Saturday, August 31, 2019

John Proctor †The Crucible Essay

   Supporting this claim further are several lines from Miller’s pre-introductory notes; â€Å"His [Putnam’s] vindictive nature was demonstrated long before witchcraft began. † Not only does this reinforce our trust within the character of John Proctor, it always creates a likeness within him in the mind of the audience. Miller strives to achieve this more-so through Proctor’s defense of his absent wife to Abigail who aims to smite her; â€Å"You’ll speak nothin’ of Elizabeth! † This is due to the fact loyalty is an undisputable likeable trait. The moment our emotions towards John Proctor are challenged lay upon his treating of his housemaid upon the warrant of his wife to be arrested. Proctor handles her violently, though it is somewhat partially excused due to its honest aim: to free his wife. Thus, the challenging of our sympathetic yet simultaneously self-righteous attitude to Proctor, only succeeds in strengthening it, through the apparent pardoning of his actions for their good intentions. It becomes apparent the good moral of John Proctor, within his decision to risk the definite pardon of his wife in order to aim to release his fellow innocent towns folk during the court scene of the play; â€Å"I – I think I cannot. † Ironically, this portrays Proctor as one of the only Puritan’s of the play, as he strives to surpass his own greed, in strive to clear his conscience and do what is best for the village. His true Puritan values are also apparent earlier in the play when he suggests his uttermost disgust at Reverend Parris’ indulgence of â€Å"golden candlesticks. † Likewise, Proctors morality influences his decision to inform the court of his lechery with Abigail Williams. For this reason, Proctor rises even further in our levels of admiration. â€Å"I have known her, sir I have known her. † This line signifies Proctors fulfillment of complete morality, as he confesses his sins in hope to release innocent victims. Proctor becomes somewhat heroic at this point, as lechery is a highly punishable crime at these times. The final bout in which Proctor reaches our highest admiration comes at the end of the play, when he decides he would rather face hanging, than lying in the face of God. This selfless deed is what separates Proctor from the rest of the townspeople. His morality proves unrivalled, after several hints at its strength earlier in the play, such as his earlier converses with his wife upon his affair with Abigail, in which he becomes irritable at his wives judgment, despite her making almost no mention of it. This hints that Proctor has simply not forgiven himself for this deed, and rather than face the fact would rather put its blame upon someone else. Despite this, his character becomes arguably a martyr towards the deformation and destruction of the witch trials, as they seemingly dissolve after his death proves example to many others. Perhaps Miller may be comparing himself to the admirable character of Proctor. Through their both almost unjustified prejudice, Proctor for his lack of faith in the Puritan system, and Miller for his satirical outlook on capitalism. For this reason, perhaps Miller is justifying his actions to not confide the American Federal government at a later date, throughout his comparison of it to something quite revolutionary (the desolation of persecution. )

Friday, August 30, 2019

Analyzing Sherman Alexie’s “Superman and me” Essay

Can reading save a man’s way of life? Can reading save an entire culture? Sherman Alexie, an Indian creative writer writes an essay of which he acquaints us of his means in learning how to read, that is, through a Superman comic book. The essay was written in an alternating first person and third person style of telling. The first person way of telling was for his reflection. Those sentences that were written in the first person were Alexie’s own sentiments. The third person style was for his people. Probably it was meant as an insult since people who normally speak in a third person style are often deemed unintelligent since they cannot follow the rules of language. As the essays retells the experience of the author of how he learned how to read, there is one topic of which he focused, and that is how reading (and how it is connected to education) made a different impact in his way of life which can be very significant or relevant to the modern world today whose kids are taking education for granted. Reading and education Reading is a cognitive process of connecting meaning to a group of words, sentences, and letters. Not many can take the time to discipline themselves into liking and having reading as a habit but over the years reading has become a standard of calling a person or treating a person literate. It has become a mean to elevate one’s status. However, based on Sherman Alexie’s essay, knowing how to read downgrades the status of an Indian person. Indians are treated as the Native Americans. They weren’t treated kindly as the natives of the new world as history tells. They were often treated as the group of people who struggles with the advancement of life. People who are not social. If Indians were compared to animals, the Indians were the wild animals. And according to Alexie’s essay, the ones who stays wild, are the ones who’s status are high in the Indian world. In the modern world today, education has been treated as one of the major concerns of nations. More and more, the value and the quality of education have gone low and people in advance nations and culture are taking it for granted. On the other hand, Alexie and his dad are examples of people who defy the norms of their own society. People who counteracts their culture thus forming a kind a heroic act or in times a crime for/to their own people. â€Å"I am trying to save our lives. † (Alexie 2). Alexie expressed his sentiment of saving their lives in two styles. One was personal and the other was towards the children he was teaching. While he defied the accustomed treatment of Indians to non-Indian education (i. e. how he had man arguments with his classmates to shut up his mouth towards the questions of the non-Indian teacher), he was hopeful that his people might change their attitude towards education (the reason why he ought to be a teacher among his people). In some ways, education defines how a person hopes for his worth. It is more than the status, it also creating an opportunity for one’s self and knowing how to use education in helping one feel fulfilled.

Thursday, August 29, 2019

Juvenile Justice Essay Example | Topics and Well Written Essays - 500 words - 1

Juvenile Justice - Essay Example As a result it is at times difficult to understand the need for additional programs which are labeled as promising programs. These programs do not have the established record of delinquency prevention that the model programs do and must rely on data that is not always based in success but in the potential for success. The National Gang Center defines a promising program as the following. â€Å"Level 3 programs display a strong theoretical base and have been demonstrated to prevent delinquency and other child and youthful problems or to reduce risk factors or enhance protective factors using limited research methods (with at least single-group pretreatment and post treatment measurements). The programs in this category appear promising but must be confirmed using more rigorous scientific techniques. The main reason is that a control group is not required in the research design.† (Programs) Some of the available programs range from community based rehabilitation programs to prev ention based educational programs. The benefits of working programs are readily quantifiable however; they still must be proven to become model programs for future approaches. The process by which programs become model programs can be plagued with research problems as each researcher tends to have varying views as to what works and what does not.

Wednesday, August 28, 2019

Power and limitations of Intranets, extranets, e-collaboration tools Essay

Power and limitations of Intranets, extranets, e-collaboration tools and portals - Essay Example Power and limitations of Intranets, extranets, e-collaboration tools and portals This study aims at providing a comparison and contrast of extranets, intranets, portals, and e-collaboration power and limitations. An understanding of the power and limitations of each of these connectivity tools will be handy in connectivity decision-making for businesses and individuals. The power and limitations will also aid in making a Decision on having a combination of the internet connectivity tools or a single one depending on the use and number of users. An intranet is internal company network using internet standards and software with the Internet standards including HTML, HTTP, and TCP/IP Protocols. Authorized persons have access to the intranet limiting information from being accessed by people outside the company with employees and management forming the main users of the intranet. Security layers allowing the optimum functioning of the intranet include firewall and public key security and encryption key for external and internal security respectively. An intranet is a powerful tool allowing the achievement of certain aims in an organization. The intranet provides an information distribution channel where employees access work instructions, templates, documents, and tools for efficient work performance on a single platform. Details of departments, colleagues, and even subsidiaries are also available on the intranet providing employees an easy platform to contact and communicate with colleagues and share knowledge and resources fo r better work performance.

Tuesday, August 27, 2019

Saudi Arabia profile Essay Example | Topics and Well Written Essays - 500 words

Saudi Arabia profile - Essay Example As in the case of many other Middle Eastern countries, majority of the land area are deserts with some rugged mountains in the southwest. Hot and humid climatic conditions prevail in Saudi throughout a year with an exception of only few months. 78.8% literacy is reported in Saudi as per the 2010 statistics. Saudi males are more literate (84.7%) than Saudi females (70.8%). Infant mortality rate is 11.57 deaths/1,000 live births according to the 2010 statistics. Women dominate in life expectancy rates in Saudi with 78 years against 74 years of the males. More than 35% of the Saudi workforce are from foreign countries and service sector is the major revenue source in Saudi (63%) followed by industry (25%) and agriculture (12%). 2010 statistics show that GDP of Saudi is $623 billion and annual growth rate is 3.8%. Per capita of Saudi population is one among the bests in the world with an attractive figure of $24,200. Gold and oil are the major natural resources or revenue sources of Saudi. Before the discovery of oil sources in Middle East, gold mining and fishing were some of the major revenue sources of Saudi. Hydrocarbons, uranium, coal, phosphate, and tungsten are some other natural resources of Saudi Arabia. Surface water sources provide 10% of the Saudi’s drinking needs whereas 84% provides by ground water sources. Desalinated seawater not only used for the drinking needs (5%), but also for generating electric power. Even though the climatic conditions are not so good for agriculture, dates, grains and vegetables are cultivated at some parts of Saudi Arabia. As in the case of majority of the other Middle Eastern countries, export of petroleum products is the major revenue source of Saudi Arabia. Petroleum and petroleum products export of Saudi worth around $253 billion whereas its imports (manufactured goods, transportation equipment, clothing and textiles, processed

Monday, August 26, 2019

Case study Example | Topics and Well Written Essays - 500 words - 75

Case Study Example This a big problem because when such data is shared and introduced over a network it usually becomes easy for an attacker to gain delicate information like credit and debit card numbers, passwords that is previously stored in our operating systems. Another issue that comes is that the operating systems provided by Windows do not supply dependable firewalls to prevent the hacking of our operating systems. And another problem is the security policies provided by the Windows operating systems. The security standards that are already provided are not good and the safety policy settings and the password schemes are not strong and are quite vulnerable. The data encryption by the Windows operating systems is also not good and is quite feeble and also there are no tough encryption schemes or standards in place. (Gibson, 2011) These issues and problems can become a problem for us as the information of our company, the company’s employees and the company’s customers are at a risk and if any information is leaked than it might become a problem for us and disrepute our company. I have a got a few good ideas that can make the company overcome these issues and problems with ease. Windows has already faced such problems in the past and has up graded there latest operating systems overcoming these problems and issues. There latest server version Windows Server 2008 RC2 includes many solutions for such problems. These solutions and upgrades are very impressive and I have already tested them with my own self and believe that the company should also upgrades it’s operating systems and servers in to this current operating thus making the company’s, it’s clients and its employees important data to be secure. The upgrades in the server include the Server Manager for managing security components. This upgrade provides help for managing, installing and configuring server roles and the features that are

Sunday, August 25, 2019

The Big Sleep Movie Review Example | Topics and Well Written Essays - 1000 words

The Big Sleep - Movie Review Example The detective is a cynical, smart, professional investigator who mouths witty dialogues and works on cases, on being hired. The man who hires the detective is rather old and fragile in exercising his courage and efforts to put an end to the troublesome threat calls. The old man's daughters are extremely good looking girls, who are thoroughly spoilt and headstrong. There also lies a suspicious side to the older daughter, besides some other dubious characters of the novel. All this constitute the typical characterization based on the Hard-Boiled formula. c. Setting: The setting of the novel is again typically Hard-Boiled. The first few scenes showcase the encounter of the detective with the person who proposes to hire him. This takes place in a rather rich, gloomy huge bungalow, which gives the introductory feeling into the storyline consisting of a mystery and subsequently, a detective solving it. Later, the setting shifts to one oppressive crime scene to another, which mark the collection of clues and solving of the case. "...winding down curved rain swept streets, under the steady drip of trees, past lighted windows in big houses in ghostly enormous grounds, vague clusters of eaves and gables and lighted windows high on the hillside, remote and inaccessible, like witch houses in a forest. I came out at a service station glaring with wasted light, where a bored attendant in a white cap and a dark blue windbreaker sat on a stool, inside the steamed glass, reading a paper... on a night like this you could grow a beard waiting for a taxi." Label the characteristics in the passage. a. The above lines are written in first person, which is a characteristic of the Hard-Boiled formula. b. The detective is the speaker or narrator, here, which again is typical of the Hard-Boiled genre. c. The detailing is rather precise with vivid and picturesque descriptions, following a rhythmic pattern of speech, which is how Hard-Boiled specialist writers write. d. We get an insight into the lighting of the whole setup, which is dark, gloomy with occasional neon lighting. This, again, is a characteristic of the Hard-Boiled formula. e. The last line, "on a night like this you could grow a beard waiting for a taxi." Is rather witty and a wise cracking, which is the characteristic linguistic style used by the characters of the Hard-Boiled fiction formula. Do you think the above passage you've copied is well-written Why or why notPersonally, I feel the above passage is written quite well. It gives the reader very picturesque details and descriptions which helps him/her imagine and follow the occurrences effectively. The fictitious novel is not a visual medium and therefore, descriptions help readers imagine the scene beautifully and the writer has succeeded in this. Following the lines of description, the writer is wise enough to break the monotony

Saturday, August 24, 2019

Organization theory and design Essay Example | Topics and Well Written Essays - 1500 words - 1

Organization theory and design - Essay Example In this aspect, any active organization has a specific structure that fits needs; the other role of organizational structure is facilitating efficiency through allocation of roles and responsibilities. The arrangement of different organizational activities also promotes efficiency as well as efficacy in production. The concept of organizational culture has been studied in various fields such as anthropology as well as sociology on a wide perspective. However, from these studies, no clear meaning of organizational culture has been provided; despite the lack of a clear meaning, several definitions have been provided such as: A set of commonly comprehended issues that an organization’s actions are undertaken, for instance; a form of language that applies to a specific organization. On the other hand, other social scientists have also described organizational culture as a benchmark formulated to perceive things, a system of skills commonly applied in an organization to promote evaluation of issues and processes. In addition, organizational culture plays a significant role by promoting reconceptualization of issues and process in different sectors: That is, to enhance the understanding of various stakeholders and the important role their organizations play within the society. It also enables stakeholders to a gain a deeper understanding of their goals, objectives as well as determining ways in which they relate to one another within and outside the organization. Organizational design, specifically organizational structure plays a key role in promoting the success of any organization. Poor organizational structure i.e. inappropriate methods of duties allocation, inappropriate methodologies applied to guide the flow of resources. Moreover, organization culture also plays a crucial role by promoting proper relationships among workers hence creating a harmonious working environment

Folkloreterm paper on capoeira Term Example | Topics and Well Written Essays - 2500 words

Folkloreterm on capoeira - Term Paper Example This style is known today as Capoeira and reflects much of the Brazilian culture. This paper explores the rituals of Capoeira, revisits the history of the martial art and the country it originated from, takes a look the cultural aspect of the art, and explains the relevance of Capoeira to the style that is practiced today in the United States. The Ritual One of the interesting parts of this style of training is that the students usually learn to sing and play an instrument as a part of their training and development in Capoeira. Songs are sang in Brazilian Portuguese, which is why students are encourage to learn at least a basic understanding of the language. According to Lucia Viti (2003), the songs are used to set the pace of the fight. Chanting and clapping are also used to create rhythm and add excitement to the class. Some fights are aggressive and exciting, while others are low and intertwined. Capoeira contains a wide range of musical instruments used to mediate the mood or fe el of the class and widen the skills of the practitioner, particularly the advanced students. Some of the instruments allowed and commonly used in Capoeira are the drums, agogos, tambourines, berimbaus, the ago-ago, known in the United States as a cowbell. ... The Breakdown of the Classes, Fights, and Events The class is often broken down into two sections. In the first section of the class, the students are working on their technique, warming up, and learning concepts about the game. In the second section, the students get together as a group and form a ring. Two students are chosen to step inside the ring and perform. These students engage in a non-violent fight where they display their skill to the group. The other members of the group, still forming a ring, chant and sing while the two in the middle fight. The participants can be male or female and sometimes they are pitted against each other. To begin, the opponents squat down low to the ground to shake hands with each other. The ginga, or the swing, is the most basic move in and more or less the fighter’s stance. This would be equivalent to the sparring stance in Taekwondo or another sparring sport. This is acceptable, since this is not a contact sport. During the fight, the e valuation examines the fight itself and how it feels rather than focusing on the fighters. The fighters are considered successful when they follow the feel or rhythm of the music and atmosphere. According to Delmont (2006), â€Å"Festivals include baptism and graduation ceremonies, when masters from other cities come in to judge, give demonstrations, and teach classes† (____) Acrobatics are an important element that sets Capoeira apart from many other martial arts. Capoeira involves cartwheels and inversions often as a part of the intent of the fighters. The acrobatics display physical ability and serve a diversion to the opponent. Many fighters implement acrobatics into their fighting styles. Even instructors in their 50s

Friday, August 23, 2019

American Expansionism Essay Example | Topics and Well Written Essays - 750 words

American Expansionism - Essay Example In the period from 1890 to 1920, the US economy functioned in an optimal manner achieving impressive results. In 1900, the US had 38 percent of world’s wealth, which is 13 percent more than Britain. This economic might enabled leaders to pursue expansionism and importantly financed it as well. â€Å"Economic power set the foundations of American power, facilitating leaders to pursue ‘grand’ policies† (Efthymiou). The other related cause is that the US wanted to further develop its economy, which they wanted to achieve by capturing and tapping resources-rich territories. That is, after capturing and entering newer territories, the US looked for key resources or materials, which can be sold separately or can be used to manufacture finished goods. Those finished good were sold or exported to various countries thereby developing its economy. â€Å"†¦expansionism was driven by the idea that the American economy needs to grow continuously† (Johnston 1 89). The third cause which initiated expansionism was the strengthening of its naval wing. The US’s Navy Admiral of that period, Alfred Thayer Mahan only emphasized â€Å"the need for a powerful navy and the creation of â€Å"coaling stations† in strategic regions with significance in world trade† (Efthymiou). When this started actualizing, the US became confident in its expansion plans. The US expanded its role and influence through three ways namely imperialism or armed conflicts, international diplomacy, and through the construction of the Panama Canal. In 1898, the US declared a war on Spanish territories in the Caribbean and totally dismantled the waning Spanish Empire. So by evicting Spain, the US fortified its advantageous grip on the Caribbean, built a naval base in Cuba, and even annexed Puerto Rico (Efthymiou). It further extended its influence into the Pacific by capturing Philippines and Guam. The US also expanded its influence by actively

Thursday, August 22, 2019

Customer Service Careers Essay Example for Free

Customer Service Careers Essay What does Customer Service mean to you? Is it simply taking care of your daily customers’ needs? What about the concept that your employees are also your customers? Does that change your outlook on the idea of customer service? This essay will explain the internal customer concepts of human relations. Human relations, in definition, are â€Å"the skill or ability to work effectively through and with other people†. (Lamberton, p.4) As a manager, you need to understand the needs and wants of your employees. You should have an effective training program that is set up with clear guidelines and expectations. Providing feedback during the training and throughout employment is crucial. This allows for open communication between management and employees. Future goals can be discussed and additional training available to aid them on those journeys. Areas of improvement can also be discussed without singling out the negative. Read more:  Customer Service in Leisure and Recreation In human relations it is very important to know the values instilled by the company. It is also important to help the employees â€Å"understand and accept the values of others without compromising their personal integrity†. (Lamberton, p.114) Communication and compromise are vital in any organization. It is not necessary to disregard your values for someone else’s, merely understanding where they are coming from and finding common ground to build on. You’re job in human relations is help bridge those gaps and assist in dealing with those conflicts. â€Å"Something powerful happens when people see themselves as part of healthy, functional community and have a positive experience of that.† (Everett, p.78) Positive attitudes, job satisfaction, high morale, and positive reinforcements are just a few examples of ways to succeed. Involving employees in decisions and setting realistic goals will help to improve  motivation as well. Employees need to feel that they matter as individuals, not just a part of the company. Managers are crucial in developing mutual respect, self-esteem, and solving conflicts. The better your communication skills are the more likely you are to be successful. Also, being able to maintain a positive attitude increases the morale of your internal customers, or employees. References Everett, Melissa (2007) Making a Living While Making a Difference: Conscious Careers for an Era of Interdependence Lamberton, Lowell, Minor, Leslie (2010) Human Relations: Strategies for success

Wednesday, August 21, 2019

Identity Theft in Cyber Crime | Proposal

Identity Theft in Cyber Crime | Proposal A Research Proposal on Identity Theft Abstract In Todays competitive world identity theft is increasing throughout the world. The main purpose of this research is to make people aware of what identity theft is, how its happening, and what kind of technology has been used. How do you protect yourself from Identity theft? Introduction The main study of research is regarding identity theft in Cyber Crime. Well first and foremost, what is meant by the term identity theft? A very short and simple definition for identity theft is stealing other peoples personal details like Social security number, credit card details, Date of Birth etc. What are the criminals going to do with these details? Why they do that? What kind of technologies are they using to steal the other persons details? Is it becoming very dangerous nowadays? How is it possible to protect yourself from identity theft? In the UK, almost all of the people are using broadband services (BT Group Plc, 2006). The Internet is making everything easy for the consumer. Almost half of the population in the UK is using online banking, paying their bills, shopping and using the Internet to fulfil their day to day tasks. The Internet is a form of global communication throughout the world. Almost 60% percent of the people in the UK use online banking (BT Group Plc, 2006). It is quick, and reliable; however people are not aware of the threads in online banking. The majority of the people in the UK are becoming victims of online banking. Online business, internet auction, Phishing E-Mails, Trojans, and Man in the Middle attacks, Easy Password, Spyware, Adware, Payment system and cookies are the threads on the Internet (BT Group Plc, 2006). Besides the technology mentioned above, there is more technology that will indicate, at the time of execution, the research? However consumers can protect themselves from the above threads by using effective Anti-virus software, Spyware and Adware remover, Secured Wireless connection by using WAP or WEP, avoid unnecessary cookies, delete unwanted e-mails and never give out their identity in instant messaging. If the consumers follow these systems they could protect themselves from Identity theft. These cyber crimes become a global issue throughout the world (Shinder, 2002). The hackers are using up-to-the-minute technology to get the identity. Criminals are using technologies like liberate effective virus and Phishing e-mails to millions of Internet users to capture their personal details, social security number, credit card details, and date of birth. Therefore, recently, online fraud has greatly increased day by day. The news released by Metro in 2007 says that 9 out of 10 people are affected by identity theft. So what is the solution to solve this major problem and avoid not becoming a victim of identity theft? Why do I chosen Identity Theft in Cyber Crime? As stated earlier Identity theft in Cyber Crime is increasing throughout the world. The reason why that I selected this topic is to make aware of in depth knowledge of what is Identity theft? And make the Internet users aware of the tools, technology, and programs are available in the market to protect them from Identity theft in Cyber Crime. I am going make an animation website to guide the Internet users, how to use and install the tools, technology and programs to protect them from Identity theft. Background and Literature Review Overview of Identity Theft In the UK (BT Group Plc, 2006), the USA and some parts of Europe the Identity Theft is spreading like a virus. Its become one of the major problems throughout the world. Each and every day someone becomes a victim of identity theft. The Internet is a form global communication throughout the world as we all known very well. Every individual, companys, students, Solicitor, Banking and almost in the entire field, the Internet is the key form of communication to make their work quicker, easier, more reliable and effective. Why it is Significant? As we are seeing, nowadays, online business is booming each and every day, as shown by news released by Federal Trade Commission (Loza, 2001), online businesses reach up to  £3.2 trillion by 2004. However online fraud is also increasing along with the increase in online business. Well its quite weird how millions of people are becoming victims of identity theft. The majority of the people losing their personal details are losing them by using the internet. The news releases by the Federal Trade Commission about online business fraud are as follows In United States of America online business reach up to  £3.2 trillion by 2004 (Loza, 2001) The consumers are making online business around  £3.5 million each month (Loza, 2001). The estimated online payment was  £1.5 billion in 1999 and  £30 billion in 2005 (Loza, 2001) In the UK almost five Million people use broadband (BT Group Plc, 2006). In UK almost 62% of Internet users are not aware of the threads and vulnerability in online, furthermore 40% of users said that they are not even bothered whether they become a victim or not. Some users say they dont even mind to giving out their Personal details to the third parties. Internet crime is not only the regarding credit card details but also the online Identity theft, which is increasingly rapidly throughout the world, especially in developed countries like the UK, the USA and Canada. This online ID Theft is one of the fastest growing Internet crimes in the UK especially. More or less 8% of the UK PC users are falling victim to online fraud. 15% know already that they have been targeted by an internet crook. The Internet crooks using technology to retrieve the personal information from the users, release Viruses, phishing e-mails and other effective technology. With this technology they can attack millions of Internet users very quickly. The identity theft has become a big hassle for Internet users (Atwood, 2007). Some Internet users might use E-Bay. It is the online website from which we can buy and sell whatever things that we need. It is a giant online shopping website. In this website we might need to exchange our card details to third parties, but the third party has more possibility to cheat us. This gives evidence that there are many threads and a users information is very vulnerable on the Internet. ID theft has developed online because the number of consumers surfing and shopping online has greatly increased (Insight Consulting, 2003) (Acxede, 2006). Unfortunately more from the personal information is derived from the electoral registration. Mainly we have started to use and exchange the credit card details with banks and other retailers. This projects main aims are to show the risks associated with e commerce and the Internet communication technologies. Further, discussion continues on personal ID theft As a result we are losing our privacy in the Internet (Burchell et al, 2004), for example, when we register for any subscriptions from a service from an online company or when downloads bring increased risk of giving away personal information. The main issue the world is facing now, when we submitting our personal data, is that the companies give this information to third parties. They behave dishonestly to us. Cookies, adware and web bugs are used to retrieve the personal information. As we all known, most of the Companies from the UK have their customer service in India (BT Group Plc, 2006). In lndia, Labour is cheap, thats why Almost 80% of the international call centres are located in India. Because of cheap labour in India, employees start selling the IDs to the third parties. BT (British Telecom) holds almost 90% of British peoples identity information, addresses and other security information, in the department of customer service for BT in India. Due to cheap labour they wont get panic to sell Personal Details. So no one is safe in UK. Fake ID There are some websites which sell fake ID cards and deliver the ID on the same day (FraudWatch International, 2003). The above ID is a Fake ID, so the crooks are not worried nowadays about making online fake ID. The fake ID will cost you only  £10 and the delivery charge is  £5. So there is a separate website for making fake passport, ID, National Insurance Number and Student ID card. Just for  £10. So any one could make one fake id and NI number and they can start working in the UK. Online Scam The online scam means sending fake web pages to your email from a well-known ISP (BT Group Plc, 2006) (Insight Consulting, 2003). This email will tell the addressee to update their ISP Billing information and it will direct them to click on the fake link. This is to turn the people to the bogus webpage. They are both similar in appearance. It contains the same company logo and all the other infrastructure of the website remains the same. The focal seek of the scam is to instruct to enter their credit cards details, social security number, Date of Birth and the security number. This information would be more than enough to earn thousands of pounds and dollars. In most peoples Curriculum Vitae personal information is mentioned, including Date of Birth. Millions of people register in famous jobs websites every day. In that case, many crooks will come across our personal information. If our personal information gets in to the hands of cyber criminals, then we will become the victims for identity theft. The main purpose of the research is to bring together the skills, experience, and research about the online Identity theft. It will examine what is online Identity theft is, how its happening, what technology has been used, and how to prevent the online identity theft. Methodology My methodology for this proposal is how people are losing their data, in what kind of way they are becoming gullible by the information supplied by the crook and how to protect them from this identity theft on the Internet. At the current situation, the modernised world is facing lot of tribulation from well educated crooks (Insight Consulting, 2003). As the technology develops along X -axis, they generate equal antagonist clout to overcome the security issues along Y-axis. My project mainly concerns identity theft in Cyber Crime. There are some effective technologies currently being used for online ID theft. Following, are the technologies that I recently found from my research from journals, books and online. (Shinder 2002) Network Intrusion and Attacks Password Cracking Trojans Viruses Worms Phishing Man in middle attack Spyware The above mentioned points are responsible for ID theft and other kinds of crimes over the Internet (Shinder, 2002). Thus meaning, the cyber criminal cleverly hacks the personal details by using any one of the above mention points. So the criminals use the above technology, tools and programs to make a tragedy on the World Wide Web. Network Intrusion and Attacks The Network Intrusion and attack comes from all direction (Shinder 2002). It may come from external threads or from internal threads. The external threads mostly come from the Internet and the internal threads possibly from an inside job. Internal threads may come from Local Area Network (LAN) or some kind of physical access to attack the system. Nowadays the attackers dont need to have more skills, because there are some tools available to attack. Password Cracking There are more than 100 tools are there in the market to crack the password (Shinder 2002). As far as my secondary research is concerned, password cracking tools are available in the market to crack the password. To use this tool you need to be a computer literate. Its all users friendly as anyone who has the intention to do it can do so. This is one of the ways that crooks are using to steal identities through Cyber Crime. Trojans, Viruses and worms Trojans simply called as Trojan horse (Shinder 2002). The Trojan is a software program, which is mostly written by hackers to avoid a system security (BT Group Plc, 2006). If the Trojans are installed the hackers can utilize the security gap to gain the unauthorized access. If the program is installed in the system, hackers can have full authority to delete or modify the files and install other programs and viruses. So the Trojans are hazardous if any unwary user who installs it is an administrator and has the access to the system files. Virus is another program which is more dangerous (Shinder 2002). Viruses are installed without the users awareness and it executes actions that are very harmful. The viruses can come from anywhere; mostly they come from the Internet and network services such as the World Wide Web (WWW), E-Mail, instant messaging and file sharing systems. Worms is also a program that is able to pass through crossways over the network from one system to another system (Shinder 2002). The worm was used to illustrate the code that harms multiuser systems. These programs are mainly design for legitimate users to manage the multiple systems at the same time. Perhaps hackers use worms to perform some harmful actions. Phishing E-Mail One of the major concerns for Internet users is phishing E-Mail (BT Group Plc, 2006). The e-mail ids are available for sale on the Internet for a cheap price (Shinder 2002). The crooks take advantage of this opportunity to send bogus e-mails. The E-Mail claims to be from a bank, financial institute or other online fake website and asks the addressee to enter whatever information they required like personal details, username and password etc. This kind of technology is one of the major concerns for the internet users, because its quite weird to recognise which is the original website and that of the fake. Man in the middle man attack The man in the middle attack is able to read, insert and modify at desire, (BT Group Plc, 2006) the message between both the parties without either party significant in the knowledge that the connection among them has been compromised. Spyware The Spyware is software installed on the system without user knowledge; it is somewhat like Trojan horse. The spyware program can also collect also the information like personal details, username and password and the Internet history. This may lead to harmful disruption to your system. The Network Intrusion and Attack, Password Cracking, Trojan, Virus, Worms, Man in the middle man attack and spyware (Shinder, 2002) (BT Group Plc, 2006) are the responsible for the identity theft in Cyber Crime. However I am doing primary research about these technologies, tools and programs for my dissertation with the help of my supervisor. I hope my primary research will be very helpful for Internet users, government companies and private companies to protect, learn and become aware of the Identity theft in Cyber Crime. How to prevent yourself from cybercrime? Cyber crime is spreading like a virus throughout the world (BT Group Plc, 2006), how can you protect yourself from cybercrime? What should we do to avoid becoming a victim? Awareness of Network Security Concepts Awareness of Basic cryptography concepts Awareness firewalls Awareness of Phishing E-Mail. Awareness of Virus, Trojan and Worms. Awareness of Anti-Virus Software. Internet user, Government and Private concern should know the Awareness of Network Security, Password Cracking, firewalls, Phishing E-Mails, Trojans, Virus, Worms and Spyware to protect themselves from Identity Theft. My primary research will definitely help them to protect themselves from Identity theft in Cyber Crime. I am keenly performing primary research in awareness of the above tools, technology and program. I think that hopefully, my primary research would be more effective for the Internet user, Government and private concern. What would be my contribution for Identity theft in Cyber Crime? As we all are aware of the Identity Theft in Cyber Crime, but why still 70% of the people are becoming a victim for Identity Theft? The reason is most of the people are not aware of the protocol and other technology, tools and programs that are available in the market. I am working towards creating awareness of the Identity Theft in Cyber Crime. I hopefully think that my research will be more effective for the Internet user to protect them from Identity theft and not to become a victim. Resources The maximum budget for my project will be approximately  £500. I will be visiting to research centres, and some companies to do primary research about tools and technology used by the crooks. The software requirement are Microsoft Office 2007 Adobe Photoshop CS3 HTML Adobe Premier Macromedia Flash Smart Draw AutoCAD Corel Draw 12 The System requirements. Processor Intel Pentium 4 / Duo core / Core to Duo Memory (RAM) Minimum 256MB Hard Disc Minimum 20 GB Operating System Windows Vista/ Windows XP CD-ROM Readable/ Rewritable USB Cable Keyboard Mouse. Planning The estimated time for my project will be around 4 months. During my project I plan to visit some companies and research centre to gain more knowledge about Identity Theft in Cyber Crime and also I will be doing surveys about Identity Theft with the public. Conclusion The migration of Identity Theft in Cyber Crime is not at all an easy task. It requires a huge effort, patience and understanding the fundamental architecture. This research will give a sound knowledge to Internet users, Government and private concern about what is Identity theft? How its happening? By whom its happening and how to protect yourself from identity theft? References Acxede (2006) Hack #12: Add a PayPal Button to your Office Live Basics Page [Online] http://www.acxede.net/hack_12_add_a_paypal_button_to_your_office_live_basics_page [Accessed: 29 April 2008] Atwood, J. (2007) Coding Horror: Phishing: The Forever Hack [Online] http://www.codinghorror.com/blog/archives/000852.html [Accessed: 29 April 2008] BT Group plc (2006) Security Report: Online Identity Theft [Online] http://www.btplc.com/onlineidtheft/onlineidtheft.pdf [Accessed: 28 April 2008] Burchell, D., Nielsen, D., and Sofield, S. (2004) PayPal Hacks. Sebastopol, CA, USA: OReilly Media Inc. FraudWatch International (2003) Types of Identity Theft [Online] http://www.fraudwatchinternational.com/identity-theft/idtheft-types/ [Accessed: 28 April 2008] Insight Consulting (2003) Identity Theft: Managing the Risk [Online] http://www.insight.co.uk/files/whitepapers/Identity%20Theft%20(White%20paper).pdf [Accessed: 30 April 2008] Loza, E. (2001) Internet Fraud: Federal Trade Commission Prosecutions of Online Conduct. In: Communications and the Law, Vol.23 Shinder, D. L. (2002) Scene of the Cybercrime: Computer Forensics Handbook. 1st Ed. London, UK: Syngress Publishing Greys Anatomy Vs Serendipity: Psychological Perspectives Greys Anatomy Vs Serendipity: Psychological Perspectives Greys Anatomy is a medical drama that follows group of surgical interns, residents, and the various physicians who serve as their mentors both in their professional and personal lives (Rhimes 2005). There are multiple story lines that have been or are being followed to go along with the variety of characters and plots that the series portrays. The series first aired in 2005 and was recently renewed for its seventh season. The target audience for this show is men and women of various races, cultures, sexual preferences, religions, and personalities from the ages of 18-34 years of age (Rhimes 2005). Enter the world of Seattle Grace Hospital, where residents and interns strive to become the best surgeons in the country, but first they must learn to navigate the murky waters of life, love and relationships. The series starts with a focus on Meredith Grey, a surgical resident trying to live up to the reputation of her famous mother, the brilliant Dr. Ellis Grey. Her Alzheimer-stricken mother eventually passes on and in the moment she dies finally gives Meredith the validation she has always wanted from her mother but was never able to. Meredith finally marries the brilliant neurosurgeon Dr. Derek Shepherd and is moving forward in a positive direction. As the show has progressed the focus has shifted from primarily Merediths point of view that of all of Merediths fellow interns, residents, and attending surgeons. Along with Meredith are four other interns that have started the program with her, Alex Karev, George OMalley, Izzie Stevens and Cristina Yang. They are mentored by Miranda Bailey, a general surgeon who eventually becomes the hospitals Chief Resident and later becomes an attending general surgeon as well as a number of other attending surgeons of various specialties. Dr. Addison Montgomery a highly specialized OB/GYN and neonatal surgeon, is Dereks wife who arrives in Seattle seeking reconciliation. Addison eventually leaves the show the show but continues to make occasional guest appearances through crossovers of the spin-off show Private Practice. Dr. Mark Sloan a talented plastic surgeon, is Dereks former best friend, who Derek caught sleeping with Addison. Callie Torres an orthopedic surgeon that was introduced as a love-interest for George, whom she later marries, but ultimately divorces. Eventually there is a stunning addition to the cast when the interns that the show has foll owed become residents and are assigned their own interns one of which is Lexie Grey, Merediths half-sister on her fathers side. Trauma surgeon Owen Hunt and pediatric surgeon Arizona Robbins are introduced as love interests for Christina and Callie respectively. George dies a tragic heroic death, and Izzie leaves following the breakdown of her relationship with Alex that was preceded by a dramatic fight with cancer. Lexie and Mark have a fairly serious relationship for a while until Mark chooses his newly found daughter and unborn child over her. Now that Lexie is free from Mark and Alex is free from Izzie they start a fling to help each other get over their exes and it turns into a relationship. Attending Teddy Altman is introduced as a cardiothoracic surgeon from Owens military past. Finally as a reflection of the hard economic times residents Jackson Avery and April Kepner, transfer to Seattle Grace in a merger with Mercy West. Serendipity is a romantic comedy that is a story about faith, destiny, and timing (Fields 2001). It shows the how two people connected only for a night and had such an impact on each other that they eventually end up together years later after going a little bit crazy trying to follow the signs they think fate is showing them. The movie was shown in theaters in 2001 and has since been released on DVD and aired on television. The target audience is women 18-34 years of age. Sara and Jonathon meet in New York City during the Christmas season and both want to buy the same pair of black cashmere gloves in Bloomingdales. Jonathon graciously allows Sara to buy them and as a thank you she takes him to Serendipity 3 for a treat. Even though they are both dating other people they end up spending the evening together ice skating and talking. At the end of the night Jonathon asks Sara to at least exchange names and numbers incase life happens. Sara finally gives in and the paper with her name and number is blown out of her hand. Jonathan then pleads with her to write the information down again, and being superstitious by nature, Sara decides it was a sign that maybe this connection wasnt meant to be. Jonathon asks her if fate didnt want them to be together then why did they meet? This gives Sarah an idea. She has Jonathon write his name and number on a five dollar bill and uses it to buy a role of Certs. She promises to write her own name and number in the book L ove in the time of Cholera and sell it to a used bookstore. That would put their information out into the world and if they were destined to be together these items would find their way back to each other, and they would be able to contact each other. Life goes on and eventually they give up the idea of finding each other. Jonathon is engaged to Hallie, and Sara is engaged to Lars, but neither has forgotten about the other. As the wedding dates loom closer and closer Jonathon and Sara start to think more and more about the night they spent together. They both make one last effort to find each other. Jonathon does eventually find the book and Sara does eventually find the five dollar bill. They also eventually realize that if they are looking for one another then they shouldnt be marrying anyone else. They both break off their engagements and eventually find themselves back at the skating rink where it all began, each with their single black cashmere glove. Now they are both single and are free to pursue the attraction they feel. Viewers watch this television series and this type of movie for similar psychological reasons. Fischoff (n.d.) states that a person watching dramas is doing so to fill a social/ personality need and that watching comedies is done to make a person happy. Some people watch because they want the emotional rush they have experienced in the past from watching the same television show or similar movies. This emotional rush is what Potter (2008) classifies as a behavior effect called narcotizing. However, those are the things the average person seeks out almost subliminally where the need for entertainment and escape or distraction is obvious even to the viewer them self (Fischoff n.d.). People watching Greys Anatomy do so for the vicarious emotional rush they get from see their favorite characters lives unfold. In one episode there was a man in the hospital shooting people at random all in the hopes of getting to and killing the three doctors he blamed for his wifes death. There was a sense of suspense and terror as the audience realizes who was getting shot and who the shooter was actually going for. This suspense keeps the viewers watching the show with undivided attention which is what Potter (2008) calls behavioral attraction. People watching Serendipity are not going for the dramatic emotional rush but a romantic emotional rush. These people are looking for a short term escape into a world where fate and destiny explain why things happen the way that they do. Emotions are an integral part of a persons appreciation for television and movies. We experience emotions vicariously through the programs we choose to watch. What a person feels while watching or listening to a television show or a movie is essential to the whole psychological experience. There are two main physiological components that effect emotion: the physiological and the cognitive (Harris 2009). We physiologically experience emotions via increased heart rates, facial expressions like smiling, or other physical reactions like tears. The key is to link these physical reactions with a specific feeling using cognitive appraisal. While watching that specific episode of Greys Anatomy, a person home alone may physically start crying when a well known character is shot, their pulse may increase as the suspense builds, they might even gasp, scream, or yell at the TV when someone is actually shot. A person observing a viewer can see what the viewer is watching observe that the viewer is not smiling and not sneezing. These are the cognitive clues an observer uses to know if the tears being observed are those of sadness rather than happiness or possibly allergies. While watching Serendipity in a movie theater surrounded by other people viewers are more likely to hold their emotions in only showing an occasional smile or becoming misty-eyed when Jonathan and Sara find each other at the end. An observer here would have a harder time making cognitive connections between physiological representations and the feelings expressed because the expressions are being suppressed out of concern for how other people will think. It is important to remember when going to see a movie in a movie theater a persons sensory experiences are heightened because the situation is new or special and so your body tries to take in and remember as much as it can (Forrester 2000). In the physical context of being at home alone while watching a TV show, however, people are more comfortable and familiar with their surroundings this takes away from the need for heightened senses because there is no one else to relate to or unfamiliar smells to take in and the feel of the furniture is well known (Forrester 2000). Cinematographic techniques such as the choice of shot, and camera movement, can greatly influence the structure and meaning of a film or television show. Greys Anatomy uses a wide variety of different shots and camera movement to portray different things. For example when the shooter was going by a room with people in it you can see it from their terrified point of view of peaking through the blinds. Another example would be seeing an overview shot of an entire scene where people are scrambling everywhere and the shooter isnt in focus, but the chaos that he created by shooting into the crowd is. Serendipity uses the basic popular shots of those who are talking and specific points of importance like when Sara finds the five dollar bill or when Jonathan is given the book with Saras information in it as a traditional grooms gift. Music is used in many ways in both the movie and the television series. There is sad music to queue sad feelings and upbeat music to trigger happy moods (Potter 2008). Music is used to build-up and round off various scenes by using dramatic flaring of the music and an increase volume and complexity of the music fading into a softer simpler version of the same continual piece (Fischoff 2005). These musical techniques are used to suck the audience into the world of the movie and to help focus attention on specific emotions at certain times. Greys Anatomy goes one step beyond the traditional music queues that Serendipity exhibits by having absolute silence at the moment of tragic climax. There was silence when Meredith looked out into the hall way after removing a bomb from some guys chest only to see the man who had taken the bomb from her explode with half the already evacuated surgical floor. There was also complete silence when Derek was shot by the shooter roaming the hospital. Thi s silence from music is more dramatic then the build up of music traditionally used because it is unfamiliar in this series not to have music or noise in the background and complete silence is an enormous difference. An editor uses timing and sequencing to create the spacing of events through time and develop the direction of how the movie or television show will unfold (Chandler, 1994) (Bordwell, Thompson 1993). Heim, et. al. (2004) explains how editors are the secret weapons behind the psychological believability and emotional connection the audience will have with the movie or television show. The editing for a movie is different that that for a television series. With a movie like Serendipity there is only one shot to captivate the audience and there is only an hour and a half to tell the whole story. This is why movies follow one central story and sequencing like two people have totally separate lives who meet once, and then find each other again when their lives are more compatible. There are also key timing points in the movie where Jonathan and Sara just miss running into each other or are show in the same place but a different times creating a sense destiny is aware of their connection and that they will meet again when the time is right. With a television series like Greys Anatomy, however, there are multiple chances to get a persons interest and for this television series there are about twenty hours worth of show time over the already aired six seasons. This gives the editor more time to create and focus on the bonding of the viewers with multiple main characters and various plot lines. Putting together the right sequence of shots with proper timing is very important to keep a seamless transition from one characters story to the next and make all these individual stories a whole. Agenda setting, priming, and framing theories all appear to work subconsciously and have long lasting effects (Bargh, Chen, Burrows 1996), because of these effects these theories leave people susceptible to being misled. Agenda Setting is used to manipulate the amount of coverage a topic will get, what information is given on the topic, and the manner in which the information is given (McCombs, and Shaw 1972). Agenda setting is a cognitive effect used to point the audience in the direction of what the creators think is important (Potter 2008). Priming is when a person is shown something that prepares them for the future of the show or movie (Tulving, Schacter, Stark 1982). Framing is how people file and build on what they know from experience to (Plous, 1993). Agenda setting, priming, and framing are both general and episode focused. In general the agenda of the Greys Anatomy is to show the work and private lives of a group of interns, residents, and mentoring doctors and that is the focus of the series. Each show also has its own agenda like abortion, sexually transmitted diseases, various religious conflicts, death of loved ones, mistakes that as doctors have cause a patient to die, and many more. At the beginning of every episode there is prologue in an audio format spoken over a montage of scenes that prepares the audience for what is going to happen in that specific episode. There is also an epilog at the end of each episode that is a continuation of the prolog, in that it summarizes the theme of the episode and gives the viewers closure. The series its self can alter how people think about emergency room doctors and what they have gone through to get there. Each specific episode has an opportunity to change how a person feels about t he specific agenda presented. The agenda in Serendipity is that of destiny and romance and the whole movie is focused on it. The whole first ten minutes of the movie prime the audience for what is coming throughout the rest of the movie. The audience knows that there will be a search to find each other using the book and the five dollar bill and that the pair of gloves will eventually be brought back together. When all of Jonathan and Saras best efforts to find each other are thwarted and they finally give up looking for each other, the book is given to Jonathan as a grooms gift and the five dollar bill is given as change for movie head phones in front of Sara on the plane home to England. This may change a persons framework to believe that destiny does exist and that what is meant to happen will happen when it is supposed to happen. Normative Focus Theory (Baron, Branscombe, Byrne 2009) explains why people only change according normal influences on their behavior when they can see it has relevance to their own lives. This theory can explain, for example, why an individual who is having a hard time finding love would watch Serendipity and choose to alter their framework to believe that destiny will help them find the right person. Propaganda is the manipulation of ideas, images, and symbols to persuade a large group of people to think a certain way. Propaganda can be defined in a variety of ways, according to an individuals ideology and perception of the world. Change a persons framework. Greys Anatomy persuades people to think about emergency room doctors and what their lives are like at work and in private. Serendipity tries to persuade people to believe in destiny and fate. The one thing that both this movie and this television series have in common is the focus on how incredibly important good friends are. They focus on friends who will go through anything and everything with each other and still be there for each other no matter how foolish one of them may act, Serendipity, or how much one might try to push the other away, Greys Anatomy. The amount of covert, or hidden, advertising versus overt, or obvious, advertising is very different between movies and television series. When people see a product that they use and automatically feel happy it creates a reinforced relationship with the product. This is what Potter (2008) calls an immediate reinforcement effect and is often connected with overt advertising. Activation is a behavioral effect from covert advertising (Potter 2008). Television shows are able to have more covert advertising because they are designed to have periodic breaks that for overt advertising called commercials. Movies dont have that opportunity so there is a greater need to include advertising in the actual movie itself. For example Greys Anatomy has a few covert advertisements like the use of Bic pens, Fuji water, and Motorola and Blackberry cell phones. Most of its covert advertising, however, comes from an unlikely place. The songs sung by various famous artists have been used in the series to express various emotions and the sales of these songs have increased greatly after they aired on the series (Rhimes 2005). In Serendipity there are overt advertisements for Prada, the Waldorf Astoria, Serendipity 3, Bloomingdales, and Certs along with covert advertising for Coke, Love in the time of Cholera, Snickers, the movies Cool Hand Luke, the New York Times, and Hermes ties. Positive portrayals of a relatable cultural group can make an individual feel better and not alone. Negative portrayals of a cultural group that an individual can relate to is likely to anger that person and not only cause them not to watch the television show but they may even convince other individuals not to watch also. There are so many different cultural groups that individuals can relate to in Greys Anatomy that it would be hard to list them all. There are characters who are Korean, African American, Caucasian, Irish, Jewish, Christian, married, single, heterosexual, homosexual, powerful men, powerful women, underdog men, and underdog women from various social classes. These are only some of the groups that the regular cast of characters can appeal to. There are additional groups that are portrayed by in specific episodes that open up the world of cultural diversity even further. This was actually a goal of Rhimes (2005) while creating the show. She wanted the show to be as div erse as possible. Serendipity, however, is much simpler. It is basically focused and relatable to Caucasian middle-class. The key psychological effects that celebrities have they can get individuals to watch a movie or television show just by being in it. Because of a celebritys symbolic social influence people will follow their favorite celebrities careers, watching movies and television shows they may not have watched otherwise (Baron, Branscombe, Byrne 2009). However, if celebrity watching turns into an intense personal obsession or pathological fantasy then it becomes unhealthy and dangerous (Maltby et. al. 2006). Examples of this are usually reported as celebrity stalking. This is not a regular occurrence but can happen when a person gets what Maltby et. al. (2006) calls celebrity worship syndrome, aka CWS. Movies usually profit from having already known celebrities in the cast. As far as celebrities go Serendipity may have benefited from followers of Jon Cusack, Kate Beckinsale, John Corbett, and Eugene Levy. Television series like Greys Anatomy can benefit from starting with some well known actors and if the series is popular it may then turn other actors into celebrities. In the beginning viewers may have recognized Patrick Dempsy, Sandra Oh , and Katherine Heigl from their work outside the series. Now because of the series people would recognize Ellen Pompeo, Justin Chambers, Chandra Wilson, T.R. Night and many others if they were to work outside the series. Showing how a television series not only uses existing celebrities but creates them as well. Harris (2009) explains how professions presented in a positive manner greatly increase the number of people entering that field. The scary thing is that according to Potter (2008) 12.1% of professionals on television are represented as medical workers where only .9% of people are in the medical profession in real life. If you think about it, we show a higher number of doctors making fewer mistakes and giving more individualized attention in Greys Anatomy than there are in real life. If people arent careful and thinking critically they may expect these sorts of unrealistic actions in real life. In the movie Serendipity various professions are portrayed but they are really not take seriously or focused on; they are sort of poked fun at and used to create ironic twists. There is an infuriating rule following sales clerk, a obituary writer for the New York Times, an indifferent sports caster, a holistic store owner who doesnt believe in the product she sells, a psychologist who doesnt be lieve her own advice about there not being soul mates, and a goofy self-absorbed musician. If an individual were to watch this movie and focus on how the various professions are shown there could be some negative reactions, however since they are used as character enhancements and not focused on as professions it had the desired mood lightening effect movies viewers need to connect with the characters personalities. The amount of time a person spends with a specific show or type of movie is usually because of affection for its characters. The more exposure an individual has the greater an influence the exposure has on what is applied to our everyday lives. Characters can become familiar providing comfort and interesting plots provide a means of escape (Rutlege 2009). This can be healthy and relaxing as long as there is no blurring of the line between fantasy and reality (Potter 2008). With critical thinking applied to realize the dramatic license that the creators of the movies and television shows, a person can discern between unrealistic aspects and aspects of the shows or movies that may contain a gem of truth or a valuable lesson. Watching movies like Serendipity on a regular basis can cause people to have unrealistic expectations of their current or future relationships. They want the romantic emotional rush the feel from the movie in real life, which is not realistic.

Tuesday, August 20, 2019

Dynamics of Modernity: Berman Canclini

Dynamics of Modernity: Berman Canclini Compare and contrast Marshall Bermans and Nestor Garcia Canclinis account of the dynamics of Modernity To be modern is to live a life of paradox and contradiction. It is to be overpowered by the immense bureaucratic organizations that have the power to control and often to destroy all communities, values, lives; and yet to be undeterred in our determination to face these forces, to fight to change their world and make it our own. (Berman:1983:13-14) Modernity has long been hailed as one of the most powerful forces to have emerged in the world, with the capacity, according to Marx, to move mountains, and to ensure that all that is solid melts into air. Within the statement by Berman that begins this essay, we can see one of the dynamics that has created this impression. Modernity, despite its deeper roots, begins to be talked about by a series of thinkers who combine a high degree of abstraction with a imperative to act. Thus Marx argues for huge motors of historical telos that exist outside of our will, and at the same time argues for an immanent need to change historical conditions. This relationship between abstraction and concreteness is perhaps the most fundamental dynamic of modernity. It gives rise to the planned economies of communism, and the controlled biopower of modern states that Foucault (1998) talks about, which attempt to rule over the function of life itself. At the same time is gives rise to what Badiou (2005:12 ) calls the passion for the real; the search for an authentic existence in the absence of the certainties with which previous epochs lived. What is crucial about these two movements is the way in which they inflect each other. The idea of authentic will becomes possible only with the collapse of grand narratives and the rise of administered life, and the administered life then uses the same notion of self-fulfilment within consumerism to further be able to administer biopower. It is this covalence that is fundamental to modernity, and which this essay will argue is entirely misunderstood by Berman. One of the reasons for this is that, as Braudel (1995:14) notes, â€Å"each civilisation tends to overestimate its own objectivity.† Likewise, each age tends to see itself as more unique than the last. However, this is particularly a problem with the period called modernity because during this period it was thought reason could break with the past, and a utopia of the state was possible. We can see this legacy in both the Communist economies and in the artistic movements such as Marinettis futurism, which had as its mot to: â€Å"make it new.† It is precisely this trap that Berman falls into: confusing the ideas of modernity with the effects of modernisation. In fact, Bermans fetishished notions of will and authenticity, played out in the ahistorical telos of his modernist planar development, resemble nothing as much as a 19c treatise on the movement of history. Perhaps part of the reason for this is the combination of Bermans European sources with his background in the strong individualist tradition of American pragmatism, as we can see in his first book (1970). Canclini stands just south of Berman, but from the perspective of Mexico, modernity is a not a finished project to be talked about nostalgically in the way Berman does. Because this project is unfinished, Canclini is much better placed to understand the complex and intertwined relationship between what is constructed as tradition and what is constructed as modernity. His notion of hybridity, placed in the context of a heavy reliance on Gramscis theory of hegemony, allows one to understand that supreme category of modernity: tradition. For instance, Canclini notes (1995a:53) that there is no clear line between popular and hegemonic culture, because (ibid:75) peasant culture is necessary for capitalism as a symbol of national identity and because (ibid:83) it offers the construction o f a hegemony through the management of cultural fragmentation.† Thus modernity can be seen here as a hybrid form whereby old identities are mobilised rather than changed and uprooted. Canclini understands that modernity, if it means anything, means a change in underlying structure rather than the type of cultural universalism which lies as the undertone of the work of Berman. This essay will consider how Berman sets up the dynamics of modernity within this ahistorical schema, and argue, as previously alluded to, that he misses the important aspects of the relation. It will also be argued that Canclini, within his much more modest project, understands the underlying dynamics of the abstract and the concrete to a far greater degree. Perhaps Bermans problems begin with his tripartite division of modernity into modernity, modernisation and the modern, without every looking at how these categories are mutually constitutive of each other. Modernity, Berman explains is (1983:15): â€Å"a mode of vital experience – experience of space and time, of the self and others, of lifes possibilities and perils.† Bermans book is more of an evocation than a scholarly argument, but nonetheless is seems pertinent to insist on some evidence for such a claim: did other ages not experience space and time? The problem here is not simply that Bermans generalisations do not tell us anything about modernity, but that they conceal the real dynamics of the process. For instance, Berman often insists on the sense of newness, of authentic experience, within modernity. Yet understood as what Berman construes it to be, the sense of the new is not an experience particular to modernity at all. What is important here about the dynam ics of modernity is the way in which the experience of the new, what Berman calls modernity, is an essential part of the process of modernisation. This has been argued well by one of Bermans claimed inspirations, Walter Benjamin, whose Arcades Project (2002) traces the way in which a sense of wonder was used to create the consumer sensibility. This is also laid out in the work of Canclini, who chronicles the powerful political effect created by constructing modernity as something to come – around which one can mobilise people towards new identities and on new political projects. However, this is a discursive effect, rather than a fundamentally new ontological possibility for the modern subject, and Berman asserts the latter as a property of the former without giving a single argument. Instead, Berman (1983:15) gives us evocation and adjective, one strung after the other. The underlying dynamic of modernity for him is: â€Å"modernity is a paradoxical unity, a unity of disunity: it pours us all into a maelstrom of perpetual disintegration, of struggle and contradiction, of ambiguity and anguish.† Underlying all this purple prose is Marxs statement, that inspires the books title, that all that is solid melts into air. Yet what Marx is talking about is the ability of capital to undermine use-value and create a world of people alienated from their labour and extracted of surplus value. Now one can take issue with Marxs account, (as Baudrillard (1983) most usefully does by pointing out that use-value is also a fetishisation, this time of authenticity, and that the original alienation occurs with the construction of value) but what he draws attention to is the way people see the imaginaries of capitalism as real: capital is perceived by people in Marx as somethin g actually existing, rather than a maelstrom of perpetual disintegration. Here, Berman fails to give proper account of why he diverges from Marx. What can we salvage from Bermans account of the dynamics of modernity? It is true to say that the political subject in modernity was thought of as massively flexible and capable of continual reinvention. Though it must be added that this notion has much broader historical roots that Berman gives credit for: one can already see it in Machiavellis (2004) notion that people are capable of masking their intentions and this constitutes the basis for politics. However, this continual possibility for reinvention led to some of the most firm sets of continuities the world has seen for some time: the idea of class war, the tradition of the French bourgeoisie, and the modern state. Berman writes off in a few lines most of the great thinkers who have analysed this mutually constitutive relationships, Adorno here meriting a line. Canclini, in contrast, is alert to the way the supposed newness of modernity function to preserve power, and in his account of modernity in Mexico draws attention to th e the way newness is made a continuity of ritual and hegemonic power. Berman then separates out modernization as the social process that brings this maelstrom into being. In doing so he outlines some clear divisions between the phases of modernity. These phases resemble nothing so much as the clear evolutionary steps of early modern thinkers like Morgan. In doing so he makes a mockery of the patient work of people like Arrighi (1994), who have worked to uncover all the continuities that exist between different periods. Furthermore, his account is not even internally consistent. There is insufficient clarity in his work as to the difference between the 19C and 20C: Pushkin and Biely are made manifestations of the same movement, despite the widely different impulses that inform their work. What Canclinis work manages to do very well is to understand the way in which modernity, more than any other epoch (for it is the epoch of men who make history themselves without reliance on religious narratives) is complicit in its own construction of history. He trac es the way in which history is used as a political tool, and that the function of the type of planar divisions Berman uses is to extract a continuity from a succession. Which is to say that such divisions function as a political tool to extract a notion of destiny and objective inevitability from a history which is contingent and uncertain. Bermans one-sided and simplistic reading of modernity reaches its apex in his account of the American city. His account is a one sided view of power, as if Le Corbusier had artfully created American cities and all the modern man needed to do was stand up against this bloody tyrant. Canclini (1995b: 743-755) charts the way in which the modern man is complicit in the spaces that he builds, and that the solution is to problems of alienation that occur in such spaces is not some type of revolt by a careful reworking of the practices and delimitations of space that occur in the city. It is working through the very dynamics of modernity that one resolves its problems, and to do so requires an understanding of their complex inter-relation. Such an understanding is accurately posed by Jameson (1992:335) in his understanding of how it was the very construction of space in Los Angeles that led to the possibility of that constructions overthrowing. Furthermore, Berman misunderstands how contest ed Le Corbusier is in architectural theory. He fails to see the varying currents that inform modernity and that produced a diverse and heterogeneous formation of space, even within Le Corbusiers own school (Rabinow: 1991). Theoretically, he also fails to see what De Certeau (2002:19) has persuasively argued for, which is that it was the very relationship of time and space in modernity that leads states to forget the possibility of space. He argues that the spatial organisation laid out by the modern state was predicated on a notion of time as mode of organisation (e.g. wage labour) and a possibility of reinvention which necessarily allowed the particularities of space (as somewhere one has a proper place and a tradition that cannot be reinvented) to left to the people. Thus the conditions for contesting the state in modernity emerges from the intertwining of the micro and macro processes. These complex processes are ignored by Berman, because he is looking for a will-to-power to set against what he sees as the large bureaucratic structures of modernity. This is why he is so against Foucault, who attempts to set out the co-relation between these things. In attempting to find human creativity outside of any sort of system (though without offering any kind of rigorous account of how that might be achieved) he gives to much credit to bureaucratic systems. Canclini, in understanding how the four divisions of modernity he sets out (the rationalising, renovating, emancipatory and democratising projects) are frequently in conflict and lead to a conflicting and contested legacy, is in a much better position to understand. Ultimately, Bermans work seems as if it was written with a long nostalgia to badly understood 19C authors. He uses a notion of freedom as fetishised will (where he deploys what one could reasonably call a notion at all) without understanding that the development of modernity has destroyed this very category. As Zizek (1999:389) artfully pointed out it is the search for the real, for fetishised will, that, when not placed in a grand narrative, ends up in indulging in its simulacrum; the real emptied of risk. Likewise, it is the bureaucratic form of government that has led to the globalisation and decentralisation of its own form. These processes are ignored by Berman, who sees modernity as a universalism, even if a contradictory one, issuing like a new beacon of hope from a centre in Europe. Canclini understands modernity as a hybrid formation that cannot be tied to Europe, and has begun to chart the complex ways that modernity brings to bear on itself, and construct it own legacy. Bibliography Arrighi, G. 1994: The Long Twentieth Century. London: Verso. Badiou, A. 2005: La Sià ¨cle. Paris: Seuil. Baudrillard, J. 1983: For a Critique of the Political Economy of the Sign. London: Telos. Benjamin, W. 2002: The Arcades Project. Harvard: HUP. Berman, M. 1983: All that is Solid Melts into Air: Experiences of Modernity. London: Verso. Berman, M. 1970: The Politics of Authenticity: Radical Individualism and the Emergence of Modern Society. New York: MacMillan. Braudel, F. 1995: A History of Civilisations. London: Penguin. Canclini, N. G. 1995a: Hybrid Cultures: Strategies for Entering and Leaving Modernity. Minnesota: University of Minnesota Press. Canclini, N. 1995B: Mexico: Cultural Globalization in a disintegrating city. American Ethnologist. Vol. 22, No. 4: pp. 743-755. de Certeau, M. 2002: The Practice of Everyday Life. Berkeley: UCP. Foucault, M. 1998: The History of Sexuality: The Will to Knowledge. London: Penguin. Jameson, F. 1992: Postmodernism: Or the Cultural Logic of Late Capitalism. London: Verso. Machiavelli, N. 2004: The Prince. Oxford: OUP. Rabinow, P. 1991: French Modern: Norms and Forms of the Social Environment. Mass: MIT. Zizek, S. 1999: The Ticklish Subject: The Absent Centre of Political Ontology. London: Verso.

Monday, August 19, 2019

What Price Freedom? :: American America History

What Price Freedom? No country allows as much personal freedoms like the United States of America. The Supreme Court has passed laws which allow more freedom of expression than ever before. By hearing this, you may think that everyone is happy in the U.S. Well, a lot are, but to gain these freedoms, there was once a price to pay. Several people have been beaten, verbally assaulted, and killed for others to gain freedom that they deserve. I ask: At what price should freedom come? In December or 1965, in Des Moines, Iowa, a 15 year old girl and her brother wore black armbands to protest the Vietnam War. The Principal then decided that no student should be allowed to do such demonstrations, and after a warning, he suspended anyone wearing the bands. Later that day both wearers of the bands were suspended until January. The 2 students too it to federal court where they said that they had the right to wear the bands under the First Amendment right. They ended up loosing because the armbands would "disturb school discipline". About 4 years later, the decision was changed in favor of the students. Soon after, in the 1970's, more and more court battles about the First Amendment appeared. Without the help of the 2 students getting suspended, the First Amendment may have still been limited. Ever since dated history in the U.S. has begun, slavery had always gone on. Africans were forced to do the work and labor of the Americans. Black females were forced to do work in the kitchen such as cook and clean the house. Black men worked in the farm, picking cotton, and loading wagons with the crops. Slaves were often beaten by their owners and slave traders. Some were killed or mutilated for doing a "wrong" deed such as learning to read. If the slaves tried to escape from their home to the north, they would be beaten and brought back immediately. The blacks coming from Africa had to rights whatsoever. Slavery went on in the United States until the mid 1800's. The Emancipation Proclamation, which was issued in 1863 made slavery illegal in all the states in the U.S. It took the hard work and determination that one day the blacks of America would be free. A severe price of freedom, but one that stands out and may be worth while.

Sunday, August 18, 2019

Media’s Influence on Adolescent Body Image Essay -- Adolescent Behavio

Today’s society is a consumers’ society in which trying to obtain perfection is one of the fastest selling businesses (DeLaMater Pg. 12). Mass media, advertising, and fashion industries are being accused of feeding off females dissatisfaction with their bodies by portraying unhealthy thin role models in order to sell their products. This unachievable physique and lifestyle has led today’s adolescence down a dark path of such extreme eating disorders as anorexia and bulimia. Although it may sound nice to be societies perception of thin, there are consequences to these eating disorders such as cardiac failure that lead to horrifying defects or even death. In the 1950s, models such as Marilyn Monroe or Zhazha Gabor didn’t suffer from a lack of beauty due to a voluptuous figure. Then starting in 1960’s the ideal body has become more slim and slender. Twiggy had become a singer, actress, and a fashion icon during the 1960’s when she became the face of the fashion industry. Twiggy began to starve herself in order to become more â€Å"beautiful†. In addition to having such an influence on fashion, â€Å"Twiggy [had] also changed the way that women thought about their [own] bodies,† (Rosenzweig et al. Pg.62). Women of the 1960s and today have struggled to attain this slender body such as Twiggy's, sometimes going to extreme lengths to do so. Although some of these role models might actually obtain these thin bodies through strenuous workouts and healthy diets, there are a huge number of them, such as Twiggy, that obtained them through extreme dieting. Frightened and inspired by these role models, overweigh t and even teenagers that are healthy according to their BMI (Body Mass Index) continue with strict dieting and exercise regimens. An Article... ...en death associated with eating disorders." Internet Journal of Cardiovascular Research 7.1 (2010): 1. Web. 22 Mar. 2011. Mehler, Philip S., and Mori Krantz. "Anorexia Nervosa Medical Issues." Journal of Women's Health (15409996) 12.4 (2003): 331. Web. 22 Mar. 2011. (331-340) Morris, Anne, Katzman Debra. â€Å"The Impact of the Media on Eating Disorders in Children and Adolescents.† Paediatrics & Child Health (2003) 287-289. Pulsis Group Inc. Web. 18 March 2011. Rosenzweig, Marianne, and Jean Spruill. "Twenty Years After Twiggy: A Retrospective Investigation of Bulimic-Like Behaviors." International Journal of Eating Disorders 6.1 (1987): 59-65. Web. 22 Mar. 2011. Winston, A. P., and P. J. Stafford. "Cardiovascular effects of anorexia nervosa." European Eating Disorders Review 8.2 (2000): 117-125. Web. 2 Mar. 2011. http://www.wisegeek.com/who-is-twiggy.htm

Bizet, Georges :: essays research papers

Georges Bizet   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Georges Bizet was born in Paris on October 25th, 1838. He was trained by his parents, who were musical, and admitted to the Paris Conservatoire just before his tenth birthday. There he studied counterpoint with Zimmerman and Gounod and composition with Halà ©vy, and under Marmontel's tuition he became a brilliant pianist. Bizet's exceptional powers as a composer are already apparent in the products of his Conservatoire years, notably the Symphony in C, a work of precocious genius dating from 1855 (but not performed until 1935). In 1857 Bizet shared with Lecocq a prize offered by Offenbach for a setting of the one-act operetta Le Docteur Miracle; later that year he set out for Italy as holder of the coveted Prix de Rome.   Ã‚  Ã‚  Ã‚  Ã‚  During his three years in Rome Bizet began or projected many compositions; only four survive, including the opera buffa, Don Procopio (not performed until 1906). Shortly after his return to Paris, in September 1861, his mother died; the composer consoled himself with his parents' maid, by whom he had a son in June 1862. He rejected teaching at the Conservatoire and the temptation to become a concert pianist, and completed his obligations under the terms of the Prix de Rome. The last of these, a one-act opà ©ra comique, La guzla de l'emir, was rehearsed at the Opà ©ra-Comique in 1863 but withdrawn when the Thà ©Ãƒ ¢tre-Lyrique director, who had been offered 100 000 francs to produce annually an opera by a Prix de Rome winner who had not had a work staged, invited Bizet to compose Les pà ªcheurs de perles.   Ã‚  Ã‚  Ã‚  Ã‚  Bizet completed it in four months. It was produced in September 1863, but met with a generally cool reception: an uneven work, with stiff characterization, it is notable for the skilful scoring of its exotic numbers. In the ensuing years Bizet earned a living arranging other composers' music and giving piano lessons. Not until December 1867 was another opera staged - La jolie fille de Perth, which shows a surer dramatic mastery than Les pà ªcheurs despite an inept libretto. It received a good press but had only 18 performances.   Ã‚  Ã‚  Ã‚  Ã‚  1868 was a year of crisis for Bizet, with more abortive works, attacks of quinsy and a reexamination of his religious stance; and his attitude to music grew deeper. In June 1869 he married Genevià ¨ve, daughter of his former teacher, Halà ©vy, and the next year they suffered the privations caused by the Franco-Prussian war (Bizet enlisted in the National Guard).

Saturday, August 17, 2019

Impact of the Telephone Essay

If you didn’t have the telephone then how would you contact people? You wouldn’t be able to easily. If you wanted to talk to people you would have to go to their house, meet them somewhere, or write to them. That would be difficult. The world’s communication has been upgraded by the telephone. The telephone had a large impact, it made business more efficient and it saved money from having to travel back and forth from far places, and it made transactions able to occur more quickly. It led to instant communications around the world and even led to the Internet. The telephone also opened up many new job opportunities by starting new companies and building and making more telephones for the rest of the country and world. (www.learnnc.org) Before the invention of telephones, mail was a large part of life. This was mainly because it was the only way of communication. Telephones are a huge part of today’s life. As telephones became more and more advanced they also became more and more popular. Now it is the most common way of communication. (www.slideshare.net) Our modern day telephone system has made our communication system more unified. Telephone has bridged the gap of long distance communication. This expansion of the telephone can never be stopped long as the telephone business continues to build for the future. No single year in the fifty of telephone history has recorded a shrinkage in telephone use. Telephones in the United States have multiplied from Bell’s one telephone t to more than 17,000,000, or one to every seven persons in the United States and the average number of telephone conversations daily has risen from less than 8,000,000 in 1900 to 70,000,000 in 1926. (www.learnnc.org) There is no overacting, the public demand for telephone service increases with every extension and improvement of that service. Apparently, the telephone industry is destined to grow as long as the United States grows. Certainly it will continue to grow as long as individuals and groups through improved communications find it possible to increase production and sales, leisure and wages, profits and the pleasantries of life. Before the invention of the telephone, messages were sent mainly via messenger and mail. Due to the great distances being travelled to deliver  messages, only important messages were being sent. Alot of the jobs that are existent today were non-existent during the phone-less decades. For example, the telecommunications industry and the eCommerce industry were not in existence during these times. If a person needed information about goods or services being offered in the community they would ask a friend or relative, or they would get on their horses and wagons and travel down to the local business and inquire for themselves. Before the invention of the telephone, people would rarely immigrate to other places for the fear of not being able to communicate with their family and friends. Communities had more of a social setting than they do now. Strangers would communicate with each other and friends would gather to discuss the latest gossip and enjoy each others company. In current technological times, we are no longer interested in socialising with the people around us, not even our neighbors. People were more aware of their surroundings and they appreciated it more than the modern day technological society that we live in. Traditions were held up and culture expanded. How do smart phones affect in our daily lives?Research has found that smart phones satisfy all social communication needs. this lead to addiction, lack of concentration and even lack of sleep. Smart phones have a huge negative effect in the workplace, because workers can not meet their deadline. The aim of this research was to find out if it is worthy getting a smartphone? and how is it going to benefit the person buying it? Smart Phones are highly advanced and are good in multitasking, but they changing our lives in a negative way. people do not communicate as much orally and become antisocial. Students do not concentrate in class. People become addicted to the phone and dependable. These are the effects that smart phones have on us.In conclusion: as good as smart phones are the negative effects are out weighing the positives. It is hard to say whether the invention of the telephone was a good thing or a bad thing for our society. Some might argue both sides. When attacking this issue there are a lot of different facts a person has to look at before they can decide. Some of the advantages of this technology are: In the event of an emergency, the proper authority can be contacted, we can now  communicate with our family whenever we wish (this promotes strong family ties),and businesses can now spread their services throughout the world. Some disadvantages that the invention of this technology had brought about are: Loss of traditional culture, increased health problems due to radiation, lack of privacy, and increased disturbances and lack of awareness of our surroundings. Although, there is some good and some not so good effects to this invention, it is hard for me as a person of this generation to be able to imagine a picture of a world without telephones. We know that it is the most important technologi cal invention because of the length of time it has been utilized and the rate in which its use continues to grow throughout the world. I believe that it has created a more controlled environment and should continue to be utilized for years to come. Works Cited â€Å"1.5 The Impact of the Telephone.† The Impact of the Telephone. Web. 11 Mar. 2014. . â€Å"Smartphone’s and Their Effect in Society.† Smartphone’s and Their Effect in Society. Web. 12 Mar. 2014. . â€Å"The Telephone’s Impact on America – The Telephone; Impact on America!† The Telephone; Impact on America! Web. 13 Mar. 2014. . â€Å"Thoughts of An Aspiring Journalist.† Thoughts of An Aspiring Journalist. Web. 13 Mar. 2014. .

Friday, August 16, 2019

Innovation Paper

? Introduction Innovation is about partnerships. It involves advancing new and improved ideas and is relevant to all communities. Partnerships create and promote entrepreneurship, the development of technology and its commercialization. Taken together, they are critical to enhancing many organizations and America’s global competitiveness. Workforce development and education support innovation and entrepreneurship, and linking these activities are important in developing a competitive innovation and an entrepreneurial system. This paper will discuss how to identify and characterize promoting innovation, the role of leadership in sustaining innovation and the ethical implications of promoting innovation in an office environment. How would you identify and characterize the roles of incentives, training, and education in promoting innovation in your organization. In order to effectively promote innovation organizations must give their employees; â€Å"meeting and recreational space which lead to spontaneous encounters and informal networking, both are important facilitators of innovation† (Bettina Von Stamm,  2003,  para. &5). These incentives cannot act alone and instead must act together through managerial efforts with their upper level management. By working together and introducing organizational competitiveness throughout the company, upper level management and everyone else will recognize the results of better communication, coordination and cohesiveness of their innovation related efforts. Through collaborative efforts, organizations become stronger by leveraging and combining the individual strengths and resources of each employee. America’s colleges and universities are key assets that must be tapped in order to advance our nation’s innovation strategy. The United States has the best higher education system in the world and that system should be continually expanding with more students, better trained faculty and more primary research capabilities. American colleges and universities are essential in educating our future workforce, conducting research, and producing innovations. What is the role of leadership in creating, managing, and sustaining innovation in your organization? Introducing organizational innovation incentives is not an easy task, and will take finesse, and people skill to be successful. The organization structure and its relationship to culture will need to be understood to develop an action plan that will fit the current and future organizational culture. Once the culture has been dissected and analyzed, it’s important to know who the key players are, in other words, those who have the power, and authority to make decisions will be the most instrumental to the success of increasing organizational innovation. During the change process it’s necessary that one possesses a certain skill set, or techniques to help deal with resistance once discovered. Communication, the art of negotiation, and people skills are the best tools one can possess when dealing with resistance to change. Once those attributes are exhibited, techniques will need to be implemented based on the leadership. What are the ethical implications of an individual reward system? To abandon or abuse the performance appraisal process is a breach of business ethics. While some managers are skillful and genuine in reviewing an individual's performance, that does not appear to be typical. The ethical ramifications of performance reviews have caused managers and employees all levels to become frustrated, cynical, and withdrawn. Many managers talk about ethics but do not recognize or act upon ethical issues in their day-to-day managerial responsibilities. Most ethical questions arise from people relationships within the organization. Managers must realize that ethics is the process of deciding and acting. Results of questions from my previous organization indicate that some of the managers believe they are recognized and reinforced for their ethical decisions and behaviors. Employees have a big stake in the way managers evaluate and operate. Managers and nonsupervisory employees alike cite concern about â€Å"politics and lack of fair treatment, honesty, and truthfulness† in connection with the performance review. References Bettina Von Stamm. (2003). Managing Innovation, Design and Creativity. Retrieved April  7, 2009, from Bettina Von Stamm, Week Five, OI 461.