Thursday, November 28, 2019

Racial Profiling Essays (1397 words) - Offender Profiling

Racial Profiling The great era of civil rights started in the 1960s, with Martin Luther King, Jr.'s stirring "I have a Dream" speech at the historic march on Washington in August of 1963. At the same time Birmingham Police Commissioner "Bull" Connor used powerful fire hoses and vicious police attack dogs against nonviolent black civil rights activists. Although these years proved to be the highlight and downfall of civil rights in America, even with the 1964 Civil Rights Act and the 1965 Voting Rights Act being passed, time has repeated these tumultuous events again in the present. Racial profiling has been one of many civil rights issues concerning the unnecessary stopping and arresting of people based on race, color, ethnicity and gender. Skin-color has become evidence of the propensity to commit crime, and police use this "evidence" against minority drivers on the road all the time. This practice is so common that the minority community has given it the derisive term, "Driving While Black or Brown" ? a play on the real offense of "driving while intoxicated". Although many law enforcement officers defend themselves by saying they are fighting against the "War on Drugs" by arresting these law offenders, recent trials and reports show that no basis of arrest have been found against these minorities. Official skin-color prejudice is still reflected throughout the criminal justice system. Today, skin-color makes you a suspect in America. It makes you more likely to be stopped by a law enforcement officer, more likely to be searched, and more likely to be arrested and imprisoned. Tens of thousands of innocent motorists on highways across the country are victims of racial profiling, and these discriminatory police stops have reached epidemic proportions in recent years. Fueled by the "War on Drugs", this fight has given police a pretext to target people who they think fit a "drug courier" or "gang member" profile. At many times, these minorities have been stopped and arrested for illegal offenses, however we are not sure if these stories have been filed truthfully by law enforcement officers. Many police departments face issues concerning racist law enforcement officers who cause the problems of racial profiling. One such example comes from the Hillside Police Department, where several racial bias charges have been made against them. Racial slurs have become common in the Hillside district, where even the department supervisor does background checks on minorities IN the squad, even to kick them off the squad. In this department, only two officers are Hispanic and one is of African decent. The officers, many of whom are white, are encouraged to target minorities first to fill their ticket quotas for the month. Hillside officers defend themselves saying that Hillside is 40 percent black and 20 percent Hispanic. However, the actions taken by Hillside officer, such as targeting to fill quotas and background checking, seem disconcerting. The Reverend Jesse Jackson even needed to call for federal protection for whistleblowing police officers. Because of the Law Enforcement Trust and Integrity Act, passed this year, other officials who witness this discriminating act are protected. It says, "The identity of a law enforcement officer who complains in food faith to a government agency or department about the unlawful practices of a law enforcement agency shall remain confidential and shall not be disclosed by any person except upon the knowing written consent of the law enforcement officer. This section shall not preempt any right of confrontation protected by the Constitution of by Federal, State or tribal law." In many cases, we can not determine whether the racial profiling comes from the individual law enforcer, or the department itself. Many policies have been suggested to either report these discriminatory acts, or to record the ethnicity, race, or gender of the person being stopped. However, without the correct supervision of these officers, we can not truthfully tell whether these policies will be followed. There have been bills proposed to even make the slightest positive effect on racial profiling, yet many have been overlooked. Former California Governor Pete Wilson served as best he could to fight key civil rights issues such as affirmative action and immigrant rights, however Governor Gray Davis has had a disappointing civil rights record. Although he has helped establish new civil rights gains for the lesbian and gay communities, he has also vetoed a number of bills aimed at reducing discrimination against communities of color and immigrants. SB 44, a bill sponsored by Senator Richard Polanco, encourages state and local governments to conduct outreach programs. SB 44 had bipartisan support and was previously endorsed by former

Sunday, November 24, 2019

Essay on How I Met Your MotherEssay Writing Service

Essay on How I Met Your MotherEssay Writing Service Essay on How I Met Your Mother Essay on How I Met Your MotherHow I Met Your Mother is an American sitcom about five friends who live in New York City and look for their happiness in different ways. The main character is Ted Mosby who in 2030 tells his children the story of meeting their mother. Looking for the love of his life, Ted spends much time in doomed relationships. At the same time, two of his friends, Marshall and Lily inspire him as an example of true love and commitment. Another friend, Barney Stinson, is, on the contrary, mad about women and spends his time abusing them in different ways, which he has particularly described in his legendary Playbook. One of the main characters, Robin Scherbatsky ends marrying Barney, but being focused on her career, feels her marriage as a burden and gets divorced. She also used to date with Ted, and in 2030 Ted receives his children’s blessing for being with Robin as their mother died six years ago.Robin Scherbatsky is an emigrant from Canada who came to New Yo rk to make the career of a news anchor. The show bristles with jokes about Canada and its citizens, and these jokes may be interpreted as cultural oppression. However, most of the chauvinist jokes are expressed by Barney who also appears to be a quarter Canadian himself. In the meantime, it should be underlined that while the Canadians are allegedly lashed in the show, the creators tried their best to make a positive image of this nation focusing on their politeness, fortitude, and faithfulness.Further on, another example of cultural oppression is James Stinson, Barney’s stepbrother. James is an African American who prefers men to women. Being an effective homosexual charmer, he suddenly marries Tom despite the initial protests of Barney. It is necessary to stress that Barney is not against a gay marriage, but at the moment James and Tom are engaged, he is totally against monogamy and lifetime commitment (von Matterhorn). Unfortunately, James is still a playboy by the end of the series, and his marriage is going to break up because of his endless cheating. The only continual African American character in the show is simultaneously homosexual and having problems with steadiness in relationship, but the authors of the show managed to make him charismatic, talented, and possessing a number of positive features like helpfulness, sympathy, and, of course, sense of humor.The two examples listed above demonstrate how uncomfortable themes concerning cultural and social differences can be played up effectively and carefully at the same time. It seems to be a fascinating trick to express tolerance when these differences are focused on instead of being ignored or mitigated like they are something unpleasant or inconvenient. Instead, the authors afford themselves to laugh at the differences sincerely and in this way to make the similarities more visible.What is more, it is typical for How I Met Your Mother to use comic euphemisms for culturally sensitive issues (Kr ause) including smoking marijuana, giving the middle finger or loud sex acts. Extensive use of euphemisms makes the show free from abusive scenes that can injure vulnerable social strata. Besides, the role of euphemisms even became the ground for one of the episodes in which the need to visit a bathroom is substituted by the need â€Å"to read a magazine.†

Thursday, November 21, 2019

A narrowed aspect of National Park Essay Example | Topics and Well Written Essays - 750 words

A narrowed aspect of National Park - Essay Example Snowmobiling in the Yellowstone national park is disputable on a few fronts. Moderates are worried about how snowmobiles, and snowmobile outflows specifically, may affect natural life, air and water quality, commotion levels, and the pristine aesthetic of the Yellowstone wilderness. An alternate concern is for the well being impacts upon both snowmobile riders and park officers who are laid open to fumes and high clamor levels for huge measures of time. Supporters of snowmobiling point to different contemplations, for example, economic benefits to local communities and the importance of preserving access to public lands. Adding further, several individuals are of the view that more up to date innovations make cleaner, quieter snowmobiles that relieve the impacts of snowmobile use on air, water and commotion contamination. Quantitative research on this issue remains inadequate and numerous inquiries stay unanswered. There are 185 miles of cleared and paved roads especially constructed for snowmobile use in the Yellowstone National park, the vast majority of which are adjoining to streams, rivers and lakes. Considering the dissemination of pollutants in the snowpack and the impacts of poisons on oceanic creature, there is potential for surface water tainting from snowmelt spillover. For example, separation of polluted snowpack from water body, contaminant level versus weakening component and so on. Human recreational exercises have a major impact on aquatic resources directly and by through implication as well. Winter recreation influences aquatic organisms principally by aberrant affects because of contamination. Two-stroke motors can store contaminants on snow, prompting ground and surface water quality corruption, which along these lines may affect aquatic life. Protection of the aquatic resources of park, including the aquatic assets, and rebuilding of local species are essential administration objectives of the National Park Service.

Wednesday, November 20, 2019

Internal & external analyses of Lion Nathan Essay

Internal & external analyses of Lion Nathan - Essay Example This paper attempts to analyze the sustainable competitive advantage of Lion Nathan using SWOT (Strengths, weakness, opportunities, and threats) analysis, in which potential improvements may be seen in the identified weaknesses and threats, without overlooking its good points posed as strengths. Lion Nathan can be acknowledged for its strengths in terms of identifying its core purpose in the business, alongside its vision of making itself Australia’s and New Zealand’s leading alcoholic beverage company. This is undertaken with a stronghold on the company’s identity in the wine industry while making known its values of integrity, passion, acing together, and being sociable. These values, particularly the last one, are usually not found in other beverage companies, making Lion Nathan surge up to its sustainability purposes. It may also be emphasized that beverage companies are not that easy to build positive values and carry them out to the wider public due to the very nature of the business, but Lion Nathan is able to identify values that may be appropriately attached to the product. This is suggestive of leading and living clear values alongside demonstrating constructive behaviors with an intent to better engage its stakeholders in the business, a stra tegic task that is proved both effective and workable. This is how the company provides sustainable competitive advantage. The company’s aim of acting with integrity and doing the right thing for the long-term health of its business and the communities in which it operates is indicative of a long-term perspective. These are the strengths of Lion Nathan in terms of sustainable competitive advantage. The company’s involvement is sustained investment in community partnerships, responsible marketing initiatives, education and research initiatives, and reducing its

Monday, November 18, 2019

WEEK 8 journal 6500 Essay Example | Topics and Well Written Essays - 250 words

WEEK 8 journal 6500 - Essay Example n for errors to occur during practice, but failure to report these errors could lead a habit that may end up causing serious problems in the future especially when patient safety is concerned. When the nursing students were checking blood sugars, the nurse on the hall wanted them to dry their finger that had been wiped with alcohol by fanning it finger using their hand. According to patient safety, procedure in preventing that would be a wrong technique. The finger should air-dry. The nursing students did it the way the nurse wanted them to even though it was wrong so as not to upset the nurse on the hall. Nursing students need to understand that patient safety comes first, and it is okay to report an error or raise concern if they notice an error being committed by a senior nurse or physician. Having an error-reporting system is one important strategy for improving the healthcare system. Apart from offering safety through reporting and tracing underlying causes, it further offers information about potential future errors and problems (Kim, Kim, Kim, & Kim, 2007). According to Wolf & Hughes, (2008) â€Å"ethical principles of beneficence (doing well) and non-maleficence (preventing harm) are violated when errors are not reported or disclosed†. The situation I observed at the practicum site mirrors what research has found to be key reasons that lead to medication administration errors, which is a real world problem. A study carried out to identify barriers to the reporting of medication errors found â€Å"Administrative barriers and fear were found to be the top two reasons for not reporting medication administration errors among nursing students† (Koohestani & Nayereh, 2010). Kim, M.-S., Kim, J. S., Kim, Y. H., & Kim, H. J. (2007). The effectiveness of the error reporting promoting program on the nursing error incidence rate in Korean operating rooms. Journal of Korean Academy of Nursing, 185-191. Wolf, Z. R., & Hughes, R. G. (2008). Chapter 35. Error Reporting

Friday, November 15, 2019

Techniques Of Creating Stop Motion

Techniques Of Creating Stop Motion The dissertation focuses on the techniques and methods of creating stop motion and how it is implemented on various forms of visual media. The initial motivation for the content and structure of this dissertation is based on personal experience during my project and also some research on it. Several research and reviews also helped me to specify and provide certain suggestions. This dissertation will briefly explain about what are stop motion and different techniques and method of creating stop motion. And also study how to improvise and implement the stop motion in the modern CGI media industry. An introduction to some of the most popular types of stop motion. The types of stop motion reviewed and discussed in this dissertation include: Puppet animation Puppetoon Clay mation Cutout animation Silhouette animation Model animation Go motion Object animation Graphic animation Pixilation Chapter 1 Introduction Stop-motion animation is described as a type of animation created or designed by physically manipulating or altering real-world or physical objects and is photographed or captured them on one frame of a film at a single time. And when it plays altogether it will create the illusion of movement. There are many different types of stop-motion animation, usually named or tagged after the type of media or way used to create the animation. There are many Computer software is widely available in the market to create this type of animation. In late 80s stop motion become unpopular due to its strange appeal and unorthodox style of animating character. Stop motion was widely used in special effect especially in 80s.The process and traditional stop motion has been kept alive by great directors like Tim Burton and Nick Park. Stop motion is usually the work of an oneman craftsmanship performing all the duties under intense concentration on one frame at a time while, CGI or 3D special effect sequences tend to have small group devoted or appointed people to their specialized tasks. In terms of larger debates, stop motion generally wins over the traditional artistically-based 3d animation because its handcrafted naturally and lively and can be corrected any moment by keeping its traditional art history background of design and sculpture, At the end its a magic show in which actual physical or real world objects have been handled or manipulated in a way which produces an illusion of motion to the audience 1. Research question What is stop motion What are the types , methods and technique for creating stop motion What are role and importance of camera in stop motion What are the pros and cons of stop motion in production What is the future of stop motion 2. Aim The dissertation aims to find out the role and techniques of stop motion in visual media industry and also how it can be implemented in present generation media industry. 3. Objectives To define stop motion and its history To explain the different method and techniques involved in creating stop motion To explain how the camera effects on creating stop motion To analyze the pros and cons of stop motion To analyze the integration between the techniques of stop motion with new generation computer graphics media 4. Summary of chapters: 4. a. Stop motion This section provides the introductuion and the brief history of the stop motion. The reader will understand what exactly stop motion is. 4. b. Different types of stop motion This section explains the different types of stop motion, the technique and method to create it and also the resource and artist behind it. 4. c. Camera in stop motion The sections explain of choosing the camera and the requirement for it. A brief summary of camera and also the merits and demerits of each one 4. d. Stop motion in present day media industry This section explains how it is integrated in new generation media industry and also the impact of stop motion over the traditional animators 4. e. Review of some popular stop motion This section provides the use of different technique and method in each individual movie from past and present day media. 4. f. Future of stop motion Stop motion and 3D integration with stereoscopy This section briefly explains the future enhancements and technology involved in the next-generation of stop motion in the media industry Chapter 2 Review of Literature Creating a stop motion is huge and painstaking process than any other form of art .the production is a very time consuming and should take care of sculptor or the modeler and also the technical issue like frame rate and the camera . So in production these things should be executed in a good rhythm to get a fine output The production behind the project should give the proper backup and take care the whole pipeline. The stop motion makes believe, that real object and physical figures comes alive lives in front of them. Its purely an artist work. But in the world of 3d, the stop motion got some great challenge to face. 3d animation takes a short duration of production time regarding stop motion. So commonly the 3d got popular in the industry. But in present world of media industry there are few stop motion enthusiast and director who kept this art alive and bringing a new form of stop motion. The stop motion is purely an intrinsic work and effort of each sculptor or a modeler. So the basic idea of stop motion is the process technique and methods involved etc, is to understand before an artist and he can go ahead and create a stop motion in the production phase. This way he would be able to understand the technique to create a good stop motion Chapter 2 Literature review Article by Ken A. Priebe (2006) mention about the art of stop motion and also How to create puppets and how to bring them to life and create a stop-motion film. Article by Tom Brierton (2006) mention and discuss about the aesthetics of stop-motion animation. He explains the technique of lighting and camera. And the article also discussed on body language of model, facial expression, gesture, movement and emotion of the model. Article by Barey. J.C .Purves (2008) mentions and discussed about the potential of puppet and models insight of world most popular stop motion animators and discussed on initial concept and script writing Chapter 3 | Research Methodology The research paper carries out a qualitative evaluation of material collected from secondary data source i.e. literatures and articles already written. The research is aimed to explain the techniques, method and overall awareness of stop motion to use in present generation production. The research methodology used is described below: à ¢Ã¢â€š ¬Ã‚ ¢ Description about Stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Different types of stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Technical analysis of stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Explanation of present day stops motion à ¢Ã¢â€š ¬Ã‚ ¢ Review of some popular stop motion à ¢Ã¢â€š ¬Ã‚ ¢ Analysis and report making suggestions based on the reviews à ¢Ã¢â€š ¬Ã‚ ¢ Future developments of stop motion are explained. The theory and history behind the development of stop motion is first explained. Then the different type of stop motion is elaborated. This gives a basic idea about the technology and theory behind production Then the various common features and criteria of production are explained to give an idea as to what exactly artists can do. Then some review over the popular work and the techniques and method behind it, Based on the reviews, a report is made to give an idea that how it can be implemented in the perfect way Upcoming developments and enhancements of stop motion production are then explained in brief. Chapter 4 Stop motion Key words: Animation, stop motion Animation is a simulation of movement created by displaying series of image in 2d, 3d or a model position in order to create a sequence 1. | Definition Albert E. Smith and Stuart Blackton (1898) is the creator of first stop motion. Stop motion (also known as stop action or frame-by-frame) is an animation technique to make a physically manipulated object appear to move on its own. The object is moved in small increments between individually photographed frames, creating the illusion of movement when the series of frames is played as a continuous sequence 2. | Overview Animation as a whole can be related as the base of different type and method of animation available in the industry. It is also considered as the different form of art Animation are categorized by the techniques used, they include: Traditional animation Stop motion 2D animation 3D animation Here the research is on stop motion and the stop motion is divided into Puppet animation Puppetoon Clay mation Cutout animation Silhouette animation Model animation Go motion Object animation Graphic animation Pixilation 3. | History Stop motion had a long history and it is old as the traditional film. The stop motion is involved in animating objects which makes movement to nonliving objects such as toy blocks or any inanimate objects. Later the stop motion animator experimented on clay animation and puppet animation. The early examples of stop motion film and technique can be seen the movie Humpty Dumpty circus (1898) and another film called Fun in bakery shop (1902)[1]. The haunted hotel was very successful movie, with the cinema audience of that time (1907) The first stop motion that used in clay animation got a great critical acclaim (1912) And was called Modeling extraordinary The first woman animator, Helena Smith Dayton, began experimenting with clay stop motion (1916). Her first film released in 1917, Romeo and Juliet The other big changes in stop motion was brought by Willis o Brien by including 49 pre historic animals in his film Some of the other notable Milestones in the History of stop motion The great stop motion animator, Ray Harryhausen received the Gordon E. Sawyer Award from the Academy of Motion Picture Arts and Sciences for his contributions in technology 1991. But in early 20th century the face of stop motion has dramatically changed with the development of digital 3D animation and animating 3D character and become much easier and fast which the industry was favored. So it becomes rarely used. Now the stop motion enthusiast and director who kept this art alive are bringing a new form of stop motion. The stop motion is purely an intrinsic work and effort of each sculptor or a modeler. Chapter 5 | Different types of stop motion Stop motion is categorized in different type, according to the media used to create the animation They are Puppet animation Puppetoon Clay animation Cutout animation Silhouette animation Model animation Go motion Object animation Graphic animation Pixilation Stop motion is a highly time-consuming job based on the complexity of the scene and the different animating techniques, methods opt for. 1. Puppet animation: Puppet animation is a method that involves articulated puppet. These puppet figures interact with each other in a constructed environment or a set, in contrast to the real world interaction in a model animation. As on the technical side the puppets are made of constraints which allow them to move the joints to create a movement, and also the puppet will have an armature inside them keep steady or fixed steady in the set The famous puppet animation works are Tale of the Fox (France, 1937), Nightmare before Christmas (US, 1993), Corpse Bride (US, 2005), Coraline (US, 2009), the films of Jiri Trnka and the TV series Robot Chicken (US, 2005-present). a. Puppetoon: Unlike clay animators like Nick Park, Will Vinton or Art Clokey, George Pals animators worked in a replacement technique using hand-carved wooden puppets. A separate puppet (or puppet part) was used for each motion, rather than clay or hinged parts. A single walking sequence, for instance, could involve 12 pairs of legs for one character. An average Puppetoon short would use 9,000 puppets. 2. Clay animation: Clay animation or otherwise termed as plasticine animation is commonly known as Claymation. They use clay or a different type of malleable substance to create the figure which is used for the stop motion animation. Similar to puppet animation figure this Claymation figure also have the armature or wireframe inside them and they can be manipulated or altered the figure in the particular scene or shot. There are certain films like in which the figure is entirely made of clay. By using this method they can morph the creature or the figure into another shape. Examples of clay-animated works include The Gumby Show (US, 1957-1967) Morph shorts (UK, 1977-2000), Wallace and Gromit shorts (UK, as of 1989), Jan Ã…Â  vankmajers Dimensions of Dialogue(Czechoslovakia, 1982), The Trap Door (UK, 1984). Films include Wallace and Gromit: Curse of the Were-Rabbit, Chicken Run and the Adventures of Mark Twain 3. Cut out animation: Cutout animation is based on 2 dimensional animations. In this animation 2D objects like paper or cloth are move frame by frame to create the effect. Examples include Terry Gilliams animated sequences from Monty Pythons Flying Circus (UK, 1969-1974); Fantastic Planet (France/Czechoslovakia, 1973) ; Tale of Tales (Russia, 1979), The pilot episode of the TV series (and sometimes in episodes) of South Park (US, 1997). 4. Silhouette animation: Silhouette animation is a different variant of cutout animation .In this animation the characters are backlited and the result will be a silhouettes of the figure Examples include The Adventures of Prince Achmed (Weimar Republic, 1926) and Princes et princesses (France, 2000). 5. Model animation: Model animation refers to stop-motion animation created to interact with and exist as a part of a live-action world. Intercutting, matte effects, and split screens are often employed to blend stop-motion characters or objects with live actors and settings. Examples include the work ofRay Harryhausen, as seen in films such Jason and the Argonauts (1961), and the work ofWillis OBrien on films such as King Kong (1933 film). 6. Go motion: Go motion is a variant of model animation which uses various techniques to create motion blur between frames of film, which is not present in traditional stop-motion. The technique was invented by Industrial Light HYPERLINK http://en.wikipedia.org/wiki/Industrial_Light__MagicHYPERLINK http://en.wikipedia.org/wiki/Industrial_Light__Magic Magic and Phil Tippett to create special effects scenes for the film The Empire Strikes Back (1980). Another example is Vermithrax from Dragonslayer (1981 film). 7. Object animation: Object animation refers to the use of regular inanimate objects in stop-motion animation, as opposed to specially created items. 8. Graphic animation: Graphic animation uses non-drawn flat visual graphic material (photographs, newspaper clippings, magazines, etc.) which are sometimes manipulated frame-by-frame to create movement. At other times, the graphics remain stationary, while the stop-motion camera is moved to create on-screen action. 9. Pixilation: Pixilation involves the use of live humans as stop motion characters. This allows for a number of surreal effects, including disappearances and reappearances, allowing people to appear to slide across the ground, and other such effects. In this method live humans are used as stop-motion animation props. A very good example of this is the old sci-fi movies in which actors acting on screen used to just vanish in a split second; one frame they are there and the other they are gone. An awesome example is Norman McLarens Neighbors and A Chairy Tale. A must watch. Examples of pixilation include The Secret Adventures of Tom Thumb and Angry Kid shorts. Chapter 6 | Camera in stop motion Camera plays an important role in the field of stop motion. There are certain basic requirements for the camera to shoot decent stop motion film. As the stop motion is based on frame by frame capturing, the camera should be rock solid. The other important thing are the Screen resolution, manual focus and manual image control and also the types of cameras like webcams, film cameras, camcorders and digital still camera. The screen resolution will be dependent on the medium of output and the camera used. When the medium of output is web based then the web camera are mostly appreciated, and when it is broadcasting for television or other bigger screen media , a bigger camera are needed that have broadcast resolution The other thing use must take care in camera are manual focus because in each frame the object will move in the field of view and this cause the focus to change . The other thing u should notice is zoom and it should be optical zoom and not digital zoom, because the digital zoom tend to pixelate. Manual image control is other main feature that can manually override gain, exposure and white balance. Types of camera Web cameras: Web cam will be the cheapest and simplest way to make a stop motion. The plus is that unlike film cameras, there is no waiting for entire role to get exposed and developed. The beginners can start with webcam and slowly by practicing they can go for higher or expensive cameras. The merits of web cams are, they are cheap and with decent web cam we can produce a good broadcast quality animation. And also can check feedback instantly. The demerits are that the lens cannot be interchange for better quality lens Film camera: The most common choice of the motion picture format is super-8, 16mm and 35mm. In this range the 35mm camera will be outside range, because it is costly and it depends on the production In this camera the least expensive is super-8 and for 16mm we must pay little more for film and processing. The small drawback of the camera is that it is having a spring drive device which is used to wind .Because of this it cause uneven exposure, so it is better to get an animation motor fitted on it for the ease of work. The merits are that, the output will look like digital video. They can interchange lenses and also can offer timed exposure, double exposure and matte effects. The demerits are the cost of the film, as it will cost more developing process Camcorders: There are different types of camera available in the market and can be used for filming stop motion. You can capture the live feed from the camera through frame grabber software and can make correction. For an old camcorder you should have a analog/digital converter. If it is DV camcorder you dont need a converter, just connect through fire wire or usb port. You can provide a live feed to the computer through the capturing software without a tape inside Digital still camera: We can take stop motion in digital still camera and this camera offers a high resolution images. And the main feature is that you can do exposure setting The merits are that it got higher resolution and have a good optics, and also allow lens interchange The demerits are they wont work with frame grabbers, and also have flicker issues. Chapter 7 | Stop motion in present day media industry

Wednesday, November 13, 2019

Brand Name Clothes Essay -- Business Marketing

Brand Name Clothes Would you choose a friend based solely on their name? Of course not, the idea seems absurd. Is it possible, however, that we might use such a ridiculous method when selecting the type of clothing we wear? In my opinion, many of us do. Throughout my research, I will be testing the hypothesis that college students buy more brand name clothes than generic name clothes. In colleges especially, there seems to be an emphasis on appearances, so many students have a tendency to steer clear of clothing with generic names. Do they believe that generic name clothes are of less quality? This is another question I am hoping to answer through my research. In addition, I would like to determine the accuracy of my assumption that females are more inclined than males to buy brand name clothing. Nevertheless, I am a male yet I still tend to buy more brand name clothes. Regardless of our gender, we all must make decisions about clothing every day, even if the decision is only based on what smells clean. Because of this, I thought it would be interesting to find out the factors involved in the type of clothing we buy in the first place. What brands in particular do most college students prefer? Are we influenced by our family, friends, or the people we see on television? Are there any other reasons why we buy the brands we do such as their price, comfort, or popularity? If students really do buy more brand name clothing, is it because they are of better quality than generic name articles? In order to determine some answers to these questions, I have utilized three different research methods. First, I performed a survey of 20 students who are currently attending the Indiana University of Pennsylvania. Our c... ... Feel brand names are of better quality 50% 60% Feel generic names are of better quality 50% 40% Buy these clothing brands: Abercrombie & Fitch 40% 10% Aeropostal 50% 10% American Eagle 60% 50% Banana Republic 20% 20% Gap 30% 10% Pacific Sunwear 10% 10% Ralph Lauren 10% 10% Wal-Mart 10% 30% 9.99 Stock Room 30% 30% Other brand names 60% 90% Other generic names 0% 10% Influenced by: Friends 50% 60% Family 40% 20% Famous People 10% 10% No One 40% 40% Girlfriend 10% 0% Why buy the brands they do: Availability 10% 10% Fit/Comfort 30% 10% Looks 90% 80% Popularity 30% 20% Price 30% 40% Quality 50% 60%

Sunday, November 10, 2019

Smart Phone

Smartphone Security Survey of U. S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute © Research Report Smartphone Security Survey of U. S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones.In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above.We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure such sensitive information. We also recommend that security policies state these precautions and ensure they are enforced. Following are the most salient research highlights: ?Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of business and personal usage means much more sensitive and confidential data is at risk and suggests that the smartphone is with them most of the time. Sixty-six percent admit they keep a moderate or significant amount of personal data on their smartphones. Such personal data include email address, name, contact lists, photos, videos, anniversary and personal dates, music, Sixty-seven percent of consumers surveyed say they are concerned about receiving marketing ads and promotions.However, less than half (44 percent) are concerned about having a virus attack on their smartphone when it is connected to an insecure Internet network. In addition to using it as a phone, 89 percent use their smartphone for personal email and 82 percent use it for business email. A smaller percentage of consumers use their smartphones for financial transactions including payments. In fact, 38 percent of consumers use the smartphone to make payments and 14 percent use it for banking. Sixty-six percent of consumers have paid at least once for an item using their smartphone.In addition, 12 percent of consumers say they have experienced a f raud attempt vis-a-vis a mobile payment scheme. Despite this fact, only six percent say they check their mobile bill or statement every month and eight percent check the statement when the bill is higher than usual. Fifty-eight percent of consumers say that based on how they used the smartphone for purchases, Internet browsing and location they were targeted by marketers. Accordingly, 67 percent say they are very concerned or concerned about aggressive or abusive marketing practices. ? ? ? ? ? Ponemon Institute © Research Report Page 1 ?Despite security risks, less than half of consumers use keypad locks or passwords to secure their smartphones. In addition, only 29 percent of consumers said they have considered installing an anti-virus product to protect their smartphone. Forty-two percent of consumers who use social networking apps say they allow smartphone versions of well-known social networking applications such as Facebook to access the same key chains, passwords and log-ins that they use of their desktops, laptops or tablet. Only 10 percent of consumers say they turn off Bluetooth â€Å"discoverable† status on their smartphone when not in use. ? ?Ponemon Institute © Research Report Page 2 Part 2. Key Findings In this report we have organized the findings from the study according to the following topics: Consumers’ use of smartphones, consumers’ awareness about the security risks that accompany their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are not managing these risks. Consumers’ use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 percent use it for personal but some business use (Bar Chart 1).Only 6 percent of consumers surveyed use their smartphone exclusively for business. Bar Chart 1. What best describes your smartphone use? Both busine ss and personal use equally 40% Mostly personal but some business use 25% Personal use only 16% Mostly business but some personal use 13% Business use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in Bar Chart 2, 35 percent say they purchased it without any reimbursement.Bar Chart 2: Who purchased your smartphone and who pays the monthly service fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute © Research Report Page 3 Smartphones can perform a wide range of tasks. However, the most popular use next to the phone is business and personal emailing.The mo st popular smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to music (Bar Chart 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding may indicate why many in our study are not concerned about the security risks. Because consumers believe its primary use is as a phone or to email they may think (incorrectly) that there are negligible security or privacy risks.Bar Chart 3: Tasks that consumers do on their smartphone Phone Personal email Business email Address book Texting Store or move data Internet browsing Obtain documents Calendar View documents Listen to music Schedule tasks Shop Camera Social networking 0% 20% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% 100% 120% As reported in Bar Chart 4, 66 percent have paid for an item via their smartphone once, irregularly (once every two months) or regularly (maybe once a month). Fifty-one percent were surprised that they were charged for a service of product they signed up for.Bar Chart 4: Key questions about smartphone use Each bar defines the percentage yes response Did you ever pay for an item via the mobile phone? Did you every sign-up for a service or product on a mobile without realizing that there would be a cost? Have you ever signed a terms and conditions request on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute © Research Report Page 4 Consumers store confidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a significant amount of personal data.Bar Chart 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar Chart 5: How much p ersonal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned future purchases, purchase history, health data and security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6: What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary & personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% 100% 120% Ponemon Institute © Research Report Page 5 Many consumers surveyed have used email and text to sign u p for services or products without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent made what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7: The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website Other 12% 34% 31% 46% Despite these unexpected charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills every month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8: Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it every month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not certain. Ponemon Institute © Research ReportPage 6 Consumers’ awareness about the security risks that accompany their use of smartphones Marketing messages—not privacy and security risks—worry consumers. While the majority of consumers do not feel their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unwanted marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9: Attributions about privacy and security risks The agree response is a combination of strongly agree and agree.The disagree response is the sum of unsure, disagree and stro ngly disagree. I worry more about the security of my desktop or laptop computer than my smartphone. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a hacker will attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone while traveling. I do not worry about being tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% Agree Disagree They also worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the surv ey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are aware that what is described in the scenario could happen to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios: 1. Location data embedded onto image files can result in the tracking of the smartphone user. 2. Smartphone apps can transmit confidential payment information (i. e. credit card details) without the user’s knowledge or consent. Ponemon Institute © Research Report Page 7 3.Smartphones can be infected by specialized malware called â€Å"diallerware† that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. 5. Financial apps for smartphones can be infe cted with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. . A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet through a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain basic security protections that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based o n how the phone is used for purchases, Internet browsing and location. As a result, the user may receive unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers’ level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local WIFI network is insecure (35 percent). Bar Chart 10: Are you aware of the following smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Jailbreaking Spyware Social network snafu Auto transmission Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 4 0% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute © Research Report Page 8 Bar Chart 11 reports consumers’ actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk – wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11: Have any of these situations happened to you? Each bar defines the combined very concerned and concerned responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers’ level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very concerned or co ncerned about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12: Are you concerned about of the following smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware Unwanted marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disabled through â€Å"jailbreaking† but generally are not aware of this risk.In Ponemon Institute © Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While the re is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone: the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, â€Å"diallerware† infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. Line Graph 1: Summary of consumer responses to eleven smartphone securi ty risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute © Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be important when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13: How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have neither keypad locks nor passwords on their smartpho ne. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14: Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute © Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn off Bluetooth â€Å"discoverable† status on their device when they are not using it. Only 10 percent set up download controls on their smart phone to protect against apps and games that may contain malware. Bar Chart 15: Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute © Research Report Page 12 Part 4. Methods Table 1 summarizes the sample response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers located in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A total of 793 respo nded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final sample of 734 consumers (2. 5 percent response rate). Table 1: Sample response Sample frame Invitations sent Total returns Rejections Final sample Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are Apple’s iPhone, RIM Blackberry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows Mobile. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 Sprint HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other Total Pct% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% 100% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure Total Pct% 24% 19% 12% 9 % 3% 3% 2% 2% 1% 1% 25% 100%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full or part-time position. Pie Chart 1: Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2: Employment status 5%2% Employee Homemaker Retired Student Unemployed Business owner Active military 13% Ponemon Institute © Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their region in the United States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3: Household income Pie Chart 4: Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast Mid-Atlantic 14% 20% 61 to $80k 81 to $100k 101 to $150k 12% 18% Midwest Southeast Southwest 15% 17% Pacific west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute © Research Report Page 14 Part 5. Conclusion The key finding from this research is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being published about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more worried about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if lost or stolen could result in financial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that auditors who did not pa rticipate are substantially different in terms of underlying beliefs from those who completed the survey.Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute © Research Report Page 15 Appendix: Detailed Survey Responses Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sa mple frame Invitations sent Total returns Rejections Final sample Part 1. Background Q1a. Please select the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) Total Q1b. Please select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other Unsure Total Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally Total Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. % 2. 5% Pct% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% Pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% Pct% 6% 13% 16% 25% 40% 100% Ponemon Institute © Resea rch Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges Total Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking Travel assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never Total Q6a. Have you every signed u p for a service or product on your mobile without realizing that there would be a cost?Yes No Total Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other Total Pct% 35% 13% 10% 8% 34% 100% Pct% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 51% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute © Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No Unsure Total Q9. Have you ever been the victim of mobile payments fraud? Yes No Unsure Total Part 2. Attributions Q10. Please rate each one of the following statements using the scale provided below each item. Strongly agree and agree shown . Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute © Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? Concerned and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the user’s knowledge or consent. Were you aware that this could happen?Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? Concerned and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called â€Å"diallerware† that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. We re you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? Concerned and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total Very concerned 29% Concerned 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% Very concerned 31% Concerned 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute © Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Res ponse Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute © Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, p eople use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute © Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone’s security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute © Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases Purchase history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I don’t have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute © Research Report Page 23 Q28a. Do you synch your smartp hone with any of the following devices? Laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly Daily Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I don’t use social networking apps Total Q30. Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes No I don’t have children Total Q32b. If yes, do you use your children’s smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute © Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? Full-time employee Part-time employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual household income? Below $ 20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute © Research Report Page 25 D4. What is your highest level of education attained? High school Vocational University or college Post graduate Doctorate Other Total D5. Please check gender: Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my lifestyle I often give advice to others about how best to use computers and software I need to ask for help if something goes wrong with my computer I always try to spend as little time as possible online I am often confu sed when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I don’t feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute © Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to [email  protected] org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Resea rch Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute © Research Report Page 27

Friday, November 8, 2019

The History of the Mexican Revolution in 1910

The History of the Mexican Revolution in 1910 Mexican and American people should remember the Mexican revolution which took place in 1910. Several years people struggled for their lands, freedom and the opportunity to lead a normal life. Many people had leave their places as Americans and other powerful people just captured what they had.Advertising We will write a custom essay sample on The History of the Mexican Revolution in 1910-1942 specifically for you for only $16.05 $11/page Learn More Reading the book The Wind that Swept Mexico: The History of the Mexican Revolution, 1910-1942 by Brenner and Leighton (1984), it is possible to imagine how people struggled and how they suffered. Inequality and injustice supported that revolution. Looking at the time when the events took place, the beginning of the 20th century and the barbaric circumstances which supported the revolution, it is possible to predict that nothing similar may be seen in the modern time. However, the events in the modern world and the countries, which still allow such cases, exist. Columbia is a developing country where the laws are rather co0ntestible and the behavior of some powers remain unsatisfied. However, people are unable to contradict due to low income, poor existence and other factors which impact the situation. It is possible to draw the parallel; between Similar to 1910s Mexico and Colombia’s â€Å"dispossessed†, the events which may be characterized by the illegal having of the lands of population taken away by wealthy landowners with the complicity of the government. Remembering the Mexican revolution, the participants and the simple viewers of the event saw the following,  Every home was in a state of siege. Civilians dodging out for food were often caught in crossfires, and their bodies lay in the streets. Women ran on desperate errands carrying flags made of sheets tied to brooms. A million people had become only a battlefield (Brenner, Leighton, 1984, p. 34). Reading such expla nation, it is impossible to imagine that the same things may happen in the civilized world. However, this is exactly what happened in 2000 in Columbia. Molano (2005) in his book The dispossessed: chronicles of the Desterrados of Colombia presents the story of this country when people were deprived of everything they had.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More There was neither law nor judges, neither protectors nor those who could even help. Powerful people believed that they could do everything they had, others were sure that they did not have anything and could not sustain. Reading the stories told by a boy named Toà ±ito, one becomes really shocked of how the government of the country may act in such a way. Modern world is based on democracy where people are the hands of the power. Still, Columbia is not such a country. The government there lives under personal rules a nd does all possible to satisfy personal needs. Remembering the Mexican revolution, people say, â€Å"cases involving a foreigner against a Mexican were decided according to the principle that the foreigner must be right† (Brenner, Leighton, 1984, p. 11). The foreigners were the conquerors and this may be considered as one of the approvals of the events. â€Å"Many wars. Here had been a great war in which the Americans – or was it the English? had come down from the north and, aided by the devil†¦ had overrun many lands† (Brenner, Leighton, 1984, p. 18). However, the situation in Columbia was different. Paramilitaries came to the places of simple people to get what they wanted. Molano (2005) writes, â€Å"everybody was inside by eight o’clock. The adults would sit outside talking among themselves until then, because later, the paramilitaries would ride by on their motorcycles and kill whoever was at the street† (p. 73). Therefore, the main d ifference between the Mexican revolution and the Columbian’s dispossessed was the fact that in the first case the foreigners wanted to get something from a poor neighbors, while in the situation with Columbia, the government and wealthy people believed that they do not possess enough and simple poor people should give them what they have. Toà ±ito’s story about his family who were killed is touching. He tells about the representatives of power who wanted to get their house, about his days when he had nothing to eat and to where to leave. As a result, Toà ±ito remain at the street with other boys (Molano, 2005). Osiris’s story is more shocking.Advertising We will write a custom essay sample on The History of the Mexican Revolution in 1910-1942 specifically for you for only $16.05 $11/page Learn More Her husband was shot in front of her and her children. Several years later, her son was killed by police and her daughter disappeared. The more shocking event was the fact that she was accused in the murder and disappearance of her children. These are the methods how police and other governmental structures made people leave their places to give those to powerful and wealthy representatives of the society. Such countries as Mexico and Columbia do not know what democracy is. These people are not sure what they can wait from their government, they are not protected at all. These two war events which took place in Mexico and about 100 years later in Columbia prove the fact that there are people who do want to get everything, that democracy for some people is just the word which means nothing. Of course, powerful people will always get more if they use their power on the personal benefit. However, governments of the same kind should understand that the life under oppression cannot last forever, there always will be people who will want to change everything. Looking at Mexican people, it is impossible to say that they live wealthy lives, however, these people are happy to have their homes, lands and work. Columbian oppression is also finishes. Social and political processes are subjected to different laws. Even if the country leaders do not know them, it does not mean that they are not going to work. Oppressed people are ready for revolution and they will win this revolution some time. Fear for personal life is not that powerful like the fear for the same future for children, for the same future for the further generations. There are many examples in the world history where people are ready to fight to death for the freedom of those who will manage to survive. The examples of the violence (foreigners in Mexico and police in Columbia) almost 100 years ago show that human greed does not have the measures. Having a desire to get more land, powerful structures are ready for murders and other violence acts to make sure that they will be able to get what they want.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Molano (2005) and Brenner Leighton (1984) give the vivid examples of what happened in Columbia and Mexico respectively and these pictures shock. The events and the reasons are similar as the fight for land has always been supported with blood and suffering. Reference List Brenner, A., Leighton, G. R. (1984). The Wind that Swept Mexico: The History of the Mexican Revolution, 1910-1942. Austin: University of Texas Press. Molano, A. (2005). The dispossessed: chronicles of the Desterrados of Colombia. New York: Haymarket Books.

Wednesday, November 6, 2019

Yukon Jack Essays - Klondike Gold Rush, Jack London, To Build A Fire

Yukon Jack Essays - Klondike Gold Rush, Jack London, To Build A Fire Yukon Jack The short lived life of Jack London is a direct reflection of his literary works major theme, the struggle for survival of strong men driven by primitive emotions. ?To Build A Fire? and White Fang are two of his works that coincide his life experiences and illustrate his literary theme. London was born the illegitimate son of W.H. Chaney and Flora Wellmen in 1876. He never saw his biological father and his mother had little to do with him. Eight months after his birth, his mother married a man named John London. This is where Jack received his name. Even with his new family, that included two step-sisters, Jack still received little time or love from them. ?He claimed to have felt that he was a boy without a boyhood? (Marshall 749). In ?To Build A Fire,? a man is on a journey through the Yukon. He takes this journey alone, and therefore must face all challenges alone. This is much like the childhood of Jack London. London had to accept all challenges and obstacles in his childhood alone, because his family was not there to support him. Both Jack London and the man in ?To Build A Fire? are in control of their own destiny. As it turns out for the man in ?To Build A Fire,? he faces his death because of his solitude. ! London may be implying that if he had someone to guide him through the early stages of life, he might have turned out to be a more fulfilled and successful person. 2 By the age of twenty-three, London had held a numerous variety of jobs. He had been everything from a newsboy to an oyster bed pirate. He even bummed his way through the United States. In 1897, he traveled to Canada to try his luck in the Yukon Territory gold rush. This is the motivation behind his 1906 novel, White Fang. White Fang Centers around the ability of a man, through love and kindness, to tame a savage wolf, and turn it into a loyal domestic animal. This may not be relevant when talking about the relationship between London?s life and the novels theme. What is relevant though, is that the story did take place in the Yukon, a place where London had been during his life. The story contains struggles of man?s survival against nature, maybe London?s own survival against nature. London could also be portraying his survival against life in general. During the same time period, London had evolved a working philosophy from Karl Marx, Herbert Spencer, and Friedrich Nietzsche which explained the world of his experiences to his own satisfaction. ?These experiences persuaded him to join the Socialist Labor Party and crusade for worker?s rights? (Kennedy 118). Even though London claimed to be a socialist, he contradicted his belief in socialism with his individualistic notion of the survival of the fittest. In the short story ?To Build A Fire,? London shows us what happens to the weak. The man freezes to death and the dog survives. London maybe using this story to expand on his survival of the fittest belief. In order for a man to survive the potentially blizzard cold temperatures of the Yukon, he must not only be in top physical 3 condition, he must also be equally fit psychologically. The dog in ?To Build A Fire? had both, a physical conditioning and a mental instinct, something London saw in himself. The man in the story experiences regret for not following the advice given to him earlier, but the dog presses on without regret or pity for the man, the same way London treats life. London began writing in early adulthood. He found it was the easiest way for him to make money. His literary apprenticeship was comparatively short. He started by writing for a local newspaper in San Francisco, and before long the entire country took a liking to his work. London had published his first book, The Son of the Wolf, in 1900. Also in 1900, London married his first wife, Bessie Madden. In 1903 he had left her and his daughters to marry Charmian Kittredge. Shortly after their marriage, London had left his second wife. London had always longed for a

Monday, November 4, 2019

It depends on the question that the writer choose Essay - 1

It depends on the question that the writer choose - Essay Example While the previous era of globalization came up around falling transport costs, the current globalization is linked to the decrease in the costs of telecommunications, which make it easier to propel the world higher and make it a global village 1. These technologies have made developing nations to become big producers other than just relying on the trading of their raw materials to the west and get finished products in return. All these developments showcase a world full of selective understanding in which the main market players will be more coalitions of conjuncture and the traditional alliances built around a strategic interest point. In essence, globalization has led to the creation of more opportunities than harm. The benefits do outweigh the harms largely. The essay seeks to expound on how globalization has affected the word at positive level 2. The concept of globalization has remained a topic of interest, with great debaters focusing much on it. Its proponents have marked it as an exquisite phenomenon to happen in the world while its opponents criticize it strongly as a component linked to create harm rather than improving the existing conditions. One thing is well notable: that despite the challenges globalization faces, there is a great impact it has played on the lives of millions of people in the world3. Those against globalization may present diverse negative effects of its existence, such as environmental degradation, inequality in economic patterns, loss of jobs and other catastrophic events. However, a good number of developing countries are benefitting immensely from the vice more than before, in terms of economic growth, sustenance of culture and other angles. First, globalization has created many employment opportunities especially in developing nations. Many companies are reviving their operations especially with reference to ICT sector. There

Friday, November 1, 2019

Sweatshop labor analysis Research Paper Example | Topics and Well Written Essays - 1000 words

Sweatshop labor analysis - Research Paper Example Existence of Sweatshops Talking of sweatshops all that comes to mind is extreme exploitation which may include absence of a living wage, health and safety hazards, arbitrary discipline mostly verbal or physical abuse, and the fear and intimidation the workers will face in any attempt to speak out or try to form a union to fight for their rights (Montero 3-6). In the film Mardi Gas Made in China, David places his focus on the everyday life of factory workers and their life within the factory environment. He also tries to focus on the special economics of china and its growth. The character Rogers is used to bring out the picture of the workers as he appears on every scene with a white shirt time and again. He does not want to be seen as wealthy and this is exactly the situation of the workers in the factory. The have very poor living standards. The audiences of this film think that David should rather speak about the other aspects of the lives of workers but rather he only reflects th e situation as it exists and overlooks the general fear by the workers and everyone else to speak out about what goes on. The film clearly depicts the existing connection between workers and consumers and thus the question of morality comes up. If at all any consumer sees these acts as not right then they have a right to hold the company accountable for its actions. The consumer has a degree of power and this is better explained in the film. If a customer feels compelled then a slight window opens up for them to understand the organizations functions to know what is right and what is necessary. Whenever there is a slight opportunity to exploit workers then that is where the labor gets its roots since the workers usually lack the knowledge and the resources to enable them stand up for themselves. Most of them are uneducated and some are immigrants who are naive and most at times lack the knowledge concerning their legal rights. The subcontracting system under which the garment indust ry operates places the garment workers at the bottom of the chain and leaves them with no option. Sustaining Sweatshops Sweatshops can be traced back to the 9th century when the sweating system was a word that described the process of big garment manufacturers contracted work out to the smaller firms who in turn would pay low wage to the immigrant workers. The workers would sweat as much labor as possible. However the existence of these shops today cannot clearly be justified but can just be supported by a number of myths that try to justify their existence. The workers of sweat shops survive on the life and debt aspect. These people live almost all their lives without any savings to count on since what they receive is too small to have percentages for saving. These people are therefore in no way linked to the money market. They lack the idea of managing finances and therefore no access to credit cards and no emergency funds set up. To justify the use of funds and the accountability , Rivoli sets out to find out the origin of her t-shirt (Pietra). The writer Rivoli tries to explain the cotton industry in America and its travel all through to China to the Garment Industries. They have a common theme with David since through their work they both give a reflection production, consumption and disposal of