Tuesday, August 25, 2020

Caught in the Trap free essay sample

Smells went up against me as I strolled in the entryway. Masalasâ€or spicesâ€like curry, cumin and cinnamon each contributed. I sat on the edge of my chairâ€eager like a kid on Christmas. I needed to encounter these outlandish flavors. They were heavenly and red hot, yet delightful. This isn't the first occasion when I wanted something new. I long for information and improvement. On the off chance that I hear something I don’t think a lot about, I find it. Another method, style, film, or crisisâ€my want for comprehension and information ranges. This time, the Indian food got me in its snare. I required not just the flavorâ€but additionally the way of life. I had to know more. I expected to comprehend. This is the manner by which I ran over Hinduism. I saw the entrancing three-like image, the Om, previously and I had found it. I realized it was Hindi. In any case, my eyes were oblivious to Indian culture and religion. We will compose a custom article test on Trapped in the Trap or on the other hand any comparative theme explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page Captivated by the magnificence of the image and the scrumptious food, I began my examination on the web. At that point, I went to books. One about Hinduism. An India travel manage about traditions. Also, ultimately, The Bhagavad Gitaâ€a book fundamental to Hindus. I began with essentials and developed. I discovered that the dairy animals is sacrosanct and in this way, meat isn't eaten and bovines not butchered. This was something I discovered intriguing. Hamburger is imperative in America. A decent steak, uncommon and costly. In any case, in Hinduism, the dairy animals is an image of life and respected. I was attracted by the liberality towards different religions. Hindus accept that religion is the equivalent just named in an unexpected way. This spoke to me since religion is tied in with cherishing and tolerating and in Hinduism this is valid. Hinduism is different, permitting its own supporters to put stock in an assortment of things. Religion will in general be exacting, and the assorted variety and assortment in Hinduism made it engaging. The movement control clarified Hinduism is a lifestyle and is reflected in the traditions. The Bhagavad Gita gave me knowledge and helped me gain from a similar book that a Hindu would gain from. This new data made me think in manners I hadn’t previously, offer conversation starters and challenge my convictions. Did I despite everything accept the strict establishment worked around me? I wasn’t sure. â€Å"Aren’t you a Hindu or something?† asked my sibling. I realized this inquiry was coming, however I still didn’t have an answer. â€Å"I’m not sure.† Before asserting it, I need to completely comprehend. What's more, I am as yet progressing in the direction of that. I may adjust to this religion, I may not. In any case, it doesn’t matter. This pursuit is tied in with comprehension and digging into the charming obscure. The Indian food got me. Everlastingly I will review my first supper at Tandoori Nights a year back and what originated from it. What will get me next?

Saturday, August 22, 2020

The Ethics of Photos

Question: Talk about theEthics of Photos. Answer: Presentation The web has become a well known method of correspondence for little youngsters, grown-ups, associations and businessman. There are number of various focal points because of which individuals just as association needs to distribute their pictures including documentation, notice or for advancing various exercises of an association (Jassim et al., 2015). The openness just as the expanded notoriety of internet based life has become simple consequently, numerous individuals including grown-ups and little youngsters share their pictures on facebook, twitter and pages. This has raised number of moral difficulties, which incorporates patrons security, social columnist prosperity, right and legitimate issues and issues related with work process and assets (Cornwall et al., 2016). The utilization of photography is an indispensable piece of clinical medical procedure in emergency clinic, which has raised numerous risk issues. The liabilities issues happen as once in a while are shot without the ir assent or information. There are number of lawful issues of photography in plastic medical procedure rehearses. In this exposition, diverse sort of moral issues that happens because of photography is examined. The substance of this task covers gives that are connected with pictures via web-based networking media, Intellectual and Intangible property Images of Children, issues happened because of Manipulation and Deception of pictures. The simple likewise talks about the issues or moral issues that are connected with the entrance sing of pictures and cameras. Different issues are likewise outlined that are connected with the wholesale fraud. Conversation on Ethical Issues of Photography Moral Issues of Intellectual and Intangible property Licensed innovation is characterized as the first imaginative work that is showed in a substantial structure, which can be ensured legitimately. Promoting, design and way of life picture takers incorporate different kinds of models, canvases, toys or different sorts of aesthetic works in the photography (Eckhoff, 2015). The photos that are made by the craftsman are regularly ensured by copyright. Just the proprietor of the copyright has the privilege to duplicate the photos. The copyright law secures photos as well as various sorts of scholarly and creative works. Numerous moral issues are connected with the copyright of the photographs (Foreman, 2015). In todays world, pictures can be moved all around the globe rapidly. This upgrades the dangers related with the photographs that were intended to be private yet gone into the open field. . It is referenced by the copyright law that any image that is utilized for alteration then it should entirely be finished by the proprietor of the c opyright in any case the image ought to be made again so as to keep up the law of copyright. So as to protect the elusiveness of a picture it is proposed that the picture must be utilized by the proprietor of the picture. On the off chance that it is utilized by another person than both the savvy and substance of, the picture is crushed (Bittar-Cortez et al., 2014). The moral issues that are connected with the copyrights are many. In the event that a picture or photo of an individual is shared or downloaded by another individual then the demonstration is against the copyright law. In this way, it is a moral issue (te Riele Baker, 2016).The downloaded or shared pictures on the person to person communication destinations can be utilized by another person for making counterfeit profiles. This demonstration is a lot of perilous it makes an antagonistic effect on the individual data of a person. In the event that a picture of an understudy wearing the school uniform is posted via web-based networking media then the data about the tutoring of the understudy is uncovered. Subsequen tly it very well may be abused by certain people in capturing or in giving dangers. The copyright demonstration recommend that a picture must be utilized by a person who claims it and along these lines on the off chance that it is utilized or shared by another individual, at that point it is a wrongdoing whether the individual is utilizing it for a legitimate or criminal behavior (Couldry, 2012). The pictures of kids and older folks are gotten to from the person to person communication locales so as to abuse them in criminal operations, for example, tormenting. Henceforth, it is constantly suggested that youth and older folks must examine about the site on which they are transferring or posting their photos. Twitter utilizes the advantages of a post without offering it to its clients (McKee, 2013). Along these lines, a client must know all the principles and guideline before utilizing a person to person communication destinations. The facebook and twitter must utilize legitimate authorizing and confirmation procedure so as to maintain a strategic distance from issues related with copyright or elusiveness. Moral Issues of Images on Social Media The internet based life goes about as stage for making new companions and getting data. It has been seen that the utilization of online networking has been expanded throughout the years. The progression of time and development of innovation has to a great extent affected the appearance of internet based life in day by day lives of individuals. Be that as it may, web-based social networking doesn't just give benefits in the lives of individuals (Walker, 2012). Everybody over the online life faces some broad issues like abuse of individual pictures and data. The abuse of picture over the internet based life can extraordinarily influence the people life in a pervade way. The moral issues looked by individuals on account of abuse of the pictures posted over the web based life are clarified beneath. Abusing pictures for making profile in some different destinations: It has been seen as a rule that the pictures and data about the individuals (particularly young ladies) are utilized for making a phony profile over other online life locales (Couldry, 2012). There are references of numerous situations where an individual has asserted that the pictures and data posted on a site has not been given by the person in question. It is generally found on account of young ladies. The pictures, for example, bunch pictures and selfies are utilized for making the phony id on the site to seem certified (Williams et al., 2013). Consequently, the pictures are powerless over the online networking and they can significantly be abused by different people. Altering of the pictures: The pictures gave over the online life are photograph shopped by others. The pictures over the web-based social networking are commonly open and it makes them defenseless for abuse (Kim et al., 2014). The pictures over the online life are utilized by social lawbreakers for altering them for their monetary benefits. The pictures posted by the big names over the internet based life are treated by different photograph altering programming and applications. These altered pictures are sold in the market for monetary profit. Bargain of protection and classification: The pictures of the individual are carefully at risk to be utilized by that individual as it were. Be that as it may, the foundation of online life can be filtrated for removing the data and pictures (Barbovschi et al., 2013). The mechanical advancement of the data arrangement of internet based life had made it feasible for the digital crooks and programmers to get into the framework. The private pictures of the VIPs, sports individual, and prestigious individual are being downloaded from their record and abused in the market. The data framework in the web based life is abused in the data framework. Thus, it very well may be said that the moral issues looked by the pictures posted over web based life can be grouped into abusing pictures for making profile in some different locales, altering of the pictures for individual increase, and bargain of security and classification. These moral issues of the data framework can be sifted through by checking the protection choices and restricting the guests on the internet based life. Moral Issues of Images of Children Numerous individuals all around the globe share the pictures of their kids on social sites to advance various exercises (Bobkowski Smith, 2013). Various associations engaged with youngsters and youngsters, for example, performing craftsmanship gatherings and game offer the pictures for the advancement of their association on person to person communication site. The openness and the expanding ubiquity of web organizing destinations drove individuals sharing more pictures of their youngsters and almost ones. This has expanded the moral worry of the individuals, which has sway on the security, and government assistance of the little youngsters. There are numerous issues related with security. There is a republic law related with the security of the unapproved creation and distribution of a people picture. This law helps in managing the individual data of youngsters that helps in passing on the character of an individual (Cook, 2010). For instance if an individual remaining outside the house or wearing school uniform ought not be distributed on the person to person communication locales as it can keep the youngsters in harm's way. As indicated by the kid, security enactment the character of an understudy must be keep classified. The pictures of little youngsters ought not be posted as it very well may be utilized for various unlawful practices. The photos of the kids posted by the guardians on long range informal communication locales can follow youngsters from their introduction to the world to death as their information are sold and exchanged to various advertisers. They give partiality just as boundaries to the advertisers (Green, 2013). Now and again an image of a youngsters transferred by a guardians can be shared by another individual and finally a circumstance happens when it is difficult to quit sharing of that image. The image of that kid can be utilized for illicit practices, for example, harassing. The private data of the kids can be gotten to from the person to person communication locales by the criminals (Jassim et al., 2015). Photos of the kids must be remained careful with the goal that they don't need to confront circumstances or issues because of criminal behavior on their photos on the long range interpersonal communication locales (Greensmith Green, 2015). The facebook or twitter must utilize legitimate confirmation with the goal that the pictures of youngsters ought not be abused. Henceforth, the moral issues related with the pictures of the youngsters can be fathomed by taking legitimate measures. The guardians ought not openly post the ima

Monday, August 3, 2020

What Affectional Bonds Mean in Attachment Theory

What Affectional Bonds Mean in Attachment Theory Theories Social Psychology Print Affectional Bonds According to Attachment Theory By Kendra Cherry facebook twitter Kendra Cherry, MS, is an author, educational consultant, and speaker focused on helping students learn about psychology. Learn about our editorial policy Kendra Cherry Updated on May 20, 2019 Kentaroo Tryman / Maskot / Getty Images More in Theories Social Psychology Behavioral Psychology Cognitive Psychology Developmental Psychology Personality Psychology Biological Psychology Psychosocial Psychology According to attachment theory, an affectional bond is a form of attachment behavior that one person has towards another. Perhaps the most common example of an affectional bond is that between a parent and child. Other examples include the bond between romantic partners, friends, and other family members. Criteria of an  Affectional Bond Psychologist John Bowlby described the term as he developed his highly influential attachment theory. According to Bowlby, as a mother responds to the needs of her child, a strong affectional bond is formed. This bond becomes integrated into the child’s personality and serves as a basis for all future affectional ties. Later, Bowlby’s colleague Mary Ainsworth described five criteria of affectional bonds: Affectional bonds are persistent rather than transitory. They often last for a long period of time and endure rather than coming and going.Affectional bonds are centered on a specific individual. People form strong feelings of attachment and affection towards certain people in their lives.The relationship involved in an affectional bond has strong emotional significance. These affectional bonds have a major impact on the lives of those who share them.The individual seeks contact and proximity with the person he or she has an affectional bond to. We desire to be physically close to the people we share affection with.  Involuntary separation from the individual leads to distress. In addition to seeking proximity, people become upset when they are parted from those they are attached to. Ainsworth suggested that the addition of a sixth criteriaâ€"seeking comfort and security in the relationshipâ€"turned the tie from an affectional bond into a true attachment relationship.

Saturday, May 23, 2020

Why We Should Fight the War on Terrorism - 2959 Words

â€Å"Common Sense† A Rationale for the War on Terrorism Preface On September 11, 2001, our fellow citizens, our way of life, our very freedom came under attack in a series of deliberate and deadly terrorist acts. On this day, our nation united, determined to obliterate the evil force of terrorism from the planet Earth. Now, just eight years later, these same people wish to pardon the acts of evil, disregarding the 2,995 deaths that they united to avenge just a few years before. So the question lies before us; do we hunt down and punish those responsible for these cowardly acts, or do we ignorantly allow terrorist to revenge the freedoms our founding fathers worked so hard for? Because of the threat caused by terrorist on the United States†¦show more content†¦Neither bin Laden nor al-Zawahiri met the traditional qualifications to issue a fatwa of any kind, but their hatred of the United States led them to do so anyway. Before the launch of the War on Terror, al-Qaeda had already killed 3,036 Americans, injured 11,870+ Americans, and cost the United States over $32.1 billion. The attacks foreshadowing the War on Terror were clearly costly to the United States, and are motifs for fighting the al-Qaeda and other terrorist organizations today. The War Begins The War on Terror began on October 7, 2001. In the words of former president George W. Bush, â€Å"Our war on terror begins with al-Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated. President Bush outlined the following as objectives for the War on Terror: ⠝â€" Defeat terrorists such as Osama Bin Laden, Abu Musab al-Zarqawi and destroy their organizations ⠝â€" Identify, locate and destroy terrorists along with their organizations ⠝â€" Deny sponsorship, support and sanctuary to terrorists âž ¢ End the state sponsorship of terrorism âž ¢ Establish and maintain an international standard of accountability with regard to combating terrorism âž ¢ Strengthen and sustain the international effort to fight terrorism âž ¢ Work with willing and able states âž ¢ Enable weak states âž ¢ Persuade reluctant states âž ¢ Compel unwilling states âž ¢ Interdict and disruptShow MoreRelatedFreedom Of Speech And The Right Of Bear Arms855 Words   |  4 Pagesas absolutes. In modern western society, we have rights, such as freedom of speech, and in some countries, the right to bear arms. In response to the 9/11 terrorist attacks, Netanyahu argues that these rights are not universal to everybody. We need to set limits as to how far these rights can take us and suspend these rights for some people, because not everybody deserves to be granted these rights. At times when we are under threat from terrorism, we need to reduce freedom of speech and the secondRead MoreTerrorism : Terrorism And Terrorism1003 Words   |  5 PagesTerrorism Terrorism is when a group of extremist or just one extremist attacks because of political, religious, or economic reasons. I believe the reason why people use terrorism is because this is their form of revenge. They may disagree with something and attack to show how mad they are and to create fear. Terrorism has been used in the past. 9/11 was not the first time terrorism has happened. For example on February 26, 1993, there was the first World Trade Center bombing. What happened was thatRead MoreIndian Constitution Provides Us Rights, Responsibility, And Duty821 Words   |  4 PagesIndia is bit bitter towards our great nation. Few people saying, we need one more partition which will never happen. The free speech is soul of any democracy. There is no question in my mind that anyone has to prove how much you love India. We do not need to handover patriotic certificate to each other. Nobody is superior over each other. We all are equal and we can express our self freely and without b eing threatened, that’s why we hop on social media. I personally do not take broad brush and paintRead MoreChomsky And The War On Terror1277 Words   |  6 PagesWe live in a day and age of hypocrisy and it seems that a majority don’t acknowledge that we are all total hypocrites. Noam Chomsky, a well-known American linguist, philosopher, cognitive scientist, logician, political commentator, social justice activist, and anarcho-syndicalist advocate does an elaborate job in his speech given at Harvard University, to make us question if there really is a war on terror. Chomsky calls everybody a hypocrite and uses the U.S. Army Manual definition of terrorismRead MoreEssay on The war against terrorism976 Words   |  4 PagesIs war the right way? Why do people resort to such violent acts as bombing, assassinations, and hi-jacking? How do individuals and organizations justify these acts of terror? These acts can be described as terrorist actions. Terrorism is a growing international problem. During the last twenty years, new terrorist groups have sprung up all over the world. Governments have had little success in their attempts to resolve issues in which terrorism is used. A major problem in discussing terrorism is establishingRead MoreEssay on War and Bush1384 Words   |  6 Pages War and Bush nbsp;nbsp;nbsp;nbsp;nbsp;War has taken place all over the world. It is brutal at times even necessary, and the United States of America has seen its own share of wars. Since September 11, 2001, the President of the United States has launched a war on terrorism, and currently we are still at war. The War on Terrorism has been one of the most important battles our country has ever had and overall it has been the best for the U.S. as well as Iraq. The United States does have its motivesRead MoreThe Threat Of The Taliban1126 Words   |  5 PagesWhen Obama was elected in 2008 one of his main goals was to end all war with Afghanistan. Currently Obama has decided to keep the troops in Afghanistan until 2017, extending after his removal from office. According to the New York Times, his decision against the removal is an effort to counter terrorism attacks. Since 2001, after the attack on the twin towers, the US has been trying to fight against terrorism. After the attack, Al Qaeda and Bin Laden both hid in Afghanistan, making it a hideout forRead MoreEssay on America Should Not Use Military Force in Iraq1357 Words   |  6 PagesDear Americans: After the successful anti-terrorism war in Afghanistan, are we going to fight another war on Iraq? In almost every statement on foreign policy, Bush states his belief on his war against Iraq and depicts Saddam Hussein as â€Å"an evil.† A recent poll showed that â€Å"nearly seven in 10 supported military action to force Saddam Hussein from power (Public Agenda). Before you make your decision, do you think a war after Iraq is justified by International law and US law? Do youRead MoreTerrorism : A Critique Of Excuses1378 Words   |  6 Pagesexpect to apply reason to all situations. In his paper Terrorism: a Critique of Excuses, that terrorism is one of the greatest evils. You may be thinking, â€Å"of course everyone knows that.† However, I believe that he is wrong for saying this and that he should reconsider why someone resorts to terrorism. No one will or should advocates for Terrorism. (Walzer, p. 284) This is the start of his thesis and it is the basis for my objection. Terrorism is as bad as or even worse than rape and murder. Not onlyRead MoreThe European Union1650 Words   |  7 Pages It is true that the European Union is taking the steps to have the rebuilding of security against terrorism. The military forces have started to take the actions in order to cope with the increasing issue of terrorism. However, it is also true that the miss-conception has been formed regarding the image of Muslims in the Europe as they are being subjected to wrong treatments for the terrorist impressions as research reports that â€Å"†¦The Ministry of Defense decided to deploy 10,500 soldiers to sensitive

Wednesday, May 6, 2020

Self-esteem and Impression Management Free Essays

Consideration of a person’s perspective â€Å"self† and the processes used to determine behaviors is one element of social psychology. Some of the processes and theories are: impression management, social tuning, social comparisons, mindsets, and intrinsic and extrinsic motivation. This work will examine the basic premises of each of these along with personal examples provided by the author. We will write a custom essay sample on Self-esteem and Impression Management or any similar topic only for you Order Now Impression Management Impression management is the use of conscious or subconscious behaviors by a person to manipulate the others’ opinions about them. This can be done in a variety of ways including showering others with praise and compliments and giving gifts with the motivation of developing a favorable opinion of the giver. Adolescence is a phase of life that is particularly susceptible to impression management. When I was twelve years old, my family was transferred from inner city St. Louis to a tiny town of 2,000 people in northeast Arkansas. This town was very elitist and there was very little inroad for â€Å"new kids† to find a place of belonging. Almost exclusively, the junior high students had been classmates since kindergarten, and their social in-groups were intact. There was one girl who reached out to make me feel welcome, and her name was Laura Beth Williams. She had long, curly, strawberry blonde hair, and wore the cutest clothes. Her dad owned a local nursery and she had four sisters. She invited me to sit at her lunch table, told me where to go at lunch time, and gave me insight about teachers and classes. I was so grateful to her that I wanted to do something nice in return, and I also wanted the other students to think well of me and to consider including me too. One day I took a turquoise ring to school with the intention of giving it to Laura Beth to show my appreciation. As I thought of what I might do, and the possible responses of my classmates, I was so excited. Then, my excitement incited something that would be my demise. Instead of simply presenting the perfectly lovely piece of costume jewelry, my mind began to create a much more elaborate scenario that snowballed to catastrophe. When we got to our first hour study hall, I made a big deal of making certain that several people saw my ring. As they asked, I told them that my maternal grandfather was a full-blooded Native American (he actually was), and that he had given me this gorgeous piece of turquoise jewelry which I wanted to give to Laura Beth as thanks for her help and welcoming manner. As I had hoped, the class was impressed and I knew my status was immediately elevated in this new social group. All was well until one of the boys asked to see the ring. As he examined it, I heard an ominous snicker before he loudly announced, â€Å"Hey, Gina, is your grandpa’s name Chief Avon? † Naturally, I was mortified and began to cry and repent about fabricating the story. What is interesting is that from that time forward, the students were much more helpful and welcoming. That was the day that I learned a valuable lesson about lying and trying to impress other people. According to Segev, Shoham, and Ruvio (2013) found that being self-conscious can be positively related with gift giving in adolescence. Adolescents value peer relationships and may give gifts as a way to ensure that they have friends. Social Tuning Social tuning is the tendency for human beings to be more attracted to the thoughts, feelings, and behaviors of their own social group. This gravitation toward similar knowledge, customs, and beliefs is one element of the development of culture. My daughter, Nikki, is a typical 20-something American young woman. She has grown up with many of the niceties and luxuries of our country and as most of us are, is a bit spoiled. When she was 22, Nikki answered a call to serve as a teacher-missionary in an orphanage in Honduras. She went to language school in Nicaragua and spent two years teaching elementary students in the mountains near Tegucigalpa. Upon her return to the U. S., Nikki would often lapse into Spanish, especially when she got nervous or excited, and she loved to go to the Mexican restaurants in town. She said it â€Å"felt more like home†. It has been two years since her return, and now Nikki no longer breaks out in Spanish, and she doesn’t frequent Mexican restaurants as often. Although living in Honduras for over two years did not make Nikki a Honduran, social tuning began an enculturation process. A 2010 study actually showed that there is a psychological and cognitive tendency for people to be more prominent within one’s in-group. The study specifically explored words, paintings, and time pressure. Not only did the study explore reactions to stimulus among those who shared cultural similarities, but the researchers found that the cognition and psychological reaction was lessened when the participants thought that the other participants were unlike them. Social Comparisons Human beings naturally compare themselves to other human beings, both individually and corporately. This phenomenon is called social comparison, and it can be either positive or negative. For example, if a person who has had three speeding tickets is comparing their driving record to the driving records of other people, they may feel good about their driving if they have fewer accidents or tickets and bad about their driving skills compared to the person who has never had an accident or a ticket. The comparison actually does not change the person’s driving ability, only their perception of their driving ability. Recent research demonstrates that it is the quality rather than the frequency of social networking experiences that places individuals at risk for negative mental health outcomes. However, the mechanisms that account for this association have yet to be examined. Accordingly, this study examined whether the tendency to negatively compare oneself with others while using Facebook leads to increases in depressive symptoms, and whether this association is mediated by increases in rumination. A sample of 268 college-age young adults completed an initial online survey and a 3-week follow-up. Path analysis was used to test the hypothesized model, wherein negative social comparison on Facebook was predicted to be associated with increases in rumination, which, in turn, was predicted to be associated with depressive symptoms. The model controlled for general social comparison to test the specific effect of social comparison on Facebook over and above the tendency to engage in social comparison in general. Results indicated that the hypothesized mediation effect was significant. In sum, in the context of social networking, negatively comparing oneself with others may place individuals at risk for rumination and, in turn, depressive symptoms. Findings increase understanding of the mechanisms that link social networking use to negative mental health outcomes and suggest a continued emphasis on examining the specific proces How to cite Self-esteem and Impression Management, Essays

Thursday, April 30, 2020

Nebosh certificate free essay sample

As part of my Nebosh NGC3 I carried out a health and safety inspection at my employers premises. Their business is medium to heavy engineering; OEM and repair and overhaul activities take place; with machine and assembly workshops yard, office and welfare areas all being inspected. It was a normal working shift when the inspection was carried out and workers would have been unaware I was carrying out an inspection. Executive Summary After the completion of the workplace inspection it was obvious that a great deal of time, effort and money had been invested in health and safety and in some areas it was very good. However there are problems that require immediate action if the company is to avoid breaches of regulations, increased risk of accidents and the subsequent cost of these unplanned events; Immediate action areas 1. Implement a system to deal with visitors (typically delivery/ collection) drivers entering the workshop. We will write a custom essay sample on Nebosh certificate or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 2. Improving the way components are transferred between the machine and assembly shops 3. Managing employees from other sites to keep exits clear Main findings of the inspection In terms of health and safety the Management try hard to tick all the boxes; but a lot of the controls already in place get forgotten when a job needs doing in a hurry; existing procedures are not being adhered to; mandatory wearing of safety glasses being the number one failure. 1. Delivery drivers There entry through the goods in gate is uncontrolled in terms of personnel entering the workshops. When visitors or contractors enter through reception there is a system of induction; PPE is issued where necessary and orange high vests identify contractors at a glance. However if drivers arrive on site and ask to use our toilets they are directed through the machine shop with no PPE or ID. These people are unfamiliar with the site or the activities around them and present a danger to themselves whilst â€Å"machine watching† The Health and Safety at Work Act 1974 section 3 Duty of employers to persons other than employees should be kept in mind. 2. Component transfer between shops This area presents a number of hazards as follows a. The plastic curtain/draft excluder is now old and dirty and offers no vision through it; During the inspection the component transfer trailer was parked a few centimetres from the curtain. b. This route has no physical barrier for pedestrians and is regularly shared with vehicular traffic. c. The main trailer for moving components is a properly maintained and manufactured device with brakes and a safe working load (20 tonne) clearly marked; however there is a smaller device which is obviously manufactured in house and used for moving long heavy pieces of metal( 2-3 tonne) that has no brakes,swl and quite frankly does not look up to the job. This risk in this one area is in my opinion unacceptably high with breaches of the HASAWA 1974 and The Workplace Health, Safety and Welfare Regulation 1992 requiring that vehicles and pedestrians can move around safely. 3. Emergency means of escape blocked The fire exit in the male works locker room was completely inaccessible; it is blocked with bags and suitcases from visiting service engineers from other countries/facilities. Although a route was accessible to the shower room! The Regulatory Reform order (Fire Safety) order 2005 requires employers amongst other things to ensure the safety of employees should a fire start. Conclusions As previously stated a huge amount of effort, time and money have been invested in health and safety over the last few years and although the monetary cost will be relatively small compared to the sums previously spent to put right the problems found during the inspection they will require a significant amount of time; using the skill base we have on site. The workforce really need to buy into modern Health and Safety culture and understand that Safety is everyone’s business and not a unnecessary hindrance that slows jobs down. It is felt that a workforce pulling in the same direction in regards to Health and Safety would benefit the business in terms of productivity through teamwork and togetherness. But the bottom line benefit would be minimising the risk of accidents and the associated costs involved in these occurrences which are thankfully rare in the company; possibly one factor in the complacent attitude shown by some. I enclose a further list of recommendation and in my opinion the risk far out weighs any cost implication especially when fines ? 20000 and imprisonment for 6 months are a realistic punishment for breaches of regulations.

Saturday, March 21, 2020

Weapons in WWI essays

Weapons in WWI essays New weaponry and interventions can ultimately decide who will win a war. In World War I there were many new weapons introduced into the battle scene. These new weapons were more efficient in destroying and more powerful which made the death count rise dramatically. The new weaponry in World War I helped contribute to it being one of the bloodiest wars know to man at that time. One key weapon that played a part in eventually bringing the United states into the war was the submarine, also called U-boats. This submarine was able to moved underwater and attack ships without being spotted. A major problem with these ships that it broke international law. For the reason that when the Germans would attack a neutral ship they would not warn the ship like they were supposed to. If the Germans had warned there enemies they would easily be destroyed because the ships were so fragile and slow moving. The U-boat was used as a tool to force embargo. The other countries did not want to risk traveling the high seas with the submarines out there ready to strike, so trade was put to a stop in certain areas. While the U-boat enforced embargo was proving to be an effective weapon, it also seemed that it would bring America into the war against Germany (Bowes 595). Some weapons had even been around awhile, but were not used effectively in large-scale combat. For example, the machine gun, in the form of the Gatling Gun or Maxim Gun, was actually invented during the American Civil War, but did not see widespread use until World War I. Chemical weapons were used on a massive scale in World War I. Mustard gas and chlorine gas were two of the more frequently used weapons. Chlorine is an asphyxiating gas that causes acute bronchitis with gradual suffocation and, "those who initially survived a considerable dose generally died from pneumonia." The effects were so horrible that they have been mostly controlled since then. Mustard gas produces ...

Thursday, March 5, 2020

How to Write a Scene The Ultimate 8-Step Guide

How to Write a Scene The Ultimate 8-Step Guide 8 Steps to Writing a Perfect Scene- Every Time You know how complex writing a novel can be. You not only have to come up with a great premise, engaging characters, high stakes, and conflict that pushes the protagonist toward his goal, but you must also learn how write a scene that compels readers- and fill your book with them. That is a lot harder than some think. Many writers spend a moment thinking up a vignette but give little regard to the scene’s purpose. While a checklist can help analyze the structure, it doesn’t address the process. Need help writing your novel?Click here to download Jerrys ultimate 12-step guide. Positioning First: scene types vary depending on where each is placed over the span of a novel. Opening Scenes should be loaded with character and set up your premise. That’s where you want to slip in important bits of backstory. Middle Scenes carry complications, twists, and raise the stakes. Climactic Scenes should build to a riveting climax, so they might be shorter and packed with action and emotion. Genre Second: there’s no â€Å"one size fits all† template for a perfect scene. The kind of novel you’re writing also dictates the style, length, and structure of a scene, so study novels in your genre. How to Write a Scene Using My 8-StepProcess Progressive steps to help you write that perfect scene: 1. Identify Its Purpose Here’s where too many writers flounder. You’ve likely heard that a scene should either advance the plot, reveal character, or both. Good advice but vague. You want strong pacing, showing rather than telling, and to create empathy for your protagonist. Plus, you want mystery and conflict in every scene to keep readers turning the pages. So, the purpose of the scene is key. In life, things happen, we react, process what happened, and decide on new action. So it’s action-reaction-process-decide-new action. Write one sentence that encapsulates that for each scene. For instance, a scene I’m working on for my new historical Western romance marks the midpoint of my novel. Its purpose is to show my hero, Buck, losing control and scaring the heroine, Angela. I fix that in my mind and make sure every element of my scene serves that purpose. If you can’t identify the purpose for your scene, throw it out and come up with one that works. 2. Identify the High Moment This occurs near the end of a scene, maybe even in the last line. Why? Because most of your scenes should mimic overall novel structure, with a beginning, middle, climax, and ending. Of course, a scene could effectively â€Å"hang† at the end, to add tension and propel the reader into the next scene. The high moment in my midpoint scene comes when Buck goes crazy in an attempt to keep Angela safe. I had established that she is terrified of snakes, and the scene begins just before they run into a mess of rattlers. The high moment is Angela screaming as the snakes strike. Buck shoots his rifle, then slashes in fury at the critters with his knife. I end the scene with Buck a man possessed and Angela more frightened of his behavior than she is of the snakes. This crucial step in the process reveals the ultimate purpose of your scene. 3. Emphasize Conflict: Inner and Outer A great novel will have conflict on every page, sometimes inner, other times outer. Or both. But you don’t want meaningless conflict, such as two people arguing over what type of coffee to order- unless that specific argument reveals something important that advances the plot or exposes a key bit of character. Think of ways to ramp up conflict to the highest stakes possible. Too few writers do this. Every scene- even thoughtful, â€Å"processing† ones- should convey tension, inner conflict, and high stakes. You don’t need explosive action to have conflict. My rattlesnake scene carries obvious outer conflict: man against snakes. But if that were all, the scene would be lacking. The deeper conflict is Angela’s inner angst over Buck’s violent streak. She has resisted falling for him, so this incident creates super-high conflict between them, as Buck’s behavior pushes her away. He intends to show courage and his desire to protect her, but it backfires. 4. Accentuate Character Change Writing instructor James Scott Bell says, â€Å"Every scene should have a death†- of a dream, a relationship, or a plan. Literary agent Donald Maass encourages writers to consider how a point-of-view (POV) character feels before a scene starts and how she feels when the scene ends. Your character should be changed by what happens. That change can be subtle or huge. It can involve a change of opinion, or it could be a monumental personality shift. But change must occur. Why? Because, for the story to advance, decisions must be made and action instigated. Every event in your novel should impact your characters and foment change. But it must be significant and serve the plot. How will Angela change by the end of the snake scene? Before the scene, she was falling in love. Now, her feelings have been squashed. She wants to flee back to NY. Buck drastically changes too. He’s also shocked at the violent streak he fears he’s inherited from his father (who murdered Buck’s ma). Though he loves Angela, he believes he can never let himself get close to any woman because he will hurt her. 5. Determine POV Who is the best character through whom the reader should experience this scene? With novels solely in the protagonist’s POV, this isn’t an issue. But for novels in shifting third person, with more than one perspective character, you need to decide whose POV you’ll portray in each scene. You may find it easier to choose your POV character when you determine the purpose of your scene. Or the POV choice may become obvious. In romance novels it’s common to alternate between hero and heroine, so each gets a turn filtering the scene through their POV. To decide whose POV to choose, ask yourself: Who has the most to lose or gain in the scene? Who will react strongest emotionally? Who will change the most? Whose reaction would most impact the plot? 6. Leave Out Boring Stuff And the on-the-nose stuff no one wants to read. Start your scene in the middle of the action, a bit before you build to the high moment, and you’ll avoid pages of unimportant narrative. Inject important backstory but not at the expense of the present action. Cut anything that doesn’t serve your scene’s purpose. Make every word count. 7. Perfect Beginnings and Endings It’s not just your novel’s first line that has to hook readers. Every scene promises to entertain your reader, to enthrall, to evoke emotion. You must make good on those promises. Study best-selling novels in your genre to see how adept authors create strong scene openings and riveting scene endings. A scene’s last paragraph and closing line should ratchet up the conflict and underscore character transformation. What about symbolism or motif? In my scene, by the end, the snakes become to Angela a symbol or image of Buck. One minute they’re silent, unmoving, and the next, they erupt in a violent attack. Beneath that calm exterior, Buck is poised to strike. 8. Inject Texture and Sensory Details While some writers stuff scenes with too much detail, most tend to underwrite sensory specifics. This step in this scene-crafting process involves combing through your draft and bringing scenes to life with vivid detail that engages your reader’s senses. Your goal is to paint enough of a picture to help your reader see the scene as if on the big screen. Too much detail is boring, as are details that don’t reveal anything important. Scenes serve as the framework of your novel and shouldn’t be thrown together. Use this 8-step method every time, and you’re sure to succeed. To help, I’ve created a worksheet you can download and print. What are your biggest challenges when youre deciding how to write a scene? Does this process make sense? What would you add to the process? The guest blogger: C. S. Lakin is a novelist, copyeditor, writing coach, mom, and backpacker. She blogs about writing at Live Write Thrive, and specializes in manuscript critiques. Get a free copy of her book Writing the Heart of Your Story when you join her novel-writing fast track mailing list here. Need help writing your novel?Click here to download Jerrys ultimate 12-step guide.

Monday, February 17, 2020

Application of PPP in the Short Run Essay Example | Topics and Well Written Essays - 1750 words

Application of PPP in the Short Run - Essay Example International trade has then been seen to lead to an equalization of purchasing power which economist describe as parity. However, this theory has been seen to have many shortcomings (Wallace, 2007: 34). For instances, the prices of different goods cannot be the same in all countries. This is because there are barriers to trade which lead to the prices increasing gradually as they pass from one country to the next. These include the tariffs, taxes and shipment costs. For instance, a car in America may cost only $5000 but when it is shipped a country such as South Africa, its final cost is $2000 higher than the price it is sold at in America. Other commodities of trade because of their nature cannot be imported to another country. These include services such giving haircuts or other products such as real estate. Moreover, a person in a rural village in Brazil may not have the luxury of choosing different goods or services on the international market and may just end up buying good on the prices offered in their country. Moreover, not all types of goods and services have demand in every country. For instance, America may not have a specific price for a rice harvester because it does not grow rice. The price of a rice harvester would thus only be determined by the countries which have a demand for it such as Vietnam. The cost of living in different countries is different and this definitely affects their purchasing power. For instance, the cost of living in China is way low compared to the cost of living in America (Ullrich, 2009: 78). China applies the strategy of reducing the cost of living in her country so that it can pay her workers lower wages reducing the production cost. This makes her exports cheaper compared to that of other players in the global market giving it a competitive edge. In some instances, PPP has been used to position the exchange rates of new countries or even predict expectations on future exchange rates. There are two versions of PPP that have been used by economist all over the globe. These are relative and absolute PPP. Absolute PPP is the equalization of good’s prices in different countries. Relative PPP on the other hand asserts that the change of exchange rates over time between different countries is relative to the change in prices of standards goods in these countries (Obstfeld &Taylor, 2004: 318).PPP has been seen to prove to hold true in its assumptions in the long run. This is because as a result of removal of trade barriers and enhancement of free trade in the globe, the price of standard goods without the inclusion of costs such as shipment costs, tariffs and taxes is similar around the globe. It would take years for prices of products to be equalized in the globe. However, various economists have argued that PPP do not hold true in the short run. This is because the exchange rates are controlled by the news in the short run. News regarding change in the perceptions of the development of exchange rates in the future has an immediate effect on the current exchange rate. The rates are also influenced by other announcement such as interest rate changes. This paper studies PPP and exchange rates in EU and US to show how PPP cannot hold in the short-term. In the developing countries, PPP is measures using a comparison of the official

Monday, February 3, 2020

Globalisation - Fair Trade or Free Trade Essay Example | Topics and Well Written Essays - 3000 words

Globalisation - Fair Trade or Free Trade - Essay Example rmine poor farmers in some African countries, thus creating a â€Å"free trade versus fair trade† conundrum which must be solved if African farmers are to develop modern commercial agricultural techniques and a ready export market. This paper will also discuss some European consumer efforts at buying â€Å"fair trade† goods from third-world farmers, but how these efforts are more conscience-palliative than actually effective in increasing the incomes of poor farmers in Africa. No developed nation is completely innocent of protecting its own farmers at the expense of poor third-world producers. The United States, for example, has a significant farm subsidy program which accounts for 11% of all agricultural receipts. The EU, however, with its more generous program, pays fully 33% of all farm receipts, with subsidies reaching over 50% in some countries. This paper will argue that these blocks to free trade not only cost European consumers (with higher prices and lower availability and quality), but they also directly harm third-world farmers whose welfare the politicians and citizens of the EU claim that they would like to help. This paper will demonstrate that, with true free trade in farm commodities, the benefits to third-world farmers and European consumers alike would be far greater than Fair Trade practices on their own. No developed nation is immune from the temptation to protect its farmers. In the United States, the current 5-year farm bill (which has been extended every 5 years since the 1930s) will inject approximately $273 billion into farm ‘supports’ over the next five-year period (NPR, 2007) (SLC, 2007). This amount appears high, but is only 1/10th of the amount of agricultural production of greater than $2.5 trillion expected over the period. Additionally, the farm price supports which take a significant portion of the allocation may not, in fact, be used, as the global prices for commodity farm products like corn and wheat are expected to

Sunday, January 26, 2020

Impact of Spyware on Computers and Mobile Devices

Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may Impact of Spyware on Computers and Mobile Devices Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may