, if you want to drop out just to spend a year on the beach, you may be able to pick up classes a year from now without any penalty. Just make sure that you submit the papers before you leave; deferment doesn’t work in reverse.

Sunday, November 3, 2019

Compare Paper Essay Example | Topics and Well Written Essays - 500 words

Compare Paper - Essay Example Operant conditioning describes positive reinforcement, negative reinforcement, punishment and extinction as reinforcement options for behavior. It considers the external factors those which can be viewed as the basis for human behavior. Resource allocation theory is a direct measure of the keenness and effort of an individual to accomplish the task effectively. It is based on certain expectations from the attainment of the tasks based on the success from the past experiences. It is the desire of the individual to contribute effort for the task accomplishment. For instance, as explained by John Whitmore (2009), self motivation can be considered as an inevitable ‘winning ingredient’ if individuals have the desire to attain self-worth and identity (p. 107). As the name suggests, goal orientation perspective refers to individuals’ response to proposed goals. It implies individuals’ attempt to accomplish their wishes set as personal goals. This perspective helps to identify individual preferences through motivation.

Thursday, October 31, 2019

The American Revolution Essay Example | Topics and Well Written Essays - 500 words - 1

The American Revolution - Essay Example The American Revolution was a triumph of human rights and liberties. Britain introduced several political and economic policies such as heavy taxation that hugely distressed Americans. Similarly, the British military was quite inhumane in handling the "Whigs† or â€Å"patriots† a clear violation of elementary human rights. Civilians were haphazardly murdered upon showing any objection to Acts such as the Townshend Acts that imposed a heavy tax on indispensable goods such as tea and paper. The â€Å"patriots† were given a worse treatment than the â€Å"loyalists† who received preferential treatment merely for being loyal to the British government (Greg, 2010). Similarly, Americans’ freedom of speech and movement was hugely curtailed and anyone who violated the stipulated laws guiding speech and movement faced severe punishment or death in some extreme cases. The revolutionary war, therefore, came not to portray America’s military prowess but to uphold the spirit of constitutionalism where the power of leaders is limited, and a leadership that is devoted to the good of the people by protecting individual rights such as right to life and liberties such as liberty of association and freedom of speech. Joseph (2001) supports this important assertion in his article when he presents George Washington’s 7th December 1796 speech where Washington said; â€Å"†¦that the virtue and happiness of the people may be preserved, and that the Government which they have instituted† (pg. 1). Britain realized that all men were created equal, and such equality must be upheld in all spheres of life. Upon the declaration of independence, after the American Revolutionary war, democracy started mushrooming in America. The Americans were so infuriated by the British government which merely imposed itself in power and subjected its subjects to immense suffering.  

Tuesday, October 29, 2019

Analysis of Mobile Commerce Market in Hong Kong Essay

Analysis of Mobile Commerce Market in Hong Kong - Essay Example The report presents a review of Hong Kong mobile commerce markets together with areas where work has been undertaken to introduce new services and products for potential customers. It is noted, however, that the paper does not differentiate among the actions that have already been taken by mobile service providers in Hong Kong market, and the ones that are recommended by the authors in this report. There is no separate section to provide recommendations for improving the overall state of affairs. Even in the conclusion section of the paper, it is evident that the authors have made no efforts to provide any recommendation. The entire conclusion is a brief summary of the contents above it. No future grounds have been identified for the Hong Kong mobile commerce market and that causes the report to be just a compilation of facts (unconfirmed, as these are not referenced at many places in the text). It is difficult to establish the utility of such a report since it does not serve a great deal of useful purpose to audience in general, except to provide a summary of current market situation and industry trend in the Hong Kong mobile commerce market industry. The study presents some very interesting facts have been provided like WAP enabled mobiles, stock and news through mobile phones, credit card transactions and other interesting and knowledge enhancement uses of the mobile commerce technology. This provides a comprehensive insight into the mobile commerce industry and builds a foundation for developing feasibility analysis of market potential for m-commerce in Hong Kong markets.

Sunday, October 27, 2019

Community Health Visit: Klinik Kesihatan

Community Health Visit: Klinik Kesihatan An Introduction to the Malaysian Healthcare System Most of us have been exposed to the Malaysian healthecare system one way another, be it, private clinics or government ones, even hospitals at times. The Malaysian healthcare system can be said to consist of a broad umbrella structure that encompasses the provision of healthcare to both urban, not to mentioni also, the rural regions of our beloved country. In general however, it can be classified under the public or private sector, which is very obvious in our country. The public sector which is backed financially by the government, constitutes a whopping 80% of the total health services in our country, the remaining 20%, needless to say, is provided by the private sector. The backbone, or in other words, basis of Malaysian Healthcare, is formed on the foundations of the complementary network of private and government clinics together with hospitals that are available to the public. Each state of our country have their respective General Hospitals located in the states capital. District hospitals will be present in most administrative districts. Health Centers (Klinik Kesihatan) will supplement these district hospitals. Under Health Centers, are the Rural Clinics (Klinik Desa). Comparing the healthcare system in Malaysia with other first world countries such as the United States of America and the United Kingdom, the healthcare system in Malaysia is heavily subsidized by our government, in the aforementioned first world countries, treatment costs can rocket sky high. Our government has made sure that the price the people pay for treatment from the public sector his reasonable and affordable to the majority of citizens. At least 5% of the national budget is allocated to healthcare system expenditures. Our government has listed the 8 elements of primary healthcare. To fulfill the 8 ELEMENTS, they provide these services as follows: Maternal and Child Healthcare Outpatient services Basic Dental Health Nutrition Environmental sanitation Essential drugs Control of Communicable Diseases Health Education Laboratory services Organization of Klinik Kesihatan Bukit Pelanduk Klinik Kesihatan Bukit Pelanduk is located in the state of Negeri Sembilan, Port Dickson to be even more specific. There are 12 villages in the Jimah District area, and this Klinik Kesihatan is located there. On the 29th of July 1986, operations begin to go on in this clinic and the clinic has served as major centre for the treatment and recovery of the Japanese Encephalities and Nipah virus infected patients. The vaccination for the deadly Nipah virus. There are subsidiary clinics such as Klinik Desa Chuah under the jurisdiction of Klinik Kesihatan Bukit Pelanduk that provides the medical services such as maternal and child healthcare services. Klinik Kesihatan Bukit Pelanduk is also located within the radius of 30 km from the Tuanku Jaafar Hospital and the Port Dickson Hospital in Negeri Sembilan Oganisation Chart Community nurse Public Health assistant U19 (6) U17 (1) Altogether there are 33 staff workers. Klinik Kesihatan Mantin is headed by an Administrative Doctor, who is directly responsible to the District Health Officer. Under the Administrative Doctor are two posts, which are the Assistant Medical Officer, and the Head Nurse. The Head Nurse is an authoritative figure, there are 7 components of the staff directly under her, which are the Assistant Pharmaceutical officer Medical Lab Technician, Assistant Medical officer, Senior Community nurse, Public Health nurse, Health nurse, and the Trained nurse. Under the Senior Community nurse would be the Community nurse, and the Public Health assistant. Components of Health Services. The Klinik Kesihatan Bukit Pelandok has 6 main departments which are the Outpatient, Maternal and Child Health, Pharmacy, Laboratory, Dental Health, and Emergency Department. The outpatient department is by far the biggest service rendered to the public and can be broken down in the diagram below The outpatient department consists of the diabetic, hypertension, mental health, healthy teen and out patient clinic. The out patient procedures of obtaining medical services is shown in the diagram on the left. The outpatient department in other words, functions as the primary healthcare clinic. It is headed by an Administrator doctor( Medical Office). The out patient clinic sees an estimated 100 patients every single day. And the head nurse and assistant medical officers will do their utmost best to carry out their respective responsibilities to assist the Administrator doctor in any duties relevant to them. The Maternal and Child Health Clinic is headed together by the administrator doctor and the head nurse. This helps in reducing the workload of the administrator doctor. The head nurse together with the staff under her will such as community nurses, will conduct frequent home visits and provide antenatal check-ups for pregnant women within that area. Diagram on the left shows a brief summary of Maternal and Child Health services. The Laboratory Department, which is headed by a medical lab technician. The medical laboratory is not as well equipped as those major hospitals, hence the Laboratory Department of Klinik Kesihatan will collaborate with the Laboratory Department of the Tuanku JaafarHospital such as urine protein tests, thyroid function tests, lipid profile and renal function tests. Diagram on left shows a brief summary of services provided by the Laboratory Department of Bukit Pelandok. Another important component of Klinik Kesihatan Bukit Pelandok. After consulting the medical officers, patients who are eligible for prescriptions, will have their medication prescriptions handed to the assistant pharmaceutical officer, who will then supply the patients and inform them of the usage of the medication. Klinik Kesihatan Bukit Pelandok also has a dental department, the dental functions under the same operational hours of the clinic. Tooth extraction, filling, scaling, whitening are provided services. Major oral surgeries however would be referred to the Tuanku Jaafar and Port Dickson hospitals. Last but not least, there is also an Emergency Department, this department is equipped to handle minor emergencies, it also has an ambulance and paramedics. The bar chart on the left shows the ethnicity of the total number of patients in 2010. Services Provided by Klinik Kesihatan Bukit Pelandok. I have already stated the various departments of Klinik Kesihatan Bukit Pelandok in the Components of Health Services provided section. The departments of this clinic provides a wide range of treatment modalities, hence allowing the clinic to ensure that patients enjoy effective treatment. The outpatient department is the most busy of all the departments. The purposes of the outpatient department are to provide immediate treatment to patients who are acutely or chronically sick, and also to act as a control for the clinic against infective disease such as Tuberculosis. Klinik Kesihatan Bukit Pelandok also provides the Tuberculosis Direct Observed Therapy Short-course treatment. Moving on to the Maternal and Child Health care department, the clinic mainly focuses on prenatal, antenatal, not to forget postnatal care of both the mother and foetus. There is a target to be achieved, which is the target of zero maternal deaths. They are accomplishing this target in a certain number of ways which include immediate diagnosis and treatment of pre-eclampsia, immunization of the mother and frequent antenatal check-ups up until the estimated delivery date. There are also activities scheduled by the department for disabled children on a case by case basis. For the Laboratory Department, their main role is to enable the clinician in conducting relevant laboratory studies that will help in the diagnosis and management of the disease. The Laboratory Department allows the clinic to receive results much faster compared to the time it takes to receive results from a nearby hospital. Some common tests conducted by this department are as follows: Blood tests for HbA1c, lipid profile, platelet count, ESR Light microscopy on blood smears to detect blood disorders such as anemia, or parasites in the blood smears. Urinalysis for toxins, glycosuria, urea and red blood cell casts. Pregnancy test Other more intricate and complicated tests such as FTA-Abs for treponema pallidum, would require samples to be obtained and sent to the Tuanku Jaafar or Port Dickson General Hospital for processing. The pharmacy is responsible for dispensing medication in safe and legal amounts to patients, and to advise patients on practicing compliance in taking their medications. Patients will also be counseled on the side effects and contraindications of the drugs. Reflections From observing the complex structure of roles and responsibilities held by the different components and departments of Klinik Kesihatan Bukit Pelandok, it brings to light the vast value of this particular clinic in the provision and primary healthcare of the residents in Bukit Pelandok. Many of the patients who visit this clinic are of the Malay ethnicity, I for particular, am one who is not fluent in Bahasa Melayu compared to the English language. I learnt that this could be a barrier in communicating with patients who can only speak the Malay language. I have decided that I will brush up my Bahasa Melayu, and master a few of the colloquial terms so that next time I would be able to communicate even better in the Malay language. This clinic visit has taught me that every component of the staff has a part to play, and has managed to teach me invaluable lessons of becoming a team player. Section II: Household Survey Introduction Bukit Pelanduk is most famous for the Nipah outbreak. Prior to the outbreak, during the 90s, it contain the largest pig farming communities in Southeast Asia. In between October 1998 and May 1999, that was the darkest time in Bukit Pelanduk recent history, there were approximately 104 deaths out of 258 cases of Nipah infected patients. Towards the Chinese new year in the middle of March 1999, a pig breeder from Sungai Nipah, which is located south of seremban, died suddenly triggering massive panic. Nearly half the population of the village migrated elsewhere out of fear towards the killer disease. The virus spread like a raging wildfire out of control causing many pig farmers not to mention villagers to abandon their farms and homes in panic. By March 1999, Bukit Pelanduk had become something like a ghost town due to the mass exodus. The ministry of health then decided to raise the level of this epidemic to the level of national crisis. A Cabinet-level task force was set up, and then headed by the then Deputy Prime Minister Abdullah Ahmad Badawi. What was confusing was that at that time, the government adamantly insisted that it was right in tagging the disease as Japanese Encephalities, however both farmers and scientists opposed this theory and suspected that it was a different strain or virus altogether. The virus then spread to Kampung Sawah, Kampung India and even Sepang. Farmers consulted temple mediums, and promptly put up red banners at the mediums advice in and around their houses to ward off the angel of death. After months of futility in treating the outbreak as Japanese Encephalitis, the government finally decided to call in the Department of Medical Micribiology of University of Malaysas medical faculty for assistance in dealing with this disease. Dr Chua Kaw Bing was the doctor who managed to isolate the virus in five days. 12 days later, it was identified as a new Hendra-like virus and tagged as Nipah. Over one million pigs, or half our contrys pig population at that time, were culled. Around 36000 ppl suffered unemployment due to the destruction of farms. According to the United Nations Food and Agriculture Organization, it is estimated close to RM 500 million of pig production was lost. Today, pig farming is no longer allowed legally in Bukit Pelanduk. Since the outbreak, the young had drifted elsewhere in search of a living. Only the old remain, to live out their days. Objectives The objectives of the study are To describe the social demographic of community To identify vectors and pests To comprehend health seeking behaviour To determine the housing conditions To understand food, nutrition and health awareness To determine working environment And to determine the knowledge, attitude and practices on dengue among the community. Methodology (Methods and Materials) The household group consisting of 15 members. We met up before going to Bukit Pelandok in IMU to discuss our strategies and to plan ahead before the Bukit Pelandok visit. Household questions and objectives for the Bukit Pelandok visit was meticulously discussed and great care was poured into the formation of our questionnaire. The questionnaire was in the English language and pretested to make sure no discrepancies arose when certain terms were used. After countless hours of discussion we finally agreed on a descriptive cross-sectional study upon the target population which were the residents of Bukit Pelandok. Due to obvious time constraints, not to mention logistical ones, the art of the convenience sampling technique was called to the fore with households being identified as the basic unit of due analysis. The survey was conducted over 2 working days around the 7 housing areas within a five kilometer radius which are as follows Kampung Sawah Kampung Pachitan Kampung Jawa Kampung Cina Kampung India   Rumah Rakyat Taman Bayan Most of us were well conversant in English as well as the Malay language, and we were able to translate all of the questions confidently into Mandarin as well. As names and specific home addresses were not included as part and parcel of the questionnaire, we managed to obtain consent of participants as well as guaranteeing their anonymity and confidentiality of their responses in the survey. To display the results in an attractive and efficient manner, descriptive statistics were employed in the formulation of the results which would be put under the results chapter. Formulation of results in this survey was done with the SPSS 18 program together with the dedication of the data entry and analysis team. The following is a brief summary of the study: Study location: Bukit Pelandok, Negeri Sembilan Study period: 17-18 February 2011. Total population of Port Dickson: 90 000 people Target population: Community in the 7 areas mentioned above. Sampling technique: Convenience sampling technique Sample size: 234 Basic unit of analysis: Household Study design: Descriptive cross sectional study Study instruments: Pre-coded and pretested questionnaires in the English language via face to face verbal interviews. Data entry and analysis: SPSS 18 Operational definitions Results Table 2.2 above shows the literacy level of respondents. For the male population, 50 out of 79 males ,63.29 % are literate whereas for the female population, 108 out of 155, 69.68% are literate. Women have a higher literacy level than men it appears. Figure 2.3 Figure 2.3 shows that the most common occupation of respondents are housewives, 108 out of 234, or 46.15%. the second most common occupation is the skilled manual/clerical which stands at 38 respondents, or 16.24%. Only 5 of the respondents were students, representing only a meager 2.14%. Figure 2.4 Figure 2.4 shows that the most of the respondents have a monthly household income of around RM 1000-RM1999 which was 84 out of 234, 35.90%. There were 11 respondents, 4.70% who were of the highest income bracket (>RM 5000) Figure 2.5 Figure 2.5 above shows that majority houses in Bukit Pelandok are of the detached type, 65.81%. Figure 2.6 Figure 2.6 shows that 53.2% of houses are made out of brick whereas 39.5% and 7.3% are made out of brick and wood, and wood respectively. Table 2.3 : The Housing Characteristics of Respondents in Bukit Pelandok (n = 234) Table 2.3 shows that 97.9% of the houses have 24 hour availability of electricity whereas 98.7 % have availability of piped water supply. Garbage collection facility was low as only 46.2% of the houses had that facility. Availability of a proper sewage system was high too at 85.9%. 231 out of 234 respondents did know where the nearest health clinic was, a 98.7% majority of them. 219, 93.7% of them claim they will seek medical assistance if sick. 70.5% would choose the government clinic for medical assistance whereas 26.9% will go to seek medical assistance from a private clinic. Discussion From Figure 2.3, the bar chart shows that a huge number of respondents are housewives. This is because the time we carried out the survey was during office working hours. Hence most respondents who were the most likely to be at home during this period of time tend to be housewives. From Table 2.3 more than half of respondents claim that they do not enjoy proper garbage collection privileges. When we asked more about garbage disposal practices in that area, we found out that about once a week, rubbish is brought to a place designated by the village chief (ketua kampung). There the rubbish is either burnt or buried. If villagers feel that this is a complicated process, they would burn or bury their own rubbish in their own backyards. From Figure 2.4, the majority of respondents household income can be appreciated to be below the RM 2000 mark. Most of the residents of this area belong to the skilled/ unskilled manual field of profession as stated in the operational definitions, hence their income is lower. Limitations While conducting the study, the survey team realized that we ran into several limitations. That was inevitable. And we will list it down below. The first limitation encountered by our team was the coverage in the area of our study. A limited area makes it difficult for any study to be effectively correlated and to allow for generalizations to be made. Certain questions in the survey were not specific for respondents such as the awareness of job related risks. If the head of household is not there to answer the questionnaire, the respondent might not be able to give a very accurate answer. Therefore certain conclusions about the population of Bukit Pelandok could not be accurately derived. There were variations between the way interviewers would ask the questions. Hence there might be a slight discrepancy between explanations of questions and answers from one interviewer to another. This means that the standardized understanding of questions by respondents would have been slightly affected. The reliability of the information provided by the respondents is very hard to verify also. We depend on truthful answers and had no concrete way to validate whatever the respondent answered. There were instances also where non responses were encountered. During the survey there were also noticeable language barriers between interviewers and respondents. There was an instance where an Indian lady could only communicate well in Mandarin, hence the Malay interviewers would have had a real difficult time if not for his Mandarin-speaking partner. Conclusion Bukit Pelandok is an area where the residents put more faith in western medicine and most of them will seek medical treatment and advice from the Government Health Clinic. Local authorities need to beef up their services and improve garbage collection facilities among this area to prevent air pollution which results from open burning. Reflections I feel that this project has taught me some very important lessons and even practical skills, for example, in the entering and formulation of graphs and tables by the SPSS 18 program. This will help me in my future career as a medical doctor in the world of medical presenting, teaching and learning. This project also gave me an experience of conducting a household survey together with my batch mates, we learnt how to delegate and carry out our respective responsibilities as a team. We also managed to learn from our mentors on how to facilitate this type of household survey research. Section III-Research Report Abstract The objectives of this research survey conducted were to investigate the social status of the community and the knowledge, attitude and practices (KAP) on dengue among rural communities in Bukit Pelandok, Negeri Sembilan. Convenient sampling was used as time was a major limiting factor. 234 and 250 people participated in the household and research survey respectively. Participants age were 18 years old and above, had the ability to converse and communicate in the Malay, English, and Mandarin language, resided permanently in the area, and holding a Malaysian citizenship. In our survey, we used a pretested, precoded, and well structured questionnaire in the English language for data collection via a face to face interview with participants. Introduction According to the WHO, the Dengue virus is transmitted through infected Aedes mosquitos with any single one of four dengue viruses when it bites a human being. This virus is more prevalent in the tropical and sub-tropical areas on Earth. After an infective bite, symptoms start presenting within the next 3-14 days. As the name dengue fever implies, it is a febrile illness that affects humans in all stages of life be it infants, young children or adults. The symptoms present with a wide range from a mild fever, to an immobilizing high fever, which is usually accompanied by severe headaches, muscle, joint pain and the occasional bout of rashes. Up to the present day, sadly, there are still no specific antiviral medicines to battle dengue. Hydration is of utmost importance when managing a patient with dengue fever. Aspirin or non steroidal anti-inflammatory drugs are not recommended for the treatment of dengue fever. The most widely feared complication is the dengue haemorrhagic fever which is accompanied with fever, abdominal pain, bleeding and vomiting. It is potentially lethal and usually this complication affects children. Prompt clinical diagnosis and meticulous clinical management by experienced doctors and nurses usually increase the rate of survival of patients. Over the past decade, dengue has emerged as one of the most common mosquito-borne viral disease among humans. On a global scale, an estimated 2.5 billion people reside in areas where the dengue viruse can be easily transmitted. From a geographical point of view, the spread of both the vectors (Aedes mosquito) and the dengue viruses has led to a resurgence globally of an epidemic dengue fever. Together with this epidemic, there is emergence of the dengue hemorrhagic fever (DHF) in the past quarter of the century. The main vector of dengue is the Aedes aegypti ¼Ã…’ there are four different but related viruses that cause dengue. The recovery from infection by one type will provide lifelong immunity only against that particular serotype. In other words, it means a human being can be infected by another serotype of dengue virus for a subsequent time. Dengue Hemorrhagic Fever was first identified during the 1950s in the Philippines and Thailand when those two countries experienced dengue epidemics. Around 1970, about nine countries had witnessed the DHF epidemic and continues to rise in our present day. All four dengue viruses are endemic in the Americas and Asia and has become one of the leading causes of hospitalization and mortalities among children in a few of their countries. Until now, vector control is the most widely used method for the dengue and DHF prevention. Broad research on dengue vaccines are still being conducted. Literature Review. A number of literature reviews provided me with a very handy guide to the socio-demography and KAP regarding dengue among the community of Bukit Pelandok, Negeri Sembilan. Since i had limited time to conduct the research, the literature reviews gave me an overview and acted as a stepping stone to getting the research report together. Even for professionals, literature reviews are useful reports that keep them updated about what is current in their field. 4 journals from the internet and online journal communities were reviewed before writing this report. This included studies on KAP among the adult population in Malaysia, Thailand and Myanmar. The quality of the journals was merely acceptable as most of them used convenience sampling. Only one journal used a cross sectional multistage sampling, this was the journal regarding Dengue-related Knowledge among Caregivers in Myanmar. From these journals, the group conducting the research managed to fine tune the questions in the questionnaire that was used so that the answers would be helpful and informative. According to the journal by Dr Farizah Hairi, out of all of the 200 respondents surveyed in Kuala Kangsar, only one had never heard of dengue. And the main source of information came from the television or radio. 88.5 % of the of the respondents thought that the cause of dengue was mosquitoes whereas only 2.5% knew it was the dengue virus to be exact. Out of these 200 respondents, only 91 could name Aedes as the type of mosquito that could transmit the dengue virus. The knowledge on the Aedes mosquito was quite poor. Only 25 percent of the respondents were able to mention that covering the stored water as a prevention method. The good news was that 192 (96%) of the respondents understood that presence of Aedes larvae in their residence was against the law. The practice of dengue control , the most common forms of prevention were using mosquito coils together with insecticides. Majority of respondents (96%) did consider the dengue virus as a very serious disease. All of the 200 respondents stated that they would seek treatment if they were infected with dengue. Out of the 200, 192 which is a large proportion felt that prevention was better than cure. 90.5% of the respondents support programmes or activities which are organized by the health authorities targeted at the elimination of Aedes mosquitoes. 91% of respondents too felt it was justified to punish those guilty of harbouring Aedes larvae in their residence. Based on the type of scoring system used which was described in the methodology of that particular journal, 68.5% of respondents possessed good knowledge of dengue and Aedes, whereas 91.5% had a positive attitude towards dengue control. What was disappointing was that only 51.5% of respondents actually adopted measures to prevent and control dengue and its vector. Research Question The following is the main research question that all the questions in the questionnaire are helping to answer. What is the current level of knowledge, attitudes practices for prevention of the Dengue virus among the semi-urban community? Objectives General objective To assess the Knowledge, Attitude and Practice on Dengue among the Bukit Pelanduk community. Specific Objectives: To determine the level of knowledge of the local communities on Dengue To appraise the attitude of the local communities towards Dengue To describe the practices taken by the local community to prevent Dengue infection Methodology For the KAP of dengue research survey, we used a cross-sectional study in Bukit Pelandok. Type of sampling used was convenience sampling. The sample size of the study was targeted at 250, we managed to hit that mark. A pre-tested and well structured questionnaire on KAP of Dengue was used. The household survey was carried out within the range of a 5 km radius around the Bukit Pelanduk Health Clinic which included -Kampung Chuah -Kampung Sawah -Kampung Pachitan -Kampung Cina -Rumah Rakyat -Taman Bayan From the 14th to the 16th of February 2011, we did some brainstorming to finalise the topic and questions. After that we sent the questionnaires for printing. 2 members of the group were sent to Bukit Pelandok to check out the area before the day we went to conduct the research. We then had to divide determine the criteria of interviewees which would be fit for selection to answer the questionnaires. The criteria the interviewees must fulfil is that they be above 18 years old, a resident of that household, and a Malaysian citizen. Our questionnaire had 4 main components which included socio-demographics, knowledge, attitude and practices. The medium used to conduct the interview were the Malay, English, and Mandarin language. On the 17th to 18th of February 2011, we proceeded to the execution of the research study. We divided the research group into 13 pairs. On the 1st day, we covered areas within walking distance, which was as far as up to Kampung Cina and Kampung Sawah. The 2nd day , we were dropped off by group members who had cars and managed to cover further areas as far as up to Taman Bayan and Chuah. As like the previous household survey, there was a key emphasis placed on obtaining consent from respondents of the survey as well as maintaining their anonymity and confidentiality of any of their responses to the survey. The descriptive statistics program, SPSS 18, was employed in the formulation of the results of the survey. The SPSS 18 greatly helped in data entry together with analysis. A P-value of less than 0.05 was used to prove the validity of the collected data unless otherwise stated. The scoring system used is as follows. Knowledge 10 vital questions à ¢Ã¢â‚¬ °Ã‚ ¥ 7 correct GOOD knowledge Attitude 6 vital questions à ¢Ã¢â‚¬ °Ã‚ ¥ 4 Yes GOOD attitude Practice 7 vital questions à ¢Ã¢â‚¬ °Ã‚ ¥ 4 Yes GOOD practice There were some protocols that we followed to reduce bias or error while conducting the interview. We did our best to avoid suggestive questions, and the questionnaire was pretested among our own group members. There was a briefing held to convey the standardization of questioning. House allocations were done to prevent overlap and we tried our best to extensive coverage of Bukit Pelandok. Our group also double checked the SPSS data after input. Results Socio Demographic data Gender Figure 3.1 shows the gender of respondents .60.4% and 39.6% were female and male respectively out of 250 respondents. Age group Figure 3.2 shows the age group of the respondents, a majority, 40.4% were middle aged. Ethinicity Figure 3.3 shows the Malay ethnicity is 59.6%, the majority. Figure 3.4 shows the educa Literature Review: Methods Of Virus Protection Literature Review: Methods Of Virus Protection Computer viruses are most critical area in computer science. All computer users in the world are suffering from this threat. Viruses reproduce themselves and spread through computer to computer as well as network to network. There are some antivirus software and some best practices to prevent from computer viruses. As well as this literature review contains the present situation of computer viruses, protection from computer viruses and how new antivirus software performs on computer viruses. end{abstract} section{Introduction} The only secure computer is one thats unplugged, locked in a safe and buried 20 feet under the ground in a secret locationÃÆ' ¯Ãƒâ€šÃ‚ ¿Ãƒâ€šÃ‚ ½ Dennis Huges, FBI begin{sloppypar} end{sloppypar} The above statement shows the current security situation of computers and the role computer viruses play in computer world. begin{sloppypar} end{sloppypar} Computer virus is a program that can execute itself with the help of another infected executable program without knowledge of computer user and infect to computer. Viruses usually copy itself in current host and another new host also. So generally viruses are infecting to executable files. Some kinds of viruses only reproduce itself within the current host and from the current host to another host and spread in the host. Those are harmless than viruses that damage to the computer program, activities and data in the computer. begin{sloppypar} end{sloppypar} But there are some other malicious software other than the viruses. Those are called malware. These malicious software can spread without help of executable program. begin{sloppypar} end{sloppypar} Computer viruses are also computer programs. So anyone who has a personal computer can create a virus program with few lines of codes. This means birth places of viruses are widely available. Also a virus is activated in host computer; the infection can spread through network (LAN or Internet) to other computers. begin{sloppypar} end{sloppypar} Virus attaches itself to other program and spreads with them. Most of the time virus attaches to executable program, when the infected executable program is running then virus is also executing behind that process. Also computer viruses can infiltrate to operating system. So all operating systems like MS Windows, PC Dos, Unix and Macintosh OS have probability to infect with viruses. begin{sloppypar} end{sloppypar} Some viruses do some destruction as soon as they enter a system. But some of others are programmed to lie dormant until activate by some signal. The signal may be mouse click, specific date, time or specific common sequence of keystrokes. As an example the famous Michelangelo virus, it is set to activate his birthday March 6. begin{sloppypar} end{sloppypar} Protecting the computers from the malicious software is the most challenging thing. But there are many ways to protect the computers from computer viruses. Although there are lots of methods to protect the computers from viruses, the computer users also have a responsibility to protect the computers from computer viruses. From the next section of review is considered about different types of Malware. cite{1} newpage section{Different types of Malware} There are different types of Malware spread in computer world. But it can mainly identified as follow. begin{itemize} item Viruses item Worms item Trojan Horses item Logic Bomb end{itemize} begin{figure}[h] par includegraphics[bb =0 0 100 325 ]{virus.png} caption{Malware Growth by Year} cite{10} par end{figure} newpage subsection{Viruses} Virus is block of executable code that is attached itself to another executable program by attaching external code, overwriting or replacing of the executable program code. When the computer user execute the infected program the automatically activate virus also by executing the hide block of code. This is the way how virus is infected to computer without knowing of user. But viruses get help from computer user to propagate in his machine. begin{sloppypar} end{sloppypar} There are several types of viruses; they are categorized into various categories according to the way how they infect to system and what part of system is. Figure1 shows how Malware growth with year. It clearly show increase of Malware in year by year. cite{1,5} begin{itemize} item Boot sector viruses item Macro viruses item File infecting viruses item Polymorphic viruses item Stealth viruses item Multi-partite viruses item Resident viruses item Companion viruses item FAT viruses end{itemize} subsubsection{Boot sector viruses} Boot sector viruses are infected to the boot sector of computer otherwise master boot record of computer. Boot sector viruses are very difficult to detect because the master boot sector is the first thing loaded when computer started. So if this virus effect to computer, the virus get fully control of the machine. begin{sloppypar} end{sloppypar} When boot sector virus infect to computer, they first move or replace the original boot code with infected boot code. Then the original boot code move to another sector of on disk and labeled that part as bad sector. So it will not use in future. The important thing is 75 per cent of viruses attacks are reported from boot sector viruses. The main and only way computer can infected with this virus is boot computer using infected disk. So some modern anti-virus software is designed to check infected disk, when boot using disk and before boot strap is loaded.cite{1,2} subsubsection{Macro viruses} In computing macro virus is virus that is crated using macro language. Macro language built into software such as word processor. So macro viruses propagate with applications which are used macros. In most of the time macro viruses infected with MS Office Word, MS Office Excel. However many of windows applications have to potential infected macro viruses too. begin{sloppypar} end{sloppypar} Because some applications allow macro program to be embedded in documents. So when the document is opening the macro run automatically. Also macro viruses spread rapidly because of peoples share data, documents and also use internet to get data and email document. Therefore Microsoft suggests opening file without macros or user can verify there is no damage macro with the document. But these methods are also not worked at all macro viruses.cite{2,3} subsubsection{File infecting viruses } File infecting viruses are infected to flies, and sometime they are allocated memory of computer. Files infecting viruses are infected with executable files, but most of the time it infect to executable files with extensions .COM, .EXE and .OVL. begin{sloppypar} end{sloppypar} Consider with boot sector viruses these are easy to detect. If the file infecting virus infects to some document, usually it increases the size of the file. Therefore Anti-virus software can detect those viruses using that feature.cite{1} subsubsection{Polymorphic viruses} Polymorphic viruses are change there appearance in each time when it infect to computer. So it is very difficult to detect theses type of viruses. begin{sloppypar} end{sloppypar} Polymorphic viruses also block of programming code, so they are encrypting there code using different algorithms every time they attack to system. Some polymorphic viruses can assume over two billion different guises. Therefore anti-virus software should make with good algorithmic scanning techniques instead of simple string based scanning techniques.cite{1,4} subsubsection{Stealth viruses} Stealth virus is a virus that hides its track after infecting to system. These types of viruses also try to hide from operating system and Anti-virus software. Therefore stealth viruses always stay in memory then they can intercept all attempts to use the operating system. Therefore these viruses waste memory available for user and hide it form both user and Anti-virus software. It hides changes it creates to files, directory structure and operating system also. begin{sloppypar} end{sloppypar} When detected theses type of viruses using Anti-viruses software, then first it should disable the virus before correct the memory location in memory because stealth viruses also stay in memory.cite{1,6} subsubsection{Multi-partite viruses} Multi-partite viruses infect both boot sector and executable program. Therefore this type of virus very difficulty detected.cite{1} subsubsection{Resident viruses} Permanent viruses reside in the RAM.cite{7} subsubsection{Companion viruses} These are working like resident viruses or direct action viruses. subsubsection{FAT viruses} These infect to the file allocation table. subsection{Worms} Worms is a self-replicating computer malware type. It spread copy of itself to other host using computer network. Worms different than viruses how the reproduce and spread. It was known viruses want host program or boot sector to activate it need file transfer (infected file) to another computer to spread to it. But worms did not want any host files to execute and they can execute independently and spread using network. Therefore they normally find addresses to propagate and they pick addresses in three ways, begin{itemize} item Randomly generate addresses item Find addresses in system tables item Find addresses in a program end{itemize} begin{sloppypar} end{sloppypar} The threat of worms is equivalent to that of viruses. Computer worms can damage and destroyed some important files and it can crash critical programs to stop working sometime. The very prominent examples of worms are the MS-Blaster and Sasser worms.cite{1,2,8} subsection{Trojan horses} Trojan horses are distractive programs that hide in some valuable and useful software in internet. Some time worms and viruses hide within Trojan horses. The different between virus an Trojan hours is Trojan did not spread itself. begin{sloppypar} end{sloppypar} Normally Trojan hours spread into two parts those are client side and server side. When the client Trojan executes in computer the server the attacker otherwise server can get high level control of the client computer. begin{sloppypar} end{sloppypar} The Trojan hours spread in several ways, most of the time with infected e-mail attachment. Also virus developers use some chat program like Yahoo messenger, Skype to spread these Trojans. begin{sloppypar} end{sloppypar} Commonly there are several types of Trojan horses like remote access Trojan, password sending Trojan, key loggers, destructive Trojan, FTP Trojan and proxy Trojan.cite{1,9} subsection{Logic bomb} The logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.cite{1,10} newpage section{How viruses spread} Virus is one kind of malicious software which does some kind of harm to the activities of the computer. They always need a host program or any executable program to be executed its code. As viruses cannot execute its code by itself, the virus has to get the help of another file. Because of this reason, the viruses can effect only to several kinds of files such as html files with JavaScript, word documents and spread sheets. As the files with the extension .gif, .jpg,.wav,.mp3 files considered as pure data files, a virus cannot do a harm to these files. begin{sloppypar} end{sloppypar} What the viruses do to spread is copying its code to another executable file. Then when that executable file is executed by another person the code of the virus is also executing and it then starts to search for files it can reside in the same computer or in the other computer which has been connected to the computer. Then the newly attacked programs are also trying to search for files which it can attack. If the infected file sends to another computer by a removable media, the computer virus infects to that computer too. begin{sloppypar} end{sloppypar} There are number of ways which a virus can enter into a computer. Most of the time viruses are spreading through the internet. As creation of viruses is rapidly increasing and internet is everywhere available, spread of the computer viruses has increase more and more. Computer viruses are coming to the computer with e-mails in e-mail attachments. When the user opens the e-mail, the computer virus enters into the computer and grows in the computer. Another way of entering a virus into a users computer is by downloading something from some web sites. Through floppy disks or another removable media, it is possible for a virus to enter into a computer.cite{1} section{What the computer viruses and other malicious software can and cannot do} begin{itemize} item Use disk space by the computer viruses in vain. item Delete or modify the content of the infected files. item Interrupt to some operations of the infected computer. item Display some messages or images. item Decrease the performance of the computer. item Block the computer networks. item Do not do any harm to the hardware components that are connected to the computer. end{itemize} section{Protection from computer viruses} Once a computer infects with some computer viruses, the computer users cannot identify whether a computer virus has entered into the computer or computer system as some computer viruses are in idle mode for some period of time. The computer users can know that a computer virus has entered into the computer only by looking at the evidence of the destruction they have done. So the computer users must always consider about the safety of their computer before a virus do some destruction to the computer. begin{sloppypar} end{sloppypar} As most of the computer users are now aware of the computer viruses, they specially pay their attention to limit the chance for a computer virus to enter into their computer. By just installing an anti virus software the users cannot give the responsibility of protecting the computer from computer viruses only to the anti virus software programs. The computer users also have the responsibility of protecting the computer from computer viruses. Although most of the computer users trust and use an anti virus software to protect their computers from computer viruses, there are best practices which should be followed by the computer users. begin{itemize} item When downloading software or any other thing from web sites the users should always be careful to download them from reliable web sites. item As viruses can come with e-mail attachments when the computer user checks the e-mails, messages from unknown contacts should not be opened. item If the user is logging into the computer with admin privileges, the chance to be infected by some computer viruses or malware is greater than the user log into the computer with user privileges. As some viruses cannot enter into the computer when the user logged as a user, log into the computer with user privileges is safer. item Restrict the other users from write privilege is another option. item Put passwords that cannot be easily guessed by another person. item Backup data. item Use only trusted software. end{itemize} begin{sloppypar} end{sloppypar} How much the company or person has to pay for an anti virus software, today most of the computer users are used to get the service of an anti virus software as the data are worth than the amount they pay to protect their computer or computer system. So installing an anti virus software program has become the most popular and reliable method of protecting from computer viruses. cite{14} newpage subsection{Computer virus protection with anti virus software programs} As computer viruses are available everywhere in the world, the better way to protect the systems is installing an anti virus software in them. Because of that reason, there are lots of anti virus software providers to provide their services to the customers. Various anti virus software providers are providing their service to the customers in various ways. They are client pull method, provider push with consent method, subscription method and care taking method. begin{sloppypar} end{sloppypar} Client pull method After a request from the client or customer for the service of an anti virus software, the service provider provides their service to the client. In this method as its name said, client should take the initiative to get the service. begin{sloppypar} end{sloppypar} Provider push with consent method The service providers sends email notification about their product and then the customers download the anti virus software and install it on the computer. begin{sloppypar} end{sloppypar} Subscription method The client agree to an agreement with the service provider. In this method when the vendor updates the anti virus software, the updates will automatically downloaded into the customers computer. begin{sloppypar} end{sloppypar} Care taking method In this method none of the individual computer user should not do anything to protect the computer from viruses. The service provider provides the service as a whole. begin{sloppypar} end{sloppypar} The mechanisms used by various kinds of anti virus programs to detect a computer virus is not able to catch all the viruses or not able to not to catch the non virus things. Traditional anti virus software used two methods to detect a computer virus.cite{15,16} subsubsection{String matching technique} Some anti virus providers stored the codes of the computer viruses in a virus dictionary and when performing a scan, the anti virus software searches the scanning file for a piece of code from the virus dictionary. If a matching character is met, then the anti virus software detects that file as a suspicious file and alerts the user saying there is a suspicious file in the computer. begin{sloppypar} end{sloppypar} But if a virus creator creates and release a new computer virus, as the code of that virus is not available in the virus dictionary, the anti virus program is not able to detect that virus. So the anti virus software which use this technique cannot guarantee that all the computer viruses can be detected by itself.cite{17} subsubsection{Detecting a virus by monitoring the behavior of the program} The anti virus programs which use this technique is monitoring the behavior of the scanned program and if there is an unusual behavior, the anti virus program detect it as an infected program and report it to the user. begin{sloppypar} end{sloppypar} But if the anti virus software detect a non infected program as an infected program and after reporting it to the user if the user deletes it from the computer, a problem arise. begin{sloppypar} end{sloppypar} Although the anti virus software can be trusted, there are some fake anti virus software which do not provide a protection against computer viruses. They have created only with the objective of earning money from the computer users by intruding them. Because of this reason, the computer users also have the ability to download and install only the trusted anti virus software.cite{17} subsection{Antivirus software rating} The latest antivirus software rates in the world.cite{11} begin{itemize} item BitDefender Antivirus 2010 This provides a great security, simple usability, effective use of resources, and a valuable pricetag and provides up to date technologies to combat viruses and other malware.Active virus control is the latest technology they are looking for to give a great security by always observing the behavior of a file. cite{19} item Kaspersky Anti-Virus 2010 All around protection from number of threats like viruses, Trojans, bots, worms, and spyware. This is more easy to use as it has created with user friendly navigations. cite{20} item Webroot AntiVirus with SpySweeper 2010 A comprehensive desktop anti virus package which is used a multi-layered approach.Webroot AntiVirus with Spy Sweeper also features proactive technology to find malware before it does any harm to the computer. cite{21} item Norton AntiVirus 2010 Great protection level against malware but a problem arises when uninstalling the software as its partial ninstallation. This uses traditional signature based detection mechanism to detect malware. cite{22} item ESET Nod32 Antivirus 4 Kind of desktop anti virus software. But this doesnt provide a complete security and misses some protection. This is not in the competition with other anti virus software. cite{23} item AVG Anti-Virus 9 Includes antivirus and antispyware protection. provides complette protection from harmful downloads and web cites. cite{24} item F-Secure Anti-Virus 2010 Great desktop anti virus. Has one of the most effective scan procedure and test results are shown to prove that. When installing this anti virus software, it has been automatically configured to remove the other anti virus software installed to the computer. cite{25} item G DATA AntiVirus 2011 Uses two distinct antivirus scanning engines, behavioral/heuristic protection, and even self-learning fingerprinting.This provides protection against malware spreading via emails and IM. The types of malware which are detected by this anti virus software are,phishing scams, dialers, adware, malicious scripts, Trojans, rootkits and worms. cite{26} item Avira AntiVir Premium item Trend Micro AntiVirus + AntiSpyware end{itemize} section{Cryptography and viruses} Cryptography is technique use to safe some data from other unauthorized people. Most of the time this is used when transfers data from computer to another one. But the problem is virus programmers also use this technique to their viruses. begin{sloppypar} end{sloppypar} In cryptography there are different kind of cryptography methods available but most of the time the programmer who create viruses use symmetric single key cryptography. Actually what happen in cryptography is data encrypt using key and send that encrypted data to recipient then recipient decrypt and get original data using the key. This method is so safe because the encrypted data can not anyone understand. begin{sloppypar} end{sloppypar} Normally anti-virus program detect virus using the code of the virus. If there any virus with encrypted code then anti virus software can not identify those viruses. begin{sloppypar} end{sloppypar} Virus creators using cryptography, they encrypt the code of the virus. So some viruses change their aspects moment to moment and system to system but the key is same but is encrypted with virus code. So the virus is safe from anti-virus software, till the code is encrypted. begin{sloppypar} end{sloppypar} But some cryptography viruses keep their key in separate places instead of keep with the same file. So good anti virus software can detect the places which keys are stored. Then it can decrypt the virus code and delete it. begin{sloppypar} end{sloppypar} Therefore computer system is protected some operating system developers keep the system fies as encrypted. So even though, there are some advantages and the facilities in using cryptography systems to be it prctically applicapable in virus preventation more advanced features of cryptography should be applied.cite{13} newpage section{Conclusion} As computer usage and internet usage is increasing in the modern world, the computer virus creation and the computer virus infection has become a common thing. Computer viruses can destroy a whole computer system or computer network within few seconds. But for any kind of company, the data they have should have confidentiality, integrity and availability. But sometimes those three things will be lost by the computer viruses. So most of the computers users are now try to avoid from the computer viruses. begin{sloppypar} end{sloppypar} But computer virus infection has become so common thing because of the unawareness and the careless of the computer users about computer viruses. If the computer is attacked by a computer virus, the computer users do not do the correct thing to avoid spreading the virus to the other computers. That is why the computer viruses are spreading all over the world quickly. If a new computer virus is found from a users computer, the anti virus software providers are unable to provide a solution to the problem before it spread everywhere. The computer user has great responsibility to not to let a computer virus enter into the computer. To mitigate the destruction, this can happen to the computer from computer viruses, begin{itemize} item Aware the computer users about computer viruses. item Backup the data. item Put passwords which cannot easily guess by the outsiders. item Not to give write permission to the other persons. item Do not open suspicious e-mails from unknown contacts. item Download and use only the recommended software. item Install an anti virus software. item Always keep the anti virus database up to date. item Use only the recommended anti virus software. end{itemize} begin{sloppypar} end{sloppypar} As computer users are now searching for the best anti virus software which can give the best protection to their computers from computer malware, the anti virus market has grown and saturated with various kinds of anti virus software. But the problem is that though there are more anti virus software with the target of providing a better protection; virus creators are more powerful than anti virus program creators. They encrypt the code of the computer virus so that any of the anti viruses cannot detect that computer virus. begin{sloppypar} end{sloppypar} Considering all the fact we can come to a conclusion that any of the computer in the world cannot be there with no virus attack and any of the computer virus protection methods cannot eradicate the computer viruses from the computer forever. newpage begin{thebibliography}{widest entry} bibitem{1} McAfee,emph{An Introduction to Computer Viruses and other Destructive Programs},Available at: http://www.mcafee.com/common/media/vil/pdf/av_white.pdf bibitem{2} Markus Hanhisalo,emph{computer Viruses},Available at:http://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html# 1.Introduction% 20to% 20Computer% 20Viruses bibitem{3} Top Bits,2010, {http://www.topbits.com/types-of-computer-viruses.html} bibitem{4} Spamlaws,2009,emph{Understanding the Polymorphic Virus},Available at: http://www.spamlaws.com/polymorphic-virus.html bibitem{5} Ward Takamiya,Jocelyn Kasamoto,emph{An Introduction to Computer Viruses} bibitem{6} Spamlaws,2009,emph{Spotting the Stealth Virus},Available at:http://www.spamlaws.com/stealth-virus.html bibitem{7}Spamlaws,2009, emph{Understanding the Resident Virus},Available at:http://www.spamlaws.com/resident-virus.html bibitem{8} Top Bits,2010{http://www.topbits.com/computer-worm.html} bibitem{9} Top Bits,2010{http://www.topbits.com/trojan-virus.html} bibitem{10} Top Bits,2010,{http://www.topbits.com/logic-bomb.html} bibitem{11} emph{AntiVirus Software Review },http://anti-virus-software-review.toptenreviews.com/ bibitem{12} emph{Computer knowledge virus tutorial},Available at:www.cknow.com bibitem{13} Charles P. Pfleeger,Shari Lawrence Pfleeger emph{Security in Computing (4th Edition) } bibitem{14} Stanley A. Kurzban, emph{Defending against viruses and worms},Available at:http://portal.acm.org/citation.cfm?id=68697 bibitem{15} emph{How does anti-virus software work?},Available at:http://www.antivirusworld.com/articles/antivirus.php bibitem{16} emph{How Antivirus Software Detect Computer Viruses},Available at:http://security-antivirus-software.suite101.com/article.cfm/how-antivirus-software-detect-computer-viruses bibitem{17} emph{How AntiVirus Works},Available at:http://www.antivirusware.com/articles/how-anti-virus-works.htm bibitem{18} http://www.darkgovernment.com/news/tag/hacking bibitem{19} emph{BitDefender Antivirus 2010} http://anti-virus-software-review.toptenreviews.com/bitdefender-review.html bibitem{20} emph{Kaspersky Anti-Virus 2010}http://anti-virus-software-review.toptenreviews.com/kaspersky-review.html bibitem{21} emph{Webroot AntiVirus with SpySweeper Review}http://anti-virus-software-review.toptenreviews.com/webroot-antivirus-review.html bibitem{22} emph{Norton AntiVirus 2010}http://anti-virus-software-review.toptenreviews.com/norton-review.html bibitem{23} emph{ESET Nod32 Antivirus 4}http://anti-virus-software-review.toptenreviews.com/eset-nod32-review.html bibitem{24} emph{AVG Anti-Virus 9}http://anti-virus-software-review.toptenreviews.com/avg-review.html bibitem{25} emph{F-Secure Anti-Virus 2010}http://anti-virus-software-review.toptenreviews.com/f-secure-review.html bibitem{26} emph {GDATA AntiVirus 2011}http://anti-virus-software-review.toptenreviews.com/antiviruskit-review.html end{thebibliography} end{document}