Thursday, November 28, 2019

Professional Development Plan

Introduction Leadership is an important process in team management. It is always important to understand the characteristic of self and that of team members in order to offer effective leadership. By understanding the personal characteristics and of the other team members, a leader will be able to understand the strengths and weaknesses in order to find a way of achieving success in addressing the specific duties.Advertising We will write a custom coursework sample on Professional Development Plan specifically for you for only $16.05 $11/page Learn More In this learning group, there are four members; they include Elizabeth, Jason, Rachel, and I. Each one of us has unique characteristics which make us diversified in our capabilities. Where one of us has weaknesses, the others may have strengths, and this makes it possible to address various challenges as a team. As a leader, I need to analyze these characteristics in order to determine how we can address different tasks, and how we can help one another overcome some of the personal challenges that may affect our career (Rughani, Franklin Dixon, 2003). In this assignment, I seek to develop a plan that will address the characteristics of the group and me as the leader of the learning team. Combined DISC Chart of the Learning Team Members The group members have taken their time to generate their DISC profile based on the specific questions that were set for them. The following is a combined DISC chart of my Learning Team members. Figure 1: Combined DISC Chart The characteristics of the team The chart above shows the characteristics of the team. It is clear that the four team members have different traits that make each one unique. When describing the characteristics of the team, it would be important to look at the composition of the personality and behavior of the different members. The chart shows that this team has the right composition that it needs in order to succeed.Advertisin g Looking for coursework on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Each of the four members do not share the personality trait as given by DISC assessment. In each of the four personality traits described in the DISC, there is only one person. This makes the group an all-rounded team with all the four different personalities. This may be advantageous because of the diversity of opinions that may exist in the group. This means that each of the ideas proposed by the team members will be analyzed from different perspectives, and the final decisions will be based on a clearly informed knowledge that is convincing to the four people with different traits. However, this may also have its own challenges. The difference in personality means that each of the team members has a different reasoning approach. This may not only delay the process of coming up with a decision, but also may lead to a complete breakdown in commun ication and decision making processes. What one of the team members finds to be very important may mean very little to another member. What one member may consider a best course of action may be the complete opposite of the thought of another team member. This means that it would take compromise and support in order to make any progress in some cases. Development Plan on Characteristics of my Team Members As a leader of this group, it is important at this stage to create a development plan to address specific characteristics of the team members both individually and as a group (Beers, 2007). This will clearly demonstrate my ability to lead them under various circumstances. Group professional development plan This group has four members with varying characteristics. The report we obtained from the personality self-assessment reveals that we are very unique in this group. As a leader, I consider this as the main strength. It is evident that where one of us has a weakness, we find stre ngth in the other person. This makes it easy to develop as a learning team. The results reveal that each one of us needs some development in specific areas in order to develop into a better person. In this team, we will work together and identify these weaknesses, and find a solution that will help all the team members overcome them in order to advance our careers (Peine Peine, 2008).Advertising We will write a custom coursework sample on Professional Development Plan specifically for you for only $16.05 $11/page Learn More Individual professional development plan It is vital to start by creating an individual professional development plan based on the results obtained from the DISC assessment of the four members. The four members included Elizabeth, Jason, Rachel, and I. Elizabeth The results reveal that Elizabeth is predominantly an interactive style who is sometimes referred to as an enthusiast. It means that she is more direct and less open. The ma in goal that that drives her is to influence people around her to act in a given pattern. Some of the key characteristics of Elizabeth include seeking status symbol, slow in pace, dislike of routines, comfortable to delegate duties, an enthusiast, persuasive and inspirational, and very trusting. Sometimes she may be evasive when under pressure. In her growth opportunities, she focuses more on the big picture and very impulsive. Her personal empowerment pointers show that she needs to improve her ability to deal with substance of the tasks, state her positive views, and learn from the Steadiness. Her main weakness is that she is sometimes careless and disorganized. Jason Jason comes out as predominantly a Dominance Style- sometimes referred to as the Producer- based on the results that were obtained from the DISC assessment. Generally, he is less direct in his speech and actions. His primary goal is to accomplish better goals within his organization or group. He dislikes people who h e considers to be obstacles to his achievement of the set goals, and prefer working as a team. Her ability to produce makes him valuable to this learning team because he is always dependable and very efficient. He rarely delegates his duties, strict on working as per the schedule, and can manage pressure. He is always focused and very confident when working with people. However, his weakness is that he dislikes being instructed and is always reluctant to change. Rachel Rachel comes out predominantly as a person with Steadiness style traits. She is a go-getter whose main drive in life is the desire for a steady flow of greater achievements in all the tasks that she does. She is a good short-term planner and self-reliant person. She does not rely on others to achieve her goals in life. She is an industrious person who knows how to break work into smaller tasks.Advertising Looking for coursework on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More She is less concerned about what other people say about her, but always wary of people who may beat her to the goal or take advantage of her. Rachel’s main weakness is that she is always uncomfortable with multiple or complex tasks. She may also be guarded and rigid when under pressure. Anita From the results obtained from the self-assessment report, it is clear that I am predominantly cautious. The results show that I am a perfectionist who is more indirect and less guarded. My main motivation in all that I do is to have predictable outcomes. I pay a lot of attention to details and key processes, and value relationships. I am a thorough and dependable person who prefers methodological approach when handling tasks. I am always keen to embrace change when it is confirmed that it is attainable. I prefer following established rules other than working without a plan. I also prefer having control over procedures and very keen on details. My main weakness is that I dislike oppositi on. I may be critical, and sometimes unresponsive to some issues. My ability to lead them The above characteristics identify critical personality traits that make me a good leader for this team. It is clear that I am a good planner. This is an important trait in leading a learning team. I will be able to plan and predict the outcomes of our group when handling various academic tasks. A leader should be someone who is dependable. That is another strength of mine that will make it possible for others to rely on me. I believe I am a problem solver and an industrious person, which makes it easy for me to work with and lead others. References Beers, S. (2007). Strategies for designing, implementing, and evaluating professional development. Alexandria, Va: Association for Supervision and Curriculum Development. Peine, J., Peine, J. (2008). The educator’s professional growth plan: A process for developing staff and improving instruction. Thousand Oaks, CA: Corwin Press. Rughani, A. , Franklin, C., Dixon, S. (2003). Personal development plans for dentists: The new approach to continuing professional development. Abingdon, Oxon: Radcliffe Medical Press. This coursework on Professional Development Plan was written and submitted by user Alyvia N. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Manchu Dynasty essays

Manchu Dynasty essays Through the power of the Manchu Dynasty, Chinas empire was able to reach a high point in their history. There was an internal problem as well as outside pressure, which led to its fall. The Manchu, or Qing dynasty lasted for almost 300 years with a system of an organized government ruling. Chinese culture was being absorbed as rulers ruled over the land. Confucianism ideas were kept through the years of rule. The Manchu dynasty was established by the Jurchen, a nomadic tribe from Manchuria. The Manchu dynasty lasted from 1644-1911. The downfall of the Ming dynasty brought the beginning of the Manchu period. The south of China faced many serious problems such as bad weather, which created bad harvests, famine, and raids. Soldiers and peasants would raid the towns just for food. Another problem was the population problem, which China faced and could not control. Manchu rulers introduced a system of checks and balances to the organization. The status of peasants had become much less as time went on. Most of the empires money had gone for foreign expansion and also internal corruption. Government positions were held by both Chinese and Manchurian people. All throughout China, the taxes were raised to a higher level, which started peasant uprisings. Chinese trade was restricted to only a certain amount of people, but the most exporting and trading went to three main nations, Britain, the United States, and France. A lot of tea was sold and Opium was introduced to China from the British. Gold and silver was all that could be traded in exchange. Foreign merchants were able to make a lot of money selling Chinese products in foreign nations. Opium first came from India. A struggle among the Chinese government led to a struggle about the thoughts of the Opium trade, which had bloomed in China. They believed that opium was bad for their people and it dropped the amount of silver China had. In 1839, the Chinese...

Sunday, November 24, 2019

Comprehending Chaos †Assessment of structure and Coherency Paper

Comprehending Chaos – Assessment of structure and Coherency Paper Free Online Research Papers Comprehending Chaos Assessment of structure and Coherency Paper The concept of chaos is certainly not a subject for a writer to convey with simple clarity, but Margaret Wheatley has done an outstanding job in describing the notion as it relates to both scientific and societal views. There are, however, several instances where many may find it difficult to understand where her words specifically match her meaning. The first instance I found was when she was discussing the fields of study where the concept of positive chaos is found. Wheatley mentions the ancient Greeks, modern science, and Joseph Smith’s civil governing principles as â€Å"places† where the principle of chaos is introduced as a positive notion. Wheatley’s meaning is that chaos is positive in these â€Å"fields of study† or â€Å"areas of knowledge†, rather than the popular interpretation of chaos, which is traditionally negative. However, these areas of study are not physical locations, which many people consider as the only definition of the word â€Å"place.† Although there are further definitions, such as â€Å"any location (of matter, knowledge, or whatever)† not just physical ones, and besides the fact that I personally did not have any trouble seeing the meaning, it is apparent many readers may find â€Å"place† too ambiguous. Thus, I believe Wheatley should have used more specific wording in this case. Furthermore, Wheatley’s words concerning the alignment of chaos, i.e. good or evil, light or dark, were variant. Her meaning was connected to the above mentioned notion where, although chaos is popularly held as â€Å"evil† or â€Å"dark,† there were certain groups or â€Å"places† that held a positive view of chaos. She wanted to show the contrast – although chaos is supposed to be this negative, undesirable darkness, there are beneficial and very natural aspects concerning it. However, I quote a phrase: â€Å"the dark heart of chaos.† Throughout the introduction of the essay, we are reading about the necessity and positivism of the concept of chaos, and then comes this line and others like it. What are we to believe? Is Margaret Wheatley a hypocrite? What is she trying to convey with her words? In truth, Wheatley is showing that, like Gaia, we can pull order and light out of the chaotic void. Thus, the concept of chaos is dark and turbulent and foreboding, but also necessary and positive, as it gives us our order. The mistake many make while reading this essay is to equate light and order with positivism. This is not the case – darkness may be classically evil and undesirable, but the chaotic void is definitely necessary and positive. Towards the end of the article, Wheatley begins a descent into a deeper, almost religious meaning of chaos. She introduces the â€Å"meaning attractor,† which is less of a striking description of â€Å"how† and more of an omniscient view of â€Å"why.† Through the meaning attractor, Wheatley turns us around in retrospect and shows us how our chaotic wanderings are perhaps not so comprised of â€Å"chance† after all. What seemed a mass fusion of chaos and risk now seems inextricably linked by a common attractor of meaning. This is where I hooked in; this is where I saw beyond an interest-grabbing trivial article about current scientific pursuits and viewed a grand purpose, an eternally consequential narrative which tied the early pursuit of comprehending chaos and the later search of understanding the purpose and grand order of our existence with great clarity and remarkably coherent language. Research Papers on Comprehending Chaos - Assessment of structure and Coherency PaperAnalysis Of A Cosmetics AdvertisementMind TravelRelationship between Media Coverage and Social andEffects of Television Violence on ChildrenHarry Potter and the Deathly Hallows EssayCanaanite Influence on the Early Israelite ReligionThe Relationship Between Delinquency and Drug UseThree Concepts of PsychodynamicThe Masque of the Red Death Room meaningsUnreasonable Searches and Seizures

Saturday, November 23, 2019

How to Make Homemade Magic Sand

How to Make Homemade Magic Sand Magic Sand  (also known as Aqua Sand or Space Sand) is a type of sand that doesnt get wet when placed in water. You can make your own Magic Sand at home by following a few simple steps. Magic Sand  Materials Basically, all you need to do is coat the sand with a waterproofing chemical. Just gather: Clean sandWaterproofing spray (such as Scotchguard) How to Make Magic Sand Place the sand in a small pan or bowl.Evenly spray the surface of the sand with the waterproofing chemical. You may need to shake the container of sand to expose untreated surfaces. You dont have to drown the sand in the chemical- youll have enough once the sand changes from looking dry to appearing wet.Allow the sand to dry.Thats it. Pour the sand in water and it wont get wet. How Magic Sand Works Commercial Magic Sand, Aqua Sand, and Space Sand consist of colored sand that has been coated with trimethylsilanol. This is a water-repellent or hydrophobic organosilicon molecule that seals any cracks or pits in the sand and prevents water from sticking to it. Magic Sand appears silvery in water because hydrogen bonding between water molecules causes the water to form a bubble around the sand. This is critical to how the sand functions because if the water didnt stick to itself so well, the anti-wetting agent wouldnt be effective. If you feel like testing this, try putting Magic Sand in a non-water-based liquid. It will get wet. If you look closely, youll see the sand forms cylindrical structures in the water, as the water forms the lowest surface area structure that it can around the grains. Because of this, people sometimes assume there is something special about the sand. Really, its the coating and the magic properties of water. Another Way to Make Magic Sand Water repellent sand was made long before toy makers marketed Magic Sand. Early in the 20th century, Magic Sand was made by heating together sand and wax. The excess wax was drained, leaving hydrophobic sand that behaved much like the modern product. More Fun Projects To Try Magic Colored Milk Project (Surface Tension)Make Silica or Pure SandMake Homemade Oobleck References   G. Lee, Leonard (Publisher) (1999),  The Boy Mechanic Book 2, 1000 Things for a Boy to Do. Algrove Publishing - Classic Reprint Series original  publication 1915.

Thursday, November 21, 2019

Weeks v. united states Coursework Example | Topics and Well Written Essays - 250 words

Weeks v. united states - Coursework Example In the case of Weeks v. United States, Weeks’ property was searched by the state agents without a lawful warrant and some papers and other possessions were seized by the agents which led to the conclusion that the defendant was an illegal gambler. However, this constituted a violation of the Fourth Amendment because otherwise the evidence that was collected in this unlawful manner should not have been used in the federal criminal prosecution. By the 20th century however, the Court came to recognize the fact that the Fourth Amendment was of no use if this kind of a search and seizure practice was carried on without any warrant. This Amendment carries a certain amount of protection that is to be given to citizens and states that evidence produced in such an unlawful manner cannot be held against the defendant. Thus, the Court had finally decided the case to be in favour of Weeks and classifies a certain right of privacy to be provided to other citizens under the same category in order to abide by the guidelines set in the Fourth

Business Analytics Assignment Example | Topics and Well Written Essays - 500 words - 1

Business Analytics - Assignment Example - Data driven processes often create issues (noise) which are not relevant to the goals of the project. In this respect, logic-driven analytics processes will result in more clear and concise solutions. This depends on the project and the maturity of the audience/stakeholders. In an environment where the KPIs are not already established and the data is not well known, it might be appropriate to start with a logic driven process to focus the process on the most impactful issues. This keeps the noise to a minimum and keeps a project smaller in scope while not creating distractions. A data-driven approach can be added as a second step in this case. In a more sophisticated environment where basic KPIs are established, there is an opportunity to find the hidden levers in a process by using a data-driven process to provide deeper insight. Again, these choices are not universal and depend on the maturity of the audience and company, the quality, availability and knowledge of the data and the appetite of the organization for a complex project - The choice of an analytic model to use does indeed depend on many factors, including the nature of the project and the environment. It is worth noting that both logic driven and data driven models can co-exist and complement each other. In my opinion, a data driven approach is more suited to a situation where the data is not known, since a logic driven approach requires an intimate understanding and anticipation of the data before a model can be constructed. What would an effect hybrid first analytics project look like for an organization that has not approached true analytics in the past and what elements from each methodology would you apply? Assume the organization is relatively mature (in life cycle) but novice in deep analytics and has relatively clean and accessible data as well as well educated users. The main advantage I can see using a logic driven analytics (as one of the requirement) is

Wednesday, November 20, 2019

Solar and Renewable Power in the UK Literature review

Solar and Renewable Power in the UK - Literature review Example The work also provides an overall idea about the consumption of energy in various sectors. According to the information, transport industry is the biggest consumer that accounts for 33% of the total consumption in 1990. It was followed by domestic sector with 28% and industry with 26%. By 2001, there was a rise in energy consumption in transport, domestic and services sectors. To illustrate, in transport and services, the use rose by 1% and in domestic sector, it rose by 2%. Now, when the energy consumption is analysed according to the purpose, it becomes evident that in 1999, 38% of the total energy went to space heating and 22% was used for processes. To light appliances, 12% was used, and 8% of the total energy was consumed by water and lighting/appliances. All other purposes take up one fifth of the total energy. By 2000, there was a rise in the use of electricity for water, space heating and lighting. They rose by 1%, and 2% respectively. On the other hand, the process use decli ned by 7% (ibid). A look into the UK oil reserve and consumption through the Busby Report (2002) provides a picture that is grim. The country has a mere 0.3% of the global oil reserve. In addition, its oil production had peaked in the year 1999, and by 2010, it tailed off by 54%. Though the nation faced a decline in consumption by 12% in the period, it had to import 15.8% of its oil from other nations (ibid). Thus, it becomes evident that the nation is getting more and more dependent on imported oil. Similar is the case of natural gas in UK. The UK gas reserve fell considerably from 0.74 trillion cubic meters to 0.66 trillion cube meters between 2000 and 2001. By the year 2010, the reserve is just 0.25 trillion cubic meters. Thus, the nation’s 57.1 billion cubic meters of gas production is far behind its requirement of 93.8 billion cubic meters. As a result, the nation meets 39% of its gas requirement by import (ibid). Thus, the report points out that as a result of this increased need and decreasing oil and gas reserves, there is a rise in global demand for supplies of coal and oil. As a result, the nation will be forced to reduce its energy consumption by 75% if newer ways are not developed. In order to meet this issue, the article suggests certain solutions. The first one is the increased use of bio-diesel. It is pointed out that producing adequate amount of bio-diesel means utilising 8.5% of the agricultural land in UK for growing rape and beet. Another form of energy is landfill gas. Presently, it provides

Tuesday, November 19, 2019

Davis v. The Board of County Commissioners of Doa Ana County Essay

Davis v. The Board of County Commissioners of Doa Ana County - Essay Example This made Herrera resign from his work in order to evade the disciplinary action. After a few days, the supervisor wrote a letter on behalf of Herrera to the MVH revealing that Herrera was an excellent worker arguing that he was confident that other prospective employees will notice (Walsh (2010, p. 148). Another supervisor of the Detention Centre made some verbal references that praised Herrera as a good worker who will contribute to effective organization performance. This made the plaintiff, the third party in this case to sue the Detention County for negligent misinterpretations of providing misleading information. This misinformation was provided by Mochen and Steele, employees at the Detention Center, which enabled Herrera to be employed again at the MVH. This legal issue was seen as a threat to employee; thus the plaintiff to be assaulted; hence sorted to accuse the board of county commissioners of Dona Ana County. The court concludes that Dona Ana Country deserves to be accountable for negligent referral (misinterpretation) due to positive references. When Herrera got a position as mental health technician, he was allegedly accused of sex assault by the plaintiff and physically abused female patients. In case an organization provides misleading references that can contribute to harm of employees in the new job, the jurisdictions have the right to sue that organization for negligent referral. According to Kohn, Kohn and Colapinto (2004), the court of appeal has the right to judge Steele and Mochen for not taking into considerations the harm caused to the third party and the risk that may be encountered in the end. The government has laws that protect all employees and the third parties in an organization from any harm imposed upon them. The US departments of Labor and its divisions have varied laws, which can shield third parties or employees in the workplace. Cases of negligent or a misinterp retation of any information provided

Sunday, November 17, 2019

Self analysis Essay Example | Topics and Well Written Essays - 3500 words

Self analysis - Essay Example I listen to teachers who give animated stories and real life examples instead of just presenting theories. In retaining what I have learned, I need to make a â€Å"learnable package†. This entails writing notes which have concrete and relevant examples like case studies and applications of principles or abstract concepts. I need to put in several pictures or illustrations. Talking to another â€Å"kinesthetic† learner will also help, as both of us can enjoy remembering details of our experiential learning. The Humanmetrics Test I took yielded an ISTJ profile for me. People who belong to this personality type are described to be ambitious, loyal, responsible, modest, traditional and conventional, sensible, thrifty, careful and wise with both money and possessions. ISTJ people also see projects through to the end and are good time managers. We are considered good and prudent stewards of resources and can be reliable as we make practical and realistic decisions regarding how we spend time and resources. ISTJ people like staying in their comfort zones. We do not have qualms about living in the same neighborhood for a very long time and develop a sense of loyalty, accountability and citizenship to our communities. In terms of learning, ISTJ people possess good memories for specific facts that are relevant and meaningful in their everyday lives. We rely on repeated experiences that have been proven trustworthy. New facts and ideas are accepted if a past experience provides relevance and realism for it. The Belbin Test results imply that I am a creative and thorough worker. I welcome tasks that challenge me to work to high standards. Thus, activities which focus on planning, research, and development would suit me well. The test also suggests that I may perform better behind the scenes than in the spotlight. However, once I have something definite to show for my efforts, then I can be willing

Judicial Law-Making Essay Example for Free

Judicial Law-Making Essay The independence of the judiciary was ensured by the act of settlement 1700, which transferred the power to sack judges from the crown to the parliament. Consequently, judges should theoretically make their decisions based purely on the logical deductions of precedent, uninfluenced by political or career considerations. The eighteenth century legal commentator, William Blackstone, introduced the declaratory theory of law, stating that judges do not make law, but merely, by the rules of precedence, discover and declare the law that has always been: the judge being sworn to determine, not according to his private sentiments ot according to his own private judgement, but according to the known laws and customs of the land: not delegated to pronounce a new law, but to maintain an expound the old one. Blackstone does not accept that precedent does not even offer a choice between two or more interpretations of the law: where a bad decision is made, he states, the new one that reverses or overrules it is not a new law, nor a statement that the old decision was bad law, but a declaration that the previous decision was â€Å"not law†, in other words that it was the wrong answer. His view presupposes that there is always one right answer, to be deduced from the objective study of precedence. Today, however, this position is considered somewhat unrealistic. If the operation of precedent is the precise science Blackstone suggested, a large majority of cases in the higher courts would never come to court at all. The lawyers concern could simply look up the relevant case law and predict what the decision would be, then advise whichever of the clients would be bound to lose not to bother bringing or fighting the case. In a civil case, or any appeal case, no good lawyer would advise a client to bring or defend the case that they had no chance of winning. Therefore, where such a case is contested, it can be assumed that, unless one of the lawyers has made a mistake, it could go either way, and still be in accordance with the law. In practice, thus, judges decisions may not be as neutral as Blackstones declaratory theory suggests: they have to make choices which are by no means spelled out by precedent. Yet, rather than openly stating that they are choosing between two or more equally relevant precedents, the courts find ways to avoid awkward ones, which give them the impression that the precedents they do choose to follow are the only ones they could possibly apply. Ronald Dworkin argues that judges have no real discretion in making case law. He sees law as a seamless web of principles, which supply a right answer and only one to every possible problem. Dworkin reasons that although stated legal rules may run out (in the sense of not being directly applicable to a new case) legal principles never do, and therefore judges never need to use their own discretion. In his book, laws empire 1986, professor Dworkin claims that judges first look at previous cases, and from those deduce which principles could be said to apply to the case for them. They then consult their own sense of justice as to which apply, and also consider what the communities view of justice dictates. Where the judges view and that of the community coincide, there is no problem, but if they conflict, the judges then ask themselves whether or not it would be fair to impose their own sense of justice over that of the community. Dworkin calls this the interpretive approach and, although it may appear to involve a series of choices, he considers that the legal principles underlying the decisions mean that in the end, only one result could possibly surface from any one case. Dworkins approach has been heavily criticised as being unrealistic: opponents believe that judges do not consider principles of justice but take a much more pragmatic approach, looking at the facts of the case, not the principles. Critical legal theorists, like as David Kairys (1998) take a quite different view. They argue that judges have considerable freedom within the doctrine of precedent. Kairys suggests that there is no such thing as legal reasoning in the sense of a logical, neutral method of determining rules and results from what has gone before. He states that judicial decisions are actually based on a complex mixture of social, political, institutional, experiential, and personal factors, and are simply legitimated, or justified, by reference to previous cases. The law provides a wide and conflicting variety of such justifications from which courts pick and choose. The process is not necessarily as cynical as it sounds. Kairys points out that he is not saying that judges actually make the decision and then consider which precedents they can pick to justify it: rather their own eliefs and prejudices naturally lead them to give more weight to precedents which support both views. Nevertheless, for critical legal theorists, all such decisions can be seen as reflecting social and political judgements, rather than objective, purely logical deductions. Critical theory argues that the neutral appearance of so called legal reasoning disguises the true nature of legal decisions which, by the choices made, uphold existing power relations within society, tending to favour, for example, employers over employees, property owners over those without, men over women, and rich, developed countries over poor, undeveloped ones. Griffith (1997) argues that judges make their decisions based on what they see as the public interest, but that their view of this interest is coloured by their background and their position in society. He points out that judges’ view of public interest assumes that the interests of all the members of society are roughly the same, ignoring the fact that within society, different groups, employers and employees, men and women, rich and poor – may have interests which are diametrically opposite. What appears to be acting in public interest will usually mean in the interest of one group over another, and therefore cannot be seen as neutral. Waldron, in his book ‘The Law’ (1989), agrees that judges do make law, and that they are influenced in those instances of law-making by political and ideological considerations, but argues that this is not necessarily a bad thing. He contends that while it would be wrong for judges to be biased towards one side in a case, or to make decisions based on political factors in the hope of promotion, it is unrealistic to expect a judge to be ‘a political neuter – emasculated of all values and principled commitments’. Although judges have traditionally seen themselves as declaring or finding rather than creating law, and frequently state that making law is the prerogative of the parliament, there are several areas in which they clearly do make law. In the first place, historically, a great deal of English law is and always has been case law, made by judicial decisions. Contract and tort law are still largely judge made, and many of the most important developments for example, the development of negligence as a tort have had profound effects. Even though statutes have later been passed in these subjects, and occasionally parliament has attempted to embody whole areas of common law in statutory form, these still embody the original principles created by the judges. Secondly, the application of law, whether case law or statute, to a particular case is not usually an automatic matter. Terminology may be vague or ambiguous, new developments and social life have to be accommodated, and the procedure requires interpretation as well as application. As we have suggested, judicial precedent does not always make a particular decision obvious and obligatory there may be conflicting precedents, their implications may be unclear, and there are ways of getting round a precedent that may otherwise produce an undesirable decision. If it is accepted that Blackstones declaratory theory does not apply in practice, then clearly the judges do make law, rather than explaining the law that is already there. The theories advanced by Kairys, Griffith, and Waldron, all accept that judges do have discretion, and therefore they do to some extent make law. Where precedents do not spell out what should be done in a case before them, judges nevertheless have to make a decision. They cannot simply say that the law is not clear and refer it back to parliament, even though in some cases they point out that the decision before them would be more appropriately decided by those who have been elected to make decisions on changes in the law. This was the case in Airedale NHS Trust v Bland (1993), where the House of Lords considered the fate of Tony Bland, the football supporter left in a coma, after the Hillsborough stadium disaster. The court had to decide whether it was lawful to stop supplying the drugs and artificial feeding that were keeping Bland alive, even though it was known that doing so would mean his death soon afterwards. Several law lords made it plain that they felt that cases raising wholly new moral and social issues; should be decided by the Parliament, the judges role being to apply the principles which society, through the democratic process, adopts, not to impose their standards on society. Nevertheless, the courts had no option but to make the decision one way or another, and they decided that the action was lawful in the circumstances, because it was in the patients best interests. Thirdly, our judges have been left to define their own role, and the role of the courts generally in the political system, more or less as they please. They have, for example, given themselves the power to review decisions of any public body, even when parliament has said those decisions are not to be reviewed. In addition, despite their frequent pronouncements that it is not for them to interfere in parliaments law making role, the judges have made it plain that they will not, unless forced by very explicit wording, interpret statutes as encroaching on common law rights or judge made law. They also control the operation of case law without reference to parliament : an obvious example is that the 1966 practice statement announcing that the HOL would no longer be bound by its own decisions, which made case law more flexible and thereby gave the judges more power, was made on the courts own authority, without needing permission from parliament. The HOL has explained its approach to judicial law-making (which is likely to be the same for the Supreme Court) in the case of C (a minor) v DPP 1995, which raised the issue of childrens liability for crime. The common law defence of doli incapax provided that a D aged between 10 and 14 could be liable for a crime only if the prosecution could prove that the child knew that what he or she did was seriously wrong. On appeal from the magistrates’ court, the divisional court held that the defence was outdated and should no longer exist in law. An appeal was brought before the HOL arguing that the divisional court was bound by precedent and not able to change the law in this way. the HOL agreed and went on to consider whether it should change the law itself (as the 1966 practice statement clearly allowed it to do), but decided that this was not an appropriate case for judicial law making.

Friday, November 15, 2019

Impact Of Social Networking Sites on Youth

Impact Of Social Networking Sites on Youth Just when many of us thought we understood how to use email, could shop online, and search the web for recipes or the long- lost instruction manual for a piece of equipment in the garage, the web is evolving. Now we hear about blogs, podcasts, Facebook, Myspace and Orkut. These are some of the tools and technology associated with a recent phenomenon called social networking and it is everywhere. Social networking has become part of the daily life experience for an increasing number of people. The rapid adoption of social network sites by teenagers in the United States and in many other countries around the world raises some important questions. Why do teenagers flock to these sites? What are they expressing on them? How do these sites fit into their lives? What are they learning from their participation? Are these online activities like face-to-face friendships or are they different, or complementary? (Danah Boyd, 2007). Penuel and Riel define social networking as a set of people and the relationships between them. That definition is found today in the social networking services that promote the development of online communities of people. Social networking such as Facebook, Orkut, Myspace, Flickr and Youtube are sites where users apply for membership and maintain their personal profile information in a centrally organized database. Each network members controls access to t heir profile by accepting or declining requests from other network members to be friends. By expanding and developing their network of friends, social networking members are able to maintain online relationships for work, study, special- interests or leisure- related purposes. Social networking services utilize the participation technology and software tools to facilitate communication and interaction between members. Social software communication tools include blogs, wikis, instant messaging, chat rooms, message boards and social bookmarking. Members use these tools to share online ideas, documents, photos, videos, and favorite websites actually almost anything. As more people participate in social networking, the question becomes is it merely a social activity or are they involved in learning? And social networking websites is very popular among the youth so that they contribute the majority percentage of the users of these sites. So, the researcher wanted to study the impact of these social networking sites on their education. LITERATURE REVIEW Jeff Cain (2008), in the research paper Online Social Networking Issues Within Academia and Pharmacy Education has discussed that Facebook is a tool that aids students in developing their identities and finding their fit within a college community. Helping students connect and stay in contact with old and new friends is touted as one of the significant benefits of Facebook. Making connections on campus which help them feel that they belong may be an important factor in student retention. These capabilities along with the many facets of communicating with their friends make social networking sites very appealing. Although extremely popular, especially among younger generations, social networking sites are not without their issues. Controversy surrounds the use of these sites, specifically in terms of privacy, safety, and attitudes toward revealing personal information to the world. Most of the press concerning these sites has been negative in focus. Newspapers and magazines related to higher education are replete with cases of college students who experienced negative repercussions from questionable activities that were made public online.9,15-26 The list of incidences are long and revolve around a myriad of issues related to photos, posts, and/or personal profiles. Social networking sites such as Facebook provide individuals with a way of maintaining and strengthening social ties, which can be beneficial in both social and academic settings. These same sites, however, also pose a danger to students privacy, safety, and professional reputations if proper precautions are not taken. Colleges and schools of pharmacy would be advised to consider how these issues might affect their students. At a minimum, schools should take appropriate steps to educate students about these matters. Research is needed on professional students usage and attitudes toward online social networking sites. Monitoring and usage of these sites by institutions venture into legal grey areas concerning the Fourth Amendment, the right to privacy, and duty of care, and should be approached with caution. Discussion is warranted on how, if at all, material found on student social networking sites should be used in colleges of pharmacy admissions decisions and/or matters of a discip linary nature. Further research is needed on how best to address the issues surrounding online social networking. Ana M Martinez Aleman, Katherine Lynk Wartman and M Aleman Ana (2009) in their book Online Social Networking on Campus said that Teenagers online social needs are similar to those of college students. High school students want to stay up to date with their friends status; they plan activities online; they are social searchers who investigate other users with whom they have a real- life connection, and also like college students, they perceive their Facebook community to correspond to their existing real-life social relationships at school or other institutional affiliations (sports teams, music groups, etc.). Though perhaps not a user community that engages in social browsing to connect with other users offline, the high school user seems less alien and disparate to Facebooks traditional and original niche user than the older adult user. Henk Huijser (2007) explores potential educational applications of Web 2.0 technologies, and cuts through some of the hype generated around these technologies, as well as around characteristics of Generation Y, and their implications for learning and teaching. Web 2.0 technologies both reflect and drive a blurring of the lines between students and university educators, which has a potentially profound impact on learning and teaching in higher education. This paper argues that Web 2.0 technologies, and Social Network Sites in particular, offer exciting opportunities but that educational applications of these technologies should be based on sound pedagogical principles and driven by empirical research and careful evaluation, if they are to effect meaningful learning experiences for all students. Vincent Miller (2008) in his research paper New Media, Networking and Phatic Culture has discussed that This article will demonstrate how the notion of phatic communion has become an increasingly significant part of digital media culture alongside the rise of online networking practices. Through a consideration of the new media objects of blogs, social networking profiles and microblogs, along with their associated practices, I will argue, that the social contexts of individualization and network sociality, alongside the technological developments associated with pervasive communication and connected presence has led to an online media culture increasingly dominated by phatic communications. That is, communications which have purely social (networking) and not informational or dialogic intents. I conclude with a discussion of the potential nihilistic consequences of such a culture. Doris de Almeida Soares and Escola Naval (2008) in their resarch paper Understanding class blogs as a tool for language development it has been said that Web 2.0 has allowed for the development of cyber spaces where any computer user can create their own public pages to share knowledge, feelings and thoughts inviting linguistic interactions with people around the globe. This innovation has caught the attention of language practitioners who wish to experiment with blogging to enhance the teaching and learning experience. In 2007 I set up a class blog with my nine pre-intermediate EFL students in a language school in Brazil. This experience gave rise to two central questions: a) did my students see our blog as a learning tool? and b) what was blogging like in other language teaching contexts? To answer the first question I carried out some Exploratory Practice for three months. As for the second question, I designed an online survey which was answered by 16 members of a community of pr actice called the Webheads. Ultimately I learned that my students saw our blog as a learning tool and that blogs are being used in different ways around the world. This article presents the rationale behind using blogs in language classes, describes my research process and discusses the understanding my students and I have gained from exploring our own practices. R. Cachia, R. Compano and O. Da Costa (2005) in their research paper Students Actually Use the Internet for Education says that New research released by the National School Boards Association reveals data showing we all might need to reevaluate our assumptions: It turns out kids are actually using the Internet for educational purposes. In fact, according to the study, Creating Connecting: Research and Guidelines on Online Socialand EducationalNetworking, the percentage of children specifically discussing schoolwork online outpaces the percentage that spend time downloading music. For the survey, the NSBA teamed up with Grunwald Associates to poll 1,277 9- to 17-year-olds, 1,039 parents, and 250 school district leaders who make decisions on Internet policy. It found that a full 50 percent of students who are online spend time discussing schoolwork, and 59 percent spend time talking about education-related topics, including college or college planning; learning outside of school; news; careers or jobs; politics, ideas, religion, or morals; and schoolwork. Further, these students are spending almost as much time on the Internet visiting websites and social networking services (nine hours per week for teens) as they spend watching television (10 hours). A full 96 percent of students surveyed responded that they use the Internet for social networking purposes, including Facebook, MySpace, Webkins, and Nick.com chat. Seventy-one percent said they use these services at least on a weekly basis. Yet, the study asserts, the vast majority of school districts have stringent rules against nearly all forms of social networking during the school dayeven though students and parents report few problem behaviors online. Indeed, both district leaders and parents believe that social networking could play a positive role in students lives and they recognize opportunities for using it in educationat a time when teachers now routinely assign homework that requires Internet use to complete. In light of the study findings, school districts may want to consider reexamining their policies and practices and explore ways in which they could use social networking for educational purposes. Jeff Cain (2008) in Online Social Networking Issues Within Academia and Pharmacy Education it has been said that Facebook is a tool that aids students in developing their identities and finding their fit within a college community. Helping students connect and stay in contact with old and new friends is touted as one of the significant benefits of Facebook. Making connections on campus which help them feel that they belong may be an important factor in student retention. These capabilities along with the many facets of communicating with their friends make social networking sites very appealing. Although extremely popular, especially among younger generations, social networking sites are not without their issues. Controversy surrounds the use of these sites, specifically in terms of privacy, safety, and attitudes toward revealing personal information to the world. Most of the press concerning these sites has been negative in focus. Newspapers and magazines related to higher education are replete with cases of college students who experienced negative repercussions from questionable activities that were made public online.9,15-26 The list of incidences are long and revolve around a myriad of issues related to photos, posts, and/or personal profiles. Social networking sites such as Facebook provide individuals with a way of maintaining and strengthening social ties, which can be beneficial in both social and academic settings. These same sites, however, also pose a danger to students privacy, safety, and professional reputations if proper precautions are not taken. Colleges and schools of pharmacy would be advised to consider how these issues might affect their students. At a minimum, schools should take appropriate steps to educate students about these matters. Research is needed on professional students usage and attitudes toward online social networking sites. Monitoring and usage of these sites by institutions venture into legal grey areas concerning the Fourth Amendment, the right to privacy, and duty of care, and should be approached with caution. Discussion is warranted on how, if at all, material found on student social networking sites should be used in colleges of pharmacy admissions decisions and/or matters of a discip linary nature. Further research is needed on how best to address the issues surrounding online social networking. Danah M. Boyd and N.B. Ellison (2007) in their research paper Social network sites: Definition, history, and scholarship it has been said that Social network sites (SNSs) are increasingly attracting the attention of academic and industry researchers intrigued by their affordances and reach. This special theme section of the Journal of Computer-Mediated Communication brings together scholarship on these emergent phenomena. In this introductory article, the authors describe features of SNSs and propose a comprehensive definition. They then present one perspective on the history of such sites, discussing key changes and developments. After briefly summarizing existing scholarship concerning SNSs, they discuss the articles in this special section and conclude with considerations for future research. The work described above and included in this special theme section contributes to an on-going dialogue about the importance of social network sites, both for practitioners and researchers. Vast, uncharted waters still remain to be explored. Methodologically, SNS researchers ability to make causal claims is limited by a lack of experimental or longitudinal studies. Although the situation is rapidly changing, scholars still have a limited understanding of who is and who is not using these sites, why, and for what purposes, especially outside the U.S. Such questions will require large-scale quantitative and qualitative research. Richer, ethnographic research on populations more difficult to access (including non-users) would further aid scholars ability to understand the long-term implications of these tools. They hope that the work described here and included in this collection will help build a foundation for future investigations of these and other important issues surrounding socia l network sites. M. Brendesha Tynes (2007), in Internet Safety Gone Wild? Sacrificing the Educational and Psychosocial Benefits of Online Social Environments it has been said that Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far outweigh the potential dangers. These benefits include developing cognitive skills that are consistent with those required in educational settings and perspective-taking skills that are necessary for citizenship in an increasingly multiracial society. Alternative strategies for keeping adolescents safe online should build on the increasing technological awareness and sophistication of teens themselves. Danah Boyd (2007) in her research paper Why Youth Social Network Sites: The Role of Networked Publics in Teenage Social Life has said that Although news media give the impression that all online teens in the United States are on MySpace, this is not the case. For this reason, I want to take a moment to discuss who is not participating. In 2004, PEW found that 87 percent of teenagers aged twelve to seventeen have some level of Internet access.5 In a study conducted in late 2006, they found that 55 percent of online teens aged twelve to seventeen have created profiles on social network sites with 64 percent of teens aged fifteen to seventeen.6 While these numbers are most likely low,7 it is very clear that not all high school students participate in online communities that require public content creation like social network sites. Gender also appears to influence participation on social network sites. Younger boys are more likely to participate than younger girls (46 percent vs. 44 percent) but older girls are far more likely to participate than older boys (70 percent vs. 57 percent). Older boys are twice as likely to use the sites to flirt and slightly more likely to use the sites to meet new people than girls of their age. Older girls are far more likely to use these sites to communicate with friends they see in person than younger people or boys of their age.10 While gender differences do exist and should not be ignored, most of what I discuss in this article concerns practices that are common to both boys and girls. The research paper Exploring the Educational Potential of Social Networking Sites: The Fine Line between Exploiting Opportunities and Unwelcome Imposition by Henk Huijser (2007) University of Southern Queensland explores potential educational applications of Web 2.0 technologies, and cuts through some of the hype generated around these technologies, as well as around characteristics of Generation Y, and their implications for learning and teaching. Web 2.0 technologies both reflect and drive a blurring of the lines between students and university educators, which has a potentially profound impact on learning and teaching in higher education. This paper argues that Web 2.0 technologies, and Social Network Sites in particular, offer exciting opportunities but that educational applications of these technologies should be based on sound pedagogical principles and driven by empirical research and careful evaluation, if they are to effect meaningful learning experiences for all students. In the research paper Social networking sites within Higher Education threat or opportunity? by Neville Palmer, Jomo Batola, Margaret Jones and Sheila Baron (2007) it has been said that a Southampton Solent University, students predominantly use Facebook to advertise social and sporting events, make new friends, or chat among existing friends. There are currently over 6,200 members of the official Southampton Solent network, which represents around 40% of all students at the University, though there may be more in other groups. Currently there seem to be at least 150 different groups representing areas of interest under the umbrella of the University, ranging from the bizarre to sports clubs, social activities and academic related interests. Most of these groups have a small membership. There are also alumni groups, and some specific course related groups. These seem to have been formed, not by staff, but by students. For example there is a group for journalism students and another for business studies. There is a mixture of social chitchat, but also course related self help discussion. The journalism students are also giving each other leads on where they can get work experience. Forums are a form of Social Software that can be a useful tool in education. Forums are also related to Blogs, though a blog is centered on an individual, whereas a forum is centered more on an area of interest (Holzsclag 2005). There are many blogs on the Internet posted by individuals to discuss subjects ranging from their personal lives to World events. However some students are using blogs to post and discuss their work and ideas so that others can comment and advice on it (Polly 2007). A forum can be useful when a particular topic or area of interest requires discussion on the Web. This concept is being used at Southampton Solent University. In the research paper Youth Impact I has been said that A combination of the words iPod and broadcast, podcasts are digital media files distributed over the Internet and listened to on a portable media player. A related term is vodcast, which describes podcasts that incorporate video. Podcasts were originally conceived as a way for people to create their own radio shows without needing a recording studio or transmission network. They evolved into a means of recording and distributing speeches, classes and training sessions, and public safety messages. They are especially popular in K-12 schools and colleges: Teachers and professors use them to record lessons, debates, and guest speakers for absent students or later use, and students use them to record their presentations, projects, and experiments Podcasters and vodcasters record their audio and video sessions, edit them, and upload them to a feed. Listeners and viewers use a podcatcher service such as iTunes to search for and subscribe to one or more feeds. When a new podcast or vodcast is released on the feed, the audio or video file will download automatically to the subscribers iPod, computer, or other device so that they can listen to or view it at their leisure. The review of literature gave a clear idea on the use of social networking websites and the aim of the study was formulated to find the Impact of Social Networking Websites on the education of Youth and the objective is to find the trends in the Internet use by youth and to study the impact of social networking websites on the education of youth. METHODOLOGY For conducting the research, the researcher has chosen the following two methodologies: Survey and In-depth Interview. The researcher adopted the Stratified Random Sampling technique. Stratified random sampling is done when the universe is heterogeneous i.e. if the people are of different kinds. So the universe is sub-divided into many homogeneous groups or strata. And the random sampling is done in each stratum and the sample size from each stratum is taken proportionally. The total number of samples taken were 500 i.e., 125 in each stratum. The researcher has sub- divided the universe as following strata Stratum 1- +1 +2 students Stratum 2- Engineering students Stratum 3- medical students Stratum 4- Arts Science and others Also, the researcher has interviewed experts from the field to know their perspectives of the impact of the Internet on education and to know the impact of social networking sites and how far it complements the students education. ANALYSIS Survey: Statistical Analysis Survey has been done among five hundred respondents, one hundred and twenty five students from each stratum. Among the five hundred respondents 295 were male and 205 were female. 100 students accessing Internet for more than five years, 140 students for 3-5 years, highest of all- 205 students for 1-3 years and the lowest of all- 55 students for less than a year. 210 students access Internet several times in a week, 125- once in a week, 70- once in a day, 45- several times in a day and 50- rarely. When asked about the number of years the students are using social networking sites (SNS), majority of the students from all stratum have selected the option 1-3 years. Majority of the students sit in the social networking sites several times in a week. Next highest is the option once in a week. The lowest is several times a day. Maximum number of respondents uses social networking sites more than one hour and exactly only 185 students sit for less than hour. Maximum respondents said the SNS is rarely useful for their education and 140 students said it is useful only during the exams. 65 said it is useful for the education at all times and 85 said it is never useful for the education. 310 students said SNS is time consuming, 195 said they use SNS for education and 135 said they chat regarding academics in SNS. 190 students have not agreed that social networking is time consuming. But out of 190 students, 150 of them sit in SNS more than hour. 75 of them sit for 2-4 hours and 5 sit for more than four once they access the social networking sites. 260 students said their academic performance didnt change because of using SNS and only 15 students said that it has decreased. Others said it has improved. 455 students have an account in Orkut and some of them have account in Facebook, Hi-5 etc. But next to Orkut many are familiar with the Youtube website and the next is Facebook. SNS is highly used by the students as a messenger, then it is used for sharing photos and videos and then it is used to find new friends. Only 140 students have joined in the communities regarding academics, out of which 110 had said that those communities were helpful for the education. And only 40 students have said that the social networking sites distract them from the studies. Thus, from the percentage analysis of the survey data, it is found that 41% of the students are accessing Internet for 1-3 years and 28% for 3-5 years. 42% access Internet several times in a week and 25% once in a week. Apart from social networking many students use the Internet for sending e-mails and chatting. Apart from social networking 51% of the respondents use Internet for downloading music/videos, 76% for sending e-mails/chatting and 60% for educational purposes. Maximum percentage of the students accessing social networking sites for 1-3 years. Figure 1.1 No. of years students accessing SNS 33% of the students access SNS several times in a week, 28% once in a week, 18% rarely, 14% once in a day and 7% several times in a day. More percentage of the students sits in SNS more than an hour when accessed. Figure 1.2 Time spent in SNS 13% said that SNS is useful in education at all times, 28% said it is useful only during exams, 42% said it is rarely useful and 17% said it is never used for education. Figure 1.3 SNS in education 62% had accepted that SNSs are time consuming, 39% agreed that they use SNS for education, 27% chat regarding academic subjects in SNS. Figure 1.4 SNS is time consuming 52% of the students said that their academic performance didnt change because of using SNS and only 3% said that it has decreased. 39% said it has improved and 9% said it has improved a lot. Figure 1.5 Academic performance Interview with Prof. V. Sundareswaran Dr. V. Sundareswaran, the Professor Head, Department of Media Sciences, Anna University Chennai has thirty one years of experience in the teaching field. When asked about the difference between knowledge level of students ten years back and the students at present he said that retrieval or gathering of information was very difficult in those days. It took a lot of time to reach the source materials which are in libraries. But nowadays students gather lot of information very quickly and easily using Internet. And said because of the Internet the students at present are more knowledgeable than the students in the past. And also added at times students know more than the teachers also. He said no one knows about how students are using the Internet. When a student is at home, teachers doesnt know how and for what he/she is using the Internet and when the students are at the institution, parents doesnt know what he/she is doing. When asked about students- teachers interaction via Internet he said that it is a good and easy way for a student to reach the teacher and clear some doubts or get some guidance at any time. But nothing is equivalent to the conventional class room. He always prefers the traditional classroom teaching method and specifically chalk and board teaching. He doesnt prefer to use the Over Head Projectors and Powerpoint slides also. When asked whether he thinks the information is better conveyed through the interactions with the teachers by the students in the Internet, he said he dont know as he doesnt use Internet much. He rarely uses Internet only to guide his research students. When asked about websites like Orkut and Facebook, he said he dont know about those sites and remembered me his point that at times students know more than their teachers. Interview with Mr. Kiruba Shankar Mr. Kiruba Shankar, CEO of f5ive technologies, a web based company is also a social media enthusiast. When asked about his opinion about the social networking sites like Orkut and Facebook they are wonderful tools to expand ones contact beyond the first circle of friends. Its a wonderful way to keep ones friends updated about whats happening in his/her life. That said, Social Networking sites are like a two edged knife. While they can be extremely useful, they can also be misused and become a time sink. He doesnt think social networking sites help improve students education. But what they do well is improve connections which can be quite useful in the real life. In corporate life, connections and contacts are everything. He believes that SN sites in colleges helps prepare for the real world. He said most students are using SN sites for the following 1) To maintain friendship connection with existing friends 2) Reaching out to friends of friends who they would like to be in touch with 3) To improve the brand image of the person in the community 4) Reach out to the opposite sex. He says that these websites definitely distracting the students from their studies. These SN sites are a big time sink and before we know it, they would have sucked away a lot of our time. It can easily become an addiction. He also said that in future, academic institutions will embrace the concept of SN and tweak it to be an integral part of the education system. Thats the right way of doing it. Elements like blogging, podcasting and wikis are already being actively used in documenting the lessons. FINDINGS CONCLUSION The study reveals that 41% of the students are accessing Internet for 1-3 years and 28% for 3-5 years. 42% access Internet several times in a week and 25% once in a week. Apart from social networking many students use the Internet for sending e-mails and chatting. Apart from social networking 51% of the respondents use Internet for downloading music/videos, 76% for sending e-mails/chatting and 60% for educational purposes. More percentage of the students accessing social networking sites for 1-3 years. 33% of the students access SNS several times in a week, 28% once in a week, 18% rarely, 14% once in a day and 7% several times in a day. More percentage of the students sits in SNS more than an hour when accessed. 13% said that SNS is useful in education at all times, 28% said it is useful only during exams, 42% said it is rarely useful and 17% said it is never used for education. 62% had accepted that SNSs are time consuming, 39% agreed that they use SNS for education, 27% chat regarding academic subjects in SNS. 52% of the students said that their academic performance didnt change because of using SNS and only 3% said that it has decreased. 39% said it has improved and 9% said it has improved a lot. Though students dont accept that SNS distracts them from their studies, it is clear that SNS is time consuming which

Thursday, November 14, 2019

Knowledge and Peace :: essays research papers

Knowledge is one of the most important factors in maintaining a peaceful and free society. Knowledge allows a society to plan for the future, while learning from past mistakes. Many great nations have fallen into war and chaos because they did not utilize the wisdom gained from the past. Many societies’ problems were preventable, if people had used the lessons at their disposal and placed emphasis on solving their problems through the use of their intellects, rather than their weapons. A great example of this is the Roman Empire, which allowed many of its problems to grow and fester, before attempting to check them. The Roman Empire was a powerful, seemingly invincible, civilization. Rome thrived in glory for many years, a model civilization admired by all, until it started to fall apart. Many historians argue the factual reasons for Rome’s downfall. Some say it was crime; others say crooked government was the cause. Still others say it was the focus on entertainment and luxuries. All of these problems could have been avoided and peace would have been maintained. Yet, the Romans did not believe that their empire could fall and chose to ignore their problems, believing they would go away on their own. Obviously, that did not happen and, as a result, the Roman Empire fell. In America today we have all of these problems. Are we going to be next to fall? Or, have we gained knowledge and wisdom enough by studying the errors of other nations’ past history to maintain peace in our own time? In Rome, crime made it unsafe to travel, to sell goods, or to go to the market. The Romans ran the risk of being robbed, traveling from place to place. Today, in America, we run the risk of being mugged just going to the store. In some cities it's not safe to go out at night. Stores are always being robbed, vandalized, or destroyed. There is even a murder committed approximately every twenty seconds. Crime is just as much, if not more, of a problem now in America then back during the fall of Rome. We have the knowledge of Rome’s past failures, yet we continue on the same path. If the United States of America does not use Rome’s failure as a guide of what to avoid, the results could be disastrous. Toward the end of Rome, the government was, for the most part, in chaos. Every time the current Emperor died, there was a civil war to decide who would be the next ruler of Rome. The politicians no longer cared about Rome. They became self-centered, and used all their power to better their own lives. Luckily, things in America are not yet that bad.

Wednesday, November 13, 2019

Causes of Plagiarism Essay -- Plagiarism Essays

Plagiarism has become a major issue among university students around the world. Academic misconduct has been a concern to those teaching at the universities. Hence, to prevent this from occurring the educational bodies have implemented measures to avoid plagiarism. Presently, the newly recruited students are informed of the consequences of plagiarism and that stern action is in place (Ashworth, Bannister, & Thorne,1997,p.1). However, plagiarism can be divided into two parts: deliberate and inadvertent. Presented here are the reasons why student plagiarism is considered quite high at western universities, even though many of the university students do not mean to cheat. There are three reasons as follows: (1) lack of clear understanding about the concept; (2) lack of knowledge about citation and referencing skills; and (3) poor time management. The first focus is on definitions of plagiarism and the differences between two types of plagiarism, reasons for inadvertent plagiarism, and l astly why international students have became the most plagiarising students in western universities. Plagiarism is one type of academic misconduct which is treated seriously in today’s universities. Plagiarism is defined as † literary theft, stealing ( by copying ) the words or ideas of someone else and passing them off as one’s own without crediting the source†(Handa & Power, n.d., p.66). For example, use of any material which is taken from any sources, such as books, electric journals, the Internet, or from other people’s work comprises plagiarism. There are two types of plagiarism: (1) deliberate (intention to cheat); (2) inadvertent (no intention to cheat). If students do it on purpose or intend to cheat, it means that the students have cheated... ...), 471-488. http://www.elearning.tcu.edu/resources/faculty/turnitin/Why%20Students%20Plagiarize.pdf Peter Ashwortha, Philip Bannistera, Pauline Thornea, "Guilty in whose eyes? University students' perceptions of cheating and plagiarism in academic work and assessment" Studies in Higher Education, Volume 22, Issue 2, 1997 Roig, Miguel (1997) "Can Undergraduate Students Determine Whether Text Has Been Plagiarized," The Psychological Record: Vol. 47: Iss. 1, Article 7. Available at: http://opensiuc.lib.siu.edu/tpr/vol47/iss1/7 Walker, John. "Student Plagiarism in Universities: What are we Doing About it?" Higher Education Research & Development, Volume 17, Issue 1, 1998 http://www.tandfonline.com/doi/abs/10.1080/0729436980170105?journalCode=cher20 Wang, Y. (2008). University student online plagiarism. International Journal on E-Learning, 7(4), 743-757.

Tuesday, November 12, 2019

Biography of Erik Erikson Essay

A few years after Erik’s birth, her mother took him to a local jewish pediatrician, Dr. Theodor Homburger for a treatment of minor illness. His mother and the pediatrician eventually fell in love. He quickly developed a sense that something was wrong his mother and father were Jewish his own physical appearance was clearly Scandinavian. later on he found the truth about his heritage, his identity crisis was worsened. Rejecting his stepfather’s plea to become physician. He went to Europe and enrolled in art school and eager to learn about culture and history. He returned home at the age of 25 prepared to settle down and teach art for a living. Erikson was asked by his former high school friend Peter Blos to join him as a teacher in Experimental Nursery school in Vienna where he met Anna Freud and her famous father Sigmund Freud. Anna Freud was trying to convert psychoanalytic interest in childhood experiences of adult. Erikson shared her pioneering interest and was eventually trained by her as a child analyst. Erikson was still unsure to earn his living a psychoanalyst because still wanted to paint and draw. However, he began to see a connection between psychoanalysis and art. He observed that children’s dream and play involve important visual images that only later are translated into words in therapy. Concepts and Principles Erikson’s position represents a systematic extension of Freud’s view of the role of ego in personality functioning. Erikson is a Freudian ego-psychologist. Erikson proposed that ego often operates independently of id emotions and motivation. Ego functions to help individual adapt to challenges presented by the surrounding. Ego Psychology Emphasized the integration of biological and psychosocial forces in determination of personality functioning. Epigenetic Principle The idea that human development is governed by a sequence of stages that depend on genetic or hereditary factors This principle says that we develop through a predetermined unfolding of our personalities in eight stages. Our progress through each stage is in part determined by our success, or lack of success â€Å"crisis†, in all the previous stages. Crisis defined as the crucial period in every stage. Virtue â€Å"inherent strength or active quality† human qualities or strength emerge from successful resolution of crisis. Psychosocial Development: Stages of Ego Development Stage Basic Conflict Virtue Important Events Outcome Infancy (birth to 18 months) Trust vs. Mistrust HOPE Feeding Children develop a sense of trust when caregivers provide reliability, care, and affection. A lack of this will lead to mistrust. Early Childhood (2 to 3 years) Autonomy vs. Shame and Doubt WILL Toilet Training Children need to develop a sense of personal control over physical skills and a sense of independence. Success leads to feelings of autonomy, failure results in feelings of shame and doubt. Preschool/Play Age (3 to 5 years) Initiative vs. Guilt PURPOSE Exploration Children need to begin asserting control and power over the environment. Success in this stage leads to a sense of purpose. Children who try to exert too much power experience disapproval, resulting in a sense of guilt. School Age (6 to 11 years) Industry vs. Inferiority COMPETENCE School Children need to cope with new social and academic demands. Success leads to a sense of competence, while failure results in feelings of inferiority. Adolescence (12 to 18 years) Identity vs. Role Confusion FIDELITY Social Relationships Teens need to develop a sense of self and personal identity. Success leads to an ability to stay true to yourself, while failure leads to role confusion and a weak sense of self. Young Adulthood (19 to 40 years) Intimacy vs. Isolation LOVE Relationships Young adults need to form intimate, loving relationships with other people. Success leads to strong relationships, while failure results in loneliness and isolation. Middle Adulthood (40 to 65 years) Generativity vs. Stagnation CARE Work and Parenthood Adults need to create or nurture things that will outlast them, often by having children or creating a positive change that benefits other people. Success leads to feelings of usefulness and accomplishment, while failure results in shallow involvement in the world. Maturity(65 to death) Ego Integrity vs. Despair WISDOM Reflection on Life Older adults need to look back on life and feel a sense of fulfillment. Success at this stage leads to feelings of wisdom, while failure results in regret, bitterness, and despair. Strengths and Weaknesses of Erik Erikson’s Theory Strengths Comprehensiveness It addresses itself to wide variety of phenomenon both normal and abnormal and seeks to biological, social, cultural and historical factors. Heuristic Value Within Psychology, Erikson’s work has contributed directly to lifespan psychology and the development of adult psychology. Applied Value Erikson’s work has practical impact in the area of child psychology and psychiatry, counseling, education and social work. Weaknesses Male Bias Erik Erikson articulated psychosocial stage describes the life cycle hallmarks of white, western society and may not apply well to other cultures or even to our own today/present time. Erikson’s positive outcome (such as autonomy, initiative, industry) virtues (such as will, purpose and competence) are frequently seen as characteristics of healthy male development. And his negative ones, (doubt, guilt and inferiority) are seen as reflecting unhealthy female development. Gilligan’s studies of girl and women’s development suggest different positive values emerge in healthy development. Connection, responsibility, and care replace autonomy, mastery  and power. Precision and Testability Erikson’s theory fails to meet the criterion of precision and testability. He defined the concept of ego to sustain sameness and continuity in the face of changing fate. Evidently the concept is extremely complex and does not readily precise measurement. Therapy/Application of Erik Erikson’s Theory Research Erikson believed that social and historical factors affect the formation of ego identity, which in turn affects the nature of the personality. One such example of the work of social factors in personality development is the women’s movement. Studies have found that most adolescent women today include a career orientation as part of their ego identity. Research in the area of identity crisis show that this stage may begin around 12 and be resolved by the time a person is 18. However, for some people, identity may not occur until as late as age 24. Erikson believed that people in the maturity and old age stage of psychosocial development spend time recalling and examining their life, accepting or regretting past choices. However one study showed no significant differences between younger adults compared to older adults in reported frequency of life reflections. However, younger people engaged in reflection to gain self-insight and find solutions to current problems, while older people used reflection of their past to evaluate their lives Play Therapy Erikson used play therapy to conduct research on his theory, focusing on what he called play construction. In his studies, boys and girls constructed a scene for an imaginary movie using dolls, toy animals, automobiles, and wooden blocks. Girls tended to build low enclosures, while boys focused on exteriors, action, and height. Based on biological differences, according to Erikson; girls build low enclosures in which people are walled in, and  boys would build towers. Research today still persists that traditional gender stereotyping between girls and boys exists. Girls typically play with dolls, jewelry, and toy kitchen implements, while boys play with trucks, soldiers, and guns. â€Å"Our greatest weakness lies in giving up. The most certain way to succeed is always to try just one more time. And anyone who has never made a mistake has never tried anything new†

Sunday, November 10, 2019

Digital Nation

Social media, handheld devices and the Internet have greatly improved the quality of life in the 21st Century. This is a good time to be alive because of all the modern forms of communication. This is the statement which I think is correct and is the main theme of the documentary â€Å"Digital Nation: Live on the Virtual Frontier. † The world is now in the age of information and highly advanced learning — specifically in the field of science and technology. It can practically be felt by almost all people in most parts of the world as the globe has become smaller and more manageable, so to speak.Communication from opposite sides of the planet – which was only possible through long distance voice calls less than two decades ago — can now happen in the blink of an eye through chat and e-mails. Education has become more advanced, information has become more readily accessible, and learning has become less rigid. Offices have now adopted new technology, some ev en setting up their virtual offices online without necessarily reporting to a regular office to work.Even military combat – which some years ago entailed much casualties – has become less risky, thanks to virtual technology. As shown in the said video, most kids these days are already trained on the computer shortly after they begin to read and write. This means that the children of today will be more equipped with technological knowledge when they reach our age. It is just amazing what the video shows where very young children can already create blogs, manipulate videos and do other high-tech stuff on the computer.This confirms what one of the interviewees in the video said that these kids are the natives in this technology, and we are mere immigrants. Some of the things they know were not taught to them but they instinctively knew how to feel their way into this environment which they readily adapted to in an effortless manner. Therefore, at the rate the standard of education is going, it is expected that the world will be more inclined to become a more technologically-dependent world in the near future.As of now, most people cannot function normally anymore without their being wired to their gadgets and/or not being online. Five or ten years ago, this was not a common scenario as there were lesser technological gadgets, devices and contraptions available, but things have changed a lot since then. These days, students at the M. I. T. who are supposed to be the most intelligent students in the U. S. have become a distracted bunch as they claim to be multi-taskers but fail at all aspects of the test given to them.Still, there is hope for these kids as they still have the academic capabilities within them – all they need is just a little adjustment from the distractions affecting them so they can be more focused on their tasks. The virtual world has also given most offices the capacity to allow their employees to work on telecommute. This m eans lesser effort and expenses for the worker to go to his/her regular job and makes work more efficient and cost-effective. This set-up would not have been possible a decade ago since work then meant reporting to the office and actual presence was needed for the 8-hour job.Furthermore, the prevalence of online jobs on the internet confirms this proclivity towards more virtual employment in the offing as the virtual environment becomes a more familiar venue for human activity. In conclusion, there are numerous advantages which have been brought about by the so-called Age of Technology, and these far outweigh the disadvantages like addiction to internet gaming, gambling and other similar problems. The future is certainly worth-anticipating as current advances in technology are already mind-blowing, hence, a higher degree of advancement will be most likely indescribable.

Internet Security Breaches

The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged.Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches. Cyber Fraud Cyber fraud can be defined as the use of software or internet services to defraud victims or taking advantage of them. This includes stealing information that is considered per sonal, in what constitutes identity theft. One of the most common forms of internet fraud entails distributing rogue security software.Internet technology has created the allowance for criminals to carry out fraudulent transactions, as well as transmit the proceeds of the frauds to other institutions. Cyber frauds occur in message boards, websites, emails and even chat rooms (Messner, 2012). Purchase fraud is an example of cyber fraud and occurs when a perpetrator proposes a business transaction to a merchant, only to use fraudulent mechanisms, such as a fake or stolen credit card, to pay for it. The eventuality is that the merchant does not receive the payment and may even be charged back for accepting credit cards.Another example of fraud is whereby theperpetrators post information about goods that they intend to sell. Interested buyers are asked to make payments for the purchase and delivery of the goods. However, it later turns out that the goods were non-existent and they had o nly been conned. The third example of cyber fraud is phishing, which is the act of masquerading as a person that can be trusted, such as bank agents or consultants, to acquire information that is sensitive, such as details of credit cards and passwords, among other details that victims may be convinced to share.Subsequently, the information offered is used for fraudulent transactions. It is argued that cyber frauds makeheadlines each day. In October 2012, Barners & Noble Inc. made announcements that several PIN keypads had been hacked in as many as its 63 outlets, leaking the card information and PIN numbers of its customers. Easy Solution is one of the companies with evolving techniques of curbing cyber frauds. The company claims to be the only one that is well placed to curb various forms of electronic fraud, clouds and premises.The company has introduced an updated version of the Detect Monitoring Services, which entails timely fraud protection, enhanced monitoring capabilities a nd enhanced fraud protection. Detect Monitoring Service software effectively monitors the behaviors and patterns associated with phishing scams. Thus, it stops the threats before they cause damage. The software comprises of a relatively simple interface that can effectively function for all forms of clouds and even premises. It is argued that of over 800, 000 phishing attacks, the service enabled the company to detect as many as 76% on timely basis, exhibiting 3.6 hours of average deactivation time. Online transactions services have been particularly affected by cyber frauds.More often than not, customers often get cautious when asked to give personal information. Online transaction service providers have only resorted to instilling confidence in the customers as a way of encouraging them. This entails displaying policies, security badges and trust certificates, as well as the contact information. Online retailers should highlight security around the websites’ secured areas t o assure customers that their confidential information is safe.This should be done, regardless of whether some browsers have security indicators built in them. Some online retailing companies, such as Amazon, display this through the use of the sign-in button. Others opt to use padlock symbols that are located in the sign-in areas. This is advisable, even when it is not needed by the customers. Online retailing companies are advised to give alternative contact options. Indeed, some companies are offering customer care support by using call backs, e-mails, and chats to enable users report suspicious activities.Data breachesData breaches includeall those cyber activities characterized by unauthorized access, use and disclosure of individuals’ or organization information over or from the internet. Malicious attacks are considered to constitute the most expensive data breach, yet they are increasing. Malicious attacks account for as significant as 40% of the data breaches where n egligence account for about 32% (In Defense of Data, 2013)Computer software companies, healthcare records and companies have been the most targeted and have accounted for as significant as 93% of the global data breaches (In Defense of Data, 2013).Network security is a necessity for every company. A company’s network cannot be said to be effective if it consists of security lapses. Threats to company's network can be considered as a subject of various activities. However, former employees who leave the company due to downsizing can be considered as a significant threat. Other activities such as a daily courier dropping packages at the company’s premises, employees travelling on company business to other cities, or building management company installing a fire extinguisher system in company’s premises are not a serious threat.It can be argued that individuals with the potential of hacking, sabotaging and damaging systems are those with familiarity to nature and f orm of network system. Therefore, an employee that left the company has the capability of hacking the company’s network since they are familiar about the loopholes in the company’s network system. What increases the possibility of hacking is,if the employees left the company due to retrenchment, the attempts of network hacking could be fueled by the whims of revenge.It is argued that all former employees that worked in the company, accessing sensitive data bases and financial documents pose a threat to the company’s security. The fact that information technology does not respond to the altering of access points act as a fueling factor. Therefore, a person with information about the company’s network system has the potential of causing more harm than a hacker. According to the 2005 CERT survey, a significant number of former employees are increasingly utilizing the opportunity.The survey indicates that about 59% of the security intrusion is done by former company’s contractors;48% of those involved in hacking had been sacked;38% had left the company due to downsizing while 7% had been retrenched. The survey also notes that former IT professionals are particularly a significant threat to data security(Hazelden Foundation, 2012). Data breaches caused by negligence could be resolved by addressing the factors associated with negligence. On the other hand, data breaches caused by malicious software could be prevented by using appropriate network intrusion, detection techniques and anti-spyware software.Technological mechanisms would include updating and altering passwords for security purposes. Network intrusion/ Hacking Network intrusion or hacking refers to the unauthorized entry into a network, often characterized by malicious ambition of intercepting information from the network or website. The information can be used for other criminal activities such as fraud or espionage. Telvent Company hacking is considered as one of the r ecent hacking events that occurred in September 2012.The company has learned that its firewall and security systems have been compromised by the attackers who installed malicious software that enabled them steal project files. Telvent, a company whose services and software are applied in monitoring energy industry reported that it has been hacked which affected its operation in United States, Spain and Canada. The incident was blamed on Chinese hacking groups opposed to Western interests (Thiel, 2012). Lately, US officials have blamed Russia and China for staging intrusion attacks against United States for espionage, economic gains and other selfish motives.In November 2012, Leon Panetta, the US Secretary of Defense, had warned that United States was about to experience a cyber-attack comparable to Pearl Harbor, blaming hacking incidents that had been linked to the Middle East and United States Oil producers (Messner, 2012). The technological intervention to network intrusion is the development of Intrusion Detection Systems (IDSs). IDSs refer to application of device or software that aims at monitoring either networks or activities of systems against activities that are either malicious or that violate policies in place.Types of IDSs include Network Intrusion Detection Systems (NIDSs) and Hot-based Intrusion Detection System (HIDS). Network Intrusion Detection System is considered as one of the most popular approaches. Network Intrusion Detection System refers to a system that is designed to detect activities that are considered malicious such as service denial attacks, port scans, as well as cracking into computers via Network Security Monitoring. NID senses the packets coming through the network and scans them in order to identify patterns that are suspected to be malicious.Such patterns can be referred to as rules or signatures. Not only NIDSis limited to scanning of the network traffic that comes into the system but, one can also find a lot of important i nformation concerning network intrusion from both local traffic and outgoing networks. More so, through NIDS, it is possible to stage attacks from the inside the network under monitoring and even a segment of the network. In this regard, such attacks are not in any way considered as incoming traffic. Usually, other various systems are incorporated to function with NIDS.The other network systems could, for instance, deal with updating the blacklists of firewalls using IP address of the computers under the use of real or suspected network crackers. NIDS consist of documentation (DISA) that utilizes ‘NID’ as a terminology with a target of distinguishing IDS that are internal from external. Just like any other IDS, NIDS comprises sensors and management console as its essential components. While management console deals with management and reporting, sensors deal with monitoring of networks. NIDS senses network intrusions through examination of network traffic.The system has the capability of monitoring multiple hosts. Usually, the access to the network traffic is gained through connection to a hub of networks, port-mirroring configured networks or even through the network taps. The NIDS sensors are situated at checkpoints of networks under monitoring. This are more often than not located in demilitarized areas or at the boarders of the network so as to increase effectiveness. All the network traffic is captured by the sensors before each of the packets’ contents are eventually analyzed for malicious network traffic.There are various examples of NIDS such as commercial products (such as ISS Realsecure, NFR Network Intrusion Detection System, Sourcefire and Computer Associates e Trust IDS) and freeware products (such as Ethereal, Snort and Tcpdump). Snort is the most common of all. NIDS should be considered as the most appropriate for organization securitybecause it ensures the greatest impact on the security of the network, takes shorter time to deploy compared to HIDS, yet it is relatively cheaper.Additionally, as long as it is placed on the outside of firewall or demilitarized zones to ensure for effectiveness, NIDS is capable of monitoring all forms of internet traffic and relays immediate feedback on the nature of network security. NIDS is very important to the general internet security. But particularly concerning the network security, NIDS is farther important to organizations in the following ways: first, NIDS has the capability of detecting attacks that HIDS cannot, for instance, fort scan and denial-of-service.Second, NIDS quickly detects and alerts on incidents of intrusion to avert maximum damage. This is particularly suited t o the demilitarized zones, considering the fact that internet providers usually situated at the zones are major computer attack targets. Third, NIDS is capable of reporting successful as well as unsuccessful attacks which is particularly essential as it offers a chance to better understand the network and hence, a key to network security enhancement. Fourth, NIDS equips organizations with knowledge regarding the environment of their network.Fifth, but for application of NIDS, it is difficult to identify network hacking. Lastly, NIDS is very important for organizations’ forensic evidence tool (Thiel, 2007). In this regard, it is not easy to tamper with the evidence unless the aggressors interfered with IDS. Launching worms Launching worms is a cybercrime that involves development of worms, also referred to as viruses, then releasing them on the internet domains. The worms slow down the internet connectivity or infect computers to stop them from functioning effectively.In 2000, FBI suspected incidents of cybercrimes being committed by the Russian citizens namely Alexey Ivanov and VasiliyGorshkov. It sought to track the suspected cyber criminals, luring them to come to United States with a ruse of a job promise (Quinlan, 2012). Activities of concocting worms and launching them on the internet are illegal in some parts of the world. As such, a person found to engage in cybercrime activities that spreads worms is likely to be prosecuted in various courts of countries affected by the worms. In some cases, the prosecution can be consecutive.However, in practice, few countries are in the position of claiming jurisdictions partly because some assume other countries would have incurred serious damages to consider it a priority to prosecute. These reflect how tricky dealing with cybercrimes across the borders is. Certain actions that are done on the internet may be legal in countries where they are initiated, but illegal in other countries that have access to the internet content. There are various recent incidents that entail virus launching. In October 2012, reports were made that FBI was to shut down a DNS as a way of containing viruses.Users were required to check their computers for virus and clean them before they could be allowed to access. These steps had been taken following the launching of the internet infestation by the DNS changer virus. The virus had cost the world billions of dollars (Quinlan, 2012). There are various technological approaches to worm problems. The most common approach is through installing anti-virus software. The antivirus software could be installed remotely on the computers, creating the allowance for all the information that streams in to be scanned for viruses.Malicious files and viruses are either blocked or repaired. Anti-virus could also be installed on the internet to scan the information that is sent over it. Websites, such as Google, are now offering such services. There are various antivirus software products on the market, including Avira, Norton and Kaspersky, which are effective in detecting and blocking malware (Nnap, 2011). Cyber bullying Cyber bullying has been cited as one of the areas that constitute internet security breaches. It entails transferring of abusesor information aimed at intimidating other people.Cyber bullying has turned out as the newest platform for which the people, especially the youth, are increasingly abusing each other. The more concerning issue is that there are currently no new appropriate techniques that intervene for cyber bullying despite the large numbers of children who have access to information and technologies. Internet and cell phone communications have been cited as tools of cyber bullying. Even more intriguing is that cyber bullying occurs during class time. Various incidents of cyber bullying have been witnessed recently.One of the cases that conspicuously featured on news headlines was of Alexis Henkel, a high school student. Henkel was charged with posting a number of anonymous and threatening messages on the internet account of one of her former classmates, who she accused of engaging in a flirt with his boyfriend (HazeldenFoundation, 2012). It has been argued that cyber bullying is particularly rampant because mos t cases are not reported. The most appropriate technological approach to addressing cyber bullying entails the application of safety tools, which facilitates content monitoring, as well as blocking.Indeed, various social sites now offer safety tools that enable users and administrators to report and block forms of communication that amount to bullying. These go hand-in-hand with the approach of instilling of ethical morals among the users, as well as enlightening the society on online safety, including ways of using online safety tools. Category of internet security Breaches Information leakageIntegrity ViolationDenial of ServiceIllegitimate use Data breaches; information stored in a website is accessed and released without authorityCyber bullying; entails sending abuses and information that undermines the integrity of other peopleWorm Launching; worms or viruses block internet access, denying the victims access to the internet. Additionally, some worms infect computers, making them malfunction. This also denies the victims access to computer services1. Internet intrusion and Hacking Hacking enables the perpetrators to access websites and use services illegitimately. 2. Cyber fraud Cyber fraud constitutes the motives of illegitimate use of internet resources