Tuesday, October 29, 2019

Paraphrase Essay Example | Topics and Well Written Essays - 500 words

Paraphrase - Essay Example One inclusive cycle of the waveform, or the time in which it takes to complete, is referred to as a period. Another component of a sinusoid is the amplitude, or the total quantity of pressure variation surrounding the mean of the wavelength. The final specification of a sinusoid is the part of the cycle where the wave progresses relative to a particular fixed point in time, referred to as the phase. Phase is only a crucial aspect to consider for the measurement of continuous sinusoids, because one is forced to reflect upon the relationship between two or more different waves, rather than just a single wave. However, because the vowel is considered to be a complex waveform, it can be evaluated by converting the complex waveforms into a series of sinusoids distinguished by specific frequencies, amplitudes and phases. In doing so, it is determined that a vowel has two difference frequencies, one high and one low. The sinusoids of low frequency lean towards a higher amplitude, while the sinusoids of high frequency are nearly equally balanced in amplitude from the mean. The combination of two sinusoids of two different frequencies results in a complex wave. This is accomplished by adding low and high frequencies, in which the frequency is maintained in the resulting wave. Also, a complex wave can be formed by adding two amplitudes at a suitable point in time. The perceived shape of the complex wave is reliant upon the relative frequency, amplitude and phase of each aspect of the sine wave. Vowel acoustics are examined by the relative results of the formants. According to Benade in the 1976 study, formants are â€Å"the peaks that are observed in the spectrum envelope†. This can be observed through dark bands which appear on a spectrogram, signifying acoustic resonances emitted from the vocal tract. The vocal tract operates as a resonant cavity and the placement of certain facial features, including the tongue, jaw and lips, results in different

Sunday, October 27, 2019

Land Law Problem Question on Driveway Development

Land Law Problem Question on Driveway Development Land Law Coursework Introduction The problem focuses on whether James would be bound by the right of driveway and the lease that Lily creates during her ownership in which the land was unregistered. Also, James wants to know whether the developer is bound by his interests; the restrictive covenant and the drainage. A distinction between the interests must be revealed in order to determine whether those interests are legal or equitable since they are treated differently by the law.[1] James became the first registered proprietor of the property in 2016 since Lilys title had remained unregistered from 1982. The sale to James is a registrable disposition of the land as a transfer.[2] Subsequently, James has become the legal owner and has complied with obligations under s.27 Land Registration Act 2002 (LRA). Driveway The first issue is whether James is bound by the right to use the driveway that Lily granted to Bill. This right is an easement.[3] The next thing to consider is whether this easement is capable of being a legal or equitable easement. Under s.1 (2) (a) Law of Property Act (LPA) for an easement to be a legal, it must be for a term equivalent to the fee simple absolute in possession or for a fixed term of years.[4] However, as shown by the facts this only lasts until Bill could create an alternative access. That is not a term of years since there is not a fixed date and it is not equivalent to the fee simple absolute as it is determinable. Therefore, it can be only equitable easement.[5] Equitable rights are rights in personam, which means a right is enforceable against certain persons.[6] Although the land was unregistered, James can be bound by rules for equitable interests. As there is no land charge registered,[7] the only way this right will be enforceable is subject to the doctri ne of notice. The only way that James can be bound is the doctrine of notice. This operates so that equitable interest will bind everyone except the bona fide purchaser (BFP) for value of a legal estate without notice. So, equitable owners could lose their interests if BFP of land has no notice of them. The absence of notice must be genuine and honest.[8] In this situation, the reasonable purchaser would have made enquiries because as the house plan showed, there is no alternative way for Bill to enter his garage apart from using Jamess driveway. Constructive notice is set out in s.199 (1) (ii) (a) LPA which provides that a purchaser will be bound by notice if it is within his knowledge, or would have come to his knowledge if such inquiries and inspections had been made as ought reasonably to have been made by him.[9] Here, James has deliberately abstained from enquiries to avoid having notice.[10] So, the fact that James solicitor did not find anything about the right of driveway o n the title register is irrelevant, and it is therefore likely that he will be bound due to constructive notice. Legal lease The second interest was a 4-year lease of the stable block to Usman which was created in 2015. This is potentially a legal lease since it is a term of years absolute, thus being a legal estate in land.[11] However, a lease that is more than 3 years to be valid must be created by deed.[12] In this case, Usman has only a letter which suggests that he failed to comply with the formalities.[13] At this point, is necessary to know exactly if it was a letter or a deed as it is considered as a very important detail. Since there is no deed it does not take effect at law and is equitable only. S.11 (4) (b) LRA[14] states that unregistered interests that override first registration are those that appear in Schedule 1.[15] Equitable leases cannot be an overriding interest under Schedule 1 Paragraph 1 because it applies only to legal leases.[16] It can be argued that James had constructive notice when he bought Oswald House as he noticed the painting equipment when he viewed the stable. However, James asked Lily about them and she clearly lied to him as she replied that they belonged to a friend which would get rid of them before James moved in. James can be considered as a BFP of a legal estate for value without notice. Therefore, James takes free from Usmans lease. Restrictive Covenant The third issue is whether the developer can build houses on the register land field. Although the covenant was created by deed, it is an equitable interest[17] because it does not fall in any legal interests that are listed in s.1 (2) LPA.[18] It is not a registrable disposition under s.27 of LRA.[19] S.29 of LRA[20] makes it clear that a purchaser is bound by interests that are protected by entry of notice on the title register or interests that override under Schedule 3.[21] Also, Schedule 3 Paragraph 2 refers to the interests of persons in actual occupation. James is not in actual occupation therefore it cannot be applied.[22] Restrictive covenants do not appear on Schedule 3 of the interests that can override. Also, there is no notice under s.32 LRA[23] which would protect the interest and thus developer takes free. Drainage Within the same deed as restrictive covenant, James had been granted a right of drainage. Right of drainage is an easement.[24] The next thing to consider, is to identify the nature of this right as to whether it is a legal or equitable easement. To be a legal easement, it must be equivalent to a term of years or to the fee simple absolute under s.1 (2) (a) LPA. Since it is created by deed and it complies with the requirements it can be regarded as potentially a legal easement.[25] As this easement was created prior to the LRA, it is not a registrable disposition.[26] Although, they can be overriding interests under the LRA Schedule 3 Paragraph 3 (which states that a legal easement is an interest that can override registrable disposition).[27] This easement is not the subject of an entry in the register, as James can find no mention of it. Therefore, it needs to be checked whether it falls within any of the Paragraphs of Schedule 3. Schedule 3 deals with interests that override regis trable dispositions. Only easements that are obvious on a reasonably careful inspection will override. It is argued that this should have been obvious due to its regular use, therefore it will override.[28] Therefore, developers are bound by James easement even though it does not appear on the title register. Conclusion In conclusion, James is bound by the right that Lily creates in relation to Bills driveway but takes free from Usmans lease. On the contrary, the developer can build his new homes on the field but is bound by Jamess right of drainage. Bibliography Primary Sources Table of Cases Ellenborough Park, Re [1956] Ch 131 Jones v Smith [1841] 66 ER 943 Kling v Keston Properties Ltd [1989] 49 P CR 212 Midland Bank v Green [1981] AC 513 Table of Legislation Land Charges Act 1972 Land Registration Act 2002 Law of Property (Miscellaneous Provisions) Act 1989 Law of Property Act 1925 Secondary Sources Books Clarke S and Greer S, Land Law (5th edn, Oxford University Press 2016) Journal Articles Chambers R., Landmark Cases in Property Law [2016] CLJ 635 [1] Sandra Clarke and Sarah Greer, Land Law (5th edn, Oxford University Press 2016) 38. [2] Land Registration Act 2002, s.27(2)(a). [3] Ellenborough Park, Re [1956] Ch 131. [4] Law of Property Act 1925, s.1(2)(a). [5] Ibid, s.1(3). [6] Robert Chambers, Landmark Cases in Property Law [2016] CLJ 635, 637. [7] Land Charges Act 1972. [8] Midland Bank v Green [1981] AC 513, [528] (Lord Wilberforce). [9] Law of Property Act 1925, s.199 1(ii)(a). [10] Jones v Smith [1841] 66 ER 943, [55] (Lord Wigram). [11] Law of Property Act 1925, s.1(1)(b). [12] Ibid, s.54(2). [13] Law of Property (Miscellaneous Provisions) Act 1989 s.1(2). [14] Land Registration Act 2002, s.11(4)(b). [15] Ibid, Schedule 1. [16] Ibid, Paragraph 1. [17] Law of Property Act 1925, s.1(3). [18] Ibid, s.1(2). [19] Land Registration Act 2002, s.27. [20] Ibid, s.29. [21] Ibid, Schedule 3. [22] Kling v Keston Properties Ltd [1989] 49 P CR 212. [23] Land Registration Act 2002, s.32. [24] Ellenborough Park, Re [1956] Ch 131. [25] Law of Property Act 1925, s.52. [26] Sandra Clarke and Sarah Greer, Land Law (5th edn, Oxford University Press 2016) 88. [27] Land Registration Act 2002, Schedule 3, Paragraph 3. [28] Ibid, Paragraph 3(2).

Friday, October 25, 2019

Dwight D Eisenhower :: essays research papers fc

Dwight D. Eisenhower was born on October 14 1890 in Denison Texas. His parents were David Jacob Eisenhower and Ida Stover Eisenhower. He had two older brothers Arthur and Edgar and three youger ones Roy,Earl and Milton. Predictions made in his highschool year book saw Dwight as becoming a history professor and strangly enough his older brother Edgar becoming President of the United States. Many happenings in Dwight’s life show leadership ability. In 1941 Eisenhower was appointed by the army to plan the stradegy for the Third Army in war games in Louisianna. He brilliantly defeated the â€Å"enemy force†. This performance earned him a promotion to brigadier general in September 1941. The U.S. enterred World War 2 in December of 1941. After Japans attack on Pearl Habor General George C Marshall ,Army Chief of Staff, brought Eisenhower to Washington D.C. to serve in the Army’s war plans division. He was then named commanding general of the U.S. forces in the European Theatre of Operations. In July of 1942 Eisenhower became lieutenant general. Also named commander of allied forces to invade North Africa. The invasion resulted in the recapturing of the reigon from german and italian forces. Eisenhower became a four star general in February 1943. In all these campaigns he worked to create unnity between all the foreign commanders. Many americans viewd this to be a very difficult job. Eisenhower said â€Å" Good leadership was not a matter of issuing orders but it was a matter of enforcing obedience instead†. With Eisenhower having all the experience in leadership, many americans thought Eisenhower would make a great president. During the presidency of Dwight D. Eisenhower he was faced with many difficult tasks or decisions. When Dwight D. Eisenhower was running for office he had promised that he would travel personally to Korea to astablish a truce. In the middle of the year 1953 he full filled this promise. In 1954 Eisenhower sent protection to South Vietnam in 1954 in an effort to prevent its take over by Communist-run North Vietnam. He also launched a major federal public works program that established the national interstate highway system and the Saint Lawrence Sea Way. In the year 1956 he was forced to deal with his first

Thursday, October 24, 2019

Command Economy

Command Economy: Mountainous Politicians, countries and ideologies from all over the world have been torn for years between what they should follow and believe. Countries argue over which policies should be adopted been the economist's fundamental question. What would life be like if the country you lived in targeted equality- to live in a country where all people are equal, all are treated the same, and all are one? People desire to live in a place where social class is not an issue and money, food shortage, monthly bills, and shelter is nothing you have to worry about.The command economy provides survival, value in work, stability, equality and care and economic resources for all its members, young, sick, disabled, and the old. The command economy is much stable then the market economy. One reason command economy is more efficient than a market economy is because the command economy focuses on providing survival for its people. All residents are provided with the basic needs for su rvival such as housing, jobs, education, clothing, food etc. The government provides all the needs.There is no worry about bills, losing jobs, food shortage. In a market economy, you are not guaranteed all this, sure you are given well fare– but you are not guaranteed a job. What happens to those in need of a job? They aren’t given a job. In a market economy you are on your own. Karl Marx, a German philosopher, formed the command economy. In a market economy, you are constantly competing for survival. Whereas the command economy- you are guaranteed survival. The government provides all your basic needs.According to Marx, â€Å"Disadvantage of a pure market economy cannot provide security to those who, because of sickness or age, cannot be economically productive. † The bottom line is that the government of a market economy does not imply support to its residents. An older couple is not living under the government’s wing, but the insurance and money they h ave saved over the ages. The market economy has no interest for â€Å"providing public goods and services, such as national defense† says, Marx. Another reason the command economy is better than the market economy is because the command economy values what the workers produce.According to Marx, â€Å"The definition of value – its value is the amount of labor needed to produce and sustain labor power†¦ or it is the amount of labor needed to produce and sustain labor-power. † Command economies take pride into what the workers produce. A product can be worth nothing, but it is worth much more as opposed to how much the worker has worked to produce the product. The government is in charge of producing the number of goods making sure that no money is wasted, and if it is, it is done correctly. The command economy has been successful as far as funding money.The command economy is very stable and will never have sudden depressions or financial crisis. In the late 1800s the United States struggled with government ruling. For example, The United States had little control over the economy in the early 1900s which lead to one of America’s most devastating historic event, The Great Depression. The market economy tends to multiply the wealth of a nation much quicker due to evolution while the command economy plans the entire money making process, which has proved to be more beneficial.The command economy, as I mentioned earlier is in charge of its production and the demand of the consumer. For example, the government owns the companies in a command economy so moving production to a different area is no problem because the government is capable of doing it quickly as opposed to the market economy. In a market economy there are different owners and different regulations to each area. The value of the worker is always valued in a command economy. Equality is a very strong component to the command economy.The government tries to eliminate all p roperty and distribute its good equally. If done correctly no one is in poverty and no one is wealthier than the other. Marx explains, â€Å"The workers are selling to an abstract capacity to labor, and because of this, the capitalist is able to exploit them by only paying labor-power’s value. † This means that the worker is paid only by the work the worker has accomplished. For example, all residents are paid the same wage for the same amount of work that is done. The command economy also shares the same religion.This way government and the church are able to work together unlike the market economy where the government and the church are always on the different sides. The government also provides education for all of its residents. All of its people are educated at the same level. Equality is a strong component to the command economy. The care and economic resources are also a big deal to the command economy. No other economy provides such resource. The market economy does not provide full coverage after you are unable to work. You have to save money for retirement-that comes from your pocket.In a command economy you are guaranteed care and economic resources to sustain survival even if you are not currently working- the government will have you under its wing. The command economy is much more efficient then the market economy. Residents are worry-free when it comes to resources of survival. The government also takes pride into the workers work and eliminates social classes to create equality amongst the residents. It is a stable economy and provides care for its residents. The command economy is more efficient then the market economy. Command Economy Recently, over this summer there has been hundreds of children who have illegally entered the United States from Central and South America. They snuck here because a lot of their parents sent them here in search off much safer life with more opportunity ahead of them instead of being under a gruesome government control over in there home country.I believe they should be sent back to their country because, these kids could potentially be a liar and or a threat to our countries safety, and it is unconstitutional to make exceptions for anyone that doesn't bide by the law, especially if they're not a United States citizen, that entered the U. S illegally. Unfortunately, no matter how bad any kid could've had it in a South American country, we ultimately can not trust there word because nobody's word is just completely reliable, they could be lying and be someone completely different then what they're telling us whether they are a kid or not.Without undeniable proof that they really did c ome here to escape their country, then we have too assume they're lying in order to ensure the safety to our fellow American citizens. Furthermore, even If they have proof that they really did come to our country seeking help and opportunity, they still would have to go through the Immolation and citizenship gaining process Just like everyone else who has and wants to migrate too the United States to become a citizen.Therefore to sum It up, there may be many kids who want and need help that came here from their troubled country, but we as a country can not put ourselves In danger as a whole for people from somewhere else. America has their own problems to worry about and exceptions can not and should not be made for people who could be potential threats to our country.

Wednesday, October 23, 2019

Candy empathy task Essay

Well, here I am again on the same old ranch full of the same old ranch workers. It wasn’t going to be like this. I nearly got away from it all. Ya see, in all them other I had a dream. Made me feel kinda special, I s’pose, because there ain’t too many guys who hang on to a vision these days. Anyhow, Lennie’s gone now. I gotta say even if he was a crazy bastard that shattered my dream, he was someone to talk to, in fact; he was the one that told me about the dream in the first place. I will miss that crazy bastard. Ways are back to what they were before George and Lennie turned up. The same old people as before. Curley is still as cocky as before except he has a screwed up hand. I heard Curley say to Carlson that if he comes across another girl that he likes his hand is going into that glove again. And the other difference is that my companion is not here. I remember how he used to follow me everywhere even if he was getting a bit old and did not look very attractive like he used to; but that was hardly his fault. Still if it had to be done I would have preferred to do it myself. He was my dog, my companion, my friend. I don’t know how I am going to get through the last few years of my life without him. I shoulda done it myself. They woulda let me leave this ranch but where would I go. I can’t go to the farm on my own can I. The thought of leaving my dog behind, is just too powerful so I’ve decided I’m not going anywhere. My dog jus goes round and round in my head. I mean, Carlson is a fine bloke ‘n’ all but I still regret it. I bet it was that Curley that told him to do it. Bloody ‘hand fulla Vaseline’ guy. From the moment Lennie and Curley met everyone was expecting trouble. I mean, that was all we talked bout at dinner. Those two are a right pair. I mean, a crazy bastard and a golden gloves champion. Yet, it looked like the crazy bastard lost in the end. After all that he did; I mean, crushing Curley’s hand and breaking his wife’s neck. He went and lost the fight. There ain’t nobody that I know of, and if there was I would know, that has done that much damage to Curley. So off he went to find Lennie and put an end to it. Then all I remember was that Carlson’s gun was missing. Rumour has it that George hadda overpower Lennie to get the gun. Then Lennie got shot in a struggle but I gotta feeling that, by the way Slim was quiet, that something is not right. Everyone’s moving on now. George has left. Lennie is dead. Curley’s wife is dead. Curley’s gotta new girlfriend. I nearly hadda new pup from Lulu, Slim’s dog, but jus as I was pickin’ it it made me feel bad inside; made me feel even worse bout my old companion.

Tuesday, October 22, 2019

Easy and Common German Adjectives to Remember

Easy and Common German Adjectives to Remember Beginning German learners usually learn basic common adjectives first, such as gut (good), schlecht (bad), schà ¶n (pretty), hsslich (ugly), neu (new), alt (old). But your knowledge of German adjectives could grow exponentially without much mental effort, if you used what you already know with some slight modications. Being aware of the following will help you learn a whole array of easy German adjectives. Cognate Adjectives:The German language has a surprising large amount of cognate adjectives in English. They differ mostly by their suffixes. There are only slight differences between these adjectives in the two languages. Even if you dont remember these differences when speaking, the adjectives resemble one another so much, that a German speaker would understand what you are trying to say :(dont forget to switch the c to a k when writing them!) English adjectives ending in : diagonal, emotional, ideal, normal, national, original English adjectives ending in : tolerant, interessant, elegant English adjectives ending in : excellent, intelligent, kompetent English adjectives ending in : generell, individuell, offiziel, sensationell English Adjective ending in : allergisch, analytisch, egoistisch, musikalisch English adjective ending in :aktiv, intensiv, kreativ, passiv English adjective endings in : freundlich, hungrig, persà ¶nlich, sportlich Using Present and Past Participles as Adjectives:Though you need to know how to form participles to begin with, these are easily mastered. (See Participles) Basically one changes a present or past participle into an adjective simply by adding the appropriate case ending.For Example:The present participle of schlafen is schlafend.Das schlafende Kind - The sleeping child. (See Present Participle)The past participle of kochen is gekocht.Ein gekochtes Ei - The cooked egg. (See Past Participle) Adjective Combinations:These types of adjectives give a nice punch to conversation and serve to further itensify and emphasize what you are trying to say. (Just make sure to not overuse them.) The easiest ones to remember are the ones that are a literal translation from English. There are several of them and are mostly adjective combinations with colors and some with animals:Color adjectives with ... dunkel (dark), hell (light) and blass (pale)etc.For Example: dunkelblau (dark blue), hellbraun (light brown), blassgelb (pale yellow)same: schneeweiß (snowwhite) rabenschwarz (ravenblack), blutrot (bloodred)Animal Adjective Combinations:Some of these are not at all expressed in English in the same way, nevertheless the visual picture associated with these adjectives make them easy to remember.aalglatt - to be smooth like an eelbrenstark - to be strong like a bearbienenfleissig - to be busy like a beemausarm - to be as poor as a mousehundemà ¼de - to be dog-tiredpudelnass - to be wet like a poodlewieselflink - to be as swift as a weasel

Monday, October 21, 2019

veterinary shadow day essays

veterinary shadow day essays When I first arrived Lisa The girl that I shadowed told me that there was an emergency with one of the animals. It ended up that a one-year-old beagle ate an entire thing of metabolite, and then slowly started to die. The liver had shut down, and the heart rate was up to 300. Lisa told me that taking a thing of metabolite was like taking 50 cups of coffee at once. The owners of the beagle were there and bowling. The beagles name was Murry. Murry's body slowly was shutting down one thing after another. The owners made the decision the dog was going to be put to sleep. We got the dog ready to be taken out. They undid all the cords from the dog so they could take it to another room. I said goodbye to the dog, and then they took it into the other room so that the owners could be there when they put him to sleep. After that happened they then had to put a sleep a little hedgehog that had cancer on its mouth. We then did two regular checkups with one cat and with one dog. Tho se when great. After that we had a dog come in and it ended up having an affection that might end up killing it. I never heard the end result. The last thing that I did there was that a black lab had been bitten by another dog, and that dog ripped a hole in the neck of the black lab. The doctors had to perform surgery on the dog to close up the holes in the neck. They first had to clean it out with qutips. And blood stated to come out right then I was a little dizzy and I thought I was going to faint. But thank god I didnt. I saw a cat get dental work on it. And a cat get a bath and they had to blow dry it and brush the hair while it was a sleep. I thought that the work place environment was very clean and very professional. On my pictures on the poster it shows you that they even had a place for dogs to go in and a separate place for cats to go in they also have different waiting rooms for each of them. I could eas ...

Sunday, October 20, 2019

The Essay Expert Presents How to Write a Killer LinkedIn Profile - Wednesday April 6, 1200pm CST

The Essay Expert Presents How to Write a Killer LinkedIn Profile - Wednesday April 6, 1200pm CST Some of you have been on my LinkedIn webinars before. At least one of you got a call from a recruiter one week after making the changes I suggested just from listening to the webinar!   Want to hear the recording of my last webinar?   Click on   How to Write a Killer LinkedIn Profile. Your next opportunity to hear me present LIVE is this Wednesday, April 6, 2011 at 12:00pm Central time.  Ã‚   Why would you want to attend this webinar? If you are a professional in any industry, you simply cant afford to have a mediocre LinkedIn profile. Your potential employers will all be scrutinizing your profile, and you want to make a great impression. In this webinar, I will take you through the most important sections of your profile and the most important strategies for getting found. Topics covered: Why care about LinkedIn? Whats the point of 500+ connections? What should I write in my headline to get found? What should I write in my Summary? What are LinkedIn applications and how do I use them? How do I add LinkedIns new sections to my profile? How can I make the most of LinkedIn groups? Join me and Robert Shindell of ilostmyjob.com to learn the answers to these questions and make a Killer impression on the people who find you on LinkedIn. Wednesday April 6th 12:00pm CST Category:Archived ArticlesBy Brenda BernsteinApril 3, 2011

Saturday, October 19, 2019

The Emotion of Frustration in High School Essay

The Emotion of Frustration in High School - Essay Example I realized that eating by myself every day and spending my weekends watching Full House re-runs wasn’t the ideal way to be spending the glory days of my youth. I became frustrated. When I would sit alone I would imagine the life I wish I had. I’d watch the football players laughing with cheerleaders at their table and think they were just lame anyway. I was smart. I thought about things like philosophy and books and Ernest Hemingway. So I’d continue eating my sandwich and watch other groups. One day as I was sitting there, observing people, I noticed two guys walking quickly away from the cafeteria, looking around like they were going to escape from prison or something, and then quickly disappear into the woods. I had no idea where they had gone but I was curious.The next day, after I went through the lunch line and got my hamburger, tater tots, and milk, I walked around and then saw them standing by the vending machine talking. I had to figure out where they kep t going. I sat near where they were standing and put on a happy demeanor. After a moment they stopped talking and one of them asked me what was being sold for lunch.â€Å"Tater tots,† I said.He laughed and then they walked off. A few moments later, to my great surprise, they came back and sat at the table with me and joked around for a bit.

Friday, October 18, 2019

Graham T. Allison Research Paper Example | Topics and Well Written Essays - 750 words

Graham T. Allison - Research Paper Example national security and defense policy with a special interest in terrorism. He was an assistant secretary of defense in the first Clinton Administration. As director of BCSIA, Dr. Allison has assembled a team of more than two dozen leading scholars and practitioners of national security to analyze terrorism in its multiple dimensions†2. He catapulted to fame from the books that he wrote all involving foreign policy decision making, terrorism, and other conceptual models that became bestsellers. Contributions In the field of public management, Lynn (2001) cited the contention of Allision in a seminal article that emphasized, ‘The effort to develop public management as a field of knowledge should start from problems faced by practicing public managers’3 .From among his notable books were: his first book, the â€Å"Essence ofDecision: Explaining the Cuban Missile Crisis (1971), was released in anupdated and revised second edition (1999) and ranks among the all-time be stsellerswith more than 450,000 copies in print. His latest book, Nuclear Terrorism:The Ultimate Preventable Catastrophe, is now in its third printing and wasselected by the New York Times as oneof the ‘100 most notable books of 2004’†4.The three models of decision-making were deemed to be based on different levels of analysis. The Rational Actor or Unitary Government model assumed that the presence of the following factors: â€Å"unitary optimizing actor; government as a black box; government processes information according to the rules of optimizing rational action; complete information;and the internal structure of decision-making are based on rationality†5. The Organizational Process Model takes into perspectives the goals of the organization to be well defined and established; the choices are restricted on SOPs; where mission statements are explicitly stated and strategies and policies are directed towards the defined mission; and activities are depend ent on the resources and budget of the organization. Finally, the Governmental Politics Model, also called bureaucratic politics or government bargaining model, identified assumptions that focused on key individual decision makers as the unit of analysis; consider both formal and informal networks of power and communication as contributory and influential in decision-making; and where government action presupposed political bargaining process has been undertaken by various key players; to name a few. The different books that have contributed to expanding the knowledge of practitioners in the field of public management and foreign policy decision making are as follows: Avoiding Nuclear Anarchy; Bureaucratic Politics; Conceptual Models and the Cuban Missile Crisis; Essence of Decision; Fateful Visions; Remaking foreign policy; Windows of Opportunity and the latest, Nuclear Terrorism:The Ultimate Preventable Catastrophe6 . The Belfer Center for Science and International Affairs John F. Kennedy School of Government (BCSIA) (2004) has acknowledged the recognition and awards attributted to Allison as follows: â€Å"He served as Special Advisor to the Secretary of Defense under President Reagan and as Assistant Secretary of Defense in the first Clinton Administration, during which Dr. Allison received the Defense Department's highest civilian award, the Defense Medal for Distinguished Public Service, for "reshaping relations

Sustainability of Seventeen Event Company Essay - 1

Sustainability of Seventeen Event Company - Essay Example As a concept, Sustainability can be defined as the â€Å"the growing concern for the environment and natural resources, though...[it]...has also had increasing resonance in social and economic issues.† (Mowforth and Munt,2009, p18). Academic, political and economic circles have begun to seriously consider the implications of unrestricted economic growth on the already stretched resources of the earth. The agenda is motivated by the understanding that the planet may not be able to cope up with the demands of the growth unless drastic measures are taken to support the processes with more environmentally friendly practices and technology. The burden of change in this area falls largely to businesses and economic groups as they are the main consumers of many of the natural, human and financial capital resources available currently. While governments and lobbying groups can provide much-needed direction and policies to guide the businesses towards sustainable practices; inevitably it is the businesses themselves that must show awareness and concern regarding the issue and make changes from the ground level as they have a greater reach and influence than any single consumer possibly could have.   It is not surprising that societal expectations from both local and international stakeholder are now forcing businesses towards a higher level of accountability and transparency with regards to not just their financial performance but also their role as a social participant in economic, social and environmental development (Sherwood, 2007). While responses have varied, businesses, especially in the consumer-centric, western markets, have responded to these responsibilities with efforts to be operationally eco-efficient, and incorporate social responsibility into their overall operations.

Decreasing the frequency of patient falls Article

Decreasing the frequency of patient falls - Article Example Falls are associated either with intrinsic (person risk) factor or external environmental conditions (Palmer, 2011). This paper present review of some studies done to ascertain the various causes of falls among older persons, the effect of and relationship between drug prescription and falls and also it will highlight the preventive measures that can be used to reduce incidences of falls. Falls are considered common clinical problems mostly associated with elderly nursing home residents maybe as a result of external environmentally related factors or intrinsic factors (Hill et al., 2009). Again, most reported emergency injury-related casualties resulted from falls. Different scholars have postulated different causes of falls some of which are associated with person factors such as physiological changes and pathological conditions (Palmer, 2011; Hill et al., 2009). While others have associated environmental conditions as the main contributing factors for risks of falling among elderly people. Such environmental conditions include slippery floors, poor lighting or maybe faulty equipment (Farmer, 2003). The theme of the study got its founding gist from the fore-mentioned causes of the falls among the elderly people who are the residents in the nursing homes (Hill, et al., 2009). The study sort to explore the different myths postulated as the causes of falls, namely the person risk factors (intrinsic) and environmental related causes and then get interaction of the two mentioned factors (Palmer, 2011). The study was done from the perspective of the nursing staffs that are mandated with the task of assisting the elderly nursing home residents (Hill, et al., 2009). The caregivers for these elder people in nursing home forms rich resource persons since they are the people closely interacting with the nursing home residents (Farmer, 2003). According to the study done by

Thursday, October 17, 2019

Budget for Foster Adoption Center Assignment Example | Topics and Well Written Essays - 750 words

Budget for Foster Adoption Center - Assignment Example The assignment "Budget for Foster Adoption Center" is based on the tabulated budget. Justification of the funds allocated in each budget section can be summarized as follows; direct costs, which represent, costs incurred in the performance of the project and for this intention be granted reasonable and allowable amount. With the sole responsibility of ensuring the smooth daily running of the program, direct cost is justified to attract an allocation of 144,300$ of the total monthly allocation of 209,600$. Direct costs comprise of expenditure groups such as salaries, consultants’ fees, and employees’ benefits. For example, under salaries, the executive had the biggest share of 25,000$ because of the nature of the job in terms of responsibilities to be undertaken. For the case of social workers, their salaries amount to 50,000$ with an explanation based on the calculation rate of 5 workers with a salary of 5,000$ each. Based on this, they are justified to attractive packa ges or salaries to boost their morale and make them reach the set target as per the program objectives and aims of the organization. Consultation fees attracted 8,000$. This is paid to individuals not employed by the organization and therefore the number days will be put in consideration. This amount supported by the fact that, there are always additional costs such as travel and per diem included. According to Nice (2002), indirect cost or administrative costs are not usually specific but will still be considered as costs in the long run.

Article Essay Example | Topics and Well Written Essays - 250 words - 11

Article - Essay Example There are greater chances of conflict arising than there are for a harmonious coexistence. The very differences that make people different and unique, seek to stretch farther the variations in various ways. This situation is manifested through situations like poverty, selfish interests, as well as ethnic differences. At such phenomena, there is an imminent need for the innocent to be protected. That is when law comes as a social control for the society in question (Fuller 1975, pp.89-95). The Law will, therefore, seek to replay the circumstances leading up to the crime and then judge strictly based on the constitution or other guiding statutes. Judgments made, therefore, not only serve as punishments to the accused perpetrators rather they are used to control the public on matters similar. Through the ruling that is served, the public will be wary of practicing such behaviors; in which case the society is tamed for the greater good. Nevertheless, it is challenging at times especially for the court to determine the exact purpose of the law at some instances. The two purposes mentioned above become so intertwined for any clear cut significance to show individually (Fuller 1975, pp.89-95). However, through deliberations, the judges ultimately develop appropriate resolutions. Fuller, L. (1975). Law as an Instrument of Social Control and Law as a facilitation of Human Interaction. Law as an Instrument of Social Control and Law as a facilitation of Human Interaction, 1(1),

Wednesday, October 16, 2019

Budget for Foster Adoption Center Assignment Example | Topics and Well Written Essays - 750 words

Budget for Foster Adoption Center - Assignment Example The assignment "Budget for Foster Adoption Center" is based on the tabulated budget. Justification of the funds allocated in each budget section can be summarized as follows; direct costs, which represent, costs incurred in the performance of the project and for this intention be granted reasonable and allowable amount. With the sole responsibility of ensuring the smooth daily running of the program, direct cost is justified to attract an allocation of 144,300$ of the total monthly allocation of 209,600$. Direct costs comprise of expenditure groups such as salaries, consultants’ fees, and employees’ benefits. For example, under salaries, the executive had the biggest share of 25,000$ because of the nature of the job in terms of responsibilities to be undertaken. For the case of social workers, their salaries amount to 50,000$ with an explanation based on the calculation rate of 5 workers with a salary of 5,000$ each. Based on this, they are justified to attractive packa ges or salaries to boost their morale and make them reach the set target as per the program objectives and aims of the organization. Consultation fees attracted 8,000$. This is paid to individuals not employed by the organization and therefore the number days will be put in consideration. This amount supported by the fact that, there are always additional costs such as travel and per diem included. According to Nice (2002), indirect cost or administrative costs are not usually specific but will still be considered as costs in the long run.

Tuesday, October 15, 2019

Business law- policies Essay Example | Topics and Well Written Essays - 1500 words

Business law- policies - Essay Example Supervisors are required to keep an active outlook for disputes. Company policy is to avoid disputes through proactive action on the part of both employees and company management. In case a dispute arises, the concerned employee’s actions shall be investigated by the immediate supervisor. If all employees involved in a dispute belong to one section or department then the immediate supervisor shall conduct the investigation. If employees from different departments or sections are involved in a dispute then the concerned supervisors will investigate the dispute through mutual consultation. The level of dispute investigation should be raised as deemed appropriate by the investigating authority. Throughout the course of the investigation, the investigating authority must ensure confidentiality of all concerned parties. Moreover, the employees involved in the dispute must not divulge any details of the investigation to any part of the company or outside it until the investigation is not deemed complete. Failure to do so may result in the termination of employment. A thorough investigation of the dispute must be followed by measures to resolve the dispute as amicably as possible. In case that the termination of employees is deemed as the only resolution then regular termination policies shall be enforced. Moreover, the investigators must ensure that the employee agrees to his termination so that the company does not fall liable to claims of compensation by terminated employees. The final investigation report must contain measures to avoid such disputes in the future. Any recommended lines of action to avoid disputes shall be implemented by HR in no more than 6 weeks since the end of the investigation. {company name} holds exclusive rights to discharge or terminate the employment of any employee after due process requirements are met. Upon discharge or termination the concerned employee will be

Monday, October 14, 2019

Analysis of Performance Appraisal System

Analysis of Performance Appraisal System ABSTRACT This article examines the Performance Appraisal System of Opsonin Pharma Ltd. It discusses one previous format of performance appraisal and the current performance appraisal. Author has tried to find out whether performance appraisal system of the company motivates the employees to achieve the company goal. Researcher has conducted the survey in the head office people of the company to get the idea of management people. The study uses primary and secondary data to do the analysis of the research where it has searched academic literature for the theories of performance appraisal, performance management, motivation and human resource management. Result has come out through the survey that current performance appraisal system has shown positive impression but still it needs some improvement such as proper practice and introduction of performance management. Chapter 1. Introduction Survival of the fittest once advocated by famous biologist Charles Darwin in his ‘Origin of Species (1859) transcended the boundary of biological world. Now this principle has become true in areas where competition determines ultimate fate. In the realm of organization, this principle operates in the name of productivity, profitability, efficiency, effectiveness and so on. Organization theorists during classical period emphasized on structural and technological perfection for survival and growth. Such mechanistic ideas of competitiveness started fading since 1930s onwards. The rise of behavioural and industrial humanism made way to ‘human capital to be considered central in the study of competitiveness. The measurement unit of contribution of human capital is termed as ‘Performance. Performance Appraisal (PA) as a technique of measuring competitiveness of organizations or institutions is not a modern phenomena. It has started from Han Dynasty in 206 BC-220 AD where they used to use merit exam for selection and promotion (Wren, 1994). But most probably PA system started in the industry from Robert Owens textile mills of the 1800s, where he used silent monitor system with the block of woods with different colours that he put in the work station of each employee. Everyone could see the performance with each other (Wren, 1994). This gave rise to an annual assessment which was recorded in a â€Å"book of character†. The assessments were subjective, which is one of the main criticisms still leveled at performance appraisal today. In the early part of the twentieth century Owens ideas were superseded by those of ‘scientific management, devised by F.W. Taylor and popularly associated with Henry Ford. This emphasised the use of quantitative methods to measure work performance (e.g., a fair days work and differential piece rate system), and led to the development of ‘work study techniques in the inter-war period. Though today, private sector has been credited as the perfectionist of performance management techniques, the modern psychometric approach to performance appraisal has been brought by the public sector (Torrington, Weightmen and John, 1989, p.66). Due to its monopolistic and legalistic nature, public sector performance appraisal practices could not reach that standard as reached by the private sector, which took appraisal as a response to market competition. The study is based on Opsonin Pharma Limited, a leading pharmaceutical company in Bangladesh. It was incorporated as a private company in 1976. It manufactures, and markets generic medicines for both human and animal use. Its value-added products improve the quality of life of both the people and animals in Bangladesh as well as abroad and help them enjoy longer, healthier, and more productive lives. Opsonin is known for long as a provider of regular and life saving medicines at affordable price. It has long been established and recognized as one of the most leading, progressive and modern pharmaceutical company in the country with the assurance of manufacturing quality products as the company is committed to contribute much to develop national health sector. 1.1 PURPOSE OF STUDY: Purpose of the study is to identify whether the management people who are working in the head office are convinced or not with performance appraisal system of the company. 1.2 AIM AND OBJECTIVES: 1.2.1 AIM: Aim for this research is to gather knowledge about performance appraisal system in Opsonin Pharma Ltd. and to get clear idea about performance appraisal system through literature review. 1.2.2 OBJECTIVES: To provide recommendation to Opsonin Pharma Ltd how they can improve their performance appraisal system. To examine how performance appraisal system works. To analyse how Opsonin Pharma motivate the employees through performance appraisal system. To make an overview of Opsonin Pharma Limited. To make an overview of Performance Appraisal System of Opsonin Pharma Limited. To determine the interrelation between Performance Appraisal System and other Human Resource aspects. To measure the level of employee development. To determine the impact of Performance Appraisal System for motivating the employees of Opsonin Pharma Limited. 1.3 RESEARCH QUESTIONS: How effective is the performance appraisal system in Opsonin Pharma Ltd.? Do the management people think that current performance appraisal system works properly in the company? Does performance appraisal system motivate the employees at Opsonin Pharma Ltd.? Chapter 2. LITERATURE REVIEW The Performance Appraisal (PA) system is essential for maintaining high standard of human resource of any organization, both private and public sector. Performance appraisal is a part of working link that emphasizes for both bosses and subordinates their managerial responsibilities (Williams, 1972, p.8). A good performance appraisal should introduce in the company to know employees abilities and efforts to match organizational expectations. A good PA system can measure employees activities with reasonable accuracy and it can provide feedback to employees on their performance, and make a chance to employees to develop their weaknesses. There is a chance to make wrong personnel decisions which lead to affect organizations capacity without good performance appraisal systems. But ineffective appraisal system can bring many problems including frustration for good performers which will encourage them to leave the company, causing the organization to incur high recruitment costs (Chou, 2005 , p.42). This concern is addressed by ensuring that employees understand how their work contributes to the achievement of organizational goals, by ensuring that employees have the skills to make that contribution and, above all, by developing a climate of open discussion in which performance, achievements, and difficulties can be approached openly and supportively. A sound PA system, therefore, measures performance of employees not only to make some backwardly-linked like recruitment validity, motivation, morale, etc. and forwardly-linked like career growth, reward and sanction, employee development personnel decisions etc., but to integrate between organizational goals and personal goals of employees (Hyde, 1982, p.295). It is a really hard task for reflecting employee performance through performance appraisal system. Performance appraisal systems are not general idea that can be followed by all companies without any modification because it depends on employee and organizational characteristics and qualities (Henderson, 1984, p.54). At first glance performance appraisal appears as though it should be something relatively straightforward. Torrington, Weightman and Johns (1989, p.814) offer a working definition of appraisal as: â€Å"The process of judging a persons performance and reporting that judgment.† Alan Fowler has given very good definition about the objective of performance appraisal system. He suggested that: â€Å"Staff work best when they know what they have to do, how well they have to do it, and how well they are thought to have done, so they need to talk to their managers at least once a year about this, and their managers need to take their staffs view into account when setting work goals and deciding who needs what training.† (Fisher, 1995, p.12) Traditional performance appraisal is more of a control mechanism used to make the most of an employee. How an employee is contributing toward achievement of organizational goal is the main concern here? Based on contribution ratio of the employees, the management makes some personnel decisions such as promotion, salary increase, sanction, and training needs. This uni-dimensional concept goes more with the philosophy of personnel management. 2.1 Formal versus Informal Performance Appraisal: Formal performance appraisals usually occur at specified time periods once, twice or thrice a year. Formal performance appraisals are required by the organization or institution for the purpose of employee assessment. Informal performance appraisals can take place whenever the supervisor or manager feels communication is needed. 2.2 Purpose, Objectives Benefits of Performance Appraisal: 2.2.1 Purpose: The purpose of performance appraisal is to devlop the organizations performance throughout the improved performance of employees. 2.2.2 Objectives: Organization uses performance appraisal system to execute some objectives. The main objectives in using performance appraisal in an organization are as follows: Motivating and allocating rewards for employees Review past performance to rectifying the mistakes from management and employees (Fisher, 1995, p.11) Proper utilization of company resources. Identifying areas where training and improvement are required. Coaching and developing employees so that they can perform better to achieve the company goal. Identifying the area where developments programs need to be introduced. Giving employees feedback about their work so that they can be inspired. Improve communication between managers and subordinates. Identifying the base for pay, promotion etc.. (Yeates, 1990, p.36) 2.2.3 Benefits: The benefits of a successful appraisal system can be concluded as follows: For the organization: Improved performance all the time in the organization due to: Achieve organizations objectives and values it needs proper communication; Increase sense of group work and reliability; Establish better relationship between managers and staff; Managers have got the scope and power to use their leadership skills to motivate and improve their subordinates. Improve outline of the tasks completed by employees. Classification of thoughts for improvement. Prospect and long-term view of the company can be developed. Training and development requirements appeared more clearly. A culture of continuous progress and success can be formed and maintained. People who have got potential can be classified for career development plans to provide for future staff requirements. The message is passed to everyone that employees are valued properly. (Fisher, 1995, pp.15-16). For the appraiser: Performance appraisal is a chance to develop an overview of individual jobs and organizations. Classification of ideas for development. Improved job satisfaction. Increased sense of individual value. There is an opportunity for appraiser to associate team and individual objectives to fulfil departmental and organizational objectives. There is an opportunity to explain expectations of the contribution the manager expects from team and individuals. The opportunity to set up the targets. There is a chance to make productive relationship with subordinates based on common interest and understanding. (Fisher, 1995, p.16) For the appraisee : Boost them up to increase motivation. Enlarged their career through job satisfaction They realize that they are valued. When they will get feedback after performance appraisal then they get a clear idea of what is expected from them and what they have to do to meet expectations. Supervisors discuss with them to improve their lacking areas. They are offered for training and development for their improvement. When managers are creating scope for developing their subordinates career then it is ultimately developing relationship between them. (Fisher, 1995, pp.16-17) 2.3 What should be appraised? Managers should consider four things when they are going to do the performance appraisal. Inputs Appraisers will see how job holders have implemented their knowledge and skills to perform their job effectively. Process Job holders outcome will indicate the implementation of knowledge and skills for their activities. These are sometimes called to as competences. These illustrate the performance required of people to complete their job effectively. This kind of performance can make a difference between highly effective and less effective performers in a given role such as personal drive, analytical power, team management and leadership and ability to communicate. Outputs Measurable or observable results of the performer will be expressed by jobholders. Outcomes- Result will show the ultimate impact of the jobholders and their teams or departments and their overall activities to achieve the objectives of the organizations. (Fisher, 1995, p.25) 2.4 When appraisals should take place: Formal performance appraisal are usually held annually but some of the fast moving companies prefer to do it twice a year or even more frequently, it could be quarterly. Those who are working in projects under a consultancy firm, their performance evaluation could happen after each assignment but there would still be an overall review at the end of the year. Some of the organizations conduct progress meetings at specific time to review progress towards achiev ­ing objectives, work plans or projects. Some of them are doing two or three times a year, the main purpose of which is to review and update objectives. (Fisher, 1995, p.27) There are some reasons behind failure of appraisals. Reasons are as follows: Employees dont know about the time frame and what exactly they need to do in terms of good performance; Others fail because of problems with the measures used to actually appraise the performance; An easygoing supervisor might rate as high, for instance, subordinates who are actually substandard Other problems, like arguing and poor communication, undermine the interview feedback session. Storey and Sisson (1993) have suggested that performance appraisal system actually have three steps: objective setting, feedback, and evaluation. The first step of an appraisal system is to give the guidance to the employee on how to apply their efforts for the benefit of the organization. The second step is to ensure employees work toward the achievement of their objectives through a process of positive communication with their supervisor. The final step involves the supervisor making an appraisal of the employees performance over the entire assessment cycle. (Brown Benson, 2005, p.101) 2.5 Popular Appraisal Methods: Managers usually conduct the appraisal using a predetermined and formal method one or more of the followings: 2.5.1 Graphic rating scale (GRS): The Graphic Rating Scale is the simplest and most popular technique for appraising performance. GRS measures personality traits and performance along with a point continuum scale or anchored scale. It lists traits such as quality and reliability and a range of performance values from unsatisfactory to outstanding for each trait. The manager or supervisor rates each subordinate by circling or checking the score that best describes his or her performance for each trait. In the end of marking manager or supervisor do the totals of the assigned values for the traits. (Dessler, 1999, p.156) The rater is given wide freedom in choosing a point, which is a threat to reliability and workability. 2.5.2 Alternation Ranking Method: Positioning employees from best to worst on a trait or traits is another appraisal option. Since it is usually easier to distinguish between the worst and best employees, an alternation ranking method is most popular. First, list all subordinates to be rated, and then cross out the names of any not known well enough to rank. Then, indicate the employee who is the highest on the characteristic being measured and also the one who is the lowest. Then choose the next highest and the next lowest, alternating between highest and lowest until all employees have been ranked. (Dessler, 1999, p.158) 2.5.3 Paired Comparison Method: The paired comparison method helps make the ranking method more precise. For every trait such as quantity of work, quality of work, and so on will be considered for appraisal for instant, top performer of quantity of work and top performer of quality of work will be pared. (Dessler, 1999, PP. 158-159) 2.5.4 Forced Choice Method (FCM): FCM intends to mitigate reliability problem of GRS by making scaling unknown to the rater. Here, the rater is served with some statements about a particular trait or performance factor. The rater is to choose a statement that best describes the employee. The rating is done by someone else. This is unworkable in larger organization. Both the rater and the ratee feel uncomfortable with FCM (Anderson, 1993, p.24) 2.5.5 Forced Distribution Method (FDM): The forced distribution method is similar to grading on a curve. With this method, manager places predetermined percentages of ratees into performance categories. FDM is a GRS or BARS scaling with a population distribution requirement. Usually it requires a normal distribution i.e. the lowest and the highest grade contain 10% of population each. The remaining 80% is distributed among others with highest distribution reserved for the mid-grade. FDM intends to minimize overrating. Yet it carries high probability of inequality in case of heterogeneous population. (Dessler, 1999, p.159) 2.5.6 Critical Incident Method: With this method, the supervisor keeps a log of positive and negative example (critical incidents) of a subordinates work-related behaviour. Every six months or so, supervisor and subordinate meet to discuss the latters performance, using the incidents as examples. There are several advantages of this method of which are as follows: It provides actual examples of good and poor performance the supervisor can use to explain the persons rating. It ensures that the manager or supervisor thinks about the subordinates appraisal all during the year. The rating does not just reflect the employees most recent performance. The list hopefully provides examples of what specifically the subordinate can do to eliminate any deficiencies. However, without some numerical rating, this method is not too useful for comparing employees or making salary decisions. (Baird, Beatty Schneier, 1982, pp.45-46) 2.5.7 Behaviorally Anchored Rating Scale (BARS): A behaviourally anchored rating scale combines the benefits of narratives, critical incidents, and quantified scales, by anchoring a rating scale with specific examples of behavioural activities for good or bad performance. Its supporters say it gives more equitable appraisal than do the other tools we discussed. Although BARS scales still present performance on a continuum; they provide specific behavioral anchors to help clarify the meaning of the performance dimensions and help calibrate the raters definitions of what constitutes good and poor performance. Some supporters of behaviorally focused scales also claimed that they would remove unnecessary subjectivity (Latham Wexley, 1977). BARS is judged from a set of scales- one scale describes each job dimension, or broad types of duties, responsibilities, or activities of a job. Placed on a scale are a set of statements clarifying of worker behaviour on the particular job dimension. (Baird, Beatty Schneier, 1982, p.61). Rating dimension would vary according to the nature of the job- between six and nine seems quite common. For example one British study identified seven: Supervision of operators, scheduling and planning, technical troubleshooting, handling men, communications, administrative problems of wiring wire and dealing with other departments. BARC system has got substantial advantage it has some draw back as well such as time consuming and expensive. Some of them have identified ten dimension of performance. They are interpersonal relationships, organizing and planning, reactions to problems, reliability, communicating, adaptability, growth, productivity, quality of work and teaching. (Fletcher Williams, 1985, pp. 42-44) 2.5.8 Computerised and web-based performance appraisal: Many people who have got the charged for performance appraisal for their subordinates may not be able to do so particularly newly appointed supervisors. As they will take over new responsibilities so they may not be efficient in expressing themselves in writing about employee performance. Eventhough some of them have got the strength to do perfectly but still they may need some format for developing effective, useful employee performance appraisals. Computer software programs are making the performance appraisal system easier from many aspects such as writing a difficult employee performance appraisal. Management software that is commonly called MBA-ware, offers expert guidance in management issues that would cover from creating a business plan to writing employee policy manuals (Sprout, 1995). Some managers are looking for a develop technology to solve the problems that they are facing during performance appraisal. Current computer software programs allow the managers to make performance appraisal documents that are in complete format, professional in appearance, and easy to use in the performance appraisal system. Additionally, this software programs provide classification of job performances that will be counted for appraising and offer various pre-written descriptions of behaviors for each criteria. There are three leading programs for employee evaluation software that are Review Writer 1.0, Performance Now! 2.03, and Employee Appraiser 2.0 (Stewart, 1994; Robinson, 1994). There are some similar software programs in the market but it do not do the evaluation process that way the other three software work (D.W. Pratt, personal communication, July 24, 1996). These three leading software programs work step-by-step to evaluate employees performance. Managers input the employees information into the system, mark the job description and/or categories to be used, choose the correct written evaluations, and print it. (Spinks, Wells Meche, 1999, p.94) 2.5.9 Mixed Standard Scales: These scales are made to make the evaluation system reliable through confirming each individual rates, each scales rate and each rater rates and to minimize halo and leniency errors (Blanz Ghiselli, 1972). The idea of mixed standard scale has come from the logic of forced choice method. Halo and leniency errors could reduce if ratings are not made on a scale where statements come in an obvious order of merit hierarchy. Practical findings provide support to these hypotheses (Saal Landy, 1977). This scale is choosing three items for each performance dimension which are good, average and poor. 2.5.10 Management By Objectives (MBO) More than half of the organizations regularly used performance appraisals in the beginning of 1950s, compared with only 15 per cent immediately after World War II (Spriegel, 1962). They had ordinary, numerical system which was trait rating system. This system focuses on past actions to appraise people on the basis of a previously established set of dimensions (DeVries et al., 1981). Lots of employees who were being apprised by the manager were not happy due to the way of performance measuring system. Trait rating system did not develop the employees performance rather than there was clear indication for being sacked for low performers (Van Riper, 1958). It is mentionable that this rating system gave chance to managers to play the role of judge instead of employee development for achieving both the employees and the organizations goals (McGregor, 1957). Out come of the performance appraisal system was conflicting with present roles of managers and the achievement of organizational goa l thats why new thought was introduced after World War II to update performance appraisal systems (DeVries et al., 1981). Due to the limitations of performance appraisal systems in the 1950s which led to the development of new systems based on management by objectives (MBO) In theory, at least, Management by Objectives provided a clear and unambiguous framework for specifying and measuring employee performance. Labovitz and Baird have given some ideas about MBO that is: â€Å"MBO approach to managing people is a process of continually structuring expectations through mutual goal setting with subordinates, establishing action plans and target dates, reaching objectives and providing feedback. This is a way of managing subordinates that permits them to meet their personal needs for responsibility, freedom of action and recognition. At the same time the MBO approach provides a supervisor with an element of control, and change his or her role from police officer to colleague or coach.† (Baird, Beatty Schneier, 1982, pp.51-52). MBO is introduced in the management for improving performance, reducing role vagueness and redirecting effort to important organizational target. MBO system could be fit and work with any types of organization for planning process, a control technique and a form of individual performance appraisal. (Baird, Beatty Schneier, 1982, p.57). MBO has many positive sides but it has some limitations that we need to consider. The main issue that a company should consider first to implement MBO is the high level of management commitment and time frame to reorient the thinking of employees (Patten, 1977). Communication is the key to get a good out come and to prevent the complexity of the system from primary excitement that will lead into confusion and disillusionment, bring the result to an end with disinterest and failure. The purpose for the new system needs to be clearly recognized also, because while MBO is a useful tool for performance planning and feedback, it is not easily used for administrative decisions (DeVries et al., 1981). A high standard of job assessment and implication skills are needed to determine which performance dimensions to measure and the goal achievement standards to use. Primarily, the goals and objectives which are set likely to be easily quantified, easily achieved and not necessarily central to the job (Murphy Cleveland, 1995). Levinson (1970) found out an inclination for objective-setting measures such as sales dollars or number of units produced result in a lack of attention for less calculative aspects of job performance such as customer service and quality work. As a result this method will be ineffective if objectives are activity focused instead of output centered. There is also an inclination for managers to overlook the factors which are out of employees control, but which frequently affect goal fulfillment, leaving the employee responsible for goal completion inspite of external influences (Goodale, 1977). Managerial jobs are frequently measured in terms of unit, rather than i ndividual, an objective, which requires that individuals be held accountable for outcomes requiring interdependent employee efforts (Levinson, 1970; Schneier Beatty, 1978). These are some common errors associated with MBO (Kleber, 1972), but they help to illustrate the complexity of this performance appraisal method. Longenecker (1989) points to the common assumption that appraisals are often ‘political in nature, that their mechanisms for justifying decisions which have already been taken and disregard individual merit. This is particularly the case when performance related pay (PRP) is involved. As a student of International Human Resource Management, researcher wants to discuss about international perspective of performance appraisal system. Hofstede (1980) found that national culture is a factor to vary on value dimension between managers and employees. One of the value dimensions is individualism against collectivism. Individualism is such a thing where people show their action according to their individual preferences whereas collectivism is such a thing where people behaving as a member of a group. We can see the individualistic culture in western part and collective culture in eastern part of the world. (Taormina Gao, 2009, p.103) The inception of Human Resource Management (HRM) made the Human Capital as the most important strategic resource of an organization and thereby linked it with strategic vision, mission, values, and other processes of organization. Performance Management (PM) thus replaced traditional PA under HRM philosophy. Here, both the organization and employees are of equal concern. Performance management is seen by Armstrong and Baron (1998, p.37) as: â€Å"a means of aligning organizational and individual objectives to achieve organizational effectiveness.† Mohrman and Mohrman define PM as: â€Å"The practices through which work is defined and reviewed; through which capabilities are developed and through which rewards are distributed in an organization. Performance management may involve goal setting, employee selection and placement, compensation, performance appraisal, training and development and career management† (Mohrman and Mohrman, 1995, p.2). From above two definitions we can draw following generic features of PM: It integrates between individual and organizational goals and thereby creates a sense of belongingness in the employees; It views performance as a function of organizational environment i.e. culture, climate, flow of resource, critical external environmental factors, etc; It contributes towards a climate of open discussion between management and workers about all organizational aspects. It enables employees to identify their weaknesses as well as strengths and motivates them for superior performance. 2.6 Motivation and Performance Management: Motivation has multiplier effect on performance. A sound and legitimate appraisal system is a precondition of having a highly motivated workforce. Conversely, a flawed system might demotivate and demoralize the employees in a way that appraisal becomes a ritual and sometimes counterproductive. Milkovich Wigdor (1991, p.34) identify two essential functions of PM linking to motivation: a) it provides the basis for individuals to form beliefs about causal connections between their performance and pay; b) it indicates degree of association between individuals effort and performance. 2.7 Selection of

Sunday, October 13, 2019

Common Misconceptions of Islam Essay -- Papers

Did you know that there are currently 1.5 billion Muslims living throughout the world? One in every five people in this world is a Muslim. It is proven that Islam is the fastest growing faith in the world and also happens to be the most widely and openly misunderstood faith as well. Americans have misconceptions about Muslims concerning the rights of Muslim women and whether Muslims believe in the existence of Jesus. "When a gunman attacks a mosque in the name of Judaism, a Catholic IRA guerrilla sets off a bomb in an urban area, or Serbian Orthodox militiaman rapes and kills innocent Muslim civilians, these acts are not used to stereotype an entire faith." How many times is it heard that a Christian, Jew, or any other majority robbed a bank or was involved in a mass murder? Very few, which is ironic because once a Muslim does such perils, it is blamed on the faith on whole and not the individual that makes that decision. Islam can literally be translated to mean submission to God and is derived from the root word meaning peace. One should always remember to go to the true source of Islam and separate what the true religion of Islam says from what is portrayed in the media. Many consider Islam an exotic religion or even too extreme for the modern world. But this is because religion does not dominate everyday life in the West, where as, Islam is consider a way of life for many Muslims; who from the teachings of the Quran have learned to balance their material and spiritual life. Like Christianity, Islam only permits fighting in self-defense, in defense of religion (but not the excuse for your own personal or political purposes), or on... ...mething it all gets blamed on the faith? The American government has been at war for almost two years to give rights to the people of Iraq, but how much of a difference can they actually make when their own people don't get proper rights? They say the people have freedom of speech, religion, and etcà ¢Ã¢â€š ¬Ã‚ ¦but in reality they have nothing. If the government wanted unity between the people than they would create a better understand on a situation rather than turning citizens against each other. A recent example of how much the American government 'cares' for the rights of the people is shown through the pictures they found of the prisons are being taken care of in Iraq. Many misconceptions of religion, culture, and just people on a whole would be cleared if the government and media did not exploit them for their own advantage.

Saturday, October 12, 2019

Diagnosis and Management of Diabetic Coma Essay -- Diabetes Health Ess

Diagnosis and Management of Diabetic Coma Diabetes is any disorder of the metabolism which causes excessive thirst and the production of large volumes of urine. A coma is a state of unrousable unconsciousness. (Martin (2002)) There are two types of diabetes: Diabetes Insipidus (DI) is a rare metabolic disorder, the symptoms of which are the production of large quantities of dilute urine and an increased thirst. It is caused by a deficiency of the pituitary hormone Anti-diuretic hormone (ADH / vasopressin) which regulates water reabsorption in the kidneys. (Martin (2002)) Diabetes Mellitus (DM) has symptoms of polyuria, wasting and glycosuria (mellitus means 'sweet urine') as well as the following tests to give a laboratory diagnosis of DM: Venous plasma glucose >11.1 mmol / L or Fasting venous plasma glucose > 7.0 mmol / L or Plasma venous glucose concentration > 11.1 mmol / L two hours after taking 75 g glucose in an oral glucose tolerance test (OGTT). There are two types of DM; insulin dependent DM (IDDM or type 1) and non-insulin dependent DM (NIDDM or type 2) Type 1 is caused by the destruction of pancreatic b cell destruction, which can be predicted by the detection of the presence of antibodies (Abs) to islet cells, (Pitteloud, Philippe (2000)) insulin and glutamic acid dehydrogenase (GAD) (a neurotransmitter) and a decrease in b cell insulin secretion. This destruction causes a decrease in insulin production, the hormone which stimulates glucose to be stored in the muscle and liver as glycogen. Type 1 causes an abrupt onset of severe symptoms, including a tendency to ketosis and a dependence on exogenous insulin. Type 2 is caused by a diet high in saturated fats, a lack of exercise and obesity. This is because the constantly high glucose levels cause insulin to be produced at constantly high levels, and so the body becomes desensitized to its effect as cells in target tissues posses fewer insulin receptors. Characteristics of NIDDM are that insulin is present, symptoms are moderate (tiredness and thirst), there is no tendency to ketosis and patients are not dependent on exogenous insulin. High blood glucose is controlled by diet, possibly with diabetic drugs. Complications of DM are: Cataract, as excessive blood glucose binds to lens proteins. Retinopathy (micro-angiopathy) caused by hemorrhage, etc.. .. ...ether the cause is glucose concentrations being too high or too low. Many causes of diabetic coma can be treated easily with hormones and fluids. References EMANCIPATOR K (1999) Laboratory diagnosis and Monitoring of Diabetes Mellitus, American Journal of Pathology, 112(5) PP665-674 EVERS IM, TER BRAAK EW, DE VALK HW, VAN DER SCHOOT B, JANSSEN N, VISSER GH (2002) Risk indicators Predictive For Severe Hypoglycemia During The First Trimester of Type 1 Diabetic Pregnancy, Diabetes Care, 25 (3) Pp554-559 Previous course notes, BIOM2003 MARTIN ELIZABETH A (2002) Concise Medical DictionarySixth Edition, Oxford, Oxford University Press, Pp148, 190-191, 374, 665-666, 717 MAYNE Philip D. (2001) Clinical Chemistry Sixth Edition, London, Arnold, Pp209-210 MOHSENI S (2001) Hypoglycemic Neuropathy, Acta Neuropathology, 102 (5) Pp 413-421 PITTELOUD N, PHILIPPE J (2000) Characteristics of Caucasian Type 2 Diabetic Patients During Ketoacidosis and Follow-up, Schweiz Med Wochenschr , 130, Pp576 - 582 TORTORA Gerard J, GRABOWSKI Sandra Reynolds (2000) Principles of Anatomy and Physiology Ninth Edition, New York, John Wiley & Sons Ltd., Pp 41, 964, 966, c-0, c-1

Friday, October 11, 2019

Do movie cause social evil to youths

Watching movies always considered as a relaxing thing because movie can satisfied us with all different needs. However, because of the technological development, people can download all the movie from plentiful websites easily with laptops or even a cellophane. And due to the advancement of accessing, there is no specific range of age to watch those movies. Many movies such as godfather, triple x, the wolf of the wall streets both with the theme of patriotism, crime and action always got chased by youths.I leveled here specific types of negative impact to make a better explanation. First of all is violence. Speaking of violence movie, guns and blood always present. If we think back some news of school shootings and many homicides committed by youths, there is so much violence involved at this early age. Other examples such as bullying, substance abuse happens a lot as well. The spreading of media and movie is one of the most important reasons. Teenagers just imitate the shooting beha viors from movies but knowing nothing about consequence, because movies hardly mention that.Second one is drug abuse. As young kids started to grow up with desires, it is easy to get curious about the things that they don't know. Statistics done by Cambium's(the Nation Center on Addiction and Substance Abuse at Columbia University) show that, 86 percent of US high school students know someone who drinks, smokes or does drugs. Around 50 percent know classmate who sells drugs. Media portrayal of drugs can lead the teenagers to know the drugs from negative sights and show the audience how it feels exaggeratedly. The last one is adultery and premature sex.It is more often that having nudity and sex scenes has become an attraction point or selling point. Younger generation become premature sex conscious and imitate the scenes of movies in real life. Without correct sex protection, more and more problems occur such as teenagers parents and so on. The impact of premature sex caused disease d society both mentally and physically. Most movies do have harmful impact on the youths. But the most important thing is to know the truth and reality in life.

Thursday, October 10, 2019

Smart Phone

Smartphone Security Survey of U. S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute © Research Report Smartphone Security Survey of U. S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones.In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above.We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure such sensitive information. We also recommend that security policies state these precautions and ensure they are enforced. Following are the most salient research highlights: ?Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of business and personal usage means much more sensitive and confidential data is at risk and suggests that the smartphone is with them most of the time. Sixty-six percent admit they keep a moderate or significant amount of personal data on their smartphones. Such personal data include email address, name, contact lists, photos, videos, anniversary and personal dates, music, Sixty-seven percent of consumers surveyed say they are concerned about receiving marketing ads and promotions.However, less than half (44 percent) are concerned about having a virus attack on their smartphone when it is connected to an insecure Internet network. In addition to using it as a phone, 89 percent use their smartphone for personal email and 82 percent use it for business email. A smaller percentage of consumers use their smartphones for financial transactions including payments. In fact, 38 percent of consumers use the smartphone to make payments and 14 percent use it for banking. Sixty-six percent of consumers have paid at least once for an item using their smartphone.In addition, 12 percent of consumers say they have experienced a f raud attempt vis-a-vis a mobile payment scheme. Despite this fact, only six percent say they check their mobile bill or statement every month and eight percent check the statement when the bill is higher than usual. Fifty-eight percent of consumers say that based on how they used the smartphone for purchases, Internet browsing and location they were targeted by marketers. Accordingly, 67 percent say they are very concerned or concerned about aggressive or abusive marketing practices. ? ? ? ? ? Ponemon Institute © Research Report Page 1 ?Despite security risks, less than half of consumers use keypad locks or passwords to secure their smartphones. In addition, only 29 percent of consumers said they have considered installing an anti-virus product to protect their smartphone. Forty-two percent of consumers who use social networking apps say they allow smartphone versions of well-known social networking applications such as Facebook to access the same key chains, passwords and log-ins that they use of their desktops, laptops or tablet. Only 10 percent of consumers say they turn off Bluetooth â€Å"discoverable† status on their smartphone when not in use. ? ?Ponemon Institute © Research Report Page 2 Part 2. Key Findings In this report we have organized the findings from the study according to the following topics: Consumers’ use of smartphones, consumers’ awareness about the security risks that accompany their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are not managing these risks. Consumers’ use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 percent use it for personal but some business use (Bar Chart 1).Only 6 percent of consumers surveyed use their smartphone exclusively for business. Bar Chart 1. What best describes your smartphone use? Both busine ss and personal use equally 40% Mostly personal but some business use 25% Personal use only 16% Mostly business but some personal use 13% Business use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in Bar Chart 2, 35 percent say they purchased it without any reimbursement.Bar Chart 2: Who purchased your smartphone and who pays the monthly service fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute © Research Report Page 3 Smartphones can perform a wide range of tasks. However, the most popular use next to the phone is business and personal emailing.The mo st popular smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to music (Bar Chart 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding may indicate why many in our study are not concerned about the security risks. Because consumers believe its primary use is as a phone or to email they may think (incorrectly) that there are negligible security or privacy risks.Bar Chart 3: Tasks that consumers do on their smartphone Phone Personal email Business email Address book Texting Store or move data Internet browsing Obtain documents Calendar View documents Listen to music Schedule tasks Shop Camera Social networking 0% 20% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% 100% 120% As reported in Bar Chart 4, 66 percent have paid for an item via their smartphone once, irregularly (once every two months) or regularly (maybe once a month). Fifty-one percent were surprised that they were charged for a service of product they signed up for.Bar Chart 4: Key questions about smartphone use Each bar defines the percentage yes response Did you ever pay for an item via the mobile phone? Did you every sign-up for a service or product on a mobile without realizing that there would be a cost? Have you ever signed a terms and conditions request on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute © Research Report Page 4 Consumers store confidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a significant amount of personal data.Bar Chart 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar Chart 5: How much p ersonal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned future purchases, purchase history, health data and security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6: What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary & personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% 100% 120% Ponemon Institute © Research Report Page 5 Many consumers surveyed have used email and text to sign u p for services or products without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent made what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7: The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website Other 12% 34% 31% 46% Despite these unexpected charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills every month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8: Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it every month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not certain. Ponemon Institute © Research ReportPage 6 Consumers’ awareness about the security risks that accompany their use of smartphones Marketing messages—not privacy and security risks—worry consumers. While the majority of consumers do not feel their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unwanted marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9: Attributions about privacy and security risks The agree response is a combination of strongly agree and agree.The disagree response is the sum of unsure, disagree and stro ngly disagree. I worry more about the security of my desktop or laptop computer than my smartphone. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a hacker will attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone while traveling. I do not worry about being tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% Agree Disagree They also worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the surv ey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are aware that what is described in the scenario could happen to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios: 1. Location data embedded onto image files can result in the tracking of the smartphone user. 2. Smartphone apps can transmit confidential payment information (i. e. credit card details) without the user’s knowledge or consent. Ponemon Institute © Research Report Page 7 3.Smartphones can be infected by specialized malware called â€Å"diallerware† that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. 5. Financial apps for smartphones can be infe cted with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. . A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet through a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain basic security protections that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based o n how the phone is used for purchases, Internet browsing and location. As a result, the user may receive unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers’ level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local WIFI network is insecure (35 percent). Bar Chart 10: Are you aware of the following smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Jailbreaking Spyware Social network snafu Auto transmission Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 4 0% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute © Research Report Page 8 Bar Chart 11 reports consumers’ actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk – wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11: Have any of these situations happened to you? Each bar defines the combined very concerned and concerned responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers’ level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very concerned or co ncerned about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12: Are you concerned about of the following smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware Unwanted marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disabled through â€Å"jailbreaking† but generally are not aware of this risk.In Ponemon Institute © Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While the re is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone: the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, â€Å"diallerware† infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. Line Graph 1: Summary of consumer responses to eleven smartphone securi ty risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute © Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be important when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13: How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have neither keypad locks nor passwords on their smartpho ne. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14: Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute © Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn off Bluetooth â€Å"discoverable† status on their device when they are not using it. Only 10 percent set up download controls on their smart phone to protect against apps and games that may contain malware. Bar Chart 15: Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute © Research Report Page 12 Part 4. Methods Table 1 summarizes the sample response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers located in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A total of 793 respo nded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final sample of 734 consumers (2. 5 percent response rate). Table 1: Sample response Sample frame Invitations sent Total returns Rejections Final sample Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are Apple’s iPhone, RIM Blackberry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows Mobile. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 Sprint HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other Total Pct% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% 100% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure Total Pct% 24% 19% 12% 9 % 3% 3% 2% 2% 1% 1% 25% 100%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full or part-time position. Pie Chart 1: Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2: Employment status 5%2% Employee Homemaker Retired Student Unemployed Business owner Active military 13% Ponemon Institute © Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their region in the United States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3: Household income Pie Chart 4: Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast Mid-Atlantic 14% 20% 61 to $80k 81 to $100k 101 to $150k 12% 18% Midwest Southeast Southwest 15% 17% Pacific west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute © Research Report Page 14 Part 5. Conclusion The key finding from this research is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being published about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more worried about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if lost or stolen could result in financial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that auditors who did not pa rticipate are substantially different in terms of underlying beliefs from those who completed the survey.Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute © Research Report Page 15 Appendix: Detailed Survey Responses Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sa mple frame Invitations sent Total returns Rejections Final sample Part 1. Background Q1a. Please select the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) Total Q1b. Please select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other Unsure Total Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally Total Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. % 2. 5% Pct% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% Pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% Pct% 6% 13% 16% 25% 40% 100% Ponemon Institute © Resea rch Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges Total Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking Travel assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never Total Q6a. Have you every signed u p for a service or product on your mobile without realizing that there would be a cost?Yes No Total Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other Total Pct% 35% 13% 10% 8% 34% 100% Pct% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 51% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute © Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No Unsure Total Q9. Have you ever been the victim of mobile payments fraud? Yes No Unsure Total Part 2. Attributions Q10. Please rate each one of the following statements using the scale provided below each item. Strongly agree and agree shown . Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute © Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? Concerned and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the user’s knowledge or consent. Were you aware that this could happen?Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? Concerned and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called â€Å"diallerware† that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. We re you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? Concerned and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total Very concerned 29% Concerned 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% Very concerned 31% Concerned 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute © Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Res ponse Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the user’s knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute © Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, p eople use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute © Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone’s security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute © Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases Purchase history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I don’t have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute © Research Report Page 23 Q28a. Do you synch your smartp hone with any of the following devices? Laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly Daily Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I don’t use social networking apps Total Q30. Do you turn off Bluetooth â€Å"discoverable† status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes No I don’t have children Total Q32b. If yes, do you use your children’s smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute © Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? Full-time employee Part-time employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual household income? Below $ 20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute © Research Report Page 25 D4. What is your highest level of education attained? High school Vocational University or college Post graduate Doctorate Other Total D5. Please check gender: Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my lifestyle I often give advice to others about how best to use computers and software I need to ask for help if something goes wrong with my computer I always try to spend as little time as possible online I am often confu sed when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I don’t feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute © Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to [email  protected] org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Resea rch Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute © Research Report Page 27