Wednesday, July 31, 2019

The Growth of Online Shopping

THE GROWTH OF ONLINE SHOPPING MENTORED BY- MR SUHAIL ANWAR NIFT, NEW DELHI CREDITS- VAISHALI RAI SEMESTER III BACHELOR OF FASHION TECHNOLOGY NIFT, NEW DELHI 2011-2015 DATE- 21 AUGUST, 2012 CERTIFICATE â€Å"This is to certify that this Report titled â€Å"THE GROWTH OF ONLINE SHOPPING† is based on my, original research work, conducted under the guidance of Mr. Suhail Anwar towards partial fulfillment of the requirement for award of the Bachelor Programme – Technology, of the National Institute of Fashion Technology, New Delhi Center. †Signature of Researcher Vaishali Rai BFT-III NIFT, New Delhi Signature of Mentor Mr. Suhail Anwar NIFT, New Delhi ACKNOWLEDGEMENTS Any accomplishment requires the effort of many people and there are no exceptions. The report being submitted today is a result of collective effort. Although the report has been solely prepared by me with the purpose of fulfilling the requirements of the course of BF-Tech (Bachelor of Fashion Technology ), there are many helping hands behind it who have guided me on my way. My sincere gratitude goes to Mr.Suhail Anwar, my mentor for the project, for providing me with his valuable knowledge and guidelines so as to bring out this report in a proper manner. I would like to express my gratitude towards my parents for their kind co-operation and encouragement which helped me in completion of this report. Lastly, I would like to say that this report has been prepared by me and any mistake/error in the report is solely my responsibility. Vaishali Rai BFT-III NIFT, New Delhi CONTENTS 1. INTRODUCTION 2. CURRENT ONLINE SHOPPING SCENARIO . EXISTING TRENDS IN ONLINE SHOPPING- GLOBAL AND INDIA 4. WHAT THE FURURE HAS IN STORE 5. REFRENCES INTRODUCTION When it comes to today’s Gen Z, apparently the internet generation (and the most lazy gen of all), almost everything right from food to things in our bedroom is somewhere or the other the result of the tech savvy and internet friendly behavi or of ours. A click and we have the dominoes pizza sizzling hot on our doorstep, a click and we have the latest gadget in our hands†¦ what else do we need?Dad’s credit card of course but that is not a problem at all. It’s like a new trend has started, the â€Å"CLICK has gone WILD† and online shopping†¦ wilder!!! A report by Forrester, a leading research agency indicates that online shopping has recently seen an upsurge in its realm owing to easy access to Internet, the global IT boom which has facilitated an exemplary growth of all IT – related infrastructure, and the ridiculously busy schedules which leave us too drained to take the trouble of driving to a store to buy what we need.While it’s still nice to stop by a store to touch and see products, the convenience of online shopping can’t be beat. To be precise there are quite a few reasons behind this upsurge, which are mentioned below- * The e-tailing sites have been pumped wit h cash for expansion, and there’s now a frantic race afoot to try and scale up as quickly as possible. * The reasons for this surprising consumerism are also attributed to several socio-economic reasons including high disposable incomes and greater focus on status and reflection of the private label of all consumer goods. Increase in number of people using internet and their growing belief in it due to consumer friendly security gateways etc. * The modern infrastructure and the ease of technology offered is also one of the biggest reasons for the growth of this trend. Of course, India, home to people who are huge fans of sales, discounts, etc has the gaining popularity of the coupon sites sharing the task of popularizing the growth of online shopping trend in the country. CURRENT ONLINE SHOPPING SCENARIO- MARKET AND THE CONSUMERSThe biggest hindrances to online shopping in the past were the high incidence of identity theft, lack of consumer-friendly site interface, and the do t-com bust. But despite these drawbacks, with the help of computer programmers' improved software and increased security, investors and businesses rebuilt and redefined online marketing. Today, online stores are in the millions, with shops catering to both businesses and direct consumers. * Currently Europe is the largest market for online shoppers in the world. And when it comes to nations, US and UK top the charts. Wherein when it’s the fastest growing regions of online shopping, the APAC region is gaining high popularity, both in terms of market and the consumers. Recently, it was reported that Asians, particularly Indians and Chinese, are changing their way of shopping and are going online. There are more ‘High Net Worth' consumers within China than the whole of Europe put together. Japan leads the global mobile shopping sector due to the existing infrastructure for fast and innovative delivery of technology customized for personal consumption.When the rest of the w orld showed consumers cutting back on spending, some of the countries of the APAC region, such as India, China and Vietnam, showed a surprising rise in sales values to the tune of 15 percent in comparison to the rest of the world. India alone saw the growth of 18 percent in its online shopping sector. EXISTING TRENDS IN ONLINE SHOPPING- GLOBAL AND INDIA In the global markets, the move is towards online portals, while in the Asia- Pacific regions, especially India, there is an equal mix of traditional or wet markets for fresh produce, followed by the online format for lifestyle products, clothing and electronic goods.Trends in Global Online Shopping: * 92 percent of Consumers use websites to compare prices * 76 percent of Consumers use websites to access and print coupons * 75 percent of Consumers purchase at least 1 products or services per month via the Internet * 26 percent of Consumers spend at least $500 per month buying goods/services via the Internet Trends in Indian Online Sh opping: * In the next one year, at least eight out of ten Indian consumers will make online purchases At present, a little more than a quarter users reveal that they spend 11% of their monthly shopping expenditure on procurements online. * 71 percent Indians trust recommendations from family when making an online purchase decision. Recommendations from friends stand at 64 percent and online product reviews at 29 percent. * Almost 50% Indian consumers’ use and trust social media sites to help them make online purchase decisions * In the next 6 months or so, most buyers will purchase books (41%), airline tickets (40%), and electronic equipment such as TV, Cameras (36%) online. The trend observed is that while shopping, most buyers ideally shop from websites that allow them to select products from many different stores. WHAT THE FUTURE HAS IN STORE Global business-to-consumer e-commerce sales will pass the 1 trillion euro ($1. 25 trillion) mark by 2013, and the total number of I nternet users will increase to approximately 3. 5 billion from around 2. 2 billion at the end of 2011, according to a new report by the Interactive Media in Retail Group (IMRG), a U. K. online retail trade organization.The study estimates that business-to-consumer e-commerce sales in 2011 increased to 690 billion Euros ($961 billion), an increase of close to 20% from a year earlier. IMRG estimates that growth rates in countries like US and UK (currently the market giants) will be approximately 10-15% a year. But with China’s e-commerce sales growing more than 130% in 2011, it is only a matter of time before the Asian giant becomes the single largest market in the world. IMRG, is forecasting that France, Italy, Spain, Russia, Turkey and Poland will be the fastest-growing markets in Europe.It also anticipates substantial growth in Latin America, led by Brazil and Mexico, and the Middle East, led by Israel and the UAE. Online retail in India is on fire and will be on it in the n ear future. India to be the fastest growing E-Commerce Market in Asia-Pacific region and its online market is set to grow to $8. 8 Billion by 2016. According to the latest research by Forrester, a leading global research and advisory firm, the e-commerce market in India is set to grow the fastest within theAsia-Pacific Region at a CAGR of over 57% between the years 2012-16. As per the report, while compound annual growth rates in the mature e-commerce markets of Japan, South Korea, and Australia will run 11% to 12% over the next five years, in the rapidly growing markets of China and India, these growth rates will be 25% and 57%, respectively. This report brings out the fact there has been a stable rise in the sector of online shopping and this rise will continue to take place in the future also.The trend of online shopping is here to stay. REFRENCES – http://www. businessreviewindia. in/marketing/web/online-shopping-trends-in-india (Visited on 12 August, 2012) http://www. bi gcommercereviewsite. com/online-shopping-statistics-is-your-offline-business-suffering/ (Visited on 12 August, 2012) http://EzineArticles. com (Visited on 17 August, 2012) http://www. asiaonlinemarketing. com/online-potential-in-asia-pacific/ (Visited on 17 August, 2012) http://www. retailresearch. org/onlineretailing. php (Visited on 16 August, 2012)

Tuesday, July 30, 2019

PWU FORMAT FOR THESIS PROPOSAL Essay

Hypothesis The following hypotheses are (or hypothesis is) formulated for acceptance or rejection: (use null hypothesis) Scope and Limitation of the Study Should include: 1. Focus/ areas/ scope to be assesses/ investigated/ determine/ analyze & where to conduct research 2. Participants( subject or respondents or population) of the study including sampling technique to be used, total number of population/ exclusion/ inclusion/ criteria used if purposive 3. Instrument/s to be used for data gathering (example: questionnaire, interview, observation, etc. One or combination of any chosen tool/s) 4. Statistical treatment of data to use 5. When to conduct the study Significance of the Study Findings and recommendations of this study could be beneficial to the following: School Administrators. Blah†¦.. School of Nursing. Blah†¦ Nursing Students. Blah†¦. Etc†¦ Future Researchers (should be the last) NOTE: Identify who will benefit from your study and how will they benefit from the results of the study Definitions of Terms The following terms are operationally defined within the scope of the study: (Key words can be identified from the title and variables that need to be defined in relation to your study. Remember operational, not conceptual definition.) Chapter 2 (on separate sheet) REVIEW OF RELATED LITERATURE AND STUDIES This chapter provides review of related literature and studies, both local and foreign which are related to the study. This chapter should be arranged by topic, integrating both local and foreign literatures and studies. Local Literature – includes primary or secondary related literatures from reference materials such as books, journals/ periodicals, websites, newspaper, speeches, encyclopedia, patient’s medical records, handouts, manuals, etc†¦ Local or Filipino authors Foreign Literature – includes primary or secondary related literatures from reference materials such as books, journals/ periodicals, websites, newspaper, speeches, encyclopedia, nursing literatures, etc with foreign authors, nursing theorists or other theorists from different fields of studies- medicine, psychology, sociology, education, etc that are relevant to your study Local Studies- includes research studies, undergraduate/ graduate theses or doctoral dissertations from Filipino students or researchers, thesis review, abstract of studies, published or unpublished Foreign Studies – as above but with foreign authors, published or unpublished, internet sources (Arranged by topic with sources – author/s and year of publication only ; proper citation ) Synthesis Includes the summary of related literatures and studies, pointing their similarities and differences from your present studies. 1 – 2 pages only. Theoretical Framework If research paradigm is I-P-O (Input- Process- Output), use the General Systems Theory (research on this). If you will use Independent Variables- Dependent Variables, use conceptual theory that will best support your research paradigm. (Figure 1. Research Paradigm (illustration of your research study) must be in one whole sheet, placed at the last page of chapter 2. Explanation of your paradigm or model must be under theoretical framework after the discussion of the framework you will use . Chapter 3 (separate sheet) METHODOLOGY Research Design This study will use the _________________________ research design to (state purpose of the study), (You may define or state the purpose of the study†¦ you may quote the definition from the book and cite your source/s). Participants of the Study Include here the subject/ population of the study†¦ you may copy this part from your scope and limitation. Instrumentation Construction. Include here the type of data gathering tool or method you will use, how are you going to construct your questionnaire, source/s to use or your reference for constructing your tool. Description of the tool†¦ Part I will include †¦..; Part II will consists of†¦. Validity. Mention here who will validate your questionnaire ( at least 3 experts), if you’re going to pretest or conduct pilot test prior to actual study. Data gathering Procedure Include here how you will conduct the study – letter of consent requesting permission to conduct study: Dean, Director of Hosp, Chief Nurse, participants; When to conduct study, manner on how to conduct study – distribution and retrieval of questionnaires. Statistical Treatment of Data What statistical instrument to use†¦ frequency distribution for profile, percentage, measures of central tendencies. What statistical treatment to use for test of hypothesis: t-test, Chi square, Pearson r correlation coefficient, ANOVA, etc†¦ BIBLIOGRAPHY (Separate sheet, center) A. BOOKS (center) Grodner, M., Roth, S. (2005). Foundations and Clinical application of Nutrition: A Nursing Approach. Singapore: Elsevier Pte Ltd., Health Services Asia B. JOURNALS/ PERIODICALS(center) Hughes, A. (2007). â€Å"Pragmatism Rules: The Interventions and Prevention Strategies Used by Psychiatric Nurses Working With Non-Suicidal Self-harming Individuals†. Journal of Psychiatric and Mental Health Nursing. Vol. 9, No. 17, pp. 64- 71 C. ELECTRONIC SOURCES (complete website/ internet ad/title/ author and date of retrieval; center) D. UNPUBLISHED MATERIALS (Undergrad or grad theses. Doctoral dissertations†¦center) Salang, F. (2009). Determinants of Stressors and Coping Mechanism: Their Relationships. Master’s Thesis, Asia-Pacific College of Advanced Studies, Balanga City E. OTHERS (Handouts, speeches, manuals, hosp/ school manual of policy and procedures, etc.) APPENDICES (separate sheet) Include Sample letters to the Dean, Director of Hosp., etc.., participants, questionnaire/ interview questions, etc. CURRICULUM VITAE (separate sheet) Brief resume with picture NOTE: 1. ALL ENTRIES SHOULD BE ARIAL, FONT SIZE 12, DOUBLE SPACE, JUSTIFY. FOLLOW THE STYLE IN THIS FORMAT. 2. PAGE SHOULD APPEAR ON THE RIGHT UPPER CORNER, NO PAGING ON SHEET WITH â€Å"CHAPTER 1, 2, 3† BUT INCLUDED IN COUNTING OF PAGES (EXAMPLE- Chapter 1 is page 1 but â€Å"1† should not appear in the paper, next page will be the page 2), PAGING SHOULD BE CONTINUOUS UP TO APPENDICES EXCEPT FOR CV. 3. Follow the correct format for Bibliography 4. Related Literature and Studies should be from 2006 up, or otherwise rephrase if your related lit is â€Å"old†. 5. MARGIN: 1.27 INCHES ON TOP, 1.5 LEFT; 1 INCH RIGHT & BOTTOM. 6. EVERY CHAPTER SHOULD START ON A NEW SHEET. 7. SINCE THIS IS A PROPOSAL, DO NOT USE PAST TENSE. 8. Do not use 1st person account such as I, you, me, our..Refer to yourself as the researcher. 9. Do not use block style; 1st sentence for each paragraph must be indented. 10. Appendix should include: 1. Sample Letter : a) Letter of Request to __________ (to request permission to conduct study) ;b) Letter to heads (nurse/ records section, etc..) if needed; c) Letter to Participants (for consent); d) Letter to Validators (if needed) 2. Sample questionnaire

Automobile design Essay

STATEMENT OF PURPOSE â€Å"Education is the manifestation of the perfection already in man†. -Swami Vivekananda I strongly believe that perfection is already in man, inherent in his heart and soul and education is the medium through which we are able to manifest that perfection. This century can be credited with having given birth too many ideas, visions, way of living and working. It can be credited with almost as many revelations of thoughts and practices. The world is ever changing. An ambition to be a part of and to contribute to this fact changing process, a perpetual urge to learn quest, a profound desire to translate conception into reality made me opportunity for a Graduate program at your prestigious university. It has been my deepest desire to be a part of this rapid burgeoning community. With due reverence to the department and University, I pen down this Statement of purpose. In this ever changing world of Engineering and Technology, passing day makes them obsolete, I want to attain the highest level of education and transcend new scope for research in Mechanical Engineering. This has always fascinated me and I am keen to continue my academic pursuit in this field. I have always cherished a dream to become an Engineer, a dream that was innate and developed slowly over the years. Right from my school days I grew, my interest and ability were inclined towards the physical nature of the universe. Science unraveled many a mystery for me. Math’s challenged me and gave me joy. Learning itself became a key to my life. My tryst with Automobile’s began during my childhood days when I had a great interest in Racing Sport and Cars. The idea of controlling a car has always been very thrilling and invigorating I remembered being hooked to the television, watching in amazement, an array of open wheeled cars circulates the track in a staggering fashion. Moreover, reading pertinent journals and magazines has helped me stay up-to-date with the recent advances in this fast-moving field. I always enjoyed analyzing and understanding the working of Automobiles, starting from experimenting on my toys to fixing my bike. It was then that I aspired to enter into this intriguing branch of Mechanical engineering and make my mark on the Automobile Industry. I would like to have a glance at my academic career which imbibed me potential to perform well and made me a commodious person. I did my schooling in the idyllic atmosphere  of which I gradually flourished as a versatile person where I got my first leap by scoring 75% in tenth standard. I scored 87 marks in mathematics and 82 in science; with this motivation I pursued Mathematics, Physics and Chemistry as my major course in Intermediatewhere from, I secured 73.1% in higher secondary exam. The competitive spirit within me acted as a catalyst in all my academics successes. Pursuing Engineerin g as my future was a natural consequence because of my undergraduate studies in Mechanical Engineering. I have benefited from the breadth of College of Engineering & Research, affiliated to the Jawaharlal Nehru Technological University one of the most prestigious university in India. The day of my undergraduate study helped me to get sound knowledge and a firm grasps over the principles underlying the course, which gave me an edge above other students. I excelled it with first class with distinction with an aggregate of 74.32%. The undergraduate study has given me a comprehensive exposure to a wide spectrum of courses in mechanical engineering namely, Strength of Materials, Design of Machine Members 1&2, Kinematics of Machinery, Thermodynamics, Finite Element Analysis, Mechanics of Solids, Robotics, Computer aided Design/Computer aided Manufacturing etc. I strongly believe in â€Å"learning by doing†. It is the hope of coming up with path breaking results streaked with an element of uncertainty that makes experimental result extremely fascinating. I went beyond the four walls of the classroom, during my undergraduate course, I visited many industries in which I underwent five week technical training at Nuclear Fuel Complex (NFC), is a Department of Atomic Energy on the study of Manufacturing Extrusion Die on CNC Lathe Machine which includes it’s casting to final Product in plant and other applications. Later I had undergone industrial visit at Vizag Steel Plant popularly known as Vizag Steel is the most advanced steel producer in India with the help of German and soviet technology where I have learnt the process of Manufacturing of steel from its coke to final product. This provides to be a very valuable experience as it provided me with an industry exposure and a chance to showcase my technical knowledge in an industry based environment. I wanted to get closer look at the application of Mechanical Engineering. I presented a good number of technical papers at the national level. The first competition I took part was a National level Paper Presentation event conducted by NIT Rourkela, as  a part of ‘INNOVATION 2011’ and I got Merit Certification. Then I participated in a ROBOTIC Work shop held at Kakatiya University, Warangal and I presented paper on ‘Solar & Hybrid Vehicle’ at VNR Vignan Jyothi and received a merit certification. And I have also participated as a Volunteer in a prestigious Social Activity like ’Hyderabad Literary Festival’ held in January 2014. I have organized many technical and cultural events. All this extra-curricular activities have made me social accomplished with self-confidence, communicating skills, leadership qualities and team spirit. My major contribution towards research, leading the team in an academic oriented research main project â€Å"Dynamic Analysis of Composite Propeller of Ship Using FEM† The project deals with modeling and analyzing the propeller blade by using ’C arbon Fiber Reinforced Plastic’ materials, to reduce the Vibrations & Noise in the Propeller. This requires high end Modeling software’s. The Solid model is developed in CATIA V5 R19, Tetrahedral mesh is generated in HYPER MESH and Static & Modal Analysis is done in ANSYS. The Analysis results showed that the natural frequencies of composite propeller were more than aluminum propeller, which indicates that the operation range of frequency is higher for composite materials. My role in this project as a team leader was to provide the basic functionality which deals with Modeling and analyzing was handled by my team mates along with my participation. The success of this project made me thirst in quest for a research in Design for Manufacturing, Advanced Material Technology and Design & Development which is the front and backend of my application. It has long been my ambition to pursue my studies in Automotive Engineering and to do it from a country like Germany will be a golden opportunity of my life. I know that Germany has got good reputation for higher education around the world. Its automotive industry is among the top manufacturers in the world with famous BMW and Mercedes as the leading success story of quality, modernity and comfort in automobiles. One final honest to goodness thought I have to admit in conclusion, I feel I would like to give back society all valuable and technical skills that I will be gaining from your university I am confident that graduate study in your department, which is already at the cutting edge, would provide me an excellent opportunity to reach my goal. Diverse background of students, distinguished faculty and research facilities at the institute will also help me to expand my horizons.

Monday, July 29, 2019

Journal Article Review Example | Topics and Well Written Essays - 750 words

Journal Review - Article Example The article has also addressed the interaction terms for poverty and mobility, poverty and heterogeneity, and mobility and heterogeneity are explored as well. The article’s result got from the study holds up the findings from recently carried out victimization studies and earlier studies of ecology using official crime counts. Structural density and family disruption, along with poverty and heterogeneity, are found to be significant ecological variables for mastering the crime rate distribution among neighborhoods (Warner and Glenn, 1993). In this article, social disorganization theory has been addressed intensively. The authors assert that social disorganization was among the prominent theories that explained crime in the earlier stages of this century. This is so because of the theory’s focus on the crime geological distribution of crime and the structural features of the neighborhoods that are related to the crime distribution. The article is also of the position tha t the approach of the ecology the study of crime fell, in the 1970s, out of trend. However, the ecology approach was replaced by more theories of social psychology. The authors say that several reasons for the social disorganization theory decline was in place, especially the devastating criticism that had a lot to do with the reliance of the research carried out on the official crime measures (Warner and Glenn, 1993). The article puts it that although many of the early social disorganization theory empirical examinations got support for its main ideas, the theories depended more on official crime measures (such as juvenile court referrals, arrests, and official counts of crime). It was argued in the article that the official measures of crime had a high likelihood to reflect biases in the official crime reactions because they were intended to reflect true measures of crime. This article viewed crime measures with particular skepticism when applied in relation to the communitiesâ₠¬â„¢ characteristics. Non white and poor neighborhoods were suspected of being vulnerable especially to the inflated crime measures. The article also addresses the empirical support for criticisms provided by recent studies to this study (Warner and Glenn, 1993). Victimization data has also been reviewed in this article. The article asserts that the promise of more accurate social structural effects examination on crime and a social disorganization theory renewed interests came only with the beginning of victimization data. The findings in this article and the data collected enabled for counts of crime separately from any official crime responses, and research social disorganization theory examination using the collected data. The article also says that, though the studies of early victimization explored and examined cities instead of neighborhoods used for the majority of the studies carried out earlier, the findings of these studies nevertheless raised questions concerning conclus ions based on the official data of crime. The results from the studies provided mixed support to the major social disorganization theory variables and questioned particularly the role of poverty. The article reports that Sampson (1985) detailed that mobility and racial composition were related positively to the total personal victimization and that

Sunday, July 28, 2019

Leadership style or skills and Nursing Faculty Research Paper

Leadership style or skills and Nursing Faculty - Research Paper Example Likewise, the local colleges and universities are also being challenged on how they can effectively increase the overall quality of As a common knowledge, the use of poor leadership style will increase the risk of high employee turnover rate. Instead of being able to encourage more registered nurses to become a nurse educator, having an ineffective leadership skill will not only discourage our future registered nurses to start a career in nursing education but also lead to the development of a poor nursing educational programmes. For this reason, it is very important for all nurses to fully understand all factors that will contribute to an effective leadership style. By doing so, our future nurses will be able to help reduce the shortage of nursing faculty staff (Royal College of Nurisng, 2010, p. 10). The common challenges that most of our nursing faculty leaders are experiencing include recruitment and retention of highly competitive nursing educators (Laschinger et al., 2009). It is important to provide the faculty members with opportunity to participate in a leadership training programme. Failure to do so can make the nursing faculty leaders more dissatisfied and burnt-out with their overall job requirements (Laschinger et al., 2009). By continuously improving the effectiveness of nursing faculty staff recruitment strategies, the leaders of nursing faculty can gradually improve its employee retention rate. To do so, several studies strongly suggest that the leaders of nursing faculty should focus on identifying ways on how they can help them create a healthy and attractive work environment for all registered nurses who wish to pursue a career in teaching (Weberg, 2010). To create a healthy and attractive work environment, the leaders of nursing faculty should be able to improve their leadership skill (Casida and Parker, 2011). Through the use of effective leadership style, the leaders of nursing faculty can easily increase the overall job satisfaction

Saturday, July 27, 2019

Are males and females motivated differenlty in PE Essay

Are males and females motivated differenlty in PE - Essay Example The participants were asked to answer a questionnaire to establish the gender differences in the motivation of students to participate in sports. The author, Nathalie Koivula, used a seven-point scale very similar to the one used by this author in the questionnaire created for this study. The author also discussed relevant research and studies previously conducted by other researchers. Koivuli (1999) concluded hr findings after explaining the results by stating that: The findings of the present study suggest that gender and gender-based processing correlate with the reasons given for participation in sports, some of which have been demonstrated in the present study, as well as earlier ones, to correlate with both frequency and the amount of time spent participating. It is therefore of interest to include these variables when generating and elaborating theoretical models to explain sport behavior. This article is useful to this study in that gender differences with regards to motivation is discussed in detail. This author was able to glean important points that was explained in the discussion section of this dissertation. It is important to note that although Koivuli had different results than this author, a point of comparison was made and an improvement in the motivation for participating in PE classes was seen as a result. Student Motivation in Physical Education: Breaking Down Barriers; Student Motivation in Physical Education Typically Declines after the Early Years. Why? and What Can Be Done about It? By Claire M. Mowling et al. This article discusses student motivation with regards to participation in Physical Education classes. The author delves into intrinsic and extrinsic motivation and how they present a problem with regards to students not being encouraged that much to participate actively in PE classes. The author then proceed to outline methods on how to bring down the barriers and improvements that can be made in order to address the issue

Friday, July 26, 2019

Case Study Lucy and Peter at the GP Essay Example | Topics and Well Written Essays - 3000 words

Case Study Lucy and Peter at the GP - Essay Example Science has utilized the use of biometrics to safeguard information. In a particular case, the examination of the use of biometrics and the dispensation of information via technology will be discussed. Then, a discussion will be made upon the ethics of the usage of such systems as well as the exploitation of the lacklustre security. Security over things worth protecting has been a significant driving force in technology development as well as policy proliferation. Scientists and lawmakers have joined their efforts to protect identity and fiscal assets. However, through pillaging of cyberspace hackers as well as authorized utilization and viewing of sensitive information has ran rampant on every level. The attacks on military and financial districts of the United States on September 11 gave lawmakers all over the world, especially industrialized countries (i.e. Europe and the United States), a renewed impetus to strengthen security on all levels. Biometrics and other related mechanisms have provided a means to aid in security. Biometrics is the development of statistical and mathematical methods application to data analysis problems in the biological sciences. The form of measurement is used specifically penal and corporate identification systems to protect privileged and sensitive information. ... The Greeks used almost the same methodology but in cunning and precise manner. Now, digital hand prints and eye identification are the standard as well as highest form of security to date to protect sensitive information and financial investments. (Tapscott, pg. 43) False positive tests are made to secure the identity of all constituents involved. Non-repudiation In electronic commercial transactions such as the ATM, all constituents in a transaction must be assured their security is not infringed upon. Via authentication of all parties, a transaction could be made in full confidence. Systems are programmed to make prevent any concerned parties from repudiating a transaction prior to their agreement in a form of digital signatures. Cryptographic hash function Cryptographic hash function is used for information security cryptographic hash function is to translate and transcribe an original writing or picture into an algorithmic form or a "digital fingerprint" for data. The code that represents the actual artefact is conveyed in hash sums. Devices that utilize this method expeditiously dispense information without revealing information. Each hash function must have its own distinct algorithmic, code. Distinction is important inasmuch as it mitigates confusion between two people. Inasmuch as all constituents, to a transaction wish that transaction to be secure, electronic devices must authenticate all constituents to prevent any interlopers. Also, devices, such as ATM machines must prevent parties to electronically renege their transaction. To consolidate trust, the implementation of digital signatures has been heavily utilized. (Cranor, pg 30) Polyalphabetic substitution Among the most original and often

Thursday, July 25, 2019

Cause and effect Essay Example | Topics and Well Written Essays - 1000 words

Cause and effect - Essay Example on of marital relationships is strongly associated with aggression, whose presence may cause separation or divorce within a marriage’s first 4 years. Studies show that couples who exhibit aggression in their marriages would be more likely to end their marriages through divorce or separation than those that do not (Fine and Harvey 98). Newlyweds are particularly at risk as they show higher levels of aggression. Partners facing marital violence mostly downplay the violence by making excuses for not seeking help for the behavior, opting instead for divorce. The link between marital dissatisfaction and divorce is strong. Couples that are unhappy with their union are at an increased risk of divorce than those who are happier. Fine and Harvey support this postulate, noting the risk to be higher if the husband is the unhappy one of the couples (97). The risk when the wife was unhappy was noted to remain the same as when both are happy. Marital dissatisfaction may come as a result of the two people growing apart for various reasons causing them to lose touch of each other. Adultery is one reason that may cause couples to grow apart as it causes mistrust to creep in. Such mistrust causes couples to prefer to be apart, hence divorce. Additionally, alcohol and substance abuse has led to the dissolution of many marriages. Alcohol consumption, particularly in excessive amounts, leads to lack of control and could lead to physical or psychological abuse which strains marriages (Sember 6). Alcoholics would not aware of the damage caused to the family, especially because parenting would be left to one partner. A marriage with one or both partners engaging in substance abuse would be 4 times more likely to end in divorce than one where the partners do not (Fine and Harvey 97). A majority of men divorcees report spousal abuse as the cause of their divorce. Finally, economic challenges accelerate the risk of divorce. Studies have shown that couples are at a high risk of divorce

Writing for life Essay Example | Topics and Well Written Essays - 500 words

Writing for life - Essay Example It turns out that I am the kind of person who is able to make something bad. And the fact that I have this potential makes me feel uncomfortable. So I decided to work with myself to make sure that if one day I find myself in situation of a harsh choice, I will not make a wrong decision. The point is that we always judge others. We believe that we know what is good and bad and we give ourselves this right to judge others. But in fact, considering every single situation deeply and putting ourselves in somebody’s place we may find that we would act the same way. And still we keep judging. But if we know how to act properly to be good, why often we don’t do it? I want to believe that people can be changed; moreover, I think people can change themselves. Because frequently it happens that something really bad changes person’s way of thinking, and she or he decides to make some personal changes. Does it mean that some sad event is the only way to start your personal changes? I think it’s not. Noticing some bad part in my personality makes me think of changing it into a good one, so I make decision to work on my personal qualities. Obviously working on my personality is hard for me, because I almost struggle with myself. This struggle is the mo st difficult thing in the world, because your personality is the only thing you can’t hide from. But when I think of results I’ll receive lately I feel that these difficult attempts of mine on the way to my virtue are worth being made. I hope sooner or later more and more people will come to the same conclusions as I have. This understanding of the truth that everything in my will and I’m responsible for my personality and only I can change it – it is definitely something inspiring. I wish you to experience the same, my dear

Wednesday, July 24, 2019

Entreprenuership and Innovation BUS7001 Essay Example | Topics and Well Written Essays - 2000 words

Entreprenuership and Innovation BUS7001 - Essay Example The question that needs to be asked should therefore centre on how to create a competitive urge over competitors. This is for now, what the present report seeks to achieve by analysing all factors that centre on the product and the market so as to put the product in a better position to penetrate the market (Aldrich and Weiss, 2001). A lot of research will also be done on the product involved so as to establish the key strengths of the product that needs to be built upon and some weaknesses that need to be improved. An assessment of the factors in the marketplace into which you suggest the product could be sold Sale in universities and other educational institutions where students have daily demand for cooking There are several factors on the prevailing market that suggest that the product cold easily be sold. One of such factors has to do with the fact that there are at every point in time, students in various universities and colleges who are in hostels and have regular demand for cooking. These students are not fed by the school and thus have to depend on their own provision for food (Aldrich, 2009). With growing concern for the need to stay healthy in one’s eating habit also, the likelihood that these students will resort to ready-cooked food is also minimal. This therefore means that a lot of these students will have to cook for themselves. Again, considering the fact that there is an ever growing student population in our country, one thing remains clear and that is, the product will certainly have a very large customer base among the students if the university cooking factor is considered critically. Another factor within the university factor that makes the product very viable and suitable for the university population is that students do not have much time for activities like cooking and are therefore always looking for avenues that will make cooking fast and less involving – something that this new product can easily give them (Bender, 2 000). Sale in places where the use of electricity as the source of energy as compared to gas is seen to be cheaper and easily accessible. Another important factor that suggests that the product will easily sell on the marketplace has to do with the every growing concern for the need to use electricity as a preferred source of energy instead of gas. It would be noted that gas has for long remained the major supply of energy for most homes in developed and developing worlds. However, the risks involved are fast being calculated by scientists and other experts. Some of these include pollution, degradation of the environment, greenhouse effect and dangers of causing fire (Birley and Westhead, 2004). With such concerns, the focus has now shifted to the use of electricity. Knowing that the new product is powered by electricity, the company has an advantage and potential in selling the product in places where the use of electricity as the source of energy is regarded as safer and environme ntally friendly option. Even more, electricity continues to be a cheaper source of energy as compared to gas and other forms of energy for powering cooking devices like

Tuesday, July 23, 2019

Content analysis - have gun will travel Research Paper

Content analysis - have gun will travel - Research Paper Example The stories were both hero myths and tales of American perseverance and fortitude. The Western hero represented a male ideal that could only have existed in a lawless world, but who represented the organized powers of the American government which was invulnerable to enemies both foreign and domestic. The gun as a source of power was also representative of the technological superiority of American industrialization (Tucker & Tucker, 2008). The United States had undergone great strife during the time that the Western genre was in its height. The image of the Western hero proposed a foundation of historic strength through which the American self concept was reinforced. The following paper will look at the nature of the Western as it related to the national civic imagery through which patriotic pride was built and sustained. The radio program that had been inspired by the television program was a textual promotion of the symbols that appeared on the television program, the might of the American righteousness promoted without regard to authority or law. The radio program Have Gun, Will Travel was popular because of how the American mythologies were built as reflection of the philosophical foundation upon which the American myths have been perpetuated. In the 1920s the radio was the center of the first burst of information consumption in the United States. Both news and entertainment could come directly into the homes of the masses, creating a world that was just beginning to grow smaller merely through access. Ware (2009) writes of several different perspectives on the effects of the radio. Some believed that the radio worked as a medium through which to perpetuate stereotypes, the concept of cultural differences boiled down to indicators through which to identify everyone within a culture. There was also the fear that it would act to flatten the nation, geographical

Monday, July 22, 2019

To Kill a Mockingbird Chapters 22-31 Questions Essay Example for Free

To Kill a Mockingbird Chapters 22-31 Questions Essay 1.Atticus is extremely disappointed and walks out of the courtroom after the verdict is announced. 2. When Miss Maudie is explaining that they had people like Atticus, she was telling Jem that there were people in this world who do not fall into mob mentality. She tries to explain that even though Atticus did not win, he had got the town thinking for themselves for a change, rather than act on prejudice alone. He has created respect for the individual. 3.Miss Maudie says they have at least made a baby step in the right direction because she knows that the jury actually contemplated weather or not they were going to convict Tom which means the towns were looking past prejudices for once. 4. Dill says he wants to be a clown that laughs at people instead of people laughing at him. This means that Dill wants to laugh at people (society) because they are being so dumb in the Tom Robinson court case. Chapter 23: 1. Atticus doesn’t take Bob Ewells threat seriously because he thinks that Mr. Ewells just taking his anger on Atticus. 2. a)In a courtroom, if a defendant is put on a stand with only circumstantial evidence, that person is entitled to reasonable doubt. Circumstantial evidence means the acquitted person was there at the time of the offense, but theres no actual proof like DNA and things like that. b)People always believe white men before black because of prejudices. c)People have already made up there minds before even hearing a word of the case because of racism and prejudices. d)Sooner of later people are going to realize how wrong they treated people of different race and they are going to pay for it. 3. a) Atticus believes the Cunninghams are honest hard working people. b)Alexandra believes the Cunninghams are lower class, trash. 4. Jem can’t accept Scout’s opinion because Jem knows its not because in the mostly to kinds of people, the good and the bad. Chapter 24: 1.The missionary ladies seem to be rather negative, self righteous and hypocritical. Yes it’s typical for these ladies to act like this because I think these characteristics are what brings them together. 2. The irony is that Mrs. Merriweather admires J Grimes Everett and the work he is doing for tribes in Africa while she pays little attention and thinks nothing of the African Americans in her own town. 3. Scout prefers men to women because so in her life the people closest to her are men and she doesn’t seem to like to many of the women. 4. When Ms. Maudie says, Were paying the highest tribute we can pay a man, that out of everyone in Maycomb Atticus was the only one who would try his hardest to give Tom Robinson a fair trial. To represent him the way he deserved, with all the rights. That no matter what he is faced with; the town trusts him to do right. 5. True ladies know how to but their lip and fake a smile for the sake of others. Chapter 25: 1. Most of the town believe’s that Tom’s death just shows how dumb black people are(from the perspective of a white person). 2. Although Mr. Underwood holds racist vies himself, his editorial can be likened to Atticuss prior words. In his editorial Underwood writes, it was a sin to kill cripples, be they sitting, standing, or escaping. He writes that Toms death was tantamount to the senseless slaughter of songbirds by hunters and children. Atticus had also discussed that killing a Mockingbird is a sin. The bird tries to bring a little relief in a very harsh world. Toms actions were no different. Chapter 26: 1. a) Scout feels bad about all the things she had done just to see Boo. b)Scout still wants to see him but now respects his privacy. c)She’s is glad that Atticus never said anything about their previous activity. d)Scout doesnt seem to express any feelings about the â€Å"Current Events† she does pay attention to them, which shows that she is growing up. 2.The irony is that Miss Gate’s hates Hitler because of his racism toward Jews yet, she shows just as much racism towards african americans. 3. Jem reacts violently because he is still upset for what happened to Tom Robinson, the man who got accused for doing a crime he didnt do and who got killed for trying to escape. Since Miss Gates said that its horrible for Hitler to do horrible things to the Jews Jem agreed. But remember what she said about Tom and his trial.. Since he was black, he should have been guilty.. She is a hypocrite and is racist against black people. She says that Jews are people just like her, but Jews are white. Jem hates what happened to Tom; thats why he acted so violently towards Scout. Chapter 27: 1.Bob Ewell lost a job from the WPA and blamed Atticus for it. Judge Taylor thought his dog was making noises and opened the screen door and actually saw a shadow figure and kept a shotgun at his side; and Helen Robinson, Tom Robinsons widow got a job from Link Deas, who Tom used to work for, and was being harassed by Bob Ewell and his children. Bob Ewell is the type of man that holds a grudge. 2. Atticus had to work in Montgomery and was too tired to go. Alexandra feels tired and needs to go to sleep early because she helped with the stage for the play that Scout is in. Chapter 28: 1. Cecil Jacobs scares Jem and Scout by jumping out from behind a tree on there way to the school. 2. They think the noise might be Cecil Jacobs or the rustling of the leaves in the trees. 3. 4 people- Scout, Jem, Arthur Radley and Mr. Ewell Chapter 29: 1. Arthur Radley saved Jem and Scout from Mr. Radley. 2. I agree with Atticus, as I dont think Bob Ewell is worth anything because he tried to kill innocent mockingbirds (Jem and Scout). Additionally, he also holds grudges in the wrong ways for the wrong things , causing him to do crazy things. 3. It’s nothing like she’d imagined it would be and all she can say is â€Å"hey, Boo,† then she starts to cry. Chapter 30: 1.Scout is childish and has a curious nature, while Boo has somewhat of a childish curiosity about him. 2. I don’t think either of them believe either story. They both know who really killed Bob Ewell but they would never admit to it. 3. She said something like, well, it would be like shooting a mockingbird, wouldnt it? to Atticus. I dont know the actual quote. Chapter 31: 1. She understands how Boo feels. The entire part about her standing in Boos shoes and seeing all the things happening from his point of view. I guess Scout has matured a lot and realizes the rumors about Boo Radley were not true. 2. After reading the closing scene I was mostly wondering if Jem was going to be okay, if they would ever see Boo Radley again and what would happen to the Ewells.

Sunday, July 21, 2019

The More Effective Leader: Hitler Or Stalin?

The More Effective Leader: Hitler Or Stalin? Introduction In a sense, a certain analogy appears to be between Adolf Hitler and Joseph Stalin. It is vital to recognize that these two dictators of the twentieth century represented embodiments of modern evil. Both leaders possessed almost absolute power due to their unprecedented level of repression and attempted manipulation and indoctrination. Each of these dictators was drifted by revolutionary and controversial monopolistic set of dogmatic principles about the internal systemization of society and the leading power of history. Although Hitler and Stalin shared some clear parallelisms, their personalities, the effectiveness of leadership and specific regimes were fairly distinct rather than similar. The first part of this essay will concentrate on the analysis of various historiographical interpretations, focusing on the intentionalist view, to critically assess the effectiveness of Hitlers leadership qualities in particular. Secondly, the essay will focus on the comparison of some distinct aspects of Hitler and Stalins dictatorships in order to examine the importance of power hierarchy in both their regimes. It will be argued that both leaders had different styles of leadership that played very important part in moulding of their authorities and leading power. Furthermore, the essay will evaluate some principal tools of power such as the cult of personality, the powerful machine of propaganda, the use of terror and the development of pivotal economic policies, in order to provide a compact framework of Hitlers leadership potential capabilities. It will be highlighted that Stalin counted far too much upon mass terror therefore he was unable to maintain an efficient mechanism of leadership. Lastly, the essay will conclude by connecting the analysis of Hitlers dictatorship to the current debate between historical scholars, therefore the central argument will be proved that Hitler personified more competent and constructive leader compared to Stalin.* *The purpose of this essay is not to establish the fact that Hitler was, to a certain extent, a leading giant or a failure. It is meant to assess a man and the various facets of successful leadership he applied during his domination in the Third Reich that makes him more effective leader in comparison with Stalins abilities and intentions. The Analysis of Historiographical Interpretations of Hitlers Leadership It is indispensable to realize that several historical schools of thought (the Functionalist/ Structuralist and the Intentionalist school) have tried to account for their own arguments and interpretations of Hitlers dictatorship abilities. Lets look at the major points of each historiographical perspective in order to analyze Hitler as more effective leader in comparison with Stalin; and evaluate the relevance of Kershaws theory of Working Towards the Fuhrer in terms of Hitlers role in the Third Reich. Advocates of the Functionalist view, such as Martin Broszat and Hans Mommsen, largely concentrate on the interpretation of systematization of Hitlers Nazi Germany and on his leadership qualities and charisma which played an essential role in strengthening Hitlers leading effectiveness. According to Broszat, Nazi Germany represented a chaotic tangle of conflicting institutions and bureaucracies therefore the figure of Adolf Hitler was not a key driving force behind the dynamics and organization of Hitlers Germany (Broszat, 1981: p. 262). It can be argued that Hitler as a leader did not solely dominate to the Third Reich because there were constant power struggles initiated by several institutions. Furthermore, in Broszats perspective, Hitler epitomized a weak dictator because the Third Reich signified a dualistic state where Nazi Party operated simultaneously with the normal institutions of Nazi state (Broszat, 1981: p. 244). Broszat advocated that behind a faà §ade of Nazi integrity , there were perpetual struggles for power between the revolutionary Nazi institutions, such as SA and SS, and the traditional authority of German state. According to Broszats opinion, Hitlers leadership style enabled Nazi state to emerge as a collection of competing power units which triggered the radical forces to penetrate into German society (Kershaw, 2000: p. 75). Certainly Hitler undermined orderly government in Germany by his habit of appointing several people to practically the same job, resulting in official competing for Hitlers favour. The Intentionalist historiography is embedded in the concept of Social Darwinism, therefore according to this view Hitler was depicted as a fanatical and extreme ideologist who was incessantly avid for nationalism, militarism, the importance of lebensraum and anti-Semitism. It is worth noting that there is a certain parallel between the Nazi bureaucratic machinery and Darwinian Theory of competition in terms of power struggle. In a certain way, Hitler as a leader represented the fittest element of the Nazi Party, relying on his personal appeal. Hitler was essentially responsible for the increasing momentum of radicalization. In Allan Bullocks view, he was very strong and artful leader, creating uncertainty, confusion and tension among his adherents in order to secure his leading post. Therefore, it is evident that Hitlers intention was to provoke unchecked struggle and competition until the natural selection and the survival of the fittest would have occurred (Kershaw Lewin, 1997: p. 96). To a certain extent, a highly regarded scholar Ian Kershaw inclined to endorse the interpretation of Functionalist/Structuralist school regarding Hitlers leadership qualities. On one hand, Kershaw does not associate himself with the thesis that Hitler was a weak dictator and therefore played an unimportant role in the Third Reich. On the other hand, Kershaw had advocated the idea that Hitler was completely uninvolved in the daily administrative work (Kershaw, 1998: p. 529). It is necessary to point out that Kershaw considered Hitler to be a lazy dictator who was highly inconsistent, indecisive and did not engage in the everyday direction of Germany (Kershaw, 1998: p. 533). However, other structuralist champions, such Mason, maintained that Hitler was predominantly involved in the leading of his interests: military decision-making and planning of foreign policy (Kershaw, 1998: p. 532). It might be argued that Hitlers clear focus enhanced his untouchable leading status and veiled him i n the mystery. Moreover, Kershaw argued that the actual importance of Hitler was mainly based on the perception of Germans people of Hitlers personality and not just on the character of his dictatorship.1 _______________________________________________________ 1 It is vital to recognize that some historians agreed that Hitlers effective leadership aimed to arrange his power that would enable him continuously to educate the people in the spirit of his mission by means (in his words) the total domination of every individual (Cassinelli, 1976: p 63). Nazism and Stalinism: The Comparison of Leadership Styles Æ’Â   Ideology The main contrast between the Stalinism and Nazism was that both regimes arose from completely different types of societies traditions. Russias lack of culture, traditions and illiteracy meant that Stalin had very limited possibilities to accomplish his large tasks, such as transform the whole society from bourgeois system to socialist community. The Nazi ideology was shaped Given that Hitler was allergic to any restriction to his power, he had no clear-cut effort to form the administrative anarchy of the Third Reich. It is essential to emphasize that Hitler is characterized by the unbureaucratic style of leadership mainly because he remained quite aloof from the daily business and government and distanced himself from the intricate situations. Although his style of leadership appears to be, to some extent, limited, Hitler predominantly focused on the realm of his personal interests, such as foreign policy and military affairs. It can be argued, that this unbureaucratic style emphasized Hitlers personality, an inescapable product of the deification of the leadership position itself (Kershaw, Ian, 1997: p. 99). It can be purported that Hitler did not want to concern himself with the administration to sustain prestige to match the created image (Kershaw, 1997: p. 100). According to Marx Webers classic study of the authority of power, the quality of Hitlers charisma consists in his apparent possession of supernatural or superhuman or at all events specifically out of the ordinary qualities, which make him appear an emissary of God, or a destined Leader (Schapiro, 1972: p. 21). By contrast, Stalin personified very interventionist dictator whose main objective was to established the centralization of state power in order to eliminate the party-state dualism (Kershaw Lewin, 1997: p. 91) but also to create a monopolization of all decision-making, in relation to economic reconstruction, to open up a giant bureaucratization of all aspects of life. He intended to intentionally provoke instability in the governmental apparatus and society to implement his unpopular policies by the full command of modern means of control and administration [EVIDENCE]. Stalins power was, therefore, described as bureaucratic authority (Kershaw Lewin, 1997: p. 98) hence his influence in daily administration was far-reaching and cross-sectional. This fact suggests that Hitler largely relied on his charismatic impression to coordinate the states apparatus and gain a public support for his policies and actions, therefore it might be argued that Hitler was more effective leader in strengt hening his support and forming a new and higher kind of man by a process that involved the remolding of mens psychologies than Stalin (Cassinelli, 1976: p. 63). However, Stalin was able to transform illiterate and backward masses of Russians into obedient and simple-minded people. He relied on the masses that have a certain purity and naivetà © enabling them to understand the essence of significant situations. [2] _______________________________________________________ [2] As Stalin said, Simple people sometimes prove to be far nearer to the truth than some highly placed institutions. (Cassinelli, 1976: p. 89) ***Joseph Stalin declared: Can such a radical transformation of the old bourgeois system of society be achieved without a violent revolution, without the dictatorship of the proletariat? (Cassinelli, 1976: p. 77) The Effectiveness of Hitlers Leadership There is no doubt that Hitler and Stalins regimes shared some similar characteristics, nevertheless the main argument of this essay is based on fact that Hitler represented more effective and visionary leader compared to Stalin in terms of the cult of personality, propaganda, the use of terror and economic strategies several significant ways compared to Stalin. Therefore it is quite substantial to take into account the extent to which these major factors contributed to the effectiveness of Hitlers leadership. In essence, both Stalin and Hitler applied their power in different manner, however they shared a common ground regarding to implementation of their power. Evidence I: The Cult of Personality One of the principal factor, that significantly contributed to Hitlers effective leadership, was his sophisticated cult of personality. [3] Hitler was regarded as the personification of the nation and the unity of the national community therefore he primarily established his mastery on a cultivated principle of personal loyalty to which he could always successfully appeal at moments of crisis (Kershaw, 1997: p. 93). It must be noted that the principal reason for Hitlers domination of all who assisted him was an extraordinary power of his individuality. Hitler radiated confidence, high self-esteem and strong belief in his ability; it made him extremely powerful and everyone was frightened by his aura of total assuredness (Cassinelli, 1976: p. 73) thus he could stir up emotions and hypnotize the broad spectrum of German society. Hitlers main characteristic features were his skills to achieve an extraordinary power over the German people and ability to accomplish his political objective s. In large measure, his power to grip an attention and public admiration was especially due to his exceptional oratorical talent. [4] Hitler used his speeches as a powerful tool of political intoxication that inspired a degree of fervor in his listeners that seems to defy definition and explanation (De Luca, 1983: p. 96-7). Therefore it can be argued that Hitlers leadership uniqueness stemmed from his geniality to effectively use spoken word in order to manipulate mass propaganda for his own benefit. In Hitlers view, words build bridges into unexplored regions (Bullock, 1962: p. 372). The key aspect of this argument is that his uncanny ability to appeal to the subconscious and irrational needs of his audience and to solicit the desired response made him a formidable political figure (De Luca, 1983: p. 96-7). Furthermore, Hitler, in contrast to Stalin, was able to add the authority of spiritual founder of national socialism to that of party leader. _______________________________________________________ [3] Charismatic rule has long been neglected and ridiculed, but apparently it has deep roots and becomes a powerful stimulus once the proper psychological and social doubt that millions believe in it (Neumann, 1942: p. 75). Both the Stalinist and the Nazi regimes signified a new genre of political system that concentrated the artificial concept of a leadership cult the heroic myth of the great leader, who represented a man of the people and no more super-ordinate monarch who was distant to the masses. However, in Moshe Lewins view, the rapid pace of centralization in Stalins leadership resulted in rapid growth of officialdom; hence, it might be said that the cult of Stalin was replaced by the cult of the state (Kershaw Lewin, 1997: p. 11) hence Stalin predominantly concentrated on reinforcing his authority in order to be seen as autocratic and retain. [5] It is necessary to emphasize that Stalins rise to power was from within the Soviet Union consequently he shared public glorification with former icons such as Vladimir Lenin and Karl Marx. The crucial aspect of this argument is that Stalin and his communist ideology could be detached therefore when Stalin died the similar cult of personality never evo lved around his successor but the Soviet communism preserved. It is worth noting that unlike Stalin, Hitler became a permanent image of Nazism. The Fuhrer principle, in essence, rooted in Hitler formulated the Nazis system of governance. [6] megalomaniac ambitions _______________________________________________________ [4] Walter Langer depicts Hitler as a showman with a great sense for the dramatic. However he provides very clear characterization of Hitlers captivating rallies: Not only did [Hitler] he schedule his speeches late in the evening when his audience would be tired and their resistance lowered through natural causes, but would always send an assistant ahead of time to make a short speech warm up the audience. Strom troops always played an important role at these meetings and would line the aisle through which he would pass. At the psychological moment, Hitler would appear in the door at the back of the hall. Then with a small group behind him, he would march through the rows of S.A. men to reach the speakers table. He never glanced to the right or to the left as he came down the aisle and became greatly annoyed if anyone tried to accost him or hampered his progress. Whenever possible he would have a band present, and would strike up a lively military march as he came down the aisle (Lan ger, 1972: p. 46). [5] To a certain extent, a Cult of Stalin Worship developed from a sense of paranoia because he wanted people to deify him and if he had to accomplish it though brutal means then he was prepared to do so. [6] Moreover, it might be said that the loyal adulation of Hitler signified the most effective political instrument of power in Nazi Germany, therefore there was no reliance and dependence on massive domestic constrain that was typical feature for Stalins rule. Evidence II: Propaganda Æ’Â   controlling every single aspect of daily-life Æ’Â   parades and marches provided a sense of order and gave a feeling of belonging. So that the unity between the people was very firm. Æ’Â  youth indoctrination The second key factor strengthening the effectiveness of Hitlers power was the Nazi propaganda that played very substantial role in the setting of totalitarian society. In essence, the primary objective of Hitlers propaganda was not the ideological enlightenment of the masses, but their mobilization for action through extensive spreading of ideas and symbols aimed at influencing opinion and attitude of wide range of people. For Hitler, propaganda was the sharpest weapon in conquering the state, and remains the sharpest weapon in maintaining and building up the state (Hinton Hite, 2000: p. 244). It can be affirmed that every propaganda was the preparation of political activities (Unger, 1974:p. 35). Hitlers effectiveness to indoctrinate society might be seen in fact that the high cultural level of the Germans allowed the Nazis to extensively apply the technical potentialities of modern propaganda as far as possible; therefore Nazis propagandist intended to develop the manipulation of words and symbols into the highest creative art (Unger, 1974: p. 47). [EVIDENCE Æ’Â   Unger p. 43] [7] In some way, this propaganda had also considerable success in strengthening overall support for Hitler and the regime, by reinforcing enthusiasm for a strong leader who was capable of making Germany economically and military powerful. For instance, the Nuremberg rallies brought some excitement into peoples lives and gave them a sense of belonging to a great movement. [EVIDENCE Æ’Â   DATA, STATISTICS World History] In contrast, Stalins propaganda contended with the lack of technical skills and the virtues of labour disciple therefore the effectiveness of propaganda was very limited. Due to the lack of modern mass media in the Soviet Union, a large illiterate masses (especially peasantries), were only indoctrinated by oral agitation which was hardly disseminate across large distances. There were no cultural and informational media which cemented the framework of modern society, therefore the Soviet propaganda was full of stereotyped monotony of Stalins declarative and simplistic slogans convincing the Russians about Stalins greatness and invincibility. In other words, Soviet propaganda had to be adapted to the capacity of the least intelligent and constant repetition was one of its main weapons (Unger, 1974: p. 46). Æ’Â   forcible collectivization of agriculture led to a direct clash between Stalins regime and the majority of the population therefore the rapid mobilization /////In Conquests view, the alienation distinctly increased before the wartime since many Russians started to hate Stalin for the misery he triggered; therefore it led to gradual decline in morale and discipline (Conquest, 1991: p. ). In case of Stalin, the propaganda tool was used to a limited extent and often in a wrong way. It is essential to mention that the widespread fear between the Russian population resulted in limited ability to believe Stalins promises and slogans. EVIDENCE !!!!!! ////Æ’Â  Additionally, it is vital to perceive that Hitlers leading effectiveness was mainly achieved by remarkable Nazi propaganda that enhance the popularity of policies that were genuinely popular, for instance, public works projects (autobahn) or the 1933 Farm Law assuring subsidies for farms. Whereas Stalins propaganda was directed at forming a measure of acceptance for politics that were quite undesirable, such as compulsory collectivization and rapid industrialization. [FOOTNOTES Æ’Â   EVIDENCE!!!!!] Unger Citation!!! _______________________________________________________ [7] According to historian Dick Geary, the Nazi propaganda was most successful: where it could play upon the traditional German prejudices and values of German middle-class society upon issues such as nationalism, anti-socialism, family issuesà ¢Ã¢â€š ¬Ã‚ ¦ (Geary, 1993: p. 59). [8] Evidence III: The Use of Terror and Violence The third crucial element related to Hitlers effective leadership is the use of terror and violence. Terroristic aspect of the two regimes appears to be very significant in order to compare the leadership qualities of Adolf Hitler and Joseph Stalin. Hitler seems to have had no deliberate policy of destabilization. In a sense, he tried to protect his deified leadership position by his non-bureaucratic and non-interventionist governance because he did not want to lose a popularity by deciding some unpopular policies. Furthermore, Hitler did not rule internally by terror even so his regime was deeply authoritarian and disciplinary. This means that his effectiveness based on the ability to maintain a supporting base of Nazi members in order to strengthen his own position but also to stabilize the party apparatus. However, with the exception of his purge of the Storm Trooper leadership on the Night of the Long Knives in 1934, Hitler never triggered a systematic attack on members of his ow n regime. However, It is important to note that Hitler never initiated an organized terror on members of his regime. It is significant to highlight that Hitler had his leadership position technically more secure than Stalin. On the other hand, Stalin personified the creature of bureaucracy therefore he appeared intentionally to destabilize government to turn this to his advantage; in the mid-1930s Stalin mainly instigated the liquidation of the kulaks as a class and great purges against his closest supporters in order to eliminate all challenges to his absolutistic rule but also he used the brutality of collectivization to infected the whole political system with the lust for blood and any criticism came to be identified with the sabotage of class enemies (Sakwa, 1998: p. 40). To a considerable extent, Stalins purges and the extensive use of terror and violence undermined the stability of his position and intensify his opposition within the Party sector (Kershaw, 1997: p. 93). However, it might be said that the use of purges represented a kind of weapon against the unstoppable power and expansion of Stalinist bureaucracy which seemed to malfunction. Also Stalins paranoid mentality resulted in unprecedent ed brutality used as an instrument for applying and implementing his policies and terrorizing his followers and Soviet citizens. Therefore he used purges and the Show Trials to remove Old Bolshevik rivals like Zinoniev and Kamenev, in order to destroy their reputation, so that he alone could take the credit for the Communist Partys achievements. Additionally, Steve Rosefielde argues that in the years 1929-38, the average Gulag forced labour population was about 8.8 million, and that the total adult losses attributable to forced labour, collectivization and the purges was over 20 million (Sakwa, 1998: p. 41). This, in fact, resulted in a greater alienation of masses and sustained the Soviet peoples sense of anxiety and feeling of helplessness thus they responded to Stalins force by self-control and dissimulation (Cassinelli, 1976: p. 129). Furthermore, the Purges disruptive effects were felt in the development of industry where the destruction of qualified engineers and managers seri ously undermined the Second Five Year Plan and accounts for Stalins reduction in the scale of the purges in 1939. Nonetheless the destructive policies penetrated through Stalins autocracy and the Soviet people felt perpetually insecure therefore this led to escalation of opposition between the Soviet citizens which had weakening effect on Stalins power. Evidence IV: The Major Economic Policies Another important factor that reflects Hitlers effective leadership is the series of economic policies implemented in 1930s. The main success of Hitlers economic recovery based on the total elimination of unemployment and on stabilization of German economy and progress towards an economy that would prepare Germany for war. For instance, Dr. Schacht organized Germanys finances to fund a huge programme of work creation; the increase in government spending (from RM 8.6 billion in 1932 to RM 29.3 billion by 1938) resulted in schemes to build a network of autobahns or conservation programmes. Moreover, Hitler concentrated on need to gear the economy for war It is important to highlight that Hitler was aware that he needed the support of the German people and could not risk to exacerbate their living standards at the cost of military supremacy. In 1930s, Hitler developed managed economy in Nazi Germany and in 1936 he focused on the Four Year Plan Æ’Â   autobahn completed, industry rebuilt, farmers: Blood and Soil, Workers: Strength Through Joy Æ’Â   Germany was a great economic power Stalin Æ’Â   unsuccessful FYPs collectivization and industrialization still backward- inability to catch up the West!! On the other hand, it might be argued that Stalins economic policies had only moderate short-term success. established the command economy [*9*] in the Soviet Union, clearly without this economic concept USSR would not survived. However, Stalins Five Year Plans were followed by forcible collectivization of the peasantry in order to erase all traces of capitalism and transform Soviet Union into fully industrialized, self-sufficient and completely socialist state without regard to cost. It is significant to point out that the effort to fulfill overambitious plans and resistance to collectivization led to acute shortage throughout the economy. It can be argued that despite the Stalin The top priority was investment in heavy industry which was view as the key to rapid economic growth and as an essential guarantee of national security. The acceleration continued through the Second Five Year Plan and extended into consumer goods. Against a background of a political purges and partial wartime mobilization, the pace of industrial growth slackened in the three years of the Third Five Year Plan, and such growth as took place may be attributed to territorial expansion. (p. 152-3) Falsification Æ’Â   It is vital to point out that Stalins leadership proved to be inefficient in terms of improving the Russian economy in the long run and great human expense. According to Isaac Deutscher, Stalins All-out Drive revolution from above appeared to be unsuccessful attempt to stimulate the production and increase the output because it lacked all rules of logic and principles of economies which were turned upside down (Cassinelli, 1976: p. 117). It is important to realize that Stalins economic policies were aimed at satisfying his own ideology rather than for benefit of people. This clearly supports the initial claim that Stalin was less effective leader than Hitler. _______________________________________________________ [*9*] Soviet planned or command economy was a type of economy in which centralized, bureaucratic management of economy, GOSPLAN, made a wide range of decisions penetrating to production and wages. Basically, the key objectives of centrally planned economy were to build socialism as quickly as possible and centralize the decision making and control. [10] In 1932, the number of unemployed in Germany was 5.6 million, however in 1938 there were only 0.2 unemployed in Nazi Germany. [EVIDENCE] Debate: Intentionalist view and Hitlers Effective Leadership Qualities Intentionalist view Æ’Â   Hitlers leadership domination and effectiveness was apparent in connection with [***]Hitlers dictatorship presented very extreme and intensive totalitarian demands of modern state, such as unexpected degree of violence and oppression, unprecedented manipulation of mass media to gain control and mobilize the masses, an unaccustomed cynicism in the international relations, an extraordinary aggression of nationalism and pestilent power of ideological racial superiority. Additionally, this specific dictatorship demonstrated that the modern, advanced and cultural society could fall headlong into barbarism. Indeed, Hitlers form of dictatorship meant the collapse of the modern civilization. On the other hand, Stalin personified a type of leader who focused on the continuity of Leninist tradition. By contrast, Stalin used hostility and terror as a normal feature of government when the USSR was in peace. His dictatorship resulted in creation of a personality cult of monstrous proportions but he never achieved a popular acceptance for his policies as Hitler did. ******It is vital to highlight that Hitler was more effective leader in terms of his cult of personality, propaganda and social and economic policies to 1941. This year represented a key turning point in Hitlers power and effectivity. Hitlers clash with Stalin indicated that the existing distribution of powerfulness was no longer able to outlast. It is very interesting to see the rapid transformation of power from Hitler to Stalin. Therefore it may be argued that, from the chronological perspective, Hitler was able to keep his authority at the highest position so his leadership skills were clearly better than Stalins abilities. Conclusion In conclusion, although Hitler signified a leader of one of the purest autocracies, there were some limits to his power, but it is essential to point out that these limits did not result from imperfections in his machinery of power but mainly from the context within which Hitler has to operate. However, Hitlers success might be apparent in regard to popular acceptance of his policies but also most Germans appreciated the sense of national community which was constantly instilled into them by Hitler. Furthermore, Hitlers long-lasting interest for the material-well being and social standing gave his regime a popular legitimacy that was one of the greatest success to his power. Security Management: Instant Messaging Perspective Security Management: Instant Messaging Perspective Executive Summary Nowadays, Instant messaging (IM) is used in the corporate environment which is rising rapidly, as organizations welcome to accept IM as a business communications tool. IM promotes cooperation and real-time communication among employees, business partners, and customers. It also brings new threats to local area network security and makes organizations to have a potential risks when employees share illegal or inappropriate content over the internet. Organizations are also faced with reduced employee productivity when IM is used arbitrarily and for personal communications. When use of IM is unmonitored and uncontrolled, it can lead to a significant drain on IT resources, as the IT staff attempt to identify which IM applications are being used and by whom. Moreover, when instant messaging is used to send and receive files, not only can the resulting drain on bandwidth negatively impact network performance, but the files themselves can pose a serious security threat. This report provides information to better understand threats of IM and mitigate its impact to business. The threats of IM are investigated. The trend in growing targets and number of cases are related to IM threats are analyzed. The impacts to business are assessed to identify areas of security management require great concern. Finally, measures are introduced to improve security management such that IM threats become manageable and their impact is reduced. 1. Introduction Today, Instant Messaging (IM) applications have rapidly become accepted by businesses as viable employee communications tools. IM is more instant than email, obviously easy-to-use, and provides the real-time collaboration organizations need to ensure quick judgments and decisions. Using Instant Messaging, organizations and their business partners can make a conference, share files and information easily over the Internet. Furthermore, within the organization, IM conversations among project team members can resolve issues and questions in an instantsomething that might have taken a series of emails, telephone calls, or face-to-face meetings to carry out. IM can be used to provide immediate replies to requests. It can also help promote personal relationships with customers and remote employees, and assist customers in completing transactions with Web-based businesses. This report is shown the concern of security of IM and gives some countermeasure to deal with IM threats. 2. Findings and Analysis 2.1 What threats are related to Instant Messaging? l   Worms A worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do without any user participation. In case of instant messaging, antivirus software does not currently monitor traffic at OSI Model-network layer. If a worm starts to spread via instant messaging, it cannot be stopped before it reached the remotes computer. Dissimilar a virus, it does not need to attach itself to an existing application or program. Worm almost always causes damage to the network when it drains the network bandwidth. On the contrary, virus almost always corrupt or modify files on a targeted computer. The number of instant messaging worms is rising steadily. This is made clear when one considers the list of recent IM worms: n dubbed Pykse.A (16 April 2007) n W32/Rbot-GRS (26 June 2007) However, a few antivirus applications can plug in to instant messaging clients for scanning files when they are received. The lack of applications scanning instant messaging network traffic is partly due to the difficulty in monitoring instant messaging traffic so that the antivirus product running at the desktop level can catch the worms. l Backdoor Trojan Horses Instant messaging clients allow peer-to-peer file sharing, the instant messaging client to share all files on the system with full access to everyone can be configured by a Trojan Horse and in this way gain backdoor access to the computer. Moreover, the victim computer is on-line; a notification will be send to hacker automatically. So hacker can keeps track and accesses the infected computer easily. Besides, the hacker does not need to open new suspicious ports for communication in that hacker can instead use already open instant messaging ports. Classic backdoor trojans open an outgoing listening port on the computer, forming a connection with a remote machine. If the trojan operates via the instant messaging client, it does not open a new port as the user has usually already created an allow rule for instant messaging traffic to be outbound from their machine, therefore, allowing the backdoor trojan horse using the same channel to go unblocked. l Hijacking and Impersonation Users can be impersonated in many different ways by hacker. The most frequently used attack is solely stealing the account information of an unsuspecting user using the instant messaging or IRC application. Hacker can execute a password-stealing trojan horse to obtain the account information of a user. If the password for the instant messaging client is saved on the computer, the hacker could send a trojan to an unsuspecting user. When trojan executed, it would find the password for the instant messaging account used by the victim and send it back to the hacker. l Denial of Service Instant messaging may lead a computer vulnerable to denial of service (DoS) attacks. These attacks may have different outcomes: A lot of DoS attacks make the instant messaging client crash, hang, and in some cases consume a large amount of computer processing power and causing the entire computer to become unstable. There are many ways in which a hacker can cause a denial of service on an instant messenger client. Furthermore, they are used to combine with other attacks, such as the hijacking of a connection and form a bot network to attack other servers. l Unauthorized Disclosure of Information Information disclosure could occur without the use of a trojan horse. Once the data that is being transmitted via the instant messaging network is not encrypted, a network sniffer can sniff data on most types of networks and can be used to capture the instant messaging traffic. Also, a hacker could sniff the packets from an entire instant messaging session. It can be very dangerous as hacker may gain access to privileged information. It is especially dangerous in the corporate environment in that confidential information may be transmitted along the instant messaging network. 2.2 Recent Incidents Case 1: New IM worm targets Skype users (Published date: 17 Apr 2007) Affected: The IM worm affects Skype users running Windows. Threat Type: Worm Description: A new instant-messaging pest that spreads using the chat feature in Skype has surfaced, security firm F-Secure warned. The worm, dubbed Pykse.A, is similar to threats that affect instant-messaging applications. A targeted Skype user will receive a chat message with text and a Web link that looks like it goes to a JPEG file on a Web site, F-Secure said on its Web site. Clicking the link will redirect the user to a malicious file. The file, after executing, will send a malicious link to all online contacts in a Skype users list and will show a picture of a scantily clad woman, F-Secure said. In addition, it sets the users Skype status message to Do Not Disturb, the security firm said. Pykse also visits a number of Web sites that dont host any malicious code and a site that appears to count infected machines, F-Secure said. The Finnish security company doesnt list any particular malicious payload for Pykse other than it spreading and visiting Web sites. Status: Skype also recommends using antivirus software to check the files received from other people. Case 2: Next-generation Skype Trojan hits web (Published date: 26 Mar 2007) Affected: Warezov Trojan horse to target Skype users. Threat Type: Trojan Horse Description: Miscreants have again adapted the Warezov Trojan horse to target Skype users. The attack is similar to threats that target instant-messaging applications. A targeted Skype user will receive a chat message with the text Check up this and a link to a malicious executable called file_01.exe on a website. Once infected, a computer will be at the beck and call of the attacker and the Trojan horse will start sending messages to the victims Skype contacts to propagate. Status: Skype warned users against opening the malicious file, take caution in general when opening attachments, and also recommends using antivirus software to check incoming files. Case 3: AIM bot creates fight combos to spread (Published date: 18 Sep 2006) Affected: Online attackers have created an instant-messaging bot program for AOL instant messaging that chains together a number of executable files, similar to the combination moves in fight games. Threat type: Worm and Bot Description: The software, dubbed the AIM Pipeline worm, uses modular executable files to infect machines with different functionality but also to make the bot networks growth more robust: if a Web site hosting one of the components gets shutdown, the other pieces of the worm can still spread. Status: America Online has blocked the URLs used in the messages sent by the AIM Pipeline worm. 2.3 Trends l Increase in IM threats IM Security Center researchers tracked 33 malicious code attacks over IM networks during the month of September, bringing the 2007 total to 297. This is a 20% increase in IM threats compared with the same time period last year. (SAN DIEGO Akonix Systems, Inc 2007) Research also indicates that there are more targets affected by IM threats (SANS Institute 2006) l New type of IM worms New IM worms identified include Agent-GCG, Ataxbot, Exploit-VcardGadget, Focelto, MSNFunny, IMBot, MsnSend, MSN-WhoBlocked, Neeris, Pykse, Skipi, STRATION and Yalove. IRCBot was the most common with four variants, followed by Imaut and Neeris with two, respectively. Akonix tracked 16 attacks on P2P networks, such as Kazaa and eDonkey (SAN DIEGO Akonix Systems, Inc) l Evolution of IM threats The vulnerability of IM are used in botnet communication and spread the bot and worms to another computers. When the hacker send the command to botnet army, the consequence of attacks is very serious. Unlike other attacks, botnet can comprised of thousands of computer power to perform a variety of attacks against a wide range target. For example, the botmaster can command each zombie participant in a botnet to launch spamming e-mails to steal the credit card information and launch Distributed Denial-of-Service (DDoS) attacks simultaneously against the thousands of computer. 2.4 Factors for growth of IM threats The growth of instant messaging usage within the organization, vulnerabilities in public IM networks occur during the process of transferring files. When a user transfers files or uses other IM features like file sharing or voice chat, users IP address is revealed. Using this IP address, hackers can have ability to attack the system. Some organizations configure their firewalls to block ports used by IM applications or block the external addresses of IM network servers. But IM applications can be configured to change ports automatically and are capable of penetrating firewalls through ports used by other applications. (For example: port 80). So policy control management is required. 3. Impact to Business Once the IM threats occur in the organizations, they face a significant security risk from disclosure of intellectual property or business-critical information using IMs file attachment capability. As IM is a highly informal means of communication, employees can unintentionally send critical company-confidential information, such as product specifications, code, and blueprints, or private customer data, to friends, colleagues, and competitors. There are three main concerns of using the IM which are identified. l Legal Liability concerns The danger of allowing employees to use IM at work under lacking of security management, the viruses and worms is very easy to expose. On the other hand, organizations face legal and compliance risks when employees share copyrighted, illegal, or inappropriate content via instant messaging. Unmonitored IM applications allow employees to openly transfer files and information that could lead to significant corporate liability. For example, transferring copyrighted MP3 files, movies, and software using IM is common among friends and bypasses the file size restrictions of email. l Employee productivity loss Many employees have already adopted IM which they prefer that IM is regarded as the personal connection with friends of family, because it has not used the telephone to be obvious, talking cant be eavesdropped. Employees can seem it is work, in their keyboard is typed and left, been exchanging the personal connection with friends of family all the time. l IT resource abuse Most organizations dont know what kind of IM should be installed on computer, which employees should use the IM and how often to use IM for business communication such as send, receive files, video conferencing. In addition, it is not uncommon for intensive file sharing over the IM that can influence the performance of the network. 4. Dealing with Instant Messaging threats IM threats can be operated by insider (employees) and outsider (hacker). According to the Figure 4-1, Operational-level employees want to increase their ability to override controls mechanisms base on some factors such as fear of lose their job whereas the top level-manger want to have control mechanism to monitor all harmful activity in the organization. However, top level-mangers always neglect the risk of middle-level managers whose have part of administrative power to act as insider. So that good security management must be executed in the organization to avoid or mitigate the insider and outsider activities. Consequently, prevention, detection, incident response and controls are good measures for security management. 4.1 Prevention Ensure that vendor patches are promptly applied to instant messaging software, interrelated applications, and the underlying operating system. Firewalls to separate all DMZs, internal networks and external un-trusted networks Monitor using an Intrusion Detection/ Prevention system for users. Create secure communications channel when using instant messaging with trusted business partners Do not rely on external IM servers for internal use of instant messaging. Install and use anti-virus and anti-spyware applications. Consider disposing the clear products designed for instant messaging safely. Some product like as Trend Micro IM Security for Microsoft Office and Symantec IM Manager 2007 seamlessly manages can be used for mitigation of the potential risks associated in that they acts a filter and detector between internal and external. Using Multi-factors authentication or biometric authentication to prevent the hacker to login the target computers. 4.2 Detection Monitor and detect using an Intrusion Detection for users creating tunnels for instant messaging. An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. Enable the auto detect mode of updated antivirus and anti-spyware products for client computer. Filter all http traffic through an authenticating proxy server or firewall to provide additional capabilities of filtering or monitoring instant messaging traffic. Appropriately configure intrusion detection systems. Understand that many instant messaging applications are capable of enabling associated communications to masquerade as otherwise allowed traffic (e.g. http). 4.3 Incident Response Block popular instant messaging ports. Block access to known public instant messaging servers that have not been explicitly authorized. Virus-scanning software at all critical entry points such as firewalls, remote access server, e-mail servers etc. Ensure that vendor patches are promptly applied to instant messaging software, interrelated applications, and the underlying operating system. 4.4 Management Policy Controls Establish policies for acceptable use of instant messaging and ensure that all users are aware of those policies and clearly understand the potential risks. General users should not be allowed to install software. Limit Administrative and Power User level privileges to support personnel with their support ability. If a user must have Administrative or Power User privileges, create a separate account to be used for their daily office functions, internet surfing and on-line communication. 5. Conclusion Instant messaging has clearly taken off as a means of communication. The ability to communicate in real-time makes it an ideal medium for both business and personal communication. Unfortunately, threats that affect instant messaging already exist today, including worms and vulnerabilities that can give hackers remote access to vulnerable computers and can replicate in seconds can affect more than just instant messaging. Therefore, end users and corporations should employ basic security countermeasure. However, update the patch of product can mitigate the occurrence of threats, but these measures are not enough to prevent the network security. Corporations should have other measures for security such as prevention, detection and incident response. Furthermore, management controls are available to less the impact of IM threats. Once these measures get implement, IM threats must become manageable as a result of reducing the damage of business. References Michael E. Whitman and Herbert J. Mattord (2004) Management of Information Security, Boston, Mass.; London: Thomson/Course Technology Joris Evers (2007) New IM worm targets Skype users, Cnet, Available: http://www.zdnet.com.au/news/security/soa/New-IM-worm-targets-Skype-users/0,130061744,339274904,00.htm (17 Apr 2007) Joris Evers (2007) Next-generation Skype Trojan hits web, Silicon, Available: http://software.silicon.com/malware/0,3800003100,39166534,00.htm (26 Mar 2007) (2006) AIM bot creates fight combos to spread, Security Focus, Available: http://www.securityfocus.com/brief/305 (18 Sep 2006) San Diego (2007) Akonix Intros IM Security Appliance, Dark Reading, Available: http://www.darkreading.com/document.asp?doc_id=125041WT.svl=wire_2  (29 MAY, 2007) San Diego (2007) Akonixs Threat Center tracks 33 IM attacks , Dark Reading, Available: http://www.darkreading.com/document.asp?doc_id=135045  (28 Sep 2007) SANS Institute (2006) SANS Top-20 Internet Security Attack Targets, Available: http://www.sans.org/top20/ (15 Nov 2006) Symantec (2006) Protect Your Business from Instant Messaging Threats, Available: http://www.symantec.com/business/library/article.jsp?aid=instant_messaging_threats (11 Jul 2006) Symantec (2007) Internet Security Threat Report 2007,  Avalable: http://tc.imlogic.com/threatcenterportal/pubIframe.aspx (13 Jun 2007)