Saturday, December 28, 2019

Prison Overcrwoding in America and England - 1234 Words

Prison overcrowding in the United States is due to many reoccurring charges that is being sentenced to inmates that have been released and returning. As the increasing inmate population is a growing concern in the U.S, many law enforcement agencies and academic expert have analyzed data about the situation and are working to combat it. Research shows that Drugs are mainly to blame. Of the inmates in federal prison as of September 2011, more than half or 50.4% was serving sentences for drug offenses that were committed including simple offenses. Out of 24,366 related drug offenders, 6,336 were marijuana related offenders and 4,309 were Methamphetamine related offenders. This does not only show that more than half of the prisons are filled with drug offenders but it means that the cells are being used by people who are most likely addicted to the substance. When there are cells being wasted by people who do not or would rather not change their ways, then it is useless. Overpopulated dr ug offenders are the result in prison overcrowding in the United States. In this research paper I will be reviewing the main cause for overcrowding, what overcrowding causes, crime rates and costs, proposition AB 109, and potential solutions to the overcrowding of prison system. There are well known documented issues that have been known to cause overcrowding in prisons. Some of these issues include poverty, lack of education or employment opportunities, drug or alcohol use and abuse, and mental

Friday, December 20, 2019

Child Study - Educational Observation of Development of a...

Introduction Archie is a 10 year old in the fifth grade class here at Friends School. He’s attended this school from preschool until now, a total of seven years. He lives in the neighborhood and tends to be one of the first kids in the classroom every morning. In general he seems to be a happy child, smiling often. He has a tendency to be quite goofy at times and struggles with impulse control, often speaking out in class or being disruptive by talking or making jokes. This seems to stem from his ADHD, which he is on medication for. Though he has many challenges related to his ADHD, he displays an aptitude for math, enjoys reading, loves computers and is full of random facts that he adores to contribute. His general health seems†¦show more content†¦4. Does his behavior change based on the time of day or day of the week? What about subject matter? 5. What are his strengths academically? Weaknesses? 6. Where is he developmentally in comparison to his classmates? National Norms? 7. Physical Development? (coordination, stamina, fine motor skills, rt/lt dominance, nutrition etc) 8. Mental/Cognitive Development? (multiple intelligences, level of executive function etc) 9. Does he have any other health issues? Possible digestive/constipation? 10. What is his background in regard to being adopted and does that have any bearing on his current issues? (ie. Drugs/alcohol birth parent? etc) 11. Does his sister have any similar behavioral or learning issues? 12. Who are his friends and how does he relate to them? Do any of his issues get in the way of those relationships? 13. How does his family amp; life outside of school affect his daily life in school? (ie extracurricular activiti es, consequences, family culture, parental expectations etc) 14. What language and questions are best when communicating with this child? What approaches work? What encourage him vs deflates him? 15. How does he function in large groups, small groups, pairs? 16. How does he respond when he’s faced with something difficult or makes mistakes? What motivates him to try harder? Participate? Key questions for me to learnShow MoreRelatedLeadership Assignment : Harriet Tubman Charter School Essay2462 Words   |  10 Pagesfor the rest of the week through positive reflection, realisitic goals and specific decisions that we follow as a group. Spiral of experience Experience certainly brings perspective which most definitely pertains to leadership development (Hughes, 2015). The action-observation reflection model is a specific model that reflects on experience and how it is harnessed into developing a great leader. When looking at what Ms. J’s draws on publically as well as personally it is her past experience in schoolsRead MoreCase Study And Analysis : Aurora Academy Charter School2986 Words   |  12 Pages Organization Problem Case Study and Analysis Emily Van Luit University of Northern Colorado Shaping Organizations: Management and Leadership in Education ELPS 603 Dr. Chris Jenkins December 10, 2014 Organization Problem Case Study and Analysis Background Aurora Academy Charter School came to be in the fall of 2000, and was the first charter school within the Aurora Public School District. A group of parents who were unhappy with their neighborhood schools banded together to create AuroraRead MoreMadison Metropolitan School District18559 Words   |  75 Pageswhich teachers collaborate in evaluating their practice jointly; raise awareness of their personal theory; articulate a shared conception of values; try out new strategies to render the values expressed in their practice more consistent with the educational values they espouse; record their work in a form which is readily available to and understandable by other teachers; and thus develop a shared theory of teaching by researching practice. - John Elliott What is Action Research? | Five Phases ofRead MoreEssay on Virtual Child16751 Words   |  68 PagesPreslee as often as she likes, and take Preslee to meet new people often 8 Months: 1) Q: Preslee is comfortable in new situations, and seems to enjoy meeting new people even after an initial hesitation. A: You want Preslee to be a very sociable child, so you take her to meet lots of new relatives, neighbors and friends. 2) Q: You notice that Preslee seems to have little goals that involve two steps of planning ahead, so you encourage these cognitive advances by: A:encouraging Preslee to pointRead MoreMulticultural Education in a Pluralistic Society21691 Words   |  87 PagesWe are obliged to make sure that every child gets a healthy start in life. With all of our wealth and capacity, we just can’t stand by idly. Secretary of State Colin Powell, 2000 ISBN: 0-536-29978-1 Multicultural Education in a Pluralistic Society, Seventh Edition, by Donna M. Gollnick and Philip C. Chinn. Published by Prentice-Hall/Merrill. Copyright  © 2006 by Pearson Education, Inc. Chapter 2 Class hile he was still in college, Tomas Juarez had decided he wanted to work with childrenRead MoreThe Effect of Student Attitudes and Beliefs on Mathematics Education29432 Words   |  118 Pagesdata collection. In the same vein, I thank the Form four students who participated in answering the questionnaires that were very useful in my study. I owe many thanks to my beloved wife whose inspiration, moral and financial support enabled me accomplish my studies, and also our children for enduring my long absence throughout the period of my study. While it may not be possible to mention the names of all those who contributed, in one way or another, to the success of this work, I registerRead More_x000C_Introduction to Statistics and Data Analysis355457 Words   |  1422 PagesLuis Obispo Australia †¢ Brazil †¢ Canada †¢ Mexico †¢ Singapore †¢ Spain †¢ United Kingdom †¢ United States Introduction to Statistics and Data Analysis, Third Edition Roxy Peck, Chris Olsen, Jay Devore Acquisitions Editor: Carolyn Crockett Development Editor: Danielle Derbenti Assistant Editor: Beth Gershman Editorial Assistant: Ashley Summers Technology Project Manager: Colin Blake Marketing Manager: Joe Rogove Marketing Assistant: Jennifer Liang Marketing Communications Manager: Jessica PerryRead MoreDeveloping Management Skills404131 Words   |  1617 Pages mymanagementlab is an online assessment and preparation solution for courses in Principles of Management, Human Resources, Strategy, and Organizational Behavior that helps you actively study and prepare material for class. Chapter-by-chapter activities, including built-in pretests and posttests, focus on what you need to learn and to review in order to succeed. Visit www.mymanagementlab.com to learn more. DEVELOPING MANAGEMENT SKILLS EIGHTH EDITION David A. Whetten BRIGHAM YOUNG UNIVERSITY Read MoreProject Mgmt296381 Words   |  1186 PagesActivity duration estimates (.3) 6.4.2 Estimating tools (.1.3.4) 6.3.1 Identifying resources 7.1 Activity cost estimates (.2.3.4.5) 5.1.2.4 Delphi method Chapter 6 10.5.3 Cost/schedule system (.1) 6.6 .2.1 Time performance 7.2.3.1 Cost baseline development 7.3.2.1 Earned value system (F.4) 7.3.2.4 E.V., performance status report 7.3.2.2 E.V., forecasts 7.3.2.3 EV., to complete index (EAC) 7.3.2.5 Schedule and cost variance Developing a Project Plan 4.2.2 Planning tools 6.2 Sequence activities

Thursday, December 12, 2019

Breast Cancer Treatment

Question: Write about theBreast Cancer Treatment. Answer: Introduction: Tamoxifen is a medication that is provided orally to the patients who are suffering from breast cancer. Previous guidelines have instructed physicians to prescribe the medicines for only two to five years as various complaints of side effects were associated with the medication (Ganz et al. 2014). However, the medicine is an excellent inhibitors of the cell cycling systems that prevents apoptosis if the cancerous cells. In turn they promote various factors that increase the rate of apoptosis of the cancer cells and are therefore more effective in treatment of patients (Leyland-Jones et al. 2015). A case study was provided where a patient is seen to recur the symptoms of breast cancer after her stoppage of the taking of the medication after five years. Therefore the report will mainly contain literature reviews that will shed light in the reason about the recurrence of the breast cancer symptoms and what should be done so that similar patients do not get recur their breast cancer after recovery from it. Pico-Analysis: In order to find the correct articles that will help us to know the main reason for the recurrence of breast cancer in the patient after 5 years. In order to find correct articles, a proper Pico question is to be prepared which would help in answering the research topic properly. Population Intervention Comparison outcome Women suffering from breast cancer Tamoxifen administration Medication taken over five to ten years in comparison to early stoppage Recurrence of breast cancer The Pico question which is to be formed is that whether early stoppage of taking tamofexin for women suffering from breast cancer causes recurrence of the disorder in comparison to those who have continued the medication for about five to ten years Databases and Keywords: Different databases have been searched in order to get the correct articles. This usually involves the Google scholars, Cinhal, Cochrane library, Wiley online library, Elsevier, Science direct and others. The main key words which were used are effect of stoppage of tamoxifen, tamoxifen for breast cancer patient, Cancer recurrence for tamoxifen stoppage, side effects of tamoxifen and others. Literature Review: In the works of Rajput et al., one can clearly understand the working mechanism of tamoxifen in the treatment of breast cancer. XIAP protein called the X-linked inhibitor of apoptotic protein which mainly functions in the inhibition of apoptosis. They mainly inactivate caspase 3, caspase 7 as well as caspase 9 which are responsible for carrying out successful apoptosis. In this case, the researchers have proved that with the help of another medicine called thymoquinone, tamoxifen take an active part in the cell apoptosis system of breast cancer. They have mainly reached the conclusion after they had conducted experiments to confirm the anti-angiogenic as well as the anti-invasive potential of the TQ as well as the TAM mainly through a large number of in vitro studies. They have suggested that the medication mainly works by lowering the expression of XIAP expression at a molecular level. This helps in the binding followed the activation of the caspase 9 in the cascade of apoptosis. Th ey further interfere with the survival of the cells through the PI-K/Akt pathway (Jordan 2014). They mainly inhibit the Akt phosphorylation. Thereby in course of time, caspase 9 gets cleaved which then processes a list of other cellular death substrates. This includes the PARP. This makes the entire mechanism shift from the phosphorylation mechanism to apoptosis. Not only are this they are also found to effect the Akt Phosphorylation pathway. They down regulate the pathway by acting on the downstream effectors like the Bcl-xL, Bcl-2. They in turn increase the expression of other factors like Bax, AIF, cytochrome C and p-27. This mainly leads to regulation of a large number of cell signaling mechanism that in turn results in the activation of the AKT as well as XIAP degradation (Feng et al., 2014). Therefore, this made the author to come to a conclusion where the both the medicines play an important role by inhibiting XIAP and this was confirmed through the siRNA-XIAP cotransfection studies. Herein one can easily understand that indeed tamoxifen plays a very crucial part in treating of breast cancer in patients. Another important experiments was carried out by a large number of scientists is the year 2013 as a large randomized trail recruiting more than 12000 participants were included suffering from breast cancer. Davies eta l. in the year 2013 had laid down many important facts that might be helpful for the providing more light to the case. The researcher has stated that previously tamoxifen was prescribed to the patient for only two years which showed recurrence of the cancer disorder. Therefore the period of the administration of tamoxifen was increased to four years and then it was increased to five years . While this experiment was conducted I had shown that effects of the tamoxifen can contribute for up to 15 years showing great amount of reduction in not only recurrence rate but also in mortality rates. However they have clearly mentioned that there was reduction in recurrence rate in comparison to control but they have never mentioned that it had completely stopped recurrence of the disease. Further they have also stated that they had also conducted experiment where they had made the participants to continue the medication up to 10 to 15 years and they have clearly stated astonishing results. They have stated that continuing it for longer number of times had resulted in further decrease in the rate of recurrence and mortality than using it for 5 years. Therefore in the case of the patient of the case study, she has recurred breast cancer may be due to the hereditary instances as the literature of the article shows that the people who have used tamoxifen have very few evidences of recurrence. Therefore it cannot be exactly said that whether the occurrence of the disorder has been mainly due to withdrawal of the tamoxifen or due to heredity factors. However this literature review have suggested that the side effects are indeed visible after five years and therefore if the medication is continued for ten years the side effects may also increase but it will howeve r reduce the recurrence rate and recurrence chances further by a large number. Therefore if the patient had continued it for large number of years her chance of recurrence would have been decreased. Therefore it can be concluded from the paper that she should have continued the medication for 10 years to completely eradicate the chance of recurrence of the cancer (Li et al. 2013) . A study conducted by the Early Breast Cancer Trialists' Collaborative Group (EBCTCG) in the year 2015 had also provided extensive information about the affectivity of the use of tamoxifen in breast cancer. They have clearly stated that if treatment is conducted by the use of tamoxifen in breast cancer patients, the medication is found to reduce the rate of recurrence by about half especially during the time of treatment. Not only is that it also believed that they can reduce the chance of occurrence by one third in the subsequent five years (Sandell et al. 2017). They have also supported the view that if the treatment is conducted properly they can further reduce the rate of mortality by almost one third throughout the first fifteen years. It has been also found that the authors have stated that if the treatment is conducted for about 10 to 14 years, there will be further reduction in mortality rate. Although the present concern in the case study is not considering the menopausal wom en but in order to mention the researchers view it can be said that they had stated that if tamoxifen is followed by aromatase inhibitor after 2 to 3 days of follow up by tamoxifen, it would provide better results. Another very good article has been found that had been provided by Flanagan et al. in the year 2012 who has provided a large number of important facts that had been extremely helpful in reaching the conclusion of the case. The researchers have stated that anti estrogen therapy had been found to be extremely helpful and tamoxifen and aromatase inhibitors have been extremely helpful. Tamoxifen as said by them is extremely helpful as it can work irrespective of the age and the menopausal status of the woman. They are not only helpful is treating estrogen positive cases of breast cancer and node positive breast cancer, they are also helpful for reducing the risk for contra lateral breast cancers. Just like the previous authors, those have also stated that Aromatase inhibitors are extremely helpful for treating menopausal women with breast cancer especially by following the treatment of tamoxifen and then starting it after two to five years. Herein the authors had exactly discussed the ma in query of the case study that one needs to solve. The author had stated that a large number of side effects have been found to be associated with the treatment of tamoxifen like arthralgias, weight gain and fatigue. The patients have also complained of changes in mood, hot flashes, decreased libido as well as changes in memory. The researchers have stated that it had greatly affected the capability of the woman to adhere to the treatment and therefore they are often seen to coax their guides to withdraw the medication after prescribed years. Non adherence rates had been noted to be about 25% in the first year and to about 50% after fourth year. Many women who have stopped the use of the medication due to the side effects have resulted in the increase of the mortality rates. On the other hand it was found that women who experienced higher side effects had better chanced of survivability rate. Stopping treatment earlier die to side effects had the potential to decrease the rate of t he patients survival from breast cancer. They gad got evidences which suggest that the patients suffering from greater side effects are actually gaining better treatment effect. Therefore the author had advised the nurses to understand the physiological and psychosocial necessities of the women so that they can assess the patients response in ongoing treatments, improve their surveillance care and overall provide quality care to develop the quality of their lives. Another important article was found which was provided by Burstein et al., in the year 2014. Here the researchers have conducted a systematic review of different trials including the biggest three historic trials in order to develop the clinical practice guidelines that are present on the adjuvant endocrine therapy utilized in breast cancer in patients. They have provided a number of recommendations that are indeed necessary to be followed by the nurses. The nurses should then guide the patients accordingly. The patients who are suffering from the disease are in need of conducting the medication regime up to ten years of in the premenopausal stage which is unlike the previous guidelines which stated that the menopause should be conducted for only 5 years. Moreover they have also recommended that for post menopausal women, the treatment should contain 5 years of tamoxifen followed by switching to aromatase inhibitor which would lead to a total of 10 years of treatment. Discussions and Conclusion: From the above reviews provided from different important articles it was found that most for the researchers are of the opinion that although the trials have shown that a 5 year tamoxifen treatment to be effective but no one has confirmed that it would never result in the recurrence of the breast cancer, however it had been mostly seen that most of the researchers have stated that it would be right to continue the treatment for about up to ten years to reduce the risk of recurrence and also the mortality rate of the patients. Therefore the patient of the case study should not have stopped her medication after the side effects became intense. Breast cancer is hereditary and there remains a high chance of the occurrence of the disorder but none of the authors have pointed this fact to be the reason of the recurrence. They have mainly stated that in order to reduce the risk of the breast cancer, the nurses should educate the patients to manage their side effects and continue the importa nt medication of tamoxifen. References: Binkhorst, L., Mathijssen, R.H., Jager, A. and van Gelder, T., 2015. Individualization of tamoxifen therapy: much more than just CYP2D6 genotyping.Cancer treatment reviews,41(3), pp.289-299. Burstein, H.J., Temin, S., Anderson, H., Buchholz, T.A., Davidson, N.E., Gelmon, K.E., Giordano, S.H., Hudis, C.A., Rowden, D., Solky, A.J. and Stearns, V., 2014. Adjuvant endocrine therapy for women with hormone receptorpositive breast cancer: American Society of Clinical Oncology clinical practice guideline focused update.Journal of Clinical Oncology,32(21), pp.2255-2269. Dauchy, R.T., Xiang, S., Mao, L., Brimer, S., Wren, M.A., Yuan, L., Anbalagan, M., Hauch, A., Frasch, T., Rowan, B.G. and Blask, D.E., 2014. Circadian and melatonin disruption by exposure to light at night drives intrinsic resistance to tamoxifen therapy in breast cancer.Cancer research,74(15), pp.4099-4110. Davies, C., Pan, H., Godwin, J., Gray, R., Arriagada, R., Raina, V., Abraham, M., Alencar, V.H.M., Badran, A., Bonfill, X. and Bradbury, J., 2013. Long-term effects of continuing adjuvant tamoxifen to 10 years versus stopping at 5 years after diagnosis of oestrogen receptor-positive breast cancer: ATLAS, a randomised trial.The Lancet,381(9869), pp.805-816. Early Breast Cancer Trialists' Collaborative Group, 2015. Aromatase inhibitors versus tamoxifen in early breast cancer: patient-level meta-analysis of the randomised trials.The Lancet,386(10001), pp.1341-1352. Feng, Q., Zhang, Z., Shea, M.J., Creighton, C.J., Coarfa, C., Hilsenbeck, S.G., Lanz, R., He, B., Wang, L., Fu, X. and Nardone, A., 2014. An epigenomic approach to therapy for tamoxifen-resistant breast cancer.Cell research,24(7), pp.809-819. Flanagan, J., Winters, L.N., Habin, K. and Cashavelly, B., 2012, January. Women's experiences with antiestrogen therapy to treat breast cancer. InOncology nursing forum(Vol. 39, No. 1). Ganz, P.A., Petersen, L., Castellon, S.A., Bower, J.E., Silverman, D.H., Cole, S.W., Irwin, M.R. and Belin, T.R., 2014. Cognitive function after the initiation of adjuvant endocrine therapy in early-stage breast cancer: an observational cohort study.Journal of Clinical Oncology,32(31), pp.3559-3567. Gnant, M., Mlineritsch, B., Stoeger, H., Luschin-Ebengreuth, G., Knauer, M., Moik, M., Jakesz, R., Seifert, M., Taucher, S., Bjelic-Radisic, V. and Balic, M., 2014. and Austrian Breast and Colorectal Cancer Study Group, Vienna, Austria. Zoledronic acid combined with adjuvant endocrine therapy of tamoxifen versus anastrozol plus ovarian function suppression in premenopausal early breast cancer: final analysis of the Austrian Breast and Colorectal Cancer Study Group Trial 12.Ann Oncol [Epub ahead of print]. Goldhirsch, A., Winer, E.P., Coates, A.S., Gelber, R.D., Piccart-Gebhart, M., Thrlimann, B., Senn, H.J., Albain, K.S., Andr, F., Bergh, J. and Bonnefoi, H., 2013. Personalizing the treatment of women with early breast cancer: highlights of the St Gallen International Expert Consensus on the Primary Therapy of Early Breast Cancer 2013.Annals of oncology,24(9), pp.2206-2223. Jordan, V.C., 2014. Tamoxifen as the first targeted long-term adjuvant therapy for breast cancer.Endocrine-related cancer,21(3), pp.R235-R246. Leyland-Jones, B., Gray, K.P., Abramovitz, M., Bouzyk, M., Young, B., Long, B., Kammler, R., DellOrto, P., Biasi, M.O., Thrlimann, B. and Harvey, V., 2015. ESR1 and ESR2 polymorphisms in the BIG 1-98 trial comparing adjuvant letrozole versus tamoxifen or their sequence for early breast cancer.Breast cancer research and treatment,154(3), pp.543-555. Li, J., Humphreys, K., Eriksson, L., Edgren, G., Czene, K. and Hall, P., 2013. Mammographic density reduction is a prognostic marker of response to adjuvant tamoxifen therapy in postmenopausal patients with breast cancer.Journal of Clinical Oncology,31(18), pp.2249-2256. Rajput, S., Kumar, B.P., Sarkar, S., Das, S., Azab, B., Santhekadur, P.K., Das, S.K., Emdad, L., Sarkar, D., Fisher, P.B. and Mandal, M., 2013. Targeted apoptotic effects of thymoquinone and tamoxifen on XIAP mediated Akt regulation in breast cancer.PLoS One,8(4), p.e61342. Sandell, R., Hoskin, T., Frost, M., Degnim, A. and Visscher, D.W., 2017, February. Histological Findings in Benign Breast Biopsies After Tamoxifen Therapy for Breast Cancer. InLaboraratory Investigation(Vol. 97, pp. 69A-69A). 75 VARICK ST, 9TH FLR, NEW YORK, NY 10013-1917 USA: Nature Publishing Group. Zembutsu, H., Nakamura, S., Akashi, S.T., Kuwayama, T., Watanabe, C., Takamaru, T., Takei, H., Ishikawa, T., Miyahara, K., Matsumoto, H. and Hasegawa, Y., 2016. Significant Effect of Polymorphisms in CYP2D6 on Response to Tamoxifen Therapy for Breast Cancer; a Prospective Multicenter Study.Clinical Cancer Research, pp.clincanres-1779.

Wednesday, December 4, 2019

Dover Beach Poetry Analysis Essay Research Paper free essay sample

Dover Beach Poetry Analysis Essay, Research Paper DOVER BEACH Dover Beach is a really # 8216 ; temper # 8217 ; arousing verse form. We are first met with an grasp for the sea and different emotions that is draws to the perceiver. However as the verse form progresses we are bit by bit introduced to a big metaphor for love and like the sea is able to arouse many tempers, and different emotions, whether comfortable or decayed. The poet describes the emotions with utmost passion and possibly with little crazes. We are given as sense of loss by this craze which becomes clearer in the last stanza. The rubric of this verse form, # 8216 ; Dover Beach # 8217 ; , truly sets the scene to the reader about immediately. Dover, with its white drops, giving us a sense of laterality and impressiveness. The poet may hold done this as to put the temper for the gap stanza.For others it may arouse a idea or memory of the yesteryear. We will write a custom essay sample on Dover Beach Poetry Analysis Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Possibly on childhood vacations with your parents. The could be arousing these ideas so that you can sympathize subsequently to what he is sing in the verse form. This puting for many, will of class conveying the Channel to mind, a mammoth image, arousing once more ideas, this clip of France. The rubric itself nevertheless does non give you any emotional penetration into the verse form. I feel the poet did this as to non alarm the reader to what is traveling to exceed upon them further in the verse form. The verse forms opening stanza is to get down with really soft and tranquil, # 8216 ; The sea is unagitated tonight # 8217 ; . The words the poet utilizations are delighting, # 8216 ; Gleams, Sweet, gleaming # 8217 ; . The temper for the verse form is being set. The reader is filled with visions of peace and a sense of being content # 8216 ; sweet is the dark air! # 8217 ; .However the temper of the verse form dramatically alterations. The poet begins to utilize words which changes the temper and are immensely different from the old lines, # 8216 ; howl, decelerate, unhappiness # 8217 ; . This sudden emotional alteration to me is a symbol of his love or life. Once the poets life was calm like the seas # 8217 ; in the gap line. The poets life has no changed into a convulsion of emotions, which are charged like the sea, # 8216 ; the moving ridges suck back, and crack, At their return # 8217 ; This sudden alteration in temper in the verse form is really simil Ar to the altering temper of the sea, for which the first stanza is explicating. In the 2nd stanza we are really able to larn more of the poets analogy. The poet believes that the noise of the sea, can convey in the # 8216 ; flow // Of human wretchedness # 8217 ; . This is what he claims happened to Sophocles. This analogy is possibly what besides happened to the poets life. The composure see turned into a continual waring swash in his psyche which brought with it wretchedness. However the last line of the stanza tells us that this noise does non convey with it merely human wretchedness but besides a idea, the poet does non lucubrate this theory so we are left to presume this alterations from individual to individual. # 8216 ; in the sound a thought. # 8217 ; The sea once more in the 3rd stanza represents his loss of religion. This loss of religion is intricately described as disappearance in the darks wind # 8216 ; to the breath of the night-wind # 8217 ; .Here the poet builds up a clear image of the air current being personified, # 8216 ; to the breath # 8217 ; and taking this religion down to the # 8216 ; huge borders # 8217 ; and with it besides the # 8216 ; bare herpes zosters of the universe # 8217 ; This thought of bare herpes zosters, is possibly how the poet feels himself to be. Isolated from anyone else, left stripped naked to hold all of his ideals taken off from him by the simple component the air current. By utilizing the different # 8216 ; tempers # 8217 ; of the sea, composure and powerful, the poet is able to do a connexion to life. The manner the sea continuously knocks, hurtling stones up against the strand, gives us a sense of inexorability of some emotional strain on his life, # 8216 ; Begin, and cease, and so once more begin # 8217 ; . The concluding stanza is an incorporation of the whole verse form, every bit good as corroborating to the reader what it is the poet is seeking to explain.The concluding stanza, begins like that of the gap stanza, utilizing a really appealing, soft gap, every bit good as words to back up this, # 8216 ; love, true, dreams, beautiful and new # 8217 ; .However once more like the stanzas predating it, changes temper once more, to seek and state us that non count what happens, whether we are true, or in love, we will neer understand the this beauty, either the poet here is mentioning to love, life or the existent beauty of the sea and Dover Beach we do non cognize, nevertheless it points to these subjects.

Thursday, November 28, 2019

Racial Profiling Essays (1397 words) - Offender Profiling

Racial Profiling The great era of civil rights started in the 1960s, with Martin Luther King, Jr.'s stirring "I have a Dream" speech at the historic march on Washington in August of 1963. At the same time Birmingham Police Commissioner "Bull" Connor used powerful fire hoses and vicious police attack dogs against nonviolent black civil rights activists. Although these years proved to be the highlight and downfall of civil rights in America, even with the 1964 Civil Rights Act and the 1965 Voting Rights Act being passed, time has repeated these tumultuous events again in the present. Racial profiling has been one of many civil rights issues concerning the unnecessary stopping and arresting of people based on race, color, ethnicity and gender. Skin-color has become evidence of the propensity to commit crime, and police use this "evidence" against minority drivers on the road all the time. This practice is so common that the minority community has given it the derisive term, "Driving While Black or Brown" ? a play on the real offense of "driving while intoxicated". Although many law enforcement officers defend themselves by saying they are fighting against the "War on Drugs" by arresting these law offenders, recent trials and reports show that no basis of arrest have been found against these minorities. Official skin-color prejudice is still reflected throughout the criminal justice system. Today, skin-color makes you a suspect in America. It makes you more likely to be stopped by a law enforcement officer, more likely to be searched, and more likely to be arrested and imprisoned. Tens of thousands of innocent motorists on highways across the country are victims of racial profiling, and these discriminatory police stops have reached epidemic proportions in recent years. Fueled by the "War on Drugs", this fight has given police a pretext to target people who they think fit a "drug courier" or "gang member" profile. At many times, these minorities have been stopped and arrested for illegal offenses, however we are not sure if these stories have been filed truthfully by law enforcement officers. Many police departments face issues concerning racist law enforcement officers who cause the problems of racial profiling. One such example comes from the Hillside Police Department, where several racial bias charges have been made against them. Racial slurs have become common in the Hillside district, where even the department supervisor does background checks on minorities IN the squad, even to kick them off the squad. In this department, only two officers are Hispanic and one is of African decent. The officers, many of whom are white, are encouraged to target minorities first to fill their ticket quotas for the month. Hillside officers defend themselves saying that Hillside is 40 percent black and 20 percent Hispanic. However, the actions taken by Hillside officer, such as targeting to fill quotas and background checking, seem disconcerting. The Reverend Jesse Jackson even needed to call for federal protection for whistleblowing police officers. Because of the Law Enforcement Trust and Integrity Act, passed this year, other officials who witness this discriminating act are protected. It says, "The identity of a law enforcement officer who complains in food faith to a government agency or department about the unlawful practices of a law enforcement agency shall remain confidential and shall not be disclosed by any person except upon the knowing written consent of the law enforcement officer. This section shall not preempt any right of confrontation protected by the Constitution of by Federal, State or tribal law." In many cases, we can not determine whether the racial profiling comes from the individual law enforcer, or the department itself. Many policies have been suggested to either report these discriminatory acts, or to record the ethnicity, race, or gender of the person being stopped. However, without the correct supervision of these officers, we can not truthfully tell whether these policies will be followed. There have been bills proposed to even make the slightest positive effect on racial profiling, yet many have been overlooked. Former California Governor Pete Wilson served as best he could to fight key civil rights issues such as affirmative action and immigrant rights, however Governor Gray Davis has had a disappointing civil rights record. Although he has helped establish new civil rights gains for the lesbian and gay communities, he has also vetoed a number of bills aimed at reducing discrimination against communities of color and immigrants. SB 44, a bill sponsored by Senator Richard Polanco, encourages state and local governments to conduct outreach programs. SB 44 had bipartisan support and was previously endorsed by former

Sunday, November 24, 2019

Essay on How I Met Your MotherEssay Writing Service

Essay on How I Met Your MotherEssay Writing Service Essay on How I Met Your Mother Essay on How I Met Your MotherHow I Met Your Mother is an American sitcom about five friends who live in New York City and look for their happiness in different ways. The main character is Ted Mosby who in 2030 tells his children the story of meeting their mother. Looking for the love of his life, Ted spends much time in doomed relationships. At the same time, two of his friends, Marshall and Lily inspire him as an example of true love and commitment. Another friend, Barney Stinson, is, on the contrary, mad about women and spends his time abusing them in different ways, which he has particularly described in his legendary Playbook. One of the main characters, Robin Scherbatsky ends marrying Barney, but being focused on her career, feels her marriage as a burden and gets divorced. She also used to date with Ted, and in 2030 Ted receives his children’s blessing for being with Robin as their mother died six years ago.Robin Scherbatsky is an emigrant from Canada who came to New Yo rk to make the career of a news anchor. The show bristles with jokes about Canada and its citizens, and these jokes may be interpreted as cultural oppression. However, most of the chauvinist jokes are expressed by Barney who also appears to be a quarter Canadian himself. In the meantime, it should be underlined that while the Canadians are allegedly lashed in the show, the creators tried their best to make a positive image of this nation focusing on their politeness, fortitude, and faithfulness.Further on, another example of cultural oppression is James Stinson, Barney’s stepbrother. James is an African American who prefers men to women. Being an effective homosexual charmer, he suddenly marries Tom despite the initial protests of Barney. It is necessary to stress that Barney is not against a gay marriage, but at the moment James and Tom are engaged, he is totally against monogamy and lifetime commitment (von Matterhorn). Unfortunately, James is still a playboy by the end of the series, and his marriage is going to break up because of his endless cheating. The only continual African American character in the show is simultaneously homosexual and having problems with steadiness in relationship, but the authors of the show managed to make him charismatic, talented, and possessing a number of positive features like helpfulness, sympathy, and, of course, sense of humor.The two examples listed above demonstrate how uncomfortable themes concerning cultural and social differences can be played up effectively and carefully at the same time. It seems to be a fascinating trick to express tolerance when these differences are focused on instead of being ignored or mitigated like they are something unpleasant or inconvenient. Instead, the authors afford themselves to laugh at the differences sincerely and in this way to make the similarities more visible.What is more, it is typical for How I Met Your Mother to use comic euphemisms for culturally sensitive issues (Kr ause) including smoking marijuana, giving the middle finger or loud sex acts. Extensive use of euphemisms makes the show free from abusive scenes that can injure vulnerable social strata. Besides, the role of euphemisms even became the ground for one of the episodes in which the need to visit a bathroom is substituted by the need â€Å"to read a magazine.†

Thursday, November 21, 2019

A narrowed aspect of National Park Essay Example | Topics and Well Written Essays - 750 words

A narrowed aspect of National Park - Essay Example Snowmobiling in the Yellowstone national park is disputable on a few fronts. Moderates are worried about how snowmobiles, and snowmobile outflows specifically, may affect natural life, air and water quality, commotion levels, and the pristine aesthetic of the Yellowstone wilderness. An alternate concern is for the well being impacts upon both snowmobile riders and park officers who are laid open to fumes and high clamor levels for huge measures of time. Supporters of snowmobiling point to different contemplations, for example, economic benefits to local communities and the importance of preserving access to public lands. Adding further, several individuals are of the view that more up to date innovations make cleaner, quieter snowmobiles that relieve the impacts of snowmobile use on air, water and commotion contamination. Quantitative research on this issue remains inadequate and numerous inquiries stay unanswered. There are 185 miles of cleared and paved roads especially constructed for snowmobile use in the Yellowstone National park, the vast majority of which are adjoining to streams, rivers and lakes. Considering the dissemination of pollutants in the snowpack and the impacts of poisons on oceanic creature, there is potential for surface water tainting from snowmelt spillover. For example, separation of polluted snowpack from water body, contaminant level versus weakening component and so on. Human recreational exercises have a major impact on aquatic resources directly and by through implication as well. Winter recreation influences aquatic organisms principally by aberrant affects because of contamination. Two-stroke motors can store contaminants on snow, prompting ground and surface water quality corruption, which along these lines may affect aquatic life. Protection of the aquatic resources of park, including the aquatic assets, and rebuilding of local species are essential administration objectives of the National Park Service.

Wednesday, November 20, 2019

Internal & external analyses of Lion Nathan Essay

Internal & external analyses of Lion Nathan - Essay Example This paper attempts to analyze the sustainable competitive advantage of Lion Nathan using SWOT (Strengths, weakness, opportunities, and threats) analysis, in which potential improvements may be seen in the identified weaknesses and threats, without overlooking its good points posed as strengths. Lion Nathan can be acknowledged for its strengths in terms of identifying its core purpose in the business, alongside its vision of making itself Australia’s and New Zealand’s leading alcoholic beverage company. This is undertaken with a stronghold on the company’s identity in the wine industry while making known its values of integrity, passion, acing together, and being sociable. These values, particularly the last one, are usually not found in other beverage companies, making Lion Nathan surge up to its sustainability purposes. It may also be emphasized that beverage companies are not that easy to build positive values and carry them out to the wider public due to the very nature of the business, but Lion Nathan is able to identify values that may be appropriately attached to the product. This is suggestive of leading and living clear values alongside demonstrating constructive behaviors with an intent to better engage its stakeholders in the business, a stra tegic task that is proved both effective and workable. This is how the company provides sustainable competitive advantage. The company’s aim of acting with integrity and doing the right thing for the long-term health of its business and the communities in which it operates is indicative of a long-term perspective. These are the strengths of Lion Nathan in terms of sustainable competitive advantage. The company’s involvement is sustained investment in community partnerships, responsible marketing initiatives, education and research initiatives, and reducing its

Monday, November 18, 2019

WEEK 8 journal 6500 Essay Example | Topics and Well Written Essays - 250 words

WEEK 8 journal 6500 - Essay Example n for errors to occur during practice, but failure to report these errors could lead a habit that may end up causing serious problems in the future especially when patient safety is concerned. When the nursing students were checking blood sugars, the nurse on the hall wanted them to dry their finger that had been wiped with alcohol by fanning it finger using their hand. According to patient safety, procedure in preventing that would be a wrong technique. The finger should air-dry. The nursing students did it the way the nurse wanted them to even though it was wrong so as not to upset the nurse on the hall. Nursing students need to understand that patient safety comes first, and it is okay to report an error or raise concern if they notice an error being committed by a senior nurse or physician. Having an error-reporting system is one important strategy for improving the healthcare system. Apart from offering safety through reporting and tracing underlying causes, it further offers information about potential future errors and problems (Kim, Kim, Kim, & Kim, 2007). According to Wolf & Hughes, (2008) â€Å"ethical principles of beneficence (doing well) and non-maleficence (preventing harm) are violated when errors are not reported or disclosed†. The situation I observed at the practicum site mirrors what research has found to be key reasons that lead to medication administration errors, which is a real world problem. A study carried out to identify barriers to the reporting of medication errors found â€Å"Administrative barriers and fear were found to be the top two reasons for not reporting medication administration errors among nursing students† (Koohestani & Nayereh, 2010). Kim, M.-S., Kim, J. S., Kim, Y. H., & Kim, H. J. (2007). The effectiveness of the error reporting promoting program on the nursing error incidence rate in Korean operating rooms. Journal of Korean Academy of Nursing, 185-191. Wolf, Z. R., & Hughes, R. G. (2008). Chapter 35. Error Reporting

Friday, November 15, 2019

Techniques Of Creating Stop Motion

Techniques Of Creating Stop Motion The dissertation focuses on the techniques and methods of creating stop motion and how it is implemented on various forms of visual media. The initial motivation for the content and structure of this dissertation is based on personal experience during my project and also some research on it. Several research and reviews also helped me to specify and provide certain suggestions. This dissertation will briefly explain about what are stop motion and different techniques and method of creating stop motion. And also study how to improvise and implement the stop motion in the modern CGI media industry. An introduction to some of the most popular types of stop motion. The types of stop motion reviewed and discussed in this dissertation include: Puppet animation Puppetoon Clay mation Cutout animation Silhouette animation Model animation Go motion Object animation Graphic animation Pixilation Chapter 1 Introduction Stop-motion animation is described as a type of animation created or designed by physically manipulating or altering real-world or physical objects and is photographed or captured them on one frame of a film at a single time. And when it plays altogether it will create the illusion of movement. There are many different types of stop-motion animation, usually named or tagged after the type of media or way used to create the animation. There are many Computer software is widely available in the market to create this type of animation. In late 80s stop motion become unpopular due to its strange appeal and unorthodox style of animating character. Stop motion was widely used in special effect especially in 80s.The process and traditional stop motion has been kept alive by great directors like Tim Burton and Nick Park. Stop motion is usually the work of an oneman craftsmanship performing all the duties under intense concentration on one frame at a time while, CGI or 3D special effect sequences tend to have small group devoted or appointed people to their specialized tasks. In terms of larger debates, stop motion generally wins over the traditional artistically-based 3d animation because its handcrafted naturally and lively and can be corrected any moment by keeping its traditional art history background of design and sculpture, At the end its a magic show in which actual physical or real world objects have been handled or manipulated in a way which produces an illusion of motion to the audience 1. Research question What is stop motion What are the types , methods and technique for creating stop motion What are role and importance of camera in stop motion What are the pros and cons of stop motion in production What is the future of stop motion 2. Aim The dissertation aims to find out the role and techniques of stop motion in visual media industry and also how it can be implemented in present generation media industry. 3. Objectives To define stop motion and its history To explain the different method and techniques involved in creating stop motion To explain how the camera effects on creating stop motion To analyze the pros and cons of stop motion To analyze the integration between the techniques of stop motion with new generation computer graphics media 4. Summary of chapters: 4. a. Stop motion This section provides the introductuion and the brief history of the stop motion. The reader will understand what exactly stop motion is. 4. b. Different types of stop motion This section explains the different types of stop motion, the technique and method to create it and also the resource and artist behind it. 4. c. Camera in stop motion The sections explain of choosing the camera and the requirement for it. A brief summary of camera and also the merits and demerits of each one 4. d. Stop motion in present day media industry This section explains how it is integrated in new generation media industry and also the impact of stop motion over the traditional animators 4. e. Review of some popular stop motion This section provides the use of different technique and method in each individual movie from past and present day media. 4. f. Future of stop motion Stop motion and 3D integration with stereoscopy This section briefly explains the future enhancements and technology involved in the next-generation of stop motion in the media industry Chapter 2 Review of Literature Creating a stop motion is huge and painstaking process than any other form of art .the production is a very time consuming and should take care of sculptor or the modeler and also the technical issue like frame rate and the camera . So in production these things should be executed in a good rhythm to get a fine output The production behind the project should give the proper backup and take care the whole pipeline. The stop motion makes believe, that real object and physical figures comes alive lives in front of them. Its purely an artist work. But in the world of 3d, the stop motion got some great challenge to face. 3d animation takes a short duration of production time regarding stop motion. So commonly the 3d got popular in the industry. But in present world of media industry there are few stop motion enthusiast and director who kept this art alive and bringing a new form of stop motion. The stop motion is purely an intrinsic work and effort of each sculptor or a modeler. So the basic idea of stop motion is the process technique and methods involved etc, is to understand before an artist and he can go ahead and create a stop motion in the production phase. This way he would be able to understand the technique to create a good stop motion Chapter 2 Literature review Article by Ken A. Priebe (2006) mention about the art of stop motion and also How to create puppets and how to bring them to life and create a stop-motion film. Article by Tom Brierton (2006) mention and discuss about the aesthetics of stop-motion animation. He explains the technique of lighting and camera. And the article also discussed on body language of model, facial expression, gesture, movement and emotion of the model. Article by Barey. J.C .Purves (2008) mentions and discussed about the potential of puppet and models insight of world most popular stop motion animators and discussed on initial concept and script writing Chapter 3 | Research Methodology The research paper carries out a qualitative evaluation of material collected from secondary data source i.e. literatures and articles already written. The research is aimed to explain the techniques, method and overall awareness of stop motion to use in present generation production. The research methodology used is described below: à ¢Ã¢â€š ¬Ã‚ ¢ Description about Stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Different types of stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Technical analysis of stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Explanation of present day stops motion à ¢Ã¢â€š ¬Ã‚ ¢ Review of some popular stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Analysis and report making suggestions based on the reviews à ¢Ã¢â€š ¬Ã‚ ¢ Future developments of stop motion are explained. The theory and history behind the development of stop motion is first explained. Then the different type of stop motion is elaborated. This gives a basic idea about the technology and theory behind production Then the various common features and criteria of production are explained to give an idea as to what exactly artists can do. Then some review over the popular work and the techniques and method behind it, Based on the reviews, a report is made to give an idea that how it can be implemented in the perfect way Upcoming developments and enhancements of stop motion production are then explained in brief. Chapter 4 Stop motion Key words: Animation, stop motion Animation is a simulation of movement created by displaying series of image in 2d, 3d or a model position in order to create a sequence 1. | Definition Albert E. Smith and Stuart Blackton (1898) is the creator of first stop motion. Stop motion (also known as stop action or frame-by-frame) is an animation technique to make a physically manipulated object appear to move on its own. The object is moved in small increments between individually photographed frames, creating the illusion of movement when the series of frames is played as a continuous sequence 2. | Overview Animation as a whole can be related as the base of different type and method of animation available in the industry. It is also considered as the different form of art Animation are categorized by the techniques used, they include: Traditional animation Stop motion 2D animation 3D animation Here the research is on stop motion and the stop motion is divided into Puppet animation Puppetoon Clay mation Cutout animation Silhouette animation Model animation Go motion Object animation Graphic animation Pixilation 3. | History Stop motion had a long history and it is old as the traditional film. The stop motion is involved in animating objects which makes movement to nonliving objects such as toy blocks or any inanimate objects. Later the stop motion animator experimented on clay animation and puppet animation. The early examples of stop motion film and technique can be seen the movie Humpty Dumpty circus (1898) and another film called Fun in bakery shop (1902)[1]. The haunted hotel was very successful movie, with the cinema audience of that time (1907) The first stop motion that used in clay animation got a great critical acclaim (1912) And was called Modeling extraordinary The first woman animator, Helena Smith Dayton, began experimenting with clay stop motion (1916). Her first film released in 1917, Romeo and Juliet The other big changes in stop motion was brought by Willis o Brien by including 49 pre historic animals in his film Some of the other notable Milestones in the History of stop motion The great stop motion animator, Ray Harryhausen received the Gordon E. Sawyer Award from the Academy of Motion Picture Arts and Sciences for his contributions in technology 1991. But in early 20th century the face of stop motion has dramatically changed with the development of digital 3D animation and animating 3D character and become much easier and fast which the industry was favored. So it becomes rarely used. Now the stop motion enthusiast and director who kept this art alive are bringing a new form of stop motion. The stop motion is purely an intrinsic work and effort of each sculptor or a modeler. Chapter 5 | Different types of stop motion Stop motion is categorized in different type, according to the media used to create the animation They are Puppet animation Puppetoon Clay animation Cutout animation Silhouette animation Model animation Go motion Object animation Graphic animation Pixilation Stop motion is a highly time-consuming job based on the complexity of the scene and the different animating techniques, methods opt for. 1. Puppet animation: Puppet animation is a method that involves articulated puppet. These puppet figures interact with each other in a constructed environment or a set, in contrast to the real world interaction in a model animation. As on the technical side the puppets are made of constraints which allow them to move the joints to create a movement, and also the puppet will have an armature inside them keep steady or fixed steady in the set The famous puppet animation works are Tale of the Fox (France, 1937), Nightmare before Christmas (US, 1993), Corpse Bride (US, 2005), Coraline (US, 2009), the films of Jiri Trnka and the TV series Robot Chicken (US, 2005-present). a. Puppetoon: Unlike clay animators like Nick Park, Will Vinton or Art Clokey, George Pals animators worked in a replacement technique using hand-carved wooden puppets. A separate puppet (or puppet part) was used for each motion, rather than clay or hinged parts. A single walking sequence, for instance, could involve 12 pairs of legs for one character. An average Puppetoon short would use 9,000 puppets. 2. Clay animation: Clay animation or otherwise termed as plasticine animation is commonly known as Claymation. They use clay or a different type of malleable substance to create the figure which is used for the stop motion animation. Similar to puppet animation figure this Claymation figure also have the armature or wireframe inside them and they can be manipulated or altered the figure in the particular scene or shot. There are certain films like in which the figure is entirely made of clay. By using this method they can morph the creature or the figure into another shape. Examples of clay-animated works include The Gumby Show (US, 1957-1967) Morph shorts (UK, 1977-2000), Wallace and Gromit shorts (UK, as of 1989), Jan Ã…Â  vankmajers Dimensions of Dialogue(Czechoslovakia, 1982), The Trap Door (UK, 1984). Films include Wallace and Gromit: Curse of the Were-Rabbit, Chicken Run and the Adventures of Mark Twain 3. Cut out animation: Cutout animation is based on 2 dimensional animations. In this animation 2D objects like paper or cloth are move frame by frame to create the effect. Examples include Terry Gilliams animated sequences from Monty Pythons Flying Circus (UK, 1969-1974); Fantastic Planet (France/Czechoslovakia, 1973) ; Tale of Tales (Russia, 1979), The pilot episode of the TV series (and sometimes in episodes) of South Park (US, 1997). 4. Silhouette animation: Silhouette animation is a different variant of cutout animation .In this animation the characters are backlited and the result will be a silhouettes of the figure Examples include The Adventures of Prince Achmed (Weimar Republic, 1926) and Princes et princesses (France, 2000). 5. Model animation: Model animation refers to stop-motion animation created to interact with and exist as a part of a live-action world. Intercutting, matte effects, and split screens are often employed to blend stop-motion characters or objects with live actors and settings. Examples include the work ofRay Harryhausen, as seen in films such Jason and the Argonauts (1961), and the work ofWillis OBrien on films such as King Kong (1933 film). 6. Go motion: Go motion is a variant of model animation which uses various techniques to create motion blur between frames of film, which is not present in traditional stop-motion. The technique was invented by Industrial Light HYPERLINK http://en.wikipedia.org/wiki/Industrial_Light__MagicHYPERLINK http://en.wikipedia.org/wiki/Industrial_Light__Magic Magic and Phil Tippett to create special effects scenes for the film The Empire Strikes Back (1980). Another example is Vermithrax from Dragonslayer (1981 film). 7. Object animation: Object animation refers to the use of regular inanimate objects in stop-motion animation, as opposed to specially created items. 8. Graphic animation: Graphic animation uses non-drawn flat visual graphic material (photographs, newspaper clippings, magazines, etc.) which are sometimes manipulated frame-by-frame to create movement. At other times, the graphics remain stationary, while the stop-motion camera is moved to create on-screen action. 9. Pixilation: Pixilation involves the use of live humans as stop motion characters. This allows for a number of surreal effects, including disappearances and reappearances, allowing people to appear to slide across the ground, and other such effects. In this method live humans are used as stop-motion animation props. A very good example of this is the old sci-fi movies in which actors acting on screen used to just vanish in a split second; one frame they are there and the other they are gone. An awesome example is Norman McLarens Neighbors and A Chairy Tale. A must watch. Examples of pixilation include The Secret Adventures of Tom Thumb and Angry Kid shorts. Chapter 6 | Camera in stop motion Camera plays an important role in the field of stop motion. There are certain basic requirements for the camera to shoot decent stop motion film. As the stop motion is based on frame by frame capturing, the camera should be rock solid. The other important thing are the Screen resolution, manual focus and manual image control and also the types of cameras like webcams, film cameras, camcorders and digital still camera. The screen resolution will be dependent on the medium of output and the camera used. When the medium of output is web based then the web camera are mostly appreciated, and when it is broadcasting for television or other bigger screen media , a bigger camera are needed that have broadcast resolution The other thing use must take care in camera are manual focus because in each frame the object will move in the field of view and this cause the focus to change . The other thing u should notice is zoom and it should be optical zoom and not digital zoom, because the digital zoom tend to pixelate. Manual image control is other main feature that can manually override gain, exposure and white balance. Types of camera Web cameras: Web cam will be the cheapest and simplest way to make a stop motion. The plus is that unlike film cameras, there is no waiting for entire role to get exposed and developed. The beginners can start with webcam and slowly by practicing they can go for higher or expensive cameras. The merits of web cams are, they are cheap and with decent web cam we can produce a good broadcast quality animation. And also can check feedback instantly. The demerits are that the lens cannot be interchange for better quality lens Film camera: The most common choice of the motion picture format is super-8, 16mm and 35mm. In this range the 35mm camera will be outside range, because it is costly and it depends on the production In this camera the least expensive is super-8 and for 16mm we must pay little more for film and processing. The small drawback of the camera is that it is having a spring drive device which is used to wind .Because of this it cause uneven exposure, so it is better to get an animation motor fitted on it for the ease of work. The merits are that, the output will look like digital video. They can interchange lenses and also can offer timed exposure, double exposure and matte effects. The demerits are the cost of the film, as it will cost more developing process Camcorders: There are different types of camera available in the market and can be used for filming stop motion. You can capture the live feed from the camera through frame grabber software and can make correction. For an old camcorder you should have a analog/digital converter. If it is DV camcorder you dont need a converter, just connect through fire wire or usb port. You can provide a live feed to the computer through the capturing software without a tape inside Digital still camera: We can take stop motion in digital still camera and this camera offers a high resolution images. And the main feature is that you can do exposure setting The merits are that it got higher resolution and have a good optics, and also allow lens interchange The demerits are they wont work with frame grabbers, and also have flicker issues. Chapter 7 | Stop motion in present day media industry

Wednesday, November 13, 2019

Brand Name Clothes Essay -- Business Marketing

Brand Name Clothes Would you choose a friend based solely on their name? Of course not, the idea seems absurd. Is it possible, however, that we might use such a ridiculous method when selecting the type of clothing we wear? In my opinion, many of us do. Throughout my research, I will be testing the hypothesis that college students buy more brand name clothes than generic name clothes. In colleges especially, there seems to be an emphasis on appearances, so many students have a tendency to steer clear of clothing with generic names. Do they believe that generic name clothes are of less quality? This is another question I am hoping to answer through my research. In addition, I would like to determine the accuracy of my assumption that females are more inclined than males to buy brand name clothing. Nevertheless, I am a male yet I still tend to buy more brand name clothes. Regardless of our gender, we all must make decisions about clothing every day, even if the decision is only based on what smells clean. Because of this, I thought it would be interesting to find out the factors involved in the type of clothing we buy in the first place. What brands in particular do most college students prefer? Are we influenced by our family, friends, or the people we see on television? Are there any other reasons why we buy the brands we do such as their price, comfort, or popularity? If students really do buy more brand name clothing, is it because they are of better quality than generic name articles? In order to determine some answers to these questions, I have utilized three different research methods. First, I performed a survey of 20 students who are currently attending the Indiana University of Pennsylvania. Our c... ... Feel brand names are of better quality 50% 60% Feel generic names are of better quality 50% 40% Buy these clothing brands: Abercrombie & Fitch 40% 10% Aeropostal 50% 10% American Eagle 60% 50% Banana Republic 20% 20% Gap 30% 10% Pacific Sunwear 10% 10% Ralph Lauren 10% 10% Wal-Mart 10% 30% 9.99 Stock Room 30% 30% Other brand names 60% 90% Other generic names 0% 10% Influenced by: Friends 50% 60% Family 40% 20% Famous People 10% 10% No One 40% 40% Girlfriend 10% 0% Why buy the brands they do: Availability 10% 10% Fit/Comfort 30% 10% Looks 90% 80% Popularity 30% 20% Price 30% 40% Quality 50% 60%

Sunday, November 10, 2019

Smart Phone

Smartphone Security Survey of U. S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute © Research Report Smartphone Security Survey of U. S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones.In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above.We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure such sensitive information. We also recommend that security policies state these precautions and ensure they are enforced. Following are the most salient research highlights: ?Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of business and personal usage means much more sensitive and confidential data is at risk and suggests that the smartphone is with them most of the time. Sixty-six percent admit they keep a moderate or significant amount of personal data on their smartphones. Such personal data include email address, name, contact lists, photos, videos, anniversary and personal dates, music, Sixty-seven percent of consumers surveyed say they are concerned about receiving marketing ads and promotions.However, less than half (44 percent) are concerned about having a virus attack on their smartphone when it is connected to an insecure Internet network. In addition to using it as a phone, 89 percent use their smartphone for personal email and 82 percent use it for business email. A smaller percentage of consumers use their smartphones for financial transactions including payments. In fact, 38 percent of consumers use the smartphone to make payments and 14 percent use it for banking. Sixty-six percent of consumers have paid at least once for an item using their smartphone.In addition, 12 percent of consumers say they have experienced a f raud attempt vis-a-vis a mobile payment scheme. Despite this fact, only six percent say they check their mobile bill or statement every month and eight percent check the statement when the bill is higher than usual. Fifty-eight percent of consumers say that based on how they used the smartphone for purchases, Internet browsing and location they were targeted by marketers. Accordingly, 67 percent say they are very concerned or concerned about aggressive or abusive marketing practices. ? ? ? ? ? Ponemon Institute © Research Report Page 1 ?Despite security risks, less than half of consumers use keypad locks or passwords to secure their smartphones. In addition, only 29 percent of consumers said they have considered installing an anti-virus product to protect their smartphone. Forty-two percent of consumers who use social networking apps say they allow smartphone versions of well-known social networking applications such as Facebook to access the same key chains, passwords and log-ins that they use of their desktops, laptops or tablet. Only 10 percent of consumers say they turn off Bluetooth â€Å"discoverable† status on their smartphone when not in use. ? ?Ponemon Institute © Research Report Page 2 Part 2. Key Findings In this report we have organized the findings from the study according to the following topics: Consumers’ use of smartphones, consumers’ awareness about the security risks that accompany their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are not managing these risks. Consumers’ use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 percent use it for personal but some business use (Bar Chart 1).Only 6 percent of consumers surveyed use their smartphone exclusively for business. Bar Chart 1. What best describes your smartphone use? Both busine ss and personal use equally 40% Mostly personal but some business use 25% Personal use only 16% Mostly business but some personal use 13% Business use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in Bar Chart 2, 35 percent say they purchased it without any reimbursement.Bar Chart 2: Who purchased your smartphone and who pays the monthly service fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute © Research Report Page 3 Smartphones can perform a wide range of tasks. However, the most popular use next to the phone is business and personal emailing.The mo st popular smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to music (Bar Chart 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding may indicate why many in our study are not concerned about the security risks. Because consumers believe its primary use is as a phone or to email they may think (incorrectly) that there are negligible security or privacy risks.Bar Chart 3: Tasks that consumers do on their smartphone Phone Personal email Business email Address book Texting Store or move data Internet browsing Obtain documents Calendar View documents Listen to music Schedule tasks Shop Camera Social networking 0% 20% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% 100% 120% As reported in Bar Chart 4, 66 percent have paid for an item via their smartphone once, irregularly (once every two months) or regularly (maybe once a month). Fifty-one percent were surprised that they were charged for a service of product they signed up for.Bar Chart 4: Key questions about smartphone use Each bar defines the percentage yes response Did you ever pay for an item via the mobile phone? Did you every sign-up for a service or product on a mobile without realizing that there would be a cost? Have you ever signed a terms and conditions request on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute © Research Report Page 4 Consumers store confidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a significant amount of personal data.Bar Chart 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar Chart 5: How much p ersonal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned future purchases, purchase history, health data and security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6: What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary & personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% 100% 120% Ponemon Institute © Research Report Page 5 Many consumers surveyed have used email and text to sign u p for services or products without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent made what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7: The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website Other 12% 34% 31% 46% Despite these unexpected charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills every month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8: Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it every month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not certain. Ponemon Institute © Research ReportPage 6 Consumers’ awareness about the security risks that accompany their use of smartphones Marketing messages—not privacy and security risks—worry consumers. While the majority of consumers do not feel their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unwanted marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9: Attributions about privacy and security risks The agree response is a combination of strongly agree and agree.The disagree response is the sum of unsure, disagree and stro ngly disagree. I worry more about the security of my desktop or laptop computer than my smartphone. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a hacker will attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone while traveling. I do not worry about being tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% Agree Disagree They also worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the surv ey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are aware that what is described in the scenario could happen to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios: 1. Location data embedded onto image files can result in the tracking of the smartphone user. 2. Smartphone apps can transmit confidential payment information (i. e. credit card details) without the user’s knowledge or consent. Ponemon Institute © Research Report Page 7 3.Smartphones can be infected by specialized malware called â€Å"diallerware† that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. 5. Financial apps for smartphones can be infe cted with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. . A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet through a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain basic security protections that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based o n how the phone is used for purchases, Internet browsing and location. As a result, the user may receive unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers’ level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local WIFI network is insecure (35 percent). Bar Chart 10: Are you aware of the following smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Jailbreaking Spyware Social network snafu Auto transmission Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 4 0% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute © Research Report Page 8 Bar Chart 11 reports consumers’ actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk – wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11: Have any of these situations happened to you? Each bar defines the combined very concerned and concerned responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers’ level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very concerned or co ncerned about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12: Are you concerned about of the following smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware Unwanted marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disabled through â€Å"jailbreaking† but generally are not aware of this risk.In Ponemon Institute © Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While the re is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone: the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, â€Å"diallerware† infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. Line Graph 1: Summary of consumer responses to eleven smartphone securi ty risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute © Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be important when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13: How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have neither keypad locks nor passwords on their smartpho ne. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14: Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute © Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn off Bluetooth â€Å"discoverable† status on their device when they are not using it. Only 10 percent set up download controls on their smart phone to protect against apps and games that may contain malware. Bar Chart 15: Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute © Research Report Page 12 Part 4. Methods Table 1 summarizes the sample response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers located in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A total of 793 respo nded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final sample of 734 consumers (2. 5 percent response rate). Table 1: Sample response Sample frame Invitations sent Total returns Rejections Final sample Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are Apple’s iPhone, RIM Blackberry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows Mobile. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 Sprint HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other Total Pct% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% 100% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure Total Pct% 24% 19% 12% 9 % 3% 3% 2% 2% 1% 1% 25% 100%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full or part-time position. Pie Chart 1: Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2: Employment status 5%2% Employee Homemaker Retired Student Unemployed Business owner Active military 13% Ponemon Institute © Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their region in the United States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3: Household income Pie Chart 4: Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast Mid-Atlantic 14% 20% 61 to $80k 81 to $100k 101 to $150k 12% 18% Midwest Southeast Southwest 15% 17% Pacific west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute © Research Report Page 14 Part 5. Conclusion The key finding from this research is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being published about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more worried about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if lost or stolen could result in financial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that auditors who did not pa rticipate are substantially different in terms of underlying beliefs from those who completed the survey.Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute © Research Report Page 15 Appendix: Detailed Survey Responses Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sa mple frame Invitations sent Total returns Rejections Final sample Part 1. Background Q1a. Please select the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) Total Q1b. Please select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other Unsure Total Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally Total Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. % 2. 5% Pct% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% Pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% Pct% 6% 13% 16% 25% 40% 100% Ponemon Institute © Resea rch Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges Total Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking Travel assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never Total Q6a. Have you every signed u p for a service or product on your mobile without realizing that there would be a cost?Yes No Total Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other Total Pct% 35% 13% 10% 8% 34% 100% Pct% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 51% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute © Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No Unsure Total Q9. Have you ever been the victim of mobile payments fraud? Yes No Unsure Total Part 2. Attributions Q10. Please rate each one of the following statements using the scale provided below each item. Strongly agree and agree shown . Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute © Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? Concerned and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the user’s knowledge or consent. Were you aware that this could happen?Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? Concerned and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called â€Å"diallerware† that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. We re you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? Concerned and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total Very concerned 29% Concerned 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% Very concerned 31% Concerned 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute © Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Res ponse Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute © Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, p eople use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute © Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone’s security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute © Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases Purchase history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I don’t have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute © Research Report Page 23 Q28a. Do you synch your smartp hone with any of the following devices? Laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly Daily Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I don’t use social networking apps Total Q30. Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes No I don’t have children Total Q32b. If yes, do you use your children’s smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute © Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? Full-time employee Part-time employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual household income? Below $ 20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute © Research Report Page 25 D4. What is your highest level of education attained? High school Vocational University or college Post graduate Doctorate Other Total D5. Please check gender: Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my lifestyle I often give advice to others about how best to use computers and software I need to ask for help if something goes wrong with my computer I always try to spend as little time as possible online I am often confu sed when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I don’t feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute © Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to [email  protected] org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Resea rch Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute © Research Report Page 27