Wednesday, November 27, 2019

Is Euthanasia Morally Permissible free essay sample

Is euthanasia morally permissible? Euthanasia has been hotly debated among the general public in society for many years and it has not reached the mutual agreement in many countries yet. However, the true value of life could not be replaced by anything. If people have any wrong decision on euthanasia, it would be an irretrievable regret. I am going to analyze euthanasia with Utilitarianism, Kantian ethics, Liberalism, Confucianism and religious values. Then, I will draw a conclusion to see if euthanasia is morally permissible or not. Have you heard about the story of Pun Chai (Tang Siu-pun)? In 2001, he had sent a letter to the Hong Kong Chief Executive and the legislators to plea to be allowed to die, thus this issue sparked a debate on euthanasia. And Now, Pun Chai changed his mind and said he wants to live, but he still believes that the choice to live or die is a human right. We will write a custom essay sample on Is Euthanasia Morally Permissible or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Some of the patients plea to euthanasia, it is because they hope to get out of the pain from illness and treatment only. Just like what Pun Chai said in his letter, he wanted to die because he felt that he was lonesome, isolated, helpless and painful, he hoped to run away from these feelings. Death is not his desire but an escape from the reality. When there is another choice that can help him get rid of his loneliness; when his voice is heard and his feeling is cared, he is pleased with his life although he is still suffering from the same situation of illness. Therefore, the appeal to death is not actually the patients’ request by heart; this is just an expression of their emotions at that sorrow moment. Since these patients are undergoing a long therapy of treatment, there are fluctuations in their emotions. Under the influence of medicine, they may make a frustrated decision of euthanasia, which it is not appropriate to be considered seriously. The theory of Utilitarianism, as described by one of the most influential contributors Jeremy Bentham, was the greatest happiness or greatest felicity principle†. Some people said that euthanasia can bring happiness to the patients, and to let patients get out of pain. However, can anyone be certain that death is bringing the greatest happiness to them? Is death representing a kind of happiness to which the popular is looking forward? Will they still be happy to die if there is another way to relieve their pain and desperation? Certainly not. I think they will be much happier if they are being listened to and cared of. Pun Chai is exactly a good example. To be respected and looked after considerately; physical and psychological needs fulfilled, these bring them the greatest happiness, not the euthanasia. Bentham also emphasized that the utility action of the person must achieve the greatest pleasure for the greatest number, that is, it can benefit the most people. Some patients believe that euthanasia brings a large amount of happiness to them and their family. Are their families and friends happy to hear their death? Will their death bring any pleasure to the society? I don’t think so. On the other hand, if they still survive, they may bring some happiness to the society. Look at the example of Professor Stephen William Hawking, a famous theoretical physicist and cosmologist. He got amyotrophic lateral sclerosis, a disease which would cost him almost all neuromuscular control. Although Hawking has this â€Å"incurable† disease, he never gives up his life. He uses his knowledge and excellent achievement in Physics and Cosmology to contribute to the society and almost the whole world is benefited. In Hong Kong, Pun Chai is another model. Now, he is a volunteer to help other disabled people like him. Also, he had complained to the government about neglecting the need of disabled people. And it is successful to strive for the welfare and additional allowance to the disabled people. This shows clearly that their survival can bring greater pleasure for the greater number than their death. Some people may say that we have the right to survive, so we also have the right to die. They think this is the liberty they should have. A famous philosopher in Liberalism John Stuart Mill argued in his influential essay â€Å"On Liberty† that since the condition of liberty is the power of the individual to make choices, any choice that one might make that would deprive one of the ability to make further choices should be prevented. Thus, for Mill, selling oneself into slavery or killing oneself should be prevented in order to avoid precluding the ability to make further choices. In Kantian Ethics, Kant believed that if something is right, it is right in all situations. Likewise, if something is wrong, it is wrong in all situations. Faced the issue of euthanasia, a Kantian would consider it as an act of murder. So, killing people is always wrong, this contradicts Kantian Ethics. Based on the idea of Confucianism, â€Å"Our bodies are subject to parents, we dare not harm it, it is a beginning of filial piety. †( ). Our bodies are born by our parents, and thus our bodies are not only belonged to ourselves but also our parents; if we hurt ourselves, it is totally against the principle of Hsiao. Loving our parents is the starting point before we extend to love other people. That is the most important virtue of Confucianism because it is the first virtue that we would develop. Let us look at euthanasia in a religious view. In Christianity and Catholicism, everyone is responsible for his life before God who has given it to him. It is God who remains the sovereign Master of life. We are obliged to accept life gratefully and preserve it for his honor and the salvation of our souls. We are stewards, not owners, of the life God has entrusted to us. It is not ours to dispose of. Euthanasia which is a kind of suicide contradicts the natural inclination of the human being to preserve and perpetuate his life. It is gravely contrary to the just love of self. It likewise offends love of neighbor because it unjustly breaks the ties of solidarity with family, nation, and other human societies to which we continue to have obligations. Euthanasia is contrary to love for the living God. It is seriously contrary to justice, hope, and charity. It is forbidden by the sixth commandment mentioned in the Holy Bible, â€Å"Thou shalt not kill†. It also violated the fifth commandment â€Å"Honor thy father and thy mother† since euthanasia is a grief to the parents. In Buddhism, one of the Five Precepts is â€Å"Do not kill†. One must not deliberately kill any living creatures, either by committing the act oneself, instructing others to kill, or approving of or participating in act of killing. It is a respect to others lives. In observing this precept, one must try to protect life whenever possible. Euthanasia is a destruction of life and should be refrained. In Hinduism, murdering ones own body is considered equally sinful as murdering another. Islam views suicide strictly as sinful and detrimental to ones spiritual journey; any person who dies by suicide and shows no regret for his wrongdoing will spend an eternity in hell, re-enacting the act by which he took his own life. Judaism views suicide as one of the most serious of sins. Suicide has always been forbidden by Jewish law. Hence, we can see that euthanasia which is a kind of suicide is prohibited in almost every religion. Besides, some interviews showed that those would-be suicides when saved and comforted by their family or friends would not attempt suicide again. Moreover, they started new lives and found the lives more meaningful. Some of them even volunteer to persuade others to treasure the lives. That means, those people are not really hope to die, they want to get the concerns and love from their family and friends only. Comparing with those people who plan for euthanasia, they have the same purpose; they want the concerns from others, too. They just want to reduce the bad feeling of sickness instead of death. According to Dr. Edwin Shneidman in his book â€Å"The Suicidal Mind† published in 1996, he stated that the purpose of suicide is to seek a solution, to illustrate the pain at the core of suicide, and to isolate the common stressor in suicide: frustrated psychological needs. He also said that suicide is an exclusively human response to extreme psychological pain, a lonely and desperate solution for the sufferer who can no longer see any alternatives. Therefore, what people really need and want is not death but a solution to their problems. And we should try to provide an alternative to them other than put them to death. Listed by Professor Robert F. Port of Indiana University in his study â€Å"Possible Human Instincts†, humans probably have instincts to sustenance, sex, defense, sociality, know/learn and talk. In short, these are instincts to survive than die. Humans who wanted to die may be in an abnormal mental state, such as influenced by depression or anxiety. Since this action is irrational and violating the instincts of human, accepting their decision of euthanasia is absurd. In Maslows Hierarchy, the first and second basic human needs are physiological and safety needs, those are basic needs to survive. The other three are belonging, self-esteem and self-actualization needs. Obviously, since these three needs are not fulfilled, patients lose the intention to live. So, even if they asked for euthanasia, what we should do is to perceive and help them to meet the needs on which they currently focused; then they will thank us for assistance in meeting their present needs rather than blaming us not helping them to die. On the other hand, the role of doctor is to heal not to kill. â€Å"The Oath of Hippocrates†, declares that â€Å"I will not give a lethal drug to anyone if I am asked, nor will I advise such a plan†. The ability of physicians is to prescribe the best for the patient, not to harm them. In the â€Å"The Oath of Hippocrates†, it never sanctioned euthanasia which violated the belief, value and the practice of doctor. Moreover, how can we define an â€Å"incurable† disease? One disease is â€Å"incurable† today, but it may become curable tomorrow. No one can foresee or predict what will happen in the future. New medications and therapies are innovated everyday. Smallpox is once a mortal disease and it is now completely eliminated. Leprosy is incurable in the past and now the patient can recover completely after a 12-month treatment. Hence, if a patient knows that there is a way to cure their disease, will they still plea to euthanasia?

Sunday, November 24, 2019

Jane Eyre Settings Essay Example

Jane Eyre Settings Essay Example Jane Eyre Settings Essay Jane Eyre Settings Essay Jane Eyre Essay Jane Eyre, a Gothic novel by Charlotte Bronte, tells a story of a beauty and a beast. Jane Eyre grows up an orphaned girl in Victorian England who does not know love in her cruel aunts household; after a few years her aunt sends her to a school where they abuse Jane further. After spending eight years as a student of Lowood and two as a teacher, she takes a nanny position where she meets Mr. Rochester, and sparks begin to fly. Bronte divides Janes story into three significant sections, which have a different effect on Janes life as seen at Gateshead, Lowood, and Thornfield . Janes spends her early life in the clutches of her aunt in Gateshead, a house that Jane experiences most of her loveless years in. After leaving the merciless Gateshead, Jane comes to Lowood School expecting little, but while there she begins to experience her first taste of love, mixed with unkindness from the insufferable Mr. Brocklehurst. Having learned and endured much, Jane arrives at Thornfield looking forward to her next life of servitude; however, while at Thornfield, her life takes a turn for the better, finally granting her the happiness she deserves all these years. Gateshead, Lowood, and Thornfield have a significant role in Jane Eyres life, they all impact her as a person importantly, each in a different way. Gateshead hosts an unloving family that do nothing but hurt Jane, Lowood is a school that practices rigid and harsh rules but allows Jane to experience love for the first time, and Thornfield has the biggest impact on Jane, giving her to have a happy ending. Jane Eyre, an abused, neglected, unloved orphan sent to three very different places over the course of her predominantly unhappy life; each place affects her greatly, and each for an extremely different reason.

Thursday, November 21, 2019

Technology Evaluation and Recommendation Research Paper - 2

Technology Evaluation and Recommendation - Research Paper Example Information Security Project Plan There are many differences between physical security, and information security. Information security is concept that entangles most aspects of the society, majorly because of the ubiquitous adoption of computing technology in the modern world. In our daily lives, we use computers at work place for our employers, play on computers in homes, study online, do business, and check emails, and so on. The level of development in the modern world has greatly improved especially with the increased rate of innovation, and growing technology. Everyone in the modern world is impressed at how the level of technology is increasing so fast because they benefit from it in very many different ways (Matford & Whitman, 2012). Owing to the fact that most people have the urge to make things easier in the modern world, everyone is turning towards the direction of Information technology because online seems to be the future of everyone, and everything. The web is viewed as the future of most activities in the world today since currently it serves as a very useful tool even though it also has some intimidating proposition. Although technology enables more productivity and allows access to much information, it also carries a lot of security issues. Employers preserve information about their companies, employees, and other important documents on the computer systems. Banks also store vital information on money transaction between them, and other clients. One of the most common challenges in the modern technology world is hacking, and piracy. When someone hacks information about a company, then this leaves the company in danger of either breaking down or losing credibility from the public that it serves because this interferes with its reputation, and competitors can take advantage of this situation. Employers can lose millions of dollars, and suffer damage of reputation, face legal prosecution through system configuration when hackers accesses personall y identifiable data. These issues are more common in the media, and they have disturbing regularity (Matford & Whitman, 2012). The rapid growth of technology brings many security issues, and this means that security standards need to be put in place with effective implementation. When discussing security issues, it is often helpful to use a model that has a baseline or foundation. This provides consistent concepts, and set of terminologies, which professionals can refer to when security issues arise. Information security has three primary concepts that are confidentiality, integrity, and availability triad since it focuses on security in relation to available data. Concept of confidentiality is similar but not the same as privacy. This component entails protecting data from those who are unauthorized to view it. One of the best examples of implementation of concept of confidentiality is when a person goes to the ATM to withdraw money; he or she is very keen on maintaining, and prote cting the account number, and card pin number. This is how simple concept of confidentiality operates (Matford & Whitman, 2012). This concept of information security goes hand in hand with that of physical security because the idea of confidentiality is still applicable in many ways. With the rapid expansion of global networks through interconnecting information systems in the modern

Wednesday, November 20, 2019

Pre-Proposal Research Proposal Example | Topics and Well Written Essays - 1000 words

Pre- - Research Proposal Example The project will aim at educate students through training programs and environmental campaigns. Various environmental topics such as waste management and energy conservation will be focused on. The target of the project will be to plant 500 tree seedlings and to educate more than 5000 students. Different varieties of trees will be planted. The trainings will be facilitated by experts in the field of environment and will target 50 students per training session. Facilitators will only focus on environmental issues. Trainings will enhance environmental sustainability since students will be able to apply what they will learn. Concerning campaigns, two campaigns will be conducted each month. The campaigns are expected to bring various benefits to the population of Arizona. For instance, they will change students’ perceptions on various environmental issues as well as enhance students’ commitment towards practices that enhance environmental protection. The project will aim at utilizing the efforts of volunteers to ensure the outlined activities are implemented in an efficient and timely manner. Themes of the campaigns will incorporate issues to do with waste management and energy conservation. The project will positively impact sustainability at the university through enhancing environmental awareness and conservation as well as promoting environmental unity. 2. Stakeholders: Different groups of people will aid in the implementation process of this project. They will contribute to its success either directly or indirectly. The first group of people will be the board members of the University of Arizona. They will support the project through decision making. They will provide consent for implementation of various project activities. They will also decide where trees will be planted. The input of lecturers from the School of Natural Resources and Environment, as

Sunday, November 17, 2019

Structure Of The Human Powered Aircraft And The Industry Literature review

Structure Of The Human Powered Aircraft And The Industry - Literature review Example 1 – 5). Thus, a capacity for flying over the longest possible distance on limited power available from humans is a critical measure of performance for small human powered aircraft and jump type hang gliders, which must maintain a low weight while ensuring a degree of stability, safety, controllability and structural soundness. Because one of the largest weight components of an aircraft is its primary structure, the proper design of aircraft structure for human powered aircraft and hang gliders remains a challenge that decides about the success or failure of a design. The appropriate design flight conditions and the structural loads caused by a flight are variable and not immediately apparent, with flight regime and manoeuvring requirements placing additional demands on aircraft structures. Thus, for hundreds of years, if not thousands, the idea of man-powered flight has inspired many brave men to design strange contraptions with which to rival the birds (Grosser, 2004, Pp. xvi i – xix). The International Worthing Birdman Competition is an annual event held in the picturesque Worthing Town, located on England’s South Coast that encourages creativity in design and innovation for human powered / glider type flying machines (Worthing Birdman, 2011,† Worthing International Birdman Festival†). ... Because of the limitations imposed on designs of aircraft that are eligible to participate in the Worthing International Birdman Festival, no single entry to date has succeeded in gliding over the required 100 m distance. This literature review presents an examination of designs for human powered aircraft and hang gliders that will most likely present a winning entry for the Worthing International Birdman Festival. An emphasis exists for deciding about the structure of the aircraft, and the literature review should appeal to all those with an interest in human powered aircraft and gliders. Because Para gliders are gliders with no rigid form and only a simple fabric wing, with a pilot attached to the wing with high-strength cords, these designs cannot meet the specifications mentioned for the Worthing International Birdman Festival (Demand Media, 2011, â€Å"What Are Three Different Glider Designs?†). The length of the high-strength cords in a Para glider design connected to th e pilot will not permit pilots to travel far after a jump from the pier before they land in the sea. Thus, this literature review only considers hang gliders and other human powered type structures, excluding human powered helicopters (which do not have a wingspan) that are more likely to provide a pilot with the maximum height to travel before landing in the sea to present a win in the competition. It is important to note that human powered helicopters must lift the weight of the human and power engine as well as the weight of the entire aircraft structure to demand exceptionally large and lightweight rotary wings that present great complexities to render such

Friday, November 15, 2019

Installation And Configuration Of Honeyd Computer Science Essay

Installation And Configuration Of Honeyd Computer Science Essay As an Open Source solution honeyd does not offer any support or Graphical User Interface for installation or configuration. The source code should be downloaded on the honeyd host, get compiled and the binary and configuration files of honeyd be installed. Then the Honeyd binary file could be run from the command line prompt of the Linux system used. A second more efficient way is to install the Honeyd package as root with the command: sudo apt-get install honeyd To function correctly, honeyd requires also the following libraries to be installed: libevent: a software library providing asynchronous notification for events libnet: a portable framework/library used for network packet construction libpcap: a framework used for capturing packets passing through a network Honeyd comes with numerous scripts written in the script languages Python and Perl by both NielsProvos and other contributors which can be used to emulate services on the appropriate ports in the virtual honeypots. Although installing and running honeyd might seem quite simple, it is a particularly complicated software tool with a range of command line parameters affecting its behavior. After being correctly installed on our system, the following command is used to start honeyd: honeyd -p /etc/honeyd/nmap.prints -d -f /etc/honeyd/honeyd_thesis.conf In the following, the above parameters used are explained in detail [1]. The first command honeyd instructs the Linux kernel to execute the honeyd binary file. The -p fingerprints option gives the pathname of the Nmap fingerprint file (here: nmap.prints) which contains the Nmap signature database that honeyd uses to emulate different operating systems at the network stack. This will dictate how honeyd will behave towards attackers depending on the emulated operating system. The -d flag allows honeyd to run in debug mode with all the messages getting printed on the current terminal. This mode can be useful when testing honeyd and its functionality on the fly. Omitting this flag will cause honeyd to run as a daemon process in the background. Another important command line parameter which is not used above is the -i flag. This flag is used when the computer system hosting the virtual honeypots has more than one network interfaces. In this case, the -i flag should be used to denote which interface or interfaces will be the ones receiving network traffic for the virtual honeypots. Finally, the -f command line parameter is probably the most important one as it lies at the heart of the honeyd configuration. The -f flag gives honeyd the path name for the configuration file (here: honeyd_thesis.conf) where all information about the virtual honeypots are kept such as which operating systems are used and which services should be emulated on each honeypot. Honeyds configuration file is a simple straightforward text-based file with a context-free-grammar configuration language which can be described in Backus-Naur Form (BNF). Although quite straightforward, it offers a wide variety of options when it comes to configuring the virtual honeypots. Its main role is to specify which are the IP addresses on which the virtual hosts will be running waiting for the attackers probes and what services should be emulated on each one of them. Templates constitute the core of the configuration files for virtual honeypots [3]. Honeyd works via the creation of templates which describe and simulate specific computer systems configured in great detail. The first step taken to create a virtual honeypot is to create a corresponding template which will specify the defining characteristics of the honeypot like the simulated operating system, the ports on which the honeypot will listen and the services being emulated. After that, an IP address will be assigned to the template bringing up the honeypot and operating at that specific network address. The command to create a new template is create and the parameter entered should be a name relative to the system intended to be simulated. Each template should have a different name. A different parameter that can be used is the default one. This can be used in case honeyd does not find any template matching the destination IP address of a packet and it is preferred when there is a need f or assigning a group of IP addresses under a common template rather than assigning each template to a unique address. Following the creation of a template, the configuration commands define how the virtual honeypot will behave. The set and add commands are used to shape the behavior of the configured honeypot. The first characteristic to be defined by the set command is the operating system or personality from the Nmapfingerprint database which will dictate how the computer system will behave at the IP network stack. The personality indicates the form of the responses honeyd will be sending back along with other details such as the TCP sequence numbers, the TCP timestamps and other. It can be chosen from a great number and variety of famous operating systems like Linux, FreeBSD, Mac OS, Microsoft Windows, Cisco IOS, etc. The set command can also determine the default behavior of the template regarding the supported network protocols (TCP, UDP, ICMP), i.e. how the template reacts to probes at ports which are unassigned. The action taken can include three options: Open: this signifies that all ports for the particular network protocol are open by default. This setting applies only to TCP and UDP connections Block: this indicates that the ports will ignore any incoming connections and packets directed to them will be dropped by default. Reset: this means that all ports for the specified protocol are closed by default. For a TCP port, honeyd will reply with a TCP RST packet to a SYN packet whereas for a UDP port with a UDP-port unreachable message. Finally, honeyd gives the option to spoof the uptime of a host, referring to the duration of time since the system was first booted. The set uptime command does exactly that. If no uptime is defined, honeyd assumes an arbitrary value up to 20 days. Following the set command is the add set of commands. The add commands constitute the center of the template as they are the ones which signify what applications will be running on each port and which are the services that can be remotely accessed by the outside world. The syntax of the add command requires to specify the network protocol, the number of the port and an appropriate action. As we see in the above configuration, the options open, block and reset that are used for the default behavior of the template can also be used on a per-port basis. The important difference here is that apart from just opening or closing ports, predefined scripts can be called and emulate different services on different ports. This possibility of integrating scripts written in programming languages within the honeyd configuration gives virtual honeypots a high degree of realism. A realistic service to which an adversary can talk can grant much more detailed information about an attacker. Apparently, the more scripts running on ports, the higher the possibilities for interacting with attackers. The following example from our configuration file starts a telnet simulator service for TCP connections on port 23: add Linux1 tcp port 23 /usr/share/honeyd/scripts /unix/linux/suse8.0/telnetd.sh When a remote hosts attempts to establish connection with the above Linux1 template-personality on port 23, honeyd will initiate a new process executing the shell script ./telnetd.sh. The script is receiving input data via stdin and it is sending replies back to the sender via its stdout. Apart from TCP connections, scripts can also be used to interact with remote users through UDP connections. Important to mention is that when honeyd receives a new connection on one of its honeypots port, it forks (starts) a new process which will execute the specified script. This can be at times quite risky as it can lead to a performance bottleneck if the virtual honeypots get overwhelmed with network traffic, e.g. if deployed in a busy network [1]. The last command which should be implemented to configure successfully the virtual honeypot is the bind command whose role is to bind the created template with the IP address on which it will be operating virtually. The Ethernet option for the set command can be used to assign explicitly a unique MAC address to each configured template. As mentioned earlier, physical addresses are essential for network communication and via proxy ARP the honeyd host can reply with its own MAC address to the ARP requests regarding the honeypots. A disadvantage of this is that attackers can easily realize the existence of virtual machines as all the IP addresses of the honeypots will relate to one MAC address. Using the set ethernet command, this risk is wiped out and no need for configuring proxy ARP exists as honeyd takes care of all the ARP procedures [1]. Attention should be given to avoid any MAC address collisions when assigning them to the virtual hosts, as physical addresses should be unique for every system. 2.2.5. Honeyd Logging Information Gathering The Honeyd framework comes with a built-in mechanism for gathering information regarding the connection attempts launched from adversaries targeting the virtual honeypots. Honeyd has the ability to populate files with log information for both connection attempts by attackers and established connections for all protocols. The command used to log the network activity concerning the virtual honeypots is the following: [emailprotected]:/etc/honeypot$ honeyd -p /etc/honeyd/nmap.prints -d -f /etc/honeyd/honeyd_thesis.conf -l thesis.log The -l command line option enables the packet-level logging in honeyd. It only takes one parameter and this is the log file that will be used to create the connection logs. In this case, the log filethesis.log. It is important that the directory in which the log file resides, should have the permission to be writable by the user who is running honeyd. The log file contains information about the time a connection was attempted, the source IP address and port of the attacker attempting to connect, the destination IP address and port of the virtual honeypot under attack, the protocol involved and if the attempt is successful and the connection eventually establishes, the starting and ending point of the connection in time along with other information like the total number of bytes transmitted. The packet-level log files can be extremely useful when used in combination with data mining tools. They can offer a great deal of helpful information regarding the connection attempts launched by adversaries. Scripts written in Perl, Python or other programming languages can extract useful information and statistics from the log files such as the number of IP addresses probing our virtual honeypots on a daily basis, a list with the most common ports to be attacked and other data giving an insight on the scanning activity of the virtual hosts from the potential attackers. This kind of log files can get extremely large over time and care should be taken regarding the processing capabilities of the data mining tools used in each case. Apart from packet-level logging, the option for service-level logging is also provisioned by honeyd [1]. Whereas packet-level logging gives a general view of the overall network traffic handled by the virtual honeypots, service-level log files give a more detailed view on the ongoing sessions. When scripts emulating services on different ports are used in honeypots and these scripts have additional logging capabilities, a great deal of interesting information can be attained about the attackers activities and methods they use to take a system under their control. 2.2.6. Significance of Honeyd As an Open Source low-interaction honeypot, honeyd introduces a great range of interesting features as those were mentioned previously. Being an Open Source software tool indicates that its distribution is free and anyone can have access to the source code [3]. This means that individuals and groups belonging to the network security community can customize and contribute to its source code adding more emulated services which will improve the interaction level between the attacker and the virtual honeypots providing us with even more information about the methods they use to break into systems. Over the next years we can expect an exponential rise in our ability to capture malicious behavior via honeyd. On the other hand, being an Open Source solution, honeyd does not offer any support for maintenance or troubleshooting from an official source. As a low-interaction honeypot honeyd is basically deployed as a production honeypot used to detect and capture network attacks. No real complete operating system is offered but adversaries are limited to the network services emulated by the scripts. As such, honeyd introduces a low risk to organizations for their overall security when introduced [3]. A recognized by the attacker honeypot becomes useless, so camouflaging honeyd is an issue that should be addressed. Xinwen Fu et al. have shown that an adversary can fingerprint honeyd through measuring the latency of the links simulated and proposed a camouflaged honeyd capable of behaving like its surrounding network environment []. Another issue to be addressed is the scripts emulating network services in honeyd. These need to be written by hand and as a result not so many scripts exist. CorradoLeita et al. have proposed a method which can alleviate this issue by automatically creating new scripts []. Finally, the fact that no alerting built-in mechanism exists in honeyd as well as that only command-line interface is offered are two shortcomings of its design. Chao-His Yeh et al. in their work have proposed a Graphical User Interface (GUI) for honeyd offering a variety of interesting features []. 2.3. Dionaea Dionaea [] is an open source low interaction honeypot that can be further categorized into the class of malware collector honeypots. The aim of these low interaction honeypots is to create vulnerabilities on specific services, in order to attract malware exploiting the network and if possible, capture and download a copy of the malware. As nowadays the number of malware attacks is increasing, these copies could be very useful for monitoring and analyzing in a safe environment the behavior of a malware and finding defending security solutions. In literature, two ways of malware analysis have been proposed [], static and dynamic analysis. As their names suggest, static analysis is simply the procedure of reading the code and trying to figure out the intention of the malware, while dynamic analysis includes the execution of the code of malware in a secure manner. Usually, these two types of analysis are combined and the output of the static analysis can be very useful for the dynamic one. The collected malware copies are usually stored in the form of a binary file. Malware collectors such as Dionaea can download a great amount of binaries although in most cases these files may represent the same malware. A binary should have different MD5 hash in order to be characterized as unique []. From the perspective of detection, two types have been proposed: detection of existing malware based on patterns or samples and zero-day detection schemes. Zero-day malware is defined as a malicious software which is not detected by anti-virus programs due to lack of existing virus signatures or other malware detection techniques []. Dionaea is usually referred as Nepenthes [] successor. The main improvements on the features of the new malware collector compared to Nepenthes include [18]: the protocol implementation in python scripting language the use of libemu library for shell code detection instead of pattern matching which requires a copy of the shell code, thus making extremely hard the detection of zero-day malware support for ipv6 addresses and TLS encryption development of the VOIP module 2.3.1. Features of Dionaea As mentioned above, Dionaea developers used python to implement the network protocols. This selection allows for an easier implementation compared to C language for instance. However, the main reason for this choice was to deal with the new generation of malware that utilize API to access services. SMB is the basic protocol supported by Dionaea. The SMB (Server Message Block) protocol works on port 445 [] and is used from Windows operating systems for file and printer sharing over TCP. Akamais [] internet report for the second and third quarter of 2012 (figure 3), shows that port 445 was the most targeted port at this period, as it attracted almost one third of the total network attack traffic. Attack-traffic-of-top-ports.jpg Figure . Percentage of global internet attack traffic during the 2nd and 3rd quarter of 2012, by targeted ports [24] The SMB protocol has known vulnerabilities and it is a common target especially for worms. That is the reason for which it has been selected by the developers of Dionaea as the main protocol and, as it will be shown in the following chapter, most of the captured copies of malware originated from that port. Other important protocols that Dionaea supports are the following: HTTP and secure HTTP (HTTPS) are also supported on port 80 FTP, although the possibility of an attack to an ftp service is rather low.Dionaea supports ftp protocol on port 21. It implements an ftp server which can create directories and also upload/download files TFTP, tftp server is provided on port 69 and is implemented to check the udp connection code MSSQL, Dionaea also emulates a Microsoft SQL server on port 1433. Attackers are able to login to the server but as there is no real database provided by Dionaea, there is no further interaction MYSQL, Dionaea also implements Mysql wire stream protocol on port 3306 SIP, as mentioned above a new module for supporting VOIP was added to Dionaea. The VoIP protocol implemented is SIP. The operation of this module consists in waiting for incoming SIP messages, logging all data and replying accordingly to the requests. Only when malicious messages are detected, Dionaea passes the code to the emulation engine. 2.3.2. Operation of Dionaea The main function of Dionaea is to detect and analyze the offered payload of the attacker in order to gain a copy of the malware. To succeed this, Dionaea offers different ways of interaction with the attacker. For example, it can provide a command prompt cmd.exe window to the attacker and react accordingly to the input commands or use the URLDownloadToFileapi to get a file through http. If the previous operation is successful, Dionaea should know the location of the file that the attacker tries to send and attempts to download the file. One very interesting feature of Dionaea is that it can send the downloaded file to a third party for further analysis than simply storing it on disk. Dionaea is also a great monitoring tool. It records all the activities on the ports it listens but also keeps record of connections to other ports. All these recorded data are kept in a log file in text format. Although we can choose the format of the log file, for instance filter the log messages or sort the events from the most recent to the least recent ones, it is still quite difficult to read and gain useful information. Therefore, Dionaea creates ansqlite database with all the recorded activities and makes it easier for the user to make queries and obtain useful information from the honeypot. From the log file we can retrieve useful data to understand the operation of the honeypot. Dionaea records three types of connections: reject, accept and connect. Connection attempts to the ports that Dionaea does not listen are marked as reject. On the other hand, attempts to monitored ports are marked as either connect or accept. In any case, Dionaea records in the log file and additionally in the sqlite database, valuable information about these connections such as the timestamp of the connection, the IP addresses of the local and remote host and the corresponding ports and protocols. Except of the information about the connections, Dionaea also keeps in database other significant tables such as download tables which contain information about the id of the connection, the url from which the malware was downloaded and also the downloaded md5 hash. 2.3.3. Installation and Configuration of Dionaea The installation of Dionaea requires some basic knowledge of Linux operating systems, as it is important to install all the required dependencies first but there are useful and detailed instructions in the official home page too. Dionaea is a flexible software tool and can be easily configured according to our needs by editing the configuration file. More specifically, in the configuration file we can edit the following: We can change the directory of the log file and more importantly we can reduce the amount of the produced data. By default, Dionaea records every event in the log file. We can filter the output data by changing the levels value from all to only warning, error for example. Dionaea writes the last event at the end of the log file. Thus, it is really useful to rotate this behavior in logging section, so that the last event can be read directly at the first line of the log file. Moreover, we can modify the path of the downloaded binaries and bi-streams folders. Bi-directional streams allow us to replay an attack that Dionaea captured on IP-level. As we mentioned above, with Dionaea we can submit directly the downloaded malware to third parties for further analysis. In the submit section of the configuration file, we can edit all these details. One more interesting feature is that we can manually configure the IP range that Dionaea can listen to and also add ipv6 addresses. By default, Dionaea listens to all the IP addresses it can find. Finally, we can configure the modules section which is considered the most significant of the configuration files. The modules section includes a list of services which Dionaea supports and we can enable or disable some of them. For instance, we can enable and edit the pcap module if we want to keep information about rejected connection attempts or additionally, if we are interested in the operating system of the attackers, we can enable the p0f service. 2.4. Kippo Kippo [] is a medium interaction honeypot which emulates an SSH server. It provides an interaction shell to the intruder while monitoring and recording all the activities. Furthermore, it is designed to monitor brute force attacks. Secure shell (SSH) [] is a network protocol which provides encrypted communication between two devices. SSH allows users to gain access to remote devices through a shell or interactive command line in a secure manner. The port used by SSH protocol by default is 22 [23]. In most cases, a client can access an SSH server by entering a valid username and password through an SSH client tool. From that perspective, SSH servers are vulnerable to password attacks. Especially SSH dictionary or brute force attacks are very common and quite easy to be launched even by unqualified attackers. These types of attacks are based on the fact that many users choose their credentials from a small domain []. Thus, brute force attacks try all the possible username and password combinations until the correct one is found, in an automated way. This attribute could be very useful for SSH server honeypot implementations. In order to have as many successful logins as possible in our SSH honeypot, it is preferred to choose credentials that rely on automated dictionary attack tools. Ciscos white paper about SSH login activity [] shows that for a total of approximately 1,56 million login attempts, username root was used almost in 35 percent of all cases. The following figure depicts the 10 most used usernames according to the results of the research conducted by Cisco. cisco.jpg Figure . Top 10 attempted usernames [28] In addition, other surveys [],[ ] give some interesting information about the most commonly used passwords in connection attempts. The top password combinations include variations of the username such as username or username123 and passwords like 123456 or even password. The results about the usernames used are almost the same like the ones in Ciscos research. 2.4.1. Features of Kippo Kippo is implemented in python language. As we mentioned above, Kippo basically emulates an SSH server on port 22 and logs all login attempts to that port. Whenever a login is successful, Kippo monitors all the input commands of the attacker and replies to these commands in order to convince the attacker that she interacts with a real system. A list of the available commands can be found in Kippos directory. More specifically, the features of Kippo include: a fake file system. The attacker can add or remove files with the appropriate command Kippo saves files that have been downloaded by the attacker with the command wget, in a specific secured folder Kippo gives the ability to the attacker to add fake file contents, using for example the cat command provides fake output for some specific commands such as vi, useradd, etc. tries to fool the attacker with some reactions to specific commands, for instance exit command does not work, which means that the attacker thinks that has disconnected but still can be monitored by kippo. all the sessions are recorded and can be easily replayed with the initial timestamps all records are kept in an sql database. 2.4.2. Operation of Kippo Kippo records all the useful information in a log file but also in ansql database. The main tables of the database include: authentication table, containing information about the login attempt, the timestamp of the attempt and also the usernames and passwords that have been used client table, which contains information about the SSH client version that has been used input table, with information about the input commands that have been entered. Also, in that table we have information about the session id, the timestamp and additionally if the command was successful or not sessions table, containing information about the id of the connection, the duration and timestamp of the connection and the IP address of the attacker sensors table providing information about the ssh server and the IP address of the host finally, the ttylog table which, as mentioned above, contains information about how to replay sessions with the corresponding timestamps 2.4.3. Installation and Configuration of Kippo The installation of Kippo is quite easy if someone follows the instructions of the home page and installs the latest version of the software. In the configuration file of Kippo we can customize the honeypot according to our needs. We can edit the IP of the host if we want to change the default which is 0.0.0.0 and also the listening port which is by default 2222. Port 2222 is an alternate port and may be quite useful for testing purposes but as long as most ssh attacks are detected on port 22, this choice would reduce the number of recorded attempts. Thus, it is necessary to change the default port to 22. To succeed this, we need root privileges to the system but this is not recommended due to security reasons. Instead, port redirection can be used as proposed in Kippos home page or by using other existing solutions, such as authbind []. In addition, in the configuration file we can change the name of the user in the interaction shell. By default, it is sales, which is quite attractive to attackers. Furthermore, we can set the desired password for our server. By default, it is 123456 which as we have shown above, it is included in dictionary attacks and could guarantee a large number of successful logins. Besides that, Kippo creates a dedicated password database, where we can add more valid passwords. Also, some other configurations include the directories of important folders such as the downloaded folder, a fake file system folder and password and input data storage folders. Finally, we can edit the credentials in order to connect Kippo log files with the sql database

Tuesday, November 12, 2019

Integration Paper

ON-THE-JOB TRANING at JR AND R DISTRIBUTORS, INC. In Partial Fulfillment of the Requirements for Bachelor of Science in Information Technology Submitted by: Dilag, Mary Grace S. Submitted to: Juville C. Ranises November 12, 2012 I. Table of Contents I. II. III. IV. Table of Contents Brief History/ Background of the Company/ Company Profile Summary of the OJT Experience Assessment of the OJT/Practicum Program A. New Knowledge, attitudes, and skills acquired B. Theories actually seen in practice C. Feedback that can be given to the company or institution D. Benefits gained E. Problems Encountered Related reading: Theories Actually Seen in PracticeV. Appendices A. Company brochure and/ or pamphlet B. Copy of Endorsement Letter C. Copy of the Training Plan D. Copy of the signed Waiver Form E. Daily Time Record F. Quarterly Performance Appraisal Form G. Certificate of Completion 2 I. BRIEF HISTORY, BACKGROUND OF THE COMPANY/COMPANY PROFILE ? History JR&R Distributors, Inc. was established in March 1993 and appointed as the Authorized Distributor of Procter & Gamble Philippines, Inc. for the CAMANAVA (Caloocan, Malabon, Navotas & Valenzuela) area. It began its business with eight (8) delivery vans and a working capital of Php 10M a month.At the same time, it consisted of manpower of 20. Four months after, it was awarded the Novaliches and Quezon City Area. In April 2001, the area of Bulacan was given to JR&R. Since then, the company has continued to expand. Today, JR&R stands as one of the biggest Procter & Gamble distributors in the country. Its working capital has increased to Php 150M with a manpower complement of over 1,000 employees and operates with one hundred twenty-four (124) delivery vans and trucks. ? Work Values The company believes that good values provide a strong â€Å"backbone† to a growing company. The ompany supports values to guide all employees in maintaining high standards of ethical conduct and behavior. These values are: ? HONESTY – being truthful and â€Å"up front† with our co-workers, customers, communities and shareholders. ? INTEGRITY – saying what we mean and meaning what we say; delivering what we promise; standing for what is right. ? RESPECT – treating one another with fairness and dignity; appreciating the unique abilities and strengths of the individual and the advantages of diversity. ? TRUST – building team spirit and confidence by communicating openly and honestly and delivering our promises. RESPONSIBILITY – taking the initiative to speak up and report concerns regarding ethical conduct and to seek reliable guidance when in doubt. ? CITIZENSHIP AND PATRIOTISM – obeying the laws of the land and taking an active role in making the communities where we operate better. ? Teamwork at JR & R The Company values TEAM relationship among employees regardless of rank. The Company believes that employees work together in harmony to accomplish given responsibilities and that everyone strives to maintain and be a part of the organization in the attainment of INDUSTRIAL PEACE.As a member of the TEAM, every employee exerts his best efforts for the company to achieve active leadership in the industry, something that every employee would be proud of. 4 ? JR & R Distributors, Inc. Vision We are the undisputed leader in our area of responsibility in terms of market share and profitable volume growth. Our business processes and customer service are most preferred by our customers over that of internal and external competitors. We continue to lead in current best approaches and innovate on best practices for effectiveness and efficiency.We are the envy of our peers, competitors and customers in our manner and level of business results. We are an organization of world class employees. Our success lies in the ownership of our people on core processes and results. Our employees can handle multiple tasks and responsibilities. Our sustainable growth comes from our drive to continually improve and excel. Our people are highly motivated and well compensated for their business and personal contribution to the company. Financial leadership is our key strength. We excel in using financial data to plan, analyze and improve our business.We are the benchmark for cost efficiency in the industry. Our expertise in cost management allows us to reinvest long term and improve our employees’ standard of living and increase our leadership share in the market. Together, we are the No. 1 Distributor always in all ways. III. SUMMARY OF THE OJT EXPERIENCE Fin ally my 486 hours of OJT is finally done. For a month and a half I learned a lot of things. I had my OJT at JR & R Distributors Inc, at first it’s hard for me to wake up too early and ride all alone to office and specially riding a bus but as time goes by my body is now used to my daily routine.On our first day we had our orientation where we talked about the history of the company, the people behind its success, the policies, benefits, codes of conducts, etc. And then Ma’am Louise route us to the whole company for us to be familiar with the place, she introduced us to the whole group of Human Resource Department and as well as to the other department and companies that are under the JR and R Distributors Group of Companies. And also this is the first time that we met our buddy in the office the PHOTOCOPY MACHINE! Ma’am Regine is the one who taught us the do’s and don’ts of the machine.What I learned and experience during OJT is that talent alone i s not enough. It is important, but it is no guarantee of success. One must also be hard-working and should practice self-discipline. Sacrifice is important, too. I learned how to love my job and all the staffs. I learned to appreciate the work given to me. I was so dedicated that I do all my best to give correct service but sometimes there were errors. 6 For me on-the-job training gives us a taste of the real world–a glimpse of what lies ahead after we graduate.I’ve been too caught up with work as if I were actually a regular employee of the company and as if I were being compensated for my work. I guess it comes with the territory of being a/an practicum, OJT, intern. I would have preferred it to be this way though rather than doing nothing at all or being made as gophers. If there’s anything that I’ve learned to do, more than anything else, it’s enhancing my communication skills and enhancing my skills in the field of Information Technology. I ki nd of feel proud of myself. I started out with nothing and worried as hell that I wouldn’t be able to do the job.In sum, the whole OJT experience wasn’t as bad as I thought it would be. In fact, the 486 hours was a breeze except for those days when I had a hard time waking up, when traffic was really bad and when I was feeling lazy and out of it. Going to work and seeing some friendly faces helped a great deal. Having to do OJT with friends made it a whole lot easier for me. Furthermore, I’m very grateful that they expose me so much on what I must know regarding the work which suits my course. I’m very thankful that they treat me like them and they trust me with my work.I appreciate so much the working environment I had within the company because it helps me absorbed what I need to know. IV. ASSESSMENT OF THE OJT /PRACTICUM PROGRAM A. New knowledge, attitudes, and skills acquired We learned how to interact with different people and how to be more flexible and how to be more responsible when it comes to our duties specially in monitoring the system, we also learned how to used different software applications used by our company. B. Theories actually seen in practice A Marketing and Information Technology theory is always what we seen. C.Feedback that can be given to the company or institution Working in JR and R Distributors, Inc. Company is a great experience, working with my co workers is not that much pressure and they also provide a allowance for their OJT trainee. 8 D. Benefits gained Experience is gained through time. The longer I do something the more I learn. The faster I gain knowledge & become a productive employee. I become more familiar with interpersonal relationships, networking, responsibility and the importance of interdependence within the working environment and I provided with job experience, an invaluable asset for achieving gainful employment.E. Problems encountered Making mistake on my first day is so embarrassi ng and during On-the-job training is that you have to get along with the employees. You have to know them better. And in technical part we encountered down system. V. APPENDICES A. Company Brochure and/or pamphlet 10 B. Endorsement Letter C. Training Plan D. Waiver Form 12 D. Waiver Form E. Daily Time Record 14 16 F. Appraisal Form 18 G. Certificate of Completion

Sunday, November 10, 2019

An Educational Counseling Research Proposal Essay

Abstract Educational counseling and guidance on the basis of the effects brought about by the media on the learner is essential in the proper development of personality and behavior. Due to the fact that learning process can be measured by the behavior exhibited by an individual, it can be considered as the main indication in the research conducted. The aim of the research is to determine the possible effects of the entertainment media such as television and computers on the development of aggressive behavior of the learner. Upon the determination of such data seek possible methods of guidance. Effect can be studied based on the results of a quantitative educational research that covers 100 students, 6 to 16 years old both male and female, undertaken through survey research. Introduction There are different ways of learning which can be used and applied in educational process. The knowledge on the effective learning techniques can be considered as an essential factor to be able to attain the goals of education. The different types of learning process guide the educators on the most effective ways of attaining the goals which is learning. Included in the types of learning techniques are the behavioral influences brought about by the different factors in the society. One of the most influential factors in the development of the learner is the media. In the behaviorist point of view in lined with the scientific study of Pavlov and Skinner that behavior is a measurable concept in learning process (Griffin, Holford, and Jarvis, 2003). Thus, on the perception of the effects of media on the learner, one of the ways in the determination of the influencing effects of the mass media is through the behavior being shown by the learner. This is similar to the target learning process. Anderson and Collins (1988) have pointed out that television has an impact not only in children’s pre-pubescent behavior but can also affect adolescent behavior. The main goal of the study is to determine the effects of the media on the behavior of the learner and ultimately present educational counseling methods suitable to manage behavioral problems that are developed, particularly aggressive behavior. There is growing concern regarding increasing aggression and violent behavior among children and adolescents this past decade and media is has been one of the factors being Juvenile delinquency has been increasing progressively not only in number but also in gravity (Snieckute, 2004) The shall be undertaken through the synergy of the library-based and the observation and experimental research that will focus on the effects of the media such as television and related information tools on the development of the different aspects of the personality of the individual. The research is in-lined with the possible behavioral problems that can be expressed by the individuals under study. The study of the development of aggressiveness and violent actions as an effect of media in the development of the personality and behavior of the learner is important due to the fact that majority of he study surmised that the media is one of the major causes of the problems in behavior of the learner as a whole. More children are gaining access and are being exposed to media without or with deficient parental supervision and depend on television as their primary form of entertainment and information (Walma van der Molen & van der Voort, 1999) This is due to the fact that observation and imitation of the situations in the surroundings is also an effective informal teacher not only cognitively but most especially on the behavioral aspect (Sylwester, 2005). Thus, the behavior of an individual can be both an influential factor that teaches other people and at the same time an indication of the person’s learning. To establish the effects of the media to the learner, researches conducted prior to this study will be surveyed and assessed. The background study will enable the establishment of concepts, prevailing theories and other current research investigations on the influence of media as part of the experimental study, an in-depth analysis of the results of the research survey will be one of the primary objectives The purpose of the study is to be able to determine the validity of television exposure as a major cause of the development of aggressive behavior among children. The objective will be achieved through the research both library-based and qualitative data gathering on the behavior influences of the group. The results of previous studies will be assessed and incorporated into the current research to establish the degree of influence of television to aggression in children. The proposed paper aims to answer the following key questions: †¢ Why is there concern regarding the development of aggressive behavior among juveniles or minors specifically ages 6 to 16 years old in relation to the exposure to media? †¢ What television practices or programming are critical in influencing behavior among juveniles or minors specifically ages 6 to 16 years old? †¢ What are the long term implications to the individuals and society of the development of early aggressive behavior among the test group? In line with the aim to test the hypothesis that the violence presented by the media specifically the television has significant effects on the development of the behavior of the children that can cause concern to educational guidance as well as regarding the detrimental effects of the media such as television to the behavior of the learner, theories on the psychological and behavioral norms serves as the bases for the divergence of attitudes and for the identification of deviant behavior that can cause alarm and leads to actions related to educational counseling. Review of Related Literature The proposed study is on the basis of the behaviorist approach to education. In this principle, learning can be measured by the observable traits and behaviors of the individual. The behaviorist point of view depicts the importance of expression of a person in the determination of a successful learning process. One of the most important is the process of conditioning that can be applied through the process (Griffin, Holford, and Jarvis, 2003). Another key concept that is related to the course of this study is the theories on conditioning. Conditioning that can be explained as the exposure to different affective factors in the environment that can affect both the cognitive and behavioral aspects of development. In the study of Sylwester (2005), it was discussed that learning is greatly affected by the emotions and attention capacity of an individual. In this case it can be identified that young children become more attracted to the television and the computer rather than any forms and tools of learning. According to Walma van der Molen and van der Voort (1999), children today retain more information form television viewing compared to reading. A critical concept presented in the study is the theory that television is catering more to the fact that children tend to be attracted to â€Å"changing environments† and more suited to the learning styles (visual and aural), a competency that Media has as strength (American Association of School Administrators, 1991; â€Å"Learning Styles†, 2006). The main concern that arises in relation to the behavioral influences brought about by these types of influences is the fact that television and computer games can present violence that can be imitated by the children and are subject to very little control within most homes. Based on the same study, it was presented that due to the fact that the development is composed of both the physiological and behavioral, education can also cause development of the brain (Sylwester, 2005). The study presented a scientific and physiological approach on the changes associated with the influences of the media to the children. The television and other forms of media were presented with fair treatment, presenting both the perceived advantages and disadvantages were presented. Based on the study conducted by Barker and Petley (2001), concern regarding media content is in relation to the behavior of the children is based on the effects of the programs shown in the television especially those that show violence. Although many studies have expressed such notion, based on the study, there is no convincing evidence that points and measures the interrelationship between the two. The researches argue that violence in the televisions has no direct relationship to the changes in behavior of an individual. The access to computer and the internet was surmised to have a very influential role in the development of the children. Like television, the internet and computers have provided new opportunities and realities for learning and education. Also included in the benefits that can be incurred is the development of children are cognitive improvement and communication skills. On the other hand, such freedom to be able to access the computer can greatly effect the possible behavior of the learners when exposed to violence, pornographic materials and other factors that has negative effects (Cleon and Cho, 2005). One of the conventional studies on the effects of media was presented by Johnson (2005). Based on this study, the computer games can bring about the development of analytical skills of children. The skills that can be developed are the problem-solving and logical skills. Various methodologies that can be applied in the course of the study as well flexibility of reference can be utilized. However, a systematic research should be employed to assess and analyze in the involvement and the effects of the media on the knowledge acquisition and cognitive skills of the children (Livingstone, 2004) Procedures To be able to achieve the projected results of the study, different procedure are needed to be employed. The target of the research to be conducted is to determine the effects that can be attributed to the forms of media such as the television and computers. This can be achieved through the employment of the synergy of the different methods of research. Included in the attainment of the educational research there are essential steps that are taken into consideration. The limitations of the study, the planning phase of the research process, and the decision on the most effective research technique to be undertaken are the primary considerations (Cohen, Manion, and Morrison, 2000). †¢ Document/ Study Research The library-cased research focuses on the studies conducted by contemporary researchers on the basis of concepts presented. This can be considered as the qualitative part of the research process that will be the basis of the analysis on the experimental study that will be undertaken (Cohen, Manion, and Morrison, 2000). An online research or related document will serve as another reference assessment method but also as a benchmark of the research to be conducted. Comparison and Contrast of existing and recently conducted researches will be assessed for their implications. †¢ The Experimental Research The experimental part of the research have two main objective: to assess the degree of aggressive behavior that can be attributed to exposure to television and computer games and to determine the specific content, elements or features that can be directly related to aggressive behavior. o Participants The inclusion criteria in the study are the minor students and learners that are between 6 to 16 years old. These are individuals that are exposed to the television and computer technology. ï‚ § Demography †¢ Equal distribution of male and females †¢ Age range is between 6-16 years of age †¢ Currently enrolled in public schools that incorporate television and computers into their curricula †¢ Participants must have access both to computer gaming or entertainment and television †¢ Have significant exposure to television and computer entertainment, minimum of 1 hour daily exposure or total of 7 hours exposure in a week. ï‚ § Psychographics †¢ Must not be pre-diagnosed with any atypical behavioral conditions †¢ View television and computers as primary sources of information, entertainment or distraction †¢ Has no strong opinion regarding the influence of television and computers to his behavior o Number The ideal number of subjects that will be used in the study is 100 randomly selected from the individuals that are chosen on the basis of the inclusion criteria such as age and the exposure to the television or computer. o Instrumentation The study will make use of the survey process specifically questionnaires for the determination of the opinions of the parents on the exposure of the children to the specified forms of media. The objective is to quantify the responses given by the sample population. The method targets the characteristic or issue of interest by soliciting answers through directed questions. Responses are recorded, measured, organized and analysed to be able to come up with the output. o Sampling Process The primary step required is the preparation of the questionnaires that is needed to elicit from the subjects information necessary to accomplish the objectives of the study. Questionnaire will be made to meet closely readability levels as needed by respondents. Randomization will be employed to be able to acquire the quality of the research results. Data gathering will follow validation of responses until number or samples needed are reached. o Validation and valuation The validity can be achieved though the validation techniques employed in the statistical sampling of random samples. Respondent’s validation will be done using demographic and psychographic criteria. Response validation will be indicated through successful accomplishment of survey forms. Valuation of sampling will be conducted through statistical analysis. Correlation analysis and significance testing will be conducted to establish the actual influence levels of television and computer to aggressive behavior and their impact to aggressiveness as a behavior respectively. †¢ Ethical Considerations The aims and the objective of the survey research are not to implicate any form of media to crimes or delinquencies but to be able to assess the viability of the theories on their influence to aggressive behavior developed by children. To be able to undertake such projects permission is sought from the sample population as well as their understanding of the objectives and procedure of the study. Consent from the parents or guardians and all other pertinent authorities must be acquired to facilitate the validity of the study as well as protect the interest of the participants. Results Results of the preliminary investigation showed the possible ways to determine the reasons for the concern of the public regarding the behavioral problems that is encountered. The preliminary research presents the overview of the possible justification of concern on the development of aggressive behavior of the children. The integration of contextual library-based and survey research will be presented to determine the validity of hypotheses and its pursuit as a further study. Discussion Based on the gathered data from initial research that was undertaken, a larger part of the population perceive the media as having as a negative influence only on behavior instead of it being a direct cause of behavioral problems in children and adolescents. Literature that showed the television, computer and other electronic visual media can contribute to learning, social orientation and perceptions but are not reflective or indicative of behavior for individuals The concern on the level of exposure to violence and pornography without the guidance of responsible educators, parents and guardians of young children Is considered as the most critical and urgent. Although there is cause for public concern regarding its content and control, the lobby is for responsible programming and reviews rather that greater restriction of limitation of access. References American Association of School Administrators (1991). Learning Styles: Putting Research and Common Sense into Practice. Arlington, VA: American Association of School Administrators Anderson, D., & Collins, P. (1988). The impact on children’s education: Television’s influence on cognitive development. Washington, DC: U.S. Department of Education, Office of Educational Research and Improvement. Barker, M. and Petley, J (2001). Ill Effects: The Media/Violence Debate. New York: Routledge. Cleon, HJ and Cho, CH. (2005) Children’s Exposure to Negative Internet Content: Effects of Family Context. Journal of Broadcasting & Electronic Media, 49 (4), p. 488. Cohen, L. Manion, L. and Morrison, K. (2000). Research Methods in Education. London: Routledge. Davis, J. (2002) Types of research methods. Psychological Research Methods 2. Retrieved on October 1, 2006 from http://www.naropa.edu/faculty/johndavis/prm2/types1.html. Griffin, C., Holford, J. & Jarvis, P. (2003). The Theory & Practice of Learning. London: Kogan Page. Johnson, S. (2005). Everything bad is good for you: How today’s popular culture is actually making us smarter. New York: Riverhead Books. Livingstone, S. (2004) A commentary on the research evidence regarding the effects of food promotion on children. Prepared for the Research Department of the Office of Communication, Department of Media and Communication. London: London School of Economics and Political Science. Snieckute, Marija (2004). Juvenile delinquency and the Family. Retrieved on October 1, 2006 from http://www.sociumas.lt/Eng/Nr16/nepilnameciai.asp Sylwester, R. (2005). How to explain a brain: An educator’s handbook of brain terms and cognitive process. Thousand Oaks, CA: Corwin Press. Walma van der Molen, Juliette H. and van der Voort Tom H.A (1999). Children Remember More from Television Than Reading. Retrieved on October 1, 2006 from http://www.selfhelpmagazine.com/articles/child_behavior/kidsntv.htm Appendix 1. Age _________ 2. Sex _________ 3. Are you married? _________ 4. Do you have children? _________ 5. Do you have school children? _________ (Refers to school children age 6 – 16 years old only) 6. Are they watching TV almost everyday? _________ 7. How many hours spent in watching TV everyday? _________ 8. Having hard time in stopping them to watch TV? _________ 9. Do they sleep late at night because of TV? _________ 10. Are they committing invalid absences frequently? _________ 12. Do you think too much time in watching TV is the cause of this? _________ 13. Do you think their grades are good, maintained and not going down? ________ 14. Did they normally pass all the subjects? _________ 15. Do you get feedback that they are sleepy in the class session? _________ 16. Do they prefer TV than basketball or other sports? _________

Friday, November 8, 2019

natural resources of the u.s essays

natural resources of the u.s essays Natural Resources of the United States We should be very proud to live in the United States. Our country has a vast variety of natural resources which we enjoy each and every day. This countrys natural resources lay in a delicate balance. If we interrupt this balance, we could destroy nature, our prosperity, or the world. Natural resources such as coal, natural gas, oil, and water are critical to our existance as a people. For example, our homes are heated by precious natural gas, our automobiles are fueled by gas as well. Coal and oil are raw materials with which we make other materials. Finally, water has always been vital to us each day in more ways than we realize. We need to drink clean water. Our culture uses water to clean, wash, and lubricate. The countrys natural resources have been present in the earth since the beginning of time. In the very top layer of the earth, we find most of the earths natural resources. These include water, plants, wood, and animals. Just below the earths surface we find minerals, such as gypsum, magnesium, peat and iron ore. We use these raw materials to combine with other minerals or metals to produce some of the worlds finest products. Special minerals such as gold, silver, and diamonds are nestled deeper down in the earths crust. Precious natural resources found in the bottom of the earths crust in- clude, oil, gas, and coal which we use for fuel. As one would guess, much of our nations natural resources are located in the great state of Texas. Texas is the nations wealthiest mineral producer. The economy is dominated by the abundant energy resources. The state is the leading U.S. source of natural gas and second largest U.S. oil producer. Other important minerals include helium, salt, sulfur, sodium sulfate, and clays. Major industries include oil refining and the manufacture of machinery, transportation equip...

Wednesday, November 6, 2019

Art for Life essays

Art for Life essays The reintroduction to the arts in the curriculum has been a slow process with many detours along the way. It has also been compared to Gardners theory of multiple intelligences in this way: Three important truths are woven together in Gardners characteristically perceptive trope. First is the encouraging fact that, now, schoolteachers, college professors, administrators, artists, critics, art historians, aestheticians and others, are combining their talents and techniques in an effort to strengthen American art education. Second is the discouraging fact that these par-ties, like those in any new ensemble, are having difficulty in achieving harmony. And third is the practical truth that their own judgment as to what works best will not be the final arbiter of their success. (Moore, p.5) Throughout history, art has brought people together and was considered a great contribu-tion, but my research brought me to this statement: What I want to stress here is not how we are connected to the past, but how strongly we are disconnected. For practical purposes current art instruction doesnt involve a fixed curriculum, a hierarchy of genres, a sequence of courses, a coherent body of knowledge, or a unified theory of practice. (Elkins, p.38) Elkins shows his concern for the lack of stability and instruction in schools regarding art based programs. The arts should be an integral part of the school curriculum from kindergarten through high school graduation. Children should be exposed to original ways of thinking and imagina-tion. They should be allowed to study sculpture, painting, journalism, dance, any for of self-expression that involves creative thinking. However, society has been reduced to relying on computer games and television for their entertainment. Children no longer sit down with cray-ons and paper to draw their rendition of a giraffe in the jungle. Instead, tel...

Sunday, November 3, 2019

Malcolm X's realization of self identity Essay Example | Topics and Well Written Essays - 500 words

Malcolm X's realization of self identity - Essay Example I understand Malcolm considered him as a black person right from his childhood. His imposing struggle to become a spokesman was always discouraged by the societal benefit enjoyed by the white community. You know, it is an example of the present day’s America. As you know well, when diplomacy fails, there is war; that is what happened to this man. Continuous rehearsal of humiliating events took him to the verge of reacting violently. And you know, as a result of this incident, he turned a rebel and started exhibiting a deviant behavior against anything he disliked. As an argument line I believe that his life resembled a Russian roulette game. Expectation of a good turn out from any endeavor is the right of every individual. He evaluated the priorities of the society and found that he must be white or of a fighting nature to stand against the inequalities in the society. I mean, Malcolm was transforming himself to be a governor of the consolidated feelings of the depressed black minds. I would like to give emphasize to the fact that Malcolm strongly opposed the white’s control of education and occupation. With his struggles for upholding the prestige and rights of the black, he took chances of risking his life. He never feared the impact of failure; success or failure seemed same to him. His objective of the fight was as solid as his thoughts. I think, he encouraged the indigenous equality claims of the black, because, the topography of American soil had become a stage for the white actors to demonstrate the cruel ways of discriminating the black. Let me consider Malcolm’s life in the prison for that longer term as a reformative time for him. He confronted questions about his color of his kin and hair. A white in the jail was a jinx across his life path. He had to apply himself, to the toxic conditions that people created with the uncontrolled use of chemicals to dye hair. Looking like a white was much more essential to survive on the

Friday, November 1, 2019

Critical appraisal two research studies Essay Example | Topics and Well Written Essays - 3000 words

Critical appraisal two research studies - Essay Example The second article, Simon John Palfrey man tends to get on the psychological state of the patients, trying to clinically establishing the expectations and reasons for patients, seeking the treatment. Thus these are two papers are from the same field, though of different tradition and aim. The first paper is essentially based on quantitative research where the paradigms or testing ground would be parameters like reliability and validity while the second one is a qualitative research that would need analysis of different parameters like the researcher’s reflexity, the context in which the research took place, selection of research participants, etc. This essay critically evaluates the paper in terms of research design and their potential contribution towards effective practice, encompassing the concerned ethical and political issues. The agenda is to travel further down the concept and try to establish the barriers for implementing research in the workplace and the effective means of overcoming it. Thus to effectively analyze the research paper it becomes important to understand the background of the condition described, followed by abstract of the papers to be reviewed and their critical analysis. Varicose veins are enlarged veins that appears swollen and elevated above the skin surface. They are distinctly visible not just because of their twisted and bulging look but also their color wich can be dark purple or blue. Usually found on the backs of the calves or inside of the legs, the valves in the veins permitting the blood flow towards the heart stops functioning properly. This leads to development of blood pools in the veins causing them to dilate.Around 1 out of 2 people over the age of 50 suffer from varicose veins and is more commonly observed in women than men. Hemorrhoids or commonly known as piles are also a type of varicose vein. Proper exercise, losing obesity, elevating the legs while resting and not crossing legs while