Monday, September 30, 2019

Investing and Financing Activities of Wendy’s

During the year of 2012, cash used for investing activities of Wendy’s totaled $189 million, increased $131 million from 2011. The two largest investing activities appeared in Wendy’s statement of cash flow are capital expenditures and acquisitions. Cash capital expenditures of Wendy’s in 2012 totaling $197. 6 million, including $71. 9 million for reimaged and new Image Activation restaurants, $13. 5 million for new restaurants, $28. 0 million for point-of-sale equipment, $23. 2 million for the construction of a new building at its corporate headquarters and $61. million for various capital projects. In the middle of 2012, Wendy’s acquired 54 franchised restaurants. The purchase price was $38. 1 million in cash. Wendy’s also agreed to lease the real estate, buildings and improvements related to some of the acquired restaurants which were considered part of the purchase transaction. Wendy’s did not incur any material acquisition-related costs. Some other important investing activities involved the investment in limited partnerships of indirect 18. 5% interest in Arby’s Restaurant Group, Inc. and approximately 11% cost method investment in Jurlique International Pty Ltd. On February 2, 2012, Wendy’s completed the sale of its investment in Jurlique and received proceeds of $27. 4 million. Wendy’s did this because prior to 2009, Wendy’s had determined that all of its remaining $8. 5 million investment in Jurlique was impaired. Wendy’s realized that Jurlique cannot help them make profit and decided to sell all of investment in Jurlique to protect stockholders equity. In the meantime, Wendy’s can use this money to strength their capital expenditures.The increase in cash used for investing activities is mainly because of the sale of Arby’s in 2011. Wendy’s sold Arby’s for $130. 0 million in cash and indirectly retained an 18. 5% interest in Arby’s and during 2012, Wendy’s received a $4. 6 million dividend from the investment in Arby’s. Wendy’s decided to sell Arby’s because Arby’s has been a weaker performer than Wendy’s in recent years after Wendy’s and Arby’s were merged in 2008. We deem it wise to sell Aryb’s because Wendy’s no longer need to worry about the poor performance of Arby’s but can earn the dividend.On the other hand, cash used for investing activities of McDonald’s totaled $3. 2 billion in 2012, increased $596 million. The increase primarily reflected higher capital expenditures and lower proceeds from sales of restaurant businesses. During the year of 2012, the two largest investing activities appeared in the statement of cash flow of McDonald’s are capital expenditures and sales of restaurant business and property. The two most important financing activities for Wendy’s are the proceeds from long-term debt and the repaymen ts of long-term debt.On May 15, 2012, Wendy’s entered into a Credit Agreement including a senior secured term loan facility of $1,125. 0 million, of which net proceeds was $1,113. 8 million with draws on May 15, 2012 and July 16, 2012. Proceeds from the 2012 Term Loan were used to repay the outstanding amounts under the 2010 Term Loan of $467. 8 million, to redeem and purchase the outstanding Senior Notes of $565. 0 million and to pay substantially all of the Credit Agreement fees and expenses. The outflow of 2012 Term Loan constituted the second largest financing activity, the repayments of long-term debt.In these two activities, we can find out that Wendy uses almost 85% of the 2012 loan to reimburse its previous debt, which shows us that the company does not have enough debt-paying ability. A good company who has the ability to make profit to repay previous debt and make another investing is what all stockholders want to see, not using new loan to redeem old loan. In concl usion, we do not agree Wendy’s using these financing activities. They should improve their operation activities to increase profit.

Sunday, September 29, 2019

Competency Differences between Associate degree Nurse and Baccalaureate degree nurse. Essay

Competency Differences between Associate degree Nurse and Baccalaureate degree nurse This essay will explore the differences in competencies for nurses prepared at the associates and baccalaureate degree levels. Both degrees allow the nurse to enter in to the field of nursing as a Registered Nurse . The American Association of colleges of Nursing believes that education significantly impacts the knowledge base and competencies of nurse (AACN2010). BSN and ADN nurses have the same skills need to care for the patient’s, the BSN prepared nurse builds  upon these skills. Educational preparation for both degrees includes a core curriculum focusing on preparing the nurse for acquired to in the clinical setting. There are the educational pathways for Registered Nurses. An associate degree nurse enters a two year community college program, earning a student in associate degree in nursing, a three year diploma program offered by hospitals and a four year university or college program, earning the student a bachelor’s of science degree in nursing. The associate degree program were first introduced in 1958 to relieve the shortage of nurses post world war. The program focused on providing direct care for a patient with a well- defined common diagnosis. Facilities have protocols which the nurse takes direction from and refers to for guidance. ADN curriculum is technical in nature focusing on task oriented clinical skill, while considering patient health conditions and need. ADN nurses understand the needs for standardized data collection and assist in obtaining data in a comprehensive manner Competencies set forth for AND’S intend to center on caregiver, councilor, and educator Activities (LUCY J HOOD 2009). ADN maintains accountability for her own actions and those of other health care peers for which she delegate task. ADN nurses assess, implement and plan Running head: Competency Difference between Associate and Baccalaureate degree nurse 2 patient care from admission to discharge. BSN NURSES BSN educational program last for four years. Baccalaureate curriculums include emphasis on critical thinking, research, leadership, management and community health . BSN nurses have excellent problem solving skills and have independent decision making capacities . The BSN program graduates assume the same responsibilities of the associate degree nurse yet their role is far more expanded. The baccalaureate nurse incorporates the physical, social, spiritual, intellectual, and emotional components to address the overall health of the individual. Applying theory of nursing knowledge from evidence bases research in a holistic view of the individual, and their community. BSN nursing knowledge is based on theory and research which allows opportunities to teach, assume a leadership role in the health care environment. BSN nurses not only provide more complex aspects of daily care and patient education, but also design and co-ordinate a comprehensive plan of nursing care for the entire length of a patient’s stay from pre-admission to post-discharge , including supervising nurses’ aides and other unlicensed assistive personnel, designing discharge and teaching plans for patient’s and collaborating with patient. Physicians, families and of the hospital departments and resource personnel. An example of differences in patient care, ADN and BSN nurse are as follows. (Patient situation) A 76 year old female patient admitted with the diagnosis of breast cancer to the oncology department . Cancer care technician arrives, providing daily care of a patient. An RN Running head: Competency Difference between Associate and Baccalaureate degree nurse 3 Arrives, welcome the patient, oriented the room, call bell, introduced staff, checks the vital  signs, assess the skin, treatments given for the wound and evaluate the plan of care. A nurse with BSN degree is responsible for the co-ordination of all care provided, after assessing the patient and family needs. The nurse with a BSN collaborates with the physician, physical therapy pastoral care services, social worker and implement a plan of care for the patients based on their health care needs. The AACN â€Å"states the road to BSN, prepares the new nurse for a broader scope of practice across a variety of inpatient and outpatient setting† (AACN, 2010) . With the increase in  complexity of today’s health care system, patient’s ,along with advances in technology, our health care requires more highly educated nurses. We as nurses embrace education that prepares us to provide the best care possible for our patients. Running head: Competency Difference between Associate and Baccalaureate degree nurse 4 References American Association of colleges of health of nursing (2010). The impact of education on nursing practice. Retrieved from American ASSOCIATION OF Nursing website: www. aacn. nche. edu/media/ factsheets/ impactednp. htm HOOD, L. J. (2010).

Saturday, September 28, 2019

Manufacturing Technology Essay

In this article, it lists out several manufacturing technologies that set out new and easier processes for not just the workload, but set for an easier lifestyle as well. (summary) The automated systems was best said on my end. Transfer machines, cell phones and other automated devices are used to set a communication establishment upon anyone. It’s all about producing faster and having more efficiency in the industrial world. They also help reduce costs such as a bank you have ATM’s rather than having a clerk or 2 handling your withdrawals and deposits. You also have development of apps. These apps can take pictures of your checks and deposit them from there. Also manage your accounts with transfers and payments. It’s claimed that many human interactions really don’t require the human touch to it, which is true. Transfers of virtual products and or cash don’t need to be manually human handled. The article has been developed this year, which defiantl y will have a fair and accurate perspective on the manufacturing technology that we have in mind now. Timings, R., & Wilkinson, S. (2000). Manufacturing Technology (2nd ed.). 1061-2890, Harlow, Essex: Longman. In this book we come across specific detail about percentage-wise wholes in how much costs were reduced at the time of the startup in manufacturing technology. It claimed that all manufacturing technology orders dropped 20.4% at the start of its creation and then suddenly rose 9.8% later that year. Every year since then there’s been a 3% up raise since the start of it all. Having it being written 15 years ago I am heavily against this book, just due to the fact of how much our technology has advanced. The book shows how transfer machines are being held against in the workload and reducing the efficiency of work from its employees which is just a big key factor in communication. With the advancement in technology this has got to be a joke. Almost all technology is set in touch screen adaptations, faster ram processors, and larger memories to keep companies moving and cost efficient. Blaedel, K. L. â€Å"SciTech Connect: Manufacturing Technology.† SciTech Connect: Manufacturing Technology. USDOE, 1 Feb. 1997. Web. 20 Jan. 2015. This set article claims that there are 4 projects that led to the main movement of manufacturing technology. It details exactly how they got to developing such a vast movement at the time which we could easily set apart from our age having it being published over 10 years ago. It shows exactly how to â€Å"develop an understanding of fundamental fabrication process†. Heap, J. (2004). International Journal of Productivity and Performance Management (Vol. 57, pp. 156-176). Bradford, England: Emerald Group. This book had several findings of out SME’s had an early development progress against productivity and performance management throughout different AMT’s. It shows the different effects in management and what manners they had at the time to reduce operation costs and team efficiency. Acquisition of Manufacturing Technology. (2013). MENA Report, Retrieved from http://search.proquest.com.ezproxy.libproxy.db.erau.edu/docview/1419103734?accountid=27203 Throughout this article we the write to see what acquisitions were involved to establish the different types of manufacturing technology in our more recent industry. Our updated technologies have claimed to make our recent years more cost efficient and productive by over 150%! I am all up with this article because it has its cited facts and it’s only 2 years from our current date, so this would be my most supported article just due to the date it was created. Milgrom, P., & Roberts, J. (1990). The Economics of Modern Manufacturing: Technology, strategy, and organization. The American Economic Review, 511-528. In this scholarly article, we learn the economics of modern manufacturing and what came with the update at the time and how it was processed and underwent a revolution. The scholarly article stated that the â€Å"mass production model is being replaced by a vision of a flexible multiproduct firm that emphasizes quality and speedy response to market conditions while utilizing technologically advanced equipment and new forms of organization.† This was the start of a new branch in observing what could be replaced and updated with technology. I do enjoy seeing the central difference of how technology has shaped the workplace with time. Doms, M., Dunne, T., & Roberts, M. J. (1995). The Role of Technology Use in the Survival and Growth of Manufacturing Plants. International Journal of Industrial Organization, 13(4), 523-542. In this scholarly article, we come to distinguish the relationship between principal strength, how we use to come across the usage of manufacturing technology and what growth rates it came with. It stated that the main findings at the time had a mindset of higher progression rates against technology would have a far less development and production failure. Tracey, M., Vonderembse, M. A., & Lim, J. S. (1999). Manufacturing Technology and Strategy Formulation: Keys to Enhancing Competitiveness and Improving Performance. Journal of Operations Management, 17(4), 411-428. When coming across this article we see how the main set of technology was set and how that generation at the time had evolved it into a more competitive and healthier implement. As stated, â€Å"Linear Structural Equation Analysis results show that the relationships between a firm’s practices in these two areas and its competitive capabilities are found to be statistically significant and positive†, which shows me they had their own strategic role in which they followed to test out their performance and which ways they could use to improve the marketing satisfaction. Shepherd, D. A., Mcdermott, C., & Stock, G. N. (2000). Advanced Manufacturing Technology. Journal of High Technology Management Research, 11(1), 19-33. doi:10.1016/S1047- 8310(00)00019-5 We come to the instruction of AMT’s and how their benefits improved our workload and consumer satisfaction. This article shows the specific studies in how AMT’s were tested and outweighed the beneficial manufacturing firms in all over the world. The flexibility and higher efficiency claims from them outsourced many operational downfalls to provide advantage across the marketplace. Cho, K. (1993). Manufacturing Technology in Korea. Journal of Manufacturing Systems, 12(3), 216-222. doi:10.1016/0278-6125(93)90331-M Set across this article we have a different perspective having most of us live in the United States. With 32 set studies across this article it has been set that they have had an establishment of implementing local manufacturers across the nation with the support of  education al programs in technology and engineering. A different set perspective against the U.S. showing us how other countries had a different goal with maintaining manufacturing technology. Anonymous. (2011, ). TECHNOLOGY MANUFACTURING HEALTH CARE. Daily Herald (Arlington Heights, IL) This article was interesting to me to see the perspective of how manufacturing technology affected the health care industry. With 2 new hospitals opening up in other countries, hospitals have set out ads over the radio and television to help drivers understand the dangers of texting while driving and the rising amount of drivers ending up in the hospital from being distracted behind the wheel. I did enjoy reading this because I do commute 80 miles a day to work on the highway and easily see how much people are distracted behind the wheel. I wouldn’t know this new advancement in technology has caused such an uprise in car accidents, enough to open new hospitals around the world.

Friday, September 27, 2019

Leading Organizations and Competing in a Global Flat World Essay

Leading Organizations and Competing in a Global Flat World - Essay Example Adaptation to changing requirements while maintaining standards is a challenge of the present. Organizations cannot stay stagnant, they have to perform in a dynamic environment and are forced to continually learn in order to survive. A central concept taken into consideration in the present analysis is the 'learning organization'. The concept stresses that organizations have the ability to improve their bottom-line results and embrace new requirements by developing a culture of learning and adaptation. This can be done with best results, as will be argued further on, at a cultural level, the level of mental models (or views on organizational realities). But it can also be implemented at the individual level, with strategic implication for the career. The concept of learning organization is strictly connected to the concept of quality, referring both to the end products of an organization as well as to its overall activity and performance. Different organizations have different perspectives on quality (different models), each allowing a degree of learning capacity. The ideal, is the total quality mental model diffused in the culture of learning organizations, which states that quality represents a transformation that acts on a deep level within the organization, changing the way people think and work together, what management values and rewards, the way success is measured: "all of us collaborate to design and operate a seamless value-adding system which incorporates quality control, customer service, process involvement, supplier relationship, and good relations with the communities in which we operate" (these being inferior or partial levels of understanding of the concept of quality) (Albert 49). In today's ever changing business and social environments, organizational design is a serious challenge for all managers, irrespective or organization size. Managers recognize that organizational design is critical to performance and must accommodate change and new market or social requirements. This is why career planning has become so difficult. The overall learning behavior of an organization depends on its entire structure, not merely on the sum of its parts. It is important to focus on the whole rather than on specific events that can be misleading. The broader scheme of things is always determined by a complex set of factors. What lacks from the picture is the relationship between parts, that can determine complete different outcomes. Organizations are open systems that relate to their environments and learn from them. There is a circular relationship between the overall system and its parts. There are some patterns that repeat over and over again in a given system. Learning fr om the past receives whole new meanings from this perspective. A careful analysis is capable of determining trends of development and predicting specific directions of evolution. This can be achieved only by taking a look at the whole, at the entire system. But in order to transform the vision shared by an organization, all the mental models of its members have to be slowly directed to a coherent common view on key functional areas of the organization. And a change of this size can only be done at a cultural level. The corporate culture is a vital part of the corporate identity, along with the corporate overall goal, the objectives, the organizational structure

Thursday, September 26, 2019

Goodpaster Essay Example | Topics and Well Written Essays - 250 words

Goodpaster - Essay Example Since the statement has not categorized the stakeholders, it means that it will treat all participants who are involved in transaction equally. The mission statement also aims at ensuring that stakeholders achieve maximum satisfaction. This indicates that this statement is based on the utilitarian ethical critical thinking technique. The article argues that utilitarian principle is classified under normative ethics and it aims at providing maximum utility to all parties who are involved in an organization. Normative ethics is a field that aims at differentiating right from wrong (Goodpaster 5). Therefore, it means that if the disutility that stakeholders get from an organization surpasses the utilities, it means that the company acts unethically. The organization should, therefore, analyze the effects of its actions during the formulation of policies to ensure that they produce more benefits than costs when they are implemented. Goodpaster argues that companies should conduct the analysis when formulating policies that deal with both the internal and the external environment (3). Therefore, from the views of Goodpaster, the mission statement is ethically

The Hygiene Hypothesis Essay Example | Topics and Well Written Essays - 1000 words

The Hygiene Hypothesis - Essay Example fungi, bacteria, viruses and parasitic microbes) and allergens hinders the normal development of a natural immunity. Consequently, this condition makes an individual to be vulnerable to infectious diseases and allergies. The hypothesis has been put forward as an explanation to the occurrence of many preventable diseases and allergic infections. The following is an analysis seeking to establish accuracy of the hypothesis with the use of a context that features several case studies in the world and the relevant deductions. Accordingly, it is important to note that the immune system develops from repeated attempts to keep off disease from the low level of pathogens found in a normal environment; as such, when the germs invade the body in life threatening amounts, the immune system successfully wards them off. The need for this exposure in developed nations some decades back saw to larger families than today. This is because parents believed that the elder child would expose the younger one(s) to pathogens, hence harden their immunity (Ascherio &Munge, 2007). It has also been observed that children who are taken to baby care institutions are less susceptible to allergies and immune diseases. The research has indicated that, children who had earlier been exposed to measles or hepatitis A are also quite resistant to allergies. Autoimmune diseases are those that the body should be able to naturally protect itself from, as per the hygiene hypothesis. Such include acute lymphoblastic leukemia affecting young people in the developed world. This is a region where young children are less likely to be exposed, and thereby develop the needed immunity. Unconfirmed evidence also links the hypothesis indirectly to autism, suggesting that an immune disease causes it (Lang, et al. 2010). However, extensive research shows that the hypothesis is of more significance to allergies than to immune diseases (Christensen, 2010). Some of the common allergens, i.e. substances that cause al lergic attacks, include pollen, dust, hay, household chemicals, synthetic material, pet fur, some foods and some food preservatives. When these come into contact with the body of the allergic person, his/ her system activates the white blood cells in response to the foreign negative stimulus. (These cells normally help us to fight disease-causing microorganisms). Once released, the white blood cells cause an inflammatory reaction (Christensen, 2010). This reaction is exhibited in various ways e.g. itching, swelling, coughing, asthma, sneezing, running nose, tears etc. Asthma is a chronic condition in which the victim, when exposed to allergens, is unable breathe due to blockage of air sacs (alveoli) in the lungs. If no medical attention is availed, patient may collapse or even die. Drugs and inhalers are normally used to control the situation (Christensen, 2010). However, not all scientists concur with the hygiene hypothesis as there is an antithesis to this which is the exposure th eory. The exposure theory suggests that the higher the level of exposure to allergens, the more the possibility for allergies incidence. This theory is based on an observation that people living in urban areas have a higher percentage of allergies than their rural counterparts, and they are more prevalent in the developed than the developing world. Modern day people are more allergic as compared to people who lived some centuries back. While this appears at a glance to be true, large portions of the global population prove otherwise, hence the need for a more comprehensive and convincing explanation (Antony et al., 2006). On the other hand, some scholars support the hygiene hypothesis. A health researcher based in Germany, Dr. Erika Von Mutius investigated the

Wednesday, September 25, 2019

Corporate Social Responsibility Essay Example | Topics and Well Written Essays - 2500 words - 2

Corporate Social Responsibility - Essay Example For long-term benefits to the organization, CSR should be made a part of the firm's strategic perspective and operations. This paper proposes to discuss Corporate Social Responsibility (CSR), taking into account various factors including consumer rights, the significance of ethical consumerism, fair trade consumerism, ecological sustainability, and the cause commerce approach which promote the implementation of CSR. It has been recognized that the activities of an organization influence the external environment, hence it is important that the organization should be accountable to not only its stakeholders, but also to a wider community. This concept initially took root in the 1970s, and grew as a concern for the company as a member of society, with a wider view of company performance including its social performance (Crowther & Rayman-Bacchus, 2004: 3). Though community accountability was acknowledged as essential, the focus of big business on financial results was observed to be an impediment to social responsiveness, especially in the early years of the accountability concept taking shape. There is now an increasing move towards accountability of companies towards all participants, and this recent phenomenon of corporate social responsibility is becoming the norm with all organizations (McDonald & Puxty, 1979: 53).Corporate social responsibility (CSR) refers to a company including in its deci sion making and operations, ethical values, employee relations, compliance with legal requirements, transparency, and overall respect for the communities in which they operate. CSR is more than occassional community service action, it is a corporate philosophy that is the driving force behind strategic decision making, selection of partners or collaborators, hiring practices and ultimately brand development (Werther & Chandler, 2006: 8). CSR includes how businesses and organizations manage the impact that they have on the environment and society: particularly how organizations interact with their employees, customers, suppliers, and the communities in which they operate. Also significant is the extent to which they attempt to protect the environment, and solve new corporate problems such as the exploitation of child labour which may be occurring thousands of miles away as part of the corporate activity (Crowther & Green, 2004: 174)."Corporate social responsibility encompasses the ra nge of economic, legal, ethical and discretionary actions that affect the economic performance of the firm" (Werther & Chandler, 2006: 10). This includes legal or regulatory requirements faced in day-to-day operations. Being socially responsible and adhering to the law is an important aspect of any ethical organization. However, legal compliance is only a basic condition of CSR; strategic CSR gives priority to the ethical and discretionary concerns that are less precisely defined and for which there is often no clear or collective consensus from the part of society. Corporate social contract is related to the social responsibility that companies have towards the consumers and to the society at large. Thomas Hobbes' concept of social contract regards corporate activity as morally good if it maximises human welfare, in which collective welfare would be considered above

Tuesday, September 24, 2019

Literature assignment about change management and flexibility Article

Literature assignment about change management and flexibility - Article Example For attaining a success by an organisation , change is pervasive and is constant. Change in customers’ needs , markets , economy and trends are the factors that can influence the performance of a business orgnisation. Hence , those business organisations that fail to adopt to changes will definitely fail to succeed. A business may witness resistance to change by its employees or by its managers. Hence , a business is to perceive and educate the employees to respond to changes to remain in the business. This research article will focus on how those companies failed to stay in the business which did not respond to changes by citing real-life examples to demonstrate how significant it is for business to manage the change. Today, business managers need strategic flexibility, which is the capability to comprehend major external changes and to fastly respond to it by earmarking the required resources and to acknowledge when a strategic decision is not giving a desired result. As the business managers face a highly uncertain atmosphere in this competitive world, and the strategic flexibility appears to be absolutely needed (Robbins, Coulter & Vohra 2010:175). To maneuver efficiently in this new competitive setting, to develop and sustain competitive advantage, a business needs a novel type of organization. To attain success, the 21st century business organization needs to exercise strategic leadership, developing economic core competences, spotlighting and nourishing human capital, efficiently employing new information technologies and manufacturing, using cherished strategies thereby employing cooperative strategies and accessing global markets, introducing new organizational cultures and structures, acquiring innovative cultures, and administering the business as a mixture of assets. (Hamel et al 1998:2). Ever increasing globalization and technology innovation offer major confronts to business

Monday, September 23, 2019

McGregor's Theories and Maslow's Hierarchy of Needs in Relation to Essay

McGregor's Theories and Maslow's Hierarchy of Needs in Relation to Modern Marine Management Practices - Essay Example The role of managers can be interpreted as that of looking over or ensuring people work as expected. As a process, management aims at maintaining an environment where individuals can work together to meet the set targets (Koontz and Weihrich, 1990, p.4). A broader form of management gives different implications. One of these is that it assigns managers with the role of planning, organizing, staffing and leading. Secondly, management is not limited to specific groupings as it applies to any kind of organization. In addition to that, it applies to all managers regardless of the organizational level they are at. Also, the driving force behind every manager is to create surplus. Management also deals with productivity of an organization. Hence, emphasis is laid on effectiveness and efficiency.Also, the aim of organizational behavior is to help managers map out the organization’s future through a better understanding of human behavior (Hersey & Blanchard, 1996, p.80). Some of the k ey areas in management include problem solving, administration, human resource management and leadership of the organization. Organizations face challenges on a daily basis that affect its performance. Thus, it is the management’s responsibility to identify and analyze the problems then implement the necessary remedies. Administration, on the other hand, implies overseeing the implementation of the laid down procedures. Human resource management involves integration of human resource, analysis of workers and overseeing flow of ideas between an organization’s shareholders and its workers. Leadership looks into interpersonal relationship, personal integrity and management skills. Theories serve as perspectives which people use to get a better understanding of experiences that they face (Stoner et al. 1995, p. 31). These generalizations and principles give a framework that can be used to study a given area of knowledge. Several approaches have been given to management ana lysis. Thus, management theories have been formulated to explain and analyze the management process. Different conflicting views have been given and for this reason, some scholars refer to this situation as the ‘management theory jungle’ (Koontz, 1961: pp.174-188). Some of the theories that can be used to analyze management are McGregor theories and the Maslow hierarchy of needs. McGregor theories Douglas McGregor was an American social psychologist who came up with management ideas that he covered in his X-Y theory. This theory is commonly referred to in management and motivation. According to McGregor, there are two approaches to managing people (McGregor, 1985, p. 16). Many managers prefer to apply theory x which unfortunately gives poor results compared to theory y. a. Theory x Theory x is also known as the authoritarian management style. This management style is characterized by workers who dislike their work (Business Balls, 2012, p.1). These people have to be for ced to work with threats of punishment upon failure to meet organizational objectives. Also, such workers shy off from responsibility and prefer to be directed on what to do. Theory x managers are goal oriented and result driven. These managers are intolerant to epole that fail to meet deadlines. This leads them to act in aloofness and arrogance. These managers create a dictatorial environment where

Sunday, September 22, 2019

Push and Pull Factors in the Tourism Industry Essay Example for Free

Push and Pull Factors in the Tourism Industry Essay Gogo (formerly known as Aircell), is an innovation company, becoming leaders in providing inflight connectivity. The company began in 1991, when they began creating telephone systems for aircrafts, they progressed from this and in 2006 began creating a broadband network for aircraft. In 2008, they launched this new system into commercial flights and since then they have been offering this service for various American airlines including US Airways, Virgin America and American Airlines (Gogo 2013). The purpose of this paper is to discuss the recent experience of using Gogo Wi-Fi on an American Airlines flight, and investigate the strategy of Gogo, with reference to the innovation dilemmas when creating this new service. The experience occurred on an American Airlines flight from San Francisco to Los Angeles, although the technology had been available for a few years, this was the first time the consumer had experienced Wi-Fi whilst flying. Although the consumer had no need for the Internet on their flight and only purchase it to update their Facebook status, they recognised the benefits of having the internet on long haul flights, this included people being able to check emails and stay in touch with people and it also provides people with the ability to download entertainment from online sources and no longer be limited to the selection provided by the airline. Due to the nature of the Airline industry, at the core level it can be viewed as a generic offering across the industry. This resulting in airlines often creating a differentiation strategy, in order to gain a competitive advantage as they seek to increase the value of the product/service on offer to the consumer (Hooley et al, 2012). The Gogo Company acknowledged that their innovation could provide a service to Airlines that will enable them to differentiate themselves. This can be identified on the Gogo website, as it states ‘By differentiating your airline and providing a memorable passenger experience, you stand to gain loyalty among your valued flyers†¦lets you custom wrap the video portal, so your brand is consistently comes forth whenever passengers are connected’ (Gogo 2013). In 2009, American Airlines announced it would be using Gogo services on their domestic flights, costing the airline $100 000 to install (Semuels, 2009). This therefore shows that American Airlines have recognised the benefits and the increase ticket sales and revenue they could receive by advertising Gogo Internet is now a part of inflight entertainment. When innovation occurs within a company, they must consider the following innovation dilemmas, whether the product or service is a technology push or market pull, product or process innovation, open or closed innovation and finally a technological or business-model innovation. Technology push is when innovation is pushed by technologist or scientist who pass this information onto the company, from there they will manage, promote and distribute this new innovation. This can be compared to market push, this is when companies create innovation based on what the ‘lead users’ are doing in that particular industry (Johnson et al, 2011). One aspect that has enable Gogo to overcome this dilemma, is by listening to what the market wants and ensuring they are up to date with the current market technological tends. Product Innovation is when emphasis on innovation is placed on the finally product, whereas in process innovation is when innovation is focused on the production and distribution (Johnson et al, 2011). At the beginning Gogo was focused on the product innovation, but as the company has grown, they have shifted to process innovation. This can be identified on the Gogo website stating that ‘1 in 4 people consider their laptop, tablet or IPad an essential carry on item’ (Gogo 2013), therefore Gogo has had to ensure its innovation is compatible across the multiple devices. Open innovation is when companies improve their innovation through gaining ideas through internal and external personnel. This can be compared to closed innovation, when innovation is based on internal personnel (Johnson et al, 2011). Gogo tend to go for closed innovation to ensure they remain leaders in the industry however ensuring they are receiving feedback from their clients to ensure they are meeting their needs. Technological or business-model innovation, technological innovation is when innovation is relied on new science or technology, whereas business-model innovation emphasises on creating new models that will bring stakeholders together in a new method (Johnson et al, 2011). Gogo began as a technological innovation, however has become a business-model innovation for companies using Gogo products and service, as it changes the way they sell and promote their airline company. Overall, Gogo are the market leaders and innovators in inflight communications services. And from reviewing the company’s current strategy, it can be recognised that will continue to be market leaders as they are aware of the demands from today’s consumers, and are constantly updating, innovating and meeting these demands. Although by company innovating new products or services, it dose propose the risk of innovation dilemmas, Gogo has proven that they can overcome these dilemmas and continue to lead and grow.

Saturday, September 21, 2019

The Introduction To Malicious Software Computer Science Essay

The Introduction To Malicious Software Computer Science Essay Malware is a collective term for any malicious software which enters system without authorization of user of the system. The term is created from amalgamation the words malicious and software. Malware is a very big hazard in todays computing world. It continues to grow in capacity and advance in complexity. As more and more organization try to address the difficulty, the number of websites distribute the malware is rising at an frightening rate and is getting out of control. Most of the malware enters the system while downloading files over Internet. Once the malicious software finds its way into the system, it scans for vulnerabilities of operating system and perform unintended actions on the system finally slowing down the performance of the system. Malware has ability to infect other executable code, data/system files, boot partitions of drives, and create excessive traffic on network leading to denial of service. When user executes the infected file; it becomes resident in memory and infect any other file executed afterwards. If operating system has a vulnerability, malware can also take control of system and infect other systems on network. Such malicious programs (virus is more popular term) are also known as parasites and adversely affect the performance of machine generally resulting in slow-down. Some malware are very easy to detect and remove through antivirus software[1]. These antivirus software maintains a repository of virus signatures i.e., binary pattern characteristic of malicious code. Files suspected to be infected are checked for presence of any virus signatures. This method of detection worked well until the malware writer started writing polymorphic malware [15][16] and metamorphic malware. These variant of malware avoid detection through use of encryption techniques to thwart signature based detection. Security products such as virus scanners look for characteristics byte sequence (signature) to identify malicious code. The quality of the detector is determined by the techniques employed for detection. A stealth malware detection[36] technique must be able to identify malicious code that is hidden or embedded in the original program and should have some capability for detection of yet unknown malware. Commercial virus scanners have very low resilience to new attacks because malware writers continuously make use of new obfuscation methods so that the malware could evade detections. 2.1 Computer Virus A computer virus[6] is basically a program which is written by the programmers whose behaviour is to replicate itself and spread from one computer to another. The term virus is also normally, but incorrectly, used to refer to other types of malware, including but not limited to adware .and these spyware programs that do not have a reproductive ability. Malware includes various computer viruses[6], such as computer worms, Trojan horses[17], most of them are rootkits, spyware which are also considered as dishonest adware and other malicious or redundant software, including proper viruses. Viruses are occasionally confused with worms and Trojan horses, which are theoretically different. A worm can exploit security vulnerabilities to spread itself repeatedly to other computers through networks[7], while a Trojan horse is a program that appears nontoxic but hides malicious functions. Worms and Trojan horses[17], like viruses, may harm a computer systems data or recital. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohens theoretical compression virus[6]. However, various antivirus professionals[5] dont admit the concept of kindly viruses, as any beloved function can be implemented without involving a virus automatic compression, for instance, is available under the Windows operating system at the choice of the user. Any virus will by definition make unconstitutional changes to a computer, which is undesirable even if no damage is done or intended. On page one of Dr Solomons Virus pdf, the undesirability of viruses, even those that do nothing but reproduce, is thoroughly explained. 2.1.1 Academic Work Veith Risak published[6] the article whose title was as follows Selbstreproduzierende Automaten mit minimaler Information sà ¼bertragung (Self-reproducing automaton with minimum information switch over). The article described a fully serviceable virus written in assembler language for a particular SIEMENS 4004/35 computer system. In the year 1980 Jà ¼rgen Kraus wrote his thesis on Selbstreproduktion bei Programmen at the University of Dortmund. In his work Kraus guess that computer programs[4] can behave in a way parallel to biological viruses. In the year of 1984 Fred Cohen at the University of Southern California wrote his paper on the Computer Viruses[6] Theory and Experiments. It was the first paper of him in which he has explained to clearly call a self-reproducing program a virus, a term introduced by Cohens mentor Leonard Adleman. Fred Cohen published a exhibition that there is no algorithm that can perfectly detect all potential viruses. An article that published on malware that describes useful virus functionalities was available by J. B. Gunn in the title Use of virus functions to provide a virtual APL predictor under user control in 1984. 2.1.2 Science Fiction There are several myths associated with the science.The actual term virus was first used to symbolize a self-reproducing program in a small story by David Gerrold in Galaxy magazine in 1969-and later in his 1972 novel, When HARLIE Was One. In that novel, a attentive computer named HARLIE writes viral software to recover damaging personal information from other computers to blackmail the man who wants to turn him off. Michael Crichton[7] told as a sideline story of a computer with telephone modem dialing potential, which had been automatic to randomly dial phone numbers until it hit a modem that is answered by another computer. It was an attempt to program the answer computer with its own program, so that the second computer would also begin dialing unsystematic numbers, in search of yet a different computer to program. The program is assumed to spread exponentially through susceptible computers. 2.1.3 Virus Programs The Creeper virus[6] was first detected on ARPANET, the prototype of the Internet, in the early 1970s. Creeper was an new self-replicating program developed by Bob Thomas at BBN Technologies in 1971. Creeper has used the ARPANET to infect DEC PDP-10 computers which are running on the TENEX operating system. Creeper gain admission via the ARPANET and banal itself to the isolated system where there was a message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called which is known as Elk Cloner was the first PC virus to appear in the uncultivated that is, outside the single computer or lab where it was created by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was studying in the high school and was injected in a game on a floppy disk. On his 50th iterative use the Elk Cloner virus would be activate, which prone to infecting the PCs and displaying a short poem beginning Elk Cloner: The program with a personality. The first IBM PC virus in the natural was a boot sector virus dubbed and created by the Farooq Alvi Brothers in Lahore, Pakistan, seemingly to deter piracy of the software they had written. Before computer networks[7] became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the PCs, many users frequently exchanged their information and programs on floppies. Some of the viruses are spread by infecting programs which are stored on these disks, while others programs installed themselves into the disk boot sector, which ensure that they would be run when the user booted the computer from the disk, usually inadvertently. Personal computers of the period would try to boot from the floppy at first if one had been left in the drive. Until floppy disks rejects, this was the most unbeaten infection strategy and that is why boot sector viruses were the most common in the wild for many years. Conventional computer viruses[6] emerge in the 1980s, that are driven by the spread of PCs and the consequential increase in BBS, modem use, and software sharing. Bulletin board-driven software giving out contributed directly to the swell of Trojan horse programs, and computer viruses which were written to infect readily traded software. Shareware and bootleg software were equally common vectors for viruses on BB Systems Viruses can increase their chances of spreading over the several other computers which in networks[7] by infecting the files on the particular network file system or a file system which can be access by other computers Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as MS-Word and MS-Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word processor and Excel spread sheets were also available for Mac OS, most could also spread to Macintosh computers. Although most of these computer viruses[6] may not have the capability to send contaminated email messages to those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to repeat themselves with added blank lines. If two macro viruses concurrently infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend which isa trusted source follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005.There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo!. 2.2 Classification In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs (see code injection). If a user attempts to begin an infected program, the virus code may be executed concurrently. Viruses can be separated into two types based on their performance when they are executed. Nonresident viruses straight away search for other hosts system or OS which can be infected, or infect those targets, and finally transfer organize to the application program they infected. Tenant viruses do not search for hosts when they are happening. Instead, a resident virus masses itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself. 2.2.1 Nonresident Viruses Nonresident viruses can be notion of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file. 2.2.2 Resident Viruses Resident viruses contain a replication module which is parallel to the one that is engaged by nonresident viruses. This section, however, is not called by a finder module. The virus[27] masses the duplication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to carry out a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer. Resident viruses are sometimes can be divided into a class of fast infectors and a class of slow infectors. Fast infectors are those which are designed to infect as many files as soon as possible. A fast infector, for instance, can infect every potential host file that is accessed. This pose a special difficulty when using anti-virus software[1], since a virus scanner will access every prospective host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can piggy-back on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software[5] that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful. In most of the operating systems which use file extensions to determine program relations such as Microsoft Windows. The extensions may be normally hidden from the user by default. This makes it probable to create a file that is of a different type than it appears to the users or programmers. For example, an executable file may be created named picture.png.exe, in which the user sees only picture.png and therefore assumes that this file is an image and most likely is safe, yet when opened runs the executable on the client machine. An additional scheme is to generate the virus system from parts of existing operating system files by using the CRC16/CRC32 data. The initial code can be quite small (tens of bytes) and unpack a fairly large virus. This is analogous to a biological prion in the way it works but is vulnerable to signature based detection. This attack has not yet been seen in the wild. 2.3 Infection Strategies Virus avoids detection[31] by users, some viruses employ different kinds of deception. Some of the old viruses, especially on the MS-DOS operating system, make sure that the last modified date of a host file stays the same when the file is infected by the virus. This approach does not fool antivirus software, however, especially those which maintain and date cyclic redundancy checks on file changes. Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file. Some viruses try to avoid detection by killing the tasks associated with antivirus software[1] before it can detect them. As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access. 2.3.1 Read Request Intercepts While some antivirus software employ various techniques to counter stealth mechanisms, once the infection occurs any recourse to clean the system is unreliable. In Microsoft Windows operating systems, the NTFS file system is proprietary. Direct access to files without using the Windows OS is undocumented. This leaves antivirus software little alternative but to send a read request to Windows OS files that handle such requests. Some viruses trick antivirus[5] software by intercepting its requests to the OS. A virus can hide itself by intercepting the request to read the infected file, handling the request itself, and return an uninfected version of the file to the antivirus software. The interception can occur by code injection of the actual operating system files that would handle the read request. Thus, an antivirus software[1] attempting to detect the virus will either not be given permission to read the infected file, or, the read request will be served with the uninfected version of the same file. File hashes stored in Windows, to identify altered Windows files, can be overwritten so that the System File Checker will report that system files are originals. The only reliable method to avoid stealth is to boot from a medium that is known to be clean. Security software can then be used to check the dormant operating system files. Most security software relies on virus signatures or they employ heuristics, instead of also using a database of file hashes for Windows OS files. Using file hashes to scan for altered files would guarantee removing an infection. The security software can identify the altered files, and request Windows installation media to replace them with authentic versions. 2.3.2 Self-Modification Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. Unfortunately, the term is misleading, in that viruses do not possess unique signatures in the way that human beings do. Such a virus signature is merely a sequence of bytes that an antivirus program looks for because it is known to be part of the virus. A better term would be search strings. Different antivirus programs[1] will employ different search strings, and indeed different search methods, when identifying viruses[6]. If a virus scanner finds such a pattern in a file, it will perform other checks to make sure that it has found the virus, and not merely a coincidental sequence in an innocent file, before it notifies the user that the file is infected. The user can then delete, or in some cases clean or heal the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viru ses modify their code on each infection. That is, each infected file contains a different variant of the virus. 2.3.3 Encryption With A Variable Key A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting dependent methods and an encrypted copy of the virus code. If the virus is encrypted with the help of different key for each infected file, the only part of the virus that leftovers stable is the decrypting unit, which would (for example) be appended to the end. In this case, a virus scanner will not able to detect directly the virus using signatures, but it can still detect the decrypting unit, which still makes indirect revealing of the virus possible. Since these would be symmetric keys, stored on the infected host. In fact completely possible to decrypt the final virus, but this is almost certainly not required, since self-modifying code is such a scarcity that it may be basis for virus scanners to at least flag the file as suspicious. This may be old , but solid, encryption involves XORing each byte in a virus with a even, so that the exclusive-or operation has only to be frequent for decryption. It is doubtful for a code to adjust itself, so the code to do the encryption as wll as decryption may be part of the signature in many virus definition. 2.3.4 Polymorphic Code Polymorphic code was the first technique that posed a serious threat[27] to virus scanners. Likewise various normal encrypted viruses such as a polymorphic virus[15][16] infects files with an encrypted copy of itself, which may be decoded by a decryption method. In the case of polymorphic viruses or polymorphic worms[10], however, this decryption module is also modified on each infection. A well-written polymorphic virus thus has no parts which wait identical between infection, making it very difficult to detect directly using signatures. Antivirus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has must have a polymorphic engine which is also called mutating engine or mutation engine anywhere in its encrypted body. Some viruses employ polymorphic code in a system that constrain the change rate of the virus appreciably. For example, a virus can be planned to alter only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that previously contains copies of the virus. The benefit of using such sluggish polymorphic[15][16] code is that it makes it more difficult for antivirus professionals to get representative sample of the virus, because tempt files that are infected in one run will naturally have identical or parallel sample of the virus. This will make it more liable that the detection by the virus scanner will be variable, and that some instances of the virus may be able to avoid detection. 2.3.5 Metamorphic Code To avoid being detected by emulation, some viruses revise themselves completely each time they are to infect new executables. Viruses that make use of this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine must be needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consists of over 15,000 lines of assembly language code, 90% of which is part of the metamorphic engine. 2.3.6 Avoiding Bait Files and other Undesirable Hosts A virus wants to infect hosts in order to multiply further. In some cases, it might be a bad idea to infect a mass program. For example, many antivirus softwares perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of antivirus software. Another type of host that viruses[27] sometimes avoid are bait files. Bait files (or goat files) are files that are specially created by antivirus software, or by antivirus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus: Antivirus professionals can use tempt files to take a test of a virus. It is more realistic to store and exchange a small, infected lure file, than to swap a large application program that has been infected by the virus. Antivirus professionals can use bait files to study the actions of a virus and assess detection methods. This is particularly useful when the virus is polymorphic[15][16]. In this case, the virus can be made to infect a large number of entice files. The grimy files can be used to test whether a virus scanner detects all versions of the virus. Some antivirus software employ bait files that are accessed regularly. When these files are modified, the antivirus software warns the user that a virus is probably active on the system. Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of garbage instructions. A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week. 2.4 Vulnerability and Countermeasures 2.4.1 The Vulnerability of Operating Systems to Viruses Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. Microsoft software is targeted by virus writers due to their desktop dominance. Although Windows is by far the most popular target operating system for virus writers, viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. As of 2006, there were at least 60 known security exploits targeting the base installation of Mac OS X (with a Unix-based file system and kernel). The number of viruses[6] for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. Many Mac OS Classic viruses targeted the HyperCard authoring environment. The difference in virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising. In January 2009, Symantec announced the discovery of a Trojan that targets Macs. This discovery did not gain much coverage until April 2009. While Linux, and Unix in general, has always natively blocked normal users from having access to make changes to the operating system environment, Windows users are generally not. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like XP. In 1997, when a virus for Linux was released-known as Bliss-leading antivirus[5] vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows. The Bliss virus may be considered characteristic of viruses-as opposed to worms-on Unix systems. Bliss requires that the user run it explicitly, and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked. 2.4.2 The Role of Software Development Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits. 2.4.3 Anti-Virus Software and other Preventive Measures Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computers memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus signatures. The disadvantage of this detection[32] method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect novel viruses that anti-virus security[7] firms have yet to create a signature for. Some anti-virus programs are able to scan opened files in addition to sent and received email messages on the fly in a similar manner. This practice is known as on-access scanning. Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to recognize the latest threats[27]. One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives. 2.4.4 Recovery Methods A number of recovery options exist after a computer has a virus. These actions depend on the virus. Some may be safely removed by functions available in most anti-virus software products. Others may require re-installation of damaged programs. It is necessary to know the characteristics of the virus involved to take the correct action, and anti-virus products will identify known viruses precisely before trying to dis-infect a computer; otherwise such action could itself cause a lot of damage. New viruses that anti-virus researchers have not yet studied therefore present an ongoing problem, which requires anti-virus packages[1] to be updated frequently. 2.4.5 Virus Removal One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files and does not exist in previous restore points. Some viruses disable System Restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is Cia Door. Many such viruses can be removed by rebooting the computer, entering Windows safe mode , and then using system tools. Many websites run by anti-virus software companies provide free online virus scanning, with limited cleaning facilities (the purpose of the sites is to sell anti-virus products). Some websites allow a single suspicious file to be checked by many antivirus programs in one operation. Additionally, several capable antivirus software programs are available for free download from the internet (usually restricted to non-commercial use), and Microsoft provide a free anti-malware utility that runs as part of their regular Windows update regime. 2.4.6 Operating System Reinstallation Reinstalling any OS is another loom to virus removal. It involves either reformatting the computers hard disk drive and installing the operating system and

Friday, September 20, 2019

Effects Of Globalization On Cultures Cultural Studies Essay

Effects Of Globalization On Cultures Cultural Studies Essay With the economic, cultural and scientific development, globalization has also been greatly affected in these areas. The impact of globalization, peoples life and spiritual have great changes. Globalization process is irreversible, it is a necessary progress of human civilization and has important meaning, which is largely positive. However, there are also many negative effects that cannot be ignored. More evident in the culture, so we cannot allow free development of globalization, we need to retain our own national cultural characteristics, and cannot blindly follow. Design should preserve and promote cultural identity, because this is not only an economic issue, but more of a psychological impact to interior design. For example, we can use the design elements of their characteristics, to make these things integrate into society and more easily be accepted, to better meet peoples spiritual needs. Introduction Globalization is evidence since 1980s, with increasingly prominent in the world, a new phenomenon and that is the basic feature of the present era,. Globalization is our one of the most current topic of discussion, whether you are willing or not, it will affect you on your daily life or you jobs. Under the influence of globalization, we will find that the world is really getting smaller, information about people, economy, and cultural aspects are moving toward globalization. How can we not chase it and shares with the crowd? It has brought us too much influence, which of course has its good and bad aspects in it, we cannot follow or duplicate, it must have its own characteristics, especially in the design, should kept in their original culture and finding a goal to move forward to. 1 Analysis 2.1 The globalization effects in the culture Globalization is an objective development of human civilization process which result from the development of human society and civilization development. The process of globalization has greatly driven the development of global social productive forces, promoted the progress of human civilization. People need to calm down and think about the process of globalization on human civilization that is positive and negative effects arising. Strength of Western civilization led to globalization, many developing countries and regions to enjoy the civilization of Western science and technology while faced with the loss of the local cultural characteristics, as well as the risk of national culture. In addition to the positive effects of globalization, beyond the negative effects cannot be ignored, especially on the impact of Asian culture. Especially the impact on China even cannot be ignored. Globalization has accelerated Chinas economic development, but behind the development, the problems are evident. For example, the rapid development of rural areas have become urbanized, traditional architecture and culture under the influence of globalization because they have been making extensive damage instead of protecting them. A lot of traditional architecture has not been repaired due to their inexistence, those traditional cultural festivals have become very isolate is one example. In China there are many cultural festivals, with the involvement of Western culture, festivals, more and more Chinese people enjoy Western holidays, such as Christmas, Valentines Day, while the traditional Chinese festivals such as the Dragon Boat Festival, Mid-Autumn Festival, etc.. are increasingly be ing left out. With less and less festive atmosphere, if it continues this way is bound to let go of traditional culture, it will be disappeared. Different Cultural in the worlds current characteristics of as exchange and dialogue, if under the influence of globalization with all the same culture, this world would be impossible to develop, and cultural needs of a variety of colors, guiding peoples lives in interior design course, we should keep this point of view, design changes out life, orientation of people, therefore I think that maintaining our own cultural characteristics, in the interior design is also very important. Many people have realized that globalization has brought in many unfavorable factors, and they have already begun to protect those cultural heritages. But as a major power, the Eastern China were lagging behind to many Western. They have long been protecting those old buildings. In 2 addition to those countries we can also see the Russian countryside, and in many rural areas, we do not see a lot of modern architecture being preserved, many places are not very much affected by globalization. This is what many countries would need to learn. The historical cultures and traditions that is being left behind by the ancestors, our future generations should understand and respect those certain awe, the same reasons for as in why we had the Dragon Boat Festival to commemorate Qu Yuan. Traditional culture is the valuable legacy of our Chinese ancestors, those who recorded the history of the text, which reveals the tolerance of the protocol, those who disseminated the teachings of truth, each is worth the same pride of China. It is often questioned whether everyone had inherited and carry forward the lineage of ancestors? When fashion trends spread, we are not paying homage to the Western custom of vulgar cultural fascination with madness, but we should learn to inherit Chinese tradition and absorb its teachings and philosophy. Many people now consider only the immediate economic interests of the various types of construction are operating together for commercial purposes, and they did not take it into considerations of the cultural impact. Nowadays, a growing number of urban people yearning for a more quiet and comfortable life, and often make use of holidays as break time and to relax. The sake of our future in this increasingly urban life can find solace in a spiritual place, we cannot be take into the economic interests at the same time on our cultural life. 2.2 communicate with culture into design With the acceleration of human civilization, human productivity, modern design is very active in all aspects of human life. Materials are relatively abundant, the quality of life people are increasingly high in demands, so design has to meet the peoples material needs and emotional needs, should the heavy responsibility to improve the quality of human life. Prominent feature of modern design is people-centered, attention to human needs and meet functionality, people may enjoy modern design with happiness and relaxation. Building and construction technology have constantly been improving very quickly over the years, new building is being constantly rising. The beauty of public space needs to reflect the cultural connotation, because today people have to spend most of the time to the use of public spaces. The beauty of public space, we need a complete plan, rich in content, aesthetic and noble Chinese 3 elements into the planning and design of public spaces which are a surging trend. Public space is an architectural core. For the movement of people the public space is a hub; for the use function that is a distribution point; for the spatial form that is an expression of architectural character. Eating space as a kind of public space, it occupied a very large place. Take restaurants interior design as an example, under the influence in a globalized economy, there has been a variety of fast-food restaurants such as McDonalds, KFC, etc.., in these restaurants all over the world interior design are the same, I do not want to say that kind of restaurant is bad, but in such a large environment, people tend to feel less comfortable and cozy in the place. The design of a good restaurant should provide enjoyment in the pursuit of economic interests, but also can reflect the colorful side, so the design of my restaurant, I will focus on peoples senses integrated into some of the traditional Chinese elements. Because in the context of Chinas history, it has deeper understanding of cultural life, but also a very good expression in interior design, the use of these things combined with traditional Chinese culture course, to achieve a balance which is moderation between culture and spaces. With the faster and faster of the modern life, western simple style impact on clothing, food, and other aspects. Also in the interior design, it has become a popular trend, but a kind of Chinese elements as part of our culture and tradition should be inherited. In the design of domestic and foreign, Chinese elements began to more and popular in the design concept. We can see many things used of Chinese element as usually in our daily life. The catering industry is an important part of public areas, it has very close connection to peoples lives, Eating food environment have a direct impact on peoples mood if it bad or good and, so I think why not joining the elements of national and the culture together in to the eating environment, so that it will be more grand. Because diet is also a culture, different countries have their own different food culture, under the influence of globalization, various fast food become very popular, We cannot deny that the various business opportunities brought by economic globalization, as the restaurants is moving forward for the purpose of commercial competition, if they can combine their own national characteristics, to create a dining environment more suitable to modern life, and which is most conducive to the long-term future development. Here are two examples to illustrate the traditional culture and environment, the combination of eating produce a better situation. The first case is a restaurant in Hong Kong, named OVOlogue.To restaurant, preserve and reuse the ground floor of the Cantonese verandah shop house built in 19th century,OVO endeavors to convert it into a chic and contemporary looking estery. OVOlogue, a fusion of OVO and dialogue, is a traditional Chinese restaurant filling the air with taste, art and heritage. Through interior design and selective artworks with unique characters, it successfully blends in history and modern Asian art into dining experience. OVOlogue coincides perfectly with the east-meets-west, tradition-meets-modern flavor. Another restaurant called shi shan xuan. East-meet-West is the design concept of this project. The space contains reception area, dining area and balcony etc. The design seeks to preserve and renovate the traditional Chinese style. Grey is the colour of Chinese characteristics and it dominates the dining area. The austere texture of hewn stone and the feminine quality of dining table create vivid contrasts. Interactive layers make for a unique and intimate spatial relationship. Natural lights are introduced in to the dining area and with austere and understated decorations, the interior and the exterior are perfectly integrated. The design represents peopleà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s willing of returning to nature and simplicity, as well as the peaceful and elegant lifestyle. 2.3 relating to design concept Recently, people abandon the illusion of fanaticism, longing for a comfortable life. Especially when people want to get away from the spinning of the world that only brings anxiety and fear, the ancient elements have a mysterious power that gives us the tranquility and calmness, and Sometimes it may not be recognized that the culture of the external forces have so powerful and deep to ones heart.The doctrine of the mean was the most faithful vision along the years in Chinas philosophy of life. The new generation try to achieve a balance between modern and classic that is also an art. Now I will combine the arts of this balance to my restaurants design concept, the use of cultural and natural to achieve this balance and coordination. This balance into the design is not only for aesthetics, but more importantly is to make the dining environment that changes peoples state of mind to be relaxed and enjoyable mood. 3. Conclusion Interior design development to a variety of styles has been the coexistence of diverse age, the 21st century interior design will be in the context of globalization, with a variety of styles. Many new ideas will come in at the same time, consumers are able to accept the different style, people will accept a variety of angles comprehensive design of various forms and styles, not just understand the simple meaning of a simplification. To truly comprehend the fine traditional culture of their own, only through the fusion of globalization, culture and design to compare the essence of the approach to international action, to give the design with a true national significance and quality. We will truly grasp the so-called The more national, the more global that we all know the profound meaning of the design concept. From the international point of view, understanding again, emphasized the concept of nation in the impact of globalization, but also to seek common ground while reserving differ ences, develop and retain something of national culture

Thursday, September 19, 2019

Why Gas Prices Are Rising Essay -- essays research papers

Gas prices rising OR EVEN ABOUT SQUEEZING a few more miles out of each precious tankful. But among the special-edition Ferraris, bizarre Cadillac studies and a whole new crop of gas-guzzling SUVs, not all that many people were talking about cheaper and cleaner ways of getting around. The section of the show dedicated to ‘New Energies’ was a tiny corner on the second floor of Hall 2, behind the stands of the insurance companies. There were exactly two exhibits. The lull is deceiving. Never have so many automakers put as much money and effort into building a greener car. Not entirely without some prodding, mind you. Facing clean-fleet laws in the U.S. and â€Å"voluntary† restrictions in Europe, the industry is committing to cut emissions of its gasoline and diesel-powered cars. Gridlocked Italian cities like Rome and Milan may ban conventional cars altogether from their historic centers. In Tokyo, putting 30,000 natural-gas-powered taxis in the streets has already helped clean up the air. But most of all, carmakers have been whipped into action by California’s Zero Emissions Mandate that requires ten percent of all cars sold in the state to be pollution-free by 2003. Mention green cars, and most people think of some battery-powered buggy that the average driver wouldn’t be caught dead in. Electric cars have been around for decades and never caught on. Their problem: batteries aren’t very powerful, so the car’s speed, range and weight remain strictly limited. The typical result is Ford’s new TH!NK, already on the market in Scandinavia and about to hit a few dozen American dealers as well. The TH!NK is a tiny two-seater with a grubby-looking plastic shell that can go about 50 miles between recharges, at a top speed of 50 mph. A full charge takes eight hours, but costs only 50 cents. With a sticker price of $15,000, the car will win a small market niche at best. If you’re not willing to put up with the performance of a glorified golf cart, there are always standard cars powered by alternative fuels like propane, ethanol or liquified natural gas. Also around for decades, these cars have actually begun to catch on. There are 4 million cars in the world today running on a propane/butane mix, including 1.2 million in Italy alone. Many gas stations offer this cleaner fuel as well, so chances are you don’t have to drive very far for a fillup. GM’s U.K.-based Vauxh... ...drogen in favor of methanol, which is simpler to transport and releases hydrogen fairly easily. Trouble is, methanol leaves toxic byproducts that need to be disposed. BMW uses a different technology, burning hydrogen in a conventional combustion engine. Clean steam comes out of the exhaust pipe. As with any other technology, there’s a fierce battle for the standards that will define our hydrogen fuel-cell future.   Ã‚  Ã‚  Ã‚  Ã‚  So while hydrogen may be what DaimlerChrysler CEO Juergen Schrempp calls â€Å"the great big alternative,† it’ll be a while yet before this technology is mature enough to replace gasoline-powered cars on a grand scale. The first models will roll out in a few years, but they’ll be expensive and hard to find a filling station for. But industry analysts predict that by 2010, the market will be ready; another ten years, and half the cars sold in the world could run on hydrogen. â€Å"Everyone is buying a ticket to the lottery because we all know that whoever wins will win big time,† says Paul Everitt, chief economist at the Society of Motor Manufacturers and Traders. If he’s right, greener cars will start to be a much hotter category at the auto show.

Wednesday, September 18, 2019

Women in Homers The Odyssey Essay -- essays research papers

Homer's The Odyssey Women are important to the plot and overall theme of the Odyssey. In fact, without many of the women there would not be a complex plot to this epic poem. In the narrative and in Greek society women played a variety of roles, as mothers, herons, and many other strong roles yet, they were treated as less significant, and were made to be loyal and submissive to men. The women were required to wait on and sulk for love, as Penelope did for 20 years. In Greek society, the women had very little authority but the little control that they did have was sort of a sexual power, which at times they could use to outwit the men. Obvious examples of this sexual power would be Circe and Calypso. Calypso and Circe however, are not the only examples of women from the text that used this mystifying power. The beautiful nymph Calypso and beautiful witch-goddess Circe had super natural powers, which they each used to make Odysseus their love slave. Calypso had captured Odysseus and taken him to her island, Ogygia, where they had an affair for a while. She used her beauty and she seduced him to control him. Circe used what we would call the â€Å"puppy dog† allure to get Odysseus to have mercy on her and eventually she seduced him in chapter ten. He and his men lived with her for a year. The Sirens, enchanted Odysseus with their singing, their songs put him in a trance, they had this sultry spell-casting power. Throughout the tale, Penelope uses her feminine charm to subtly lead t...

Tuesday, September 17, 2019

Nonverbal Communication Essay

Abstract The goal of this study was to find out if teachers were teaching nonverbal communication in their classroom, and also if it was important to teach nonverbal communication in the classroom. Teachers have a variety of teaching styles, and techniques. Some teachers using nonverbals and some do not. However, sometimes class size, classification levels, and gender can cause teachers to either use nonverbal communication or not. The participants of this study were asked whether or not their teacher use different types of nonverbal communication in the classroom setting. The study found that students said most teachers in their classes use nonverbal communication to teach. This study also provides support of the importance nonverbal communication has when teaching. Nonverbal communication in the classroom: A research about the importance of teaching nonverbal communication Communication in general is the process of sending and receiving messages that enables humans to share knowledge, attitudes, and skills. Although we usually identify communication with speech, communication is composed of two dimensions, which are verbal and nonverbal. Nonverbal communication has been defined as communication, but just without any words. Communicating is not something we can just do without, nonverbal communication especially considering it can never be shut off, unlike verbal communication we are always communicating nonverbally. One cannot not communicate. Nonverbal communication is always around you and impossible to ignore. Research, in many studies, has indicated that nonverbal communication can serve a wide range of functions in human interaction. Nonverbal communication is an essential part of every day life. No matter if at work, school, or even at home, nonverbal communication plays a huge role in life. As Blatner (2002) says, â€Å"Often people cannot understand the impact of nonverbal communications involved in a situation unless it is replayed and figured out† (pg.3). Teachers need to be practicing and teaching nonverbal communication in the classroom everyday, and that by doing so students will become much better communicators. Nonverbal communication strategies are important to the development of an effective educational system. Nonverbal communication should be practiced in more classes than just communication classes, because no matter what major of study you are in communication is always going to be an essential thing to know. Many social scientists have conducted research in the field of nonverbal communication as it affects students and educators. Ritchie (1977) found that seven percent of communication is nonverbal. Voice inflection accounts for 38% of the message, and facial expression, including â€Å"body language,† communicates 55% of the message. Speer (1972) states that because 90% of the total impact of a message can come from nonverbal elements, sharpening nonverbal communication skills cannot help but make a person a better communicator. So why are not all teachers using this method of teaching in the classroom setting? That is one of the questions I would like to answer in my research. This paper will work to determine if nonverbal communication is essential to be taught in the classroom and the importance of the teaching of nonverbal communication. Literature Review Research has been investigated, by many different scholarly researchers, about nonverbal communication and the importance of why it should be taught to students in their learning career. Nonverbal communication can be defined as signing, symbols, colors, gestures, rhythms, and much more. Those are just a few examples that will be discussed (Ritchie 1977). Speer (1972) believes that it is important to know all the different ways to communicate nonverbally and explains all of those ways in the book. Speer (1972) also emphasizes on the fact that in order to communicate, you must first know what nonverbal communication actually is. Pilner, Alloway, & Krames (1974) however compare how humans and animals communicate differently nonverbally and the importance of knowing the different ways, and they also point out how humans and animals can communicate very similarly nonverbally as well. Ethology is the way of studying behavior amongst people. Weitz (1974) refers to ethology as a way to cond uct research, knowing how to study different peoples behavior is essential to know before observing how people act. Visual interactions are also ways of studying nonverbal communication in the classroom, according to Weitz (1974). According to Molcho (1985), nonverbal communication is critical in the classroom setting, especially in interpersonal communication. The most credible messages teachers generate are said to be nonverbal. Duggan (2012) discusses all of the different nonverbal cues and why they are important. For example, he states the importance of facial expressions, gestures, and appearance. Along the same lines Carli (1995), Mayo &Henley (1981) and Thompson (2012) have different articles about differences between men and women and the different thoughts they have on nonverbal communication. He also discusses different research scenarios in which research has been conducted to prove the importance of nonverbal communication, and why men and women communicate differently sometimes. Area of Study Nonverbal communication plays a huge role in the classroom, and how teachers should be using nonverbal communication. (Pliner 1974) This paper is a research intended to help understand why nonverbal communication is so important in teaching, and what those importance’s are. Teachers should be using nonverbal communication everyday, in every course no matter what the major of study is. I want to research to see if teachers are using nonverbal communication skills in the classroom environment, and if so how they are using them. My hypothesis is that yes I believe teachers are using nonverbal communication as a way of teaching in their classroom. If the answer is no however, I will research why teachers are not using nonverbal communication in their every day teaching techniques, and if there are reasons behind why they are not using it. I will conduct surveys in class to see if students believe teachers are teaching enough about nonverbal communication, and if they believe it is important to be learning about. I would ask, does nonverbal communication play a role in the classroom? For instance, is nonverbal communication important in the classroom setting, whether it be how the teacher dresses, lectures, stands, etc. I also want to find out if teachers are teaching enough about nonverbal communication to their students. Are students gaining enough knowledge about nonverbal communication while in the classroom setting? Also, I would like to find out, what is the importance of nonverbal communication. Why should we study this and why do we need to learn this study for our whole careers. Finally, what would a classroom setting be like with zero nonverbal communication? This consists of no eye contact, appearance codes, gesture, or any other kind of nonverbal communication behavior. The following research questions and hypotheses guide the current study: H1: Students believe teachers are using nonverbal communication to communicate with them on a daily basis. H2: There is no difference between what males believe teachers use in the classroom and what females believe. H3: All ages believe the same thing when it comes to how often their teachers communicate nonverbally and how they are communicating this way. RQ1: Does nonverbal communication play a role in the classroom? RQ2: Are teachers teaching enough about nonverbal communication to their students? Methodology Instrument I used the convenience type sampling method. (see appendix A) This is a nonrandom type sampling; in which I used volunteers in my class to take my survey. The survey contained nine questions. Participants were asked nine questions about how their teachers use different nonverbal communication skills to communicate with them. The students were asked to mark yes or no depending on if the teacher used those certain styles of nonverbals while teaching, Students were also asked some demographic questions: sex, classification, and age. I used evidence by Wilmont (1995), about research of nonverbal communication to come up with my research questions. I developed my questions very carefully before choosing what the right questions were to ask. I thought about questions that could be useful to my research and that would help me develop the results I needed in order to prove or disprove my topic. I choose questions that wouldn’t be offensive to anyone, so that everyone could participate . I was trying to find out the significance of nonverbal communication being used and taught in the classroom setting. Participants I had twenty-five students in my research communication class participate in my survey. There were fourteen males and eleven females who participated, however gender doesn’t have much of an affect on my research. The ages for my survey ranged from nineteen to twenty-three years old. All of the students who took my survey were in some kind of communication field. I conducted my survey and distributed it during our class hour, along with everyone else. I distributed my surveys on Thursday October 18th, 2012. I distributed my survey to each member in the class in a row order. I simply passed my survey out row by row to each class member, and when everyone received my survey they began taking it. When the class was done taking my survey they proceeded to the front of the classroom and put my surveys in a pile for me to pick up. I then took a look at all of my results later that night. I made an excel document and went through each individual paper and recorded my results in to excel. I recorded the number of females and males, class rank, and also the answers to my yes and no questions. Results The first hypothesis was concerned with if students believed teachers were using nonverbal communication with them to teach on a daily basis. The hypothesis inferred that students did believe teachers were using nonverbal communication on a daily basis to communicate with them. . This hypothesis was supported. All students answered yes to at least some type of nonverbal communication. The second hypothesis looked at the sex of the students. This hypothesis inferred that the sex of the student was not significant for this survey. This hypothesis was supported. Sex was not significant in the research. Males and females answered mostly the same for every question in the survey. The third hypothesis looked at age of the students. This hypothesis stated that age was not significant in the survey. This hypothesis was supported. After recording all the results, age was not a factor. All of the students came up with mostly the same answers no matter their age. Research question one asked if nonverbal communication played a role in the classroom setting. From my survey, students believed that yes, nonverbal communication does in fact play a role in the classroom, and the survey also showed that numerous amounts of different types of nonverbal communication are being used every day in the classroom setting. Research question number two asked, are teachers teaching enough about nonverbal communication to their students? The question was answered yes by every single student. Students believe that yes there is enough nonverbal communication being taught in the classroom. Discussion The goal of this study was to see if nonverbal communication was being taught in the classroom and if it was important to be taught. Teachers have many different ways of teaching, and many different techniques but the overall outcome was that yes, nonverbal communication is very important in the classroom and that many teachers do use nonverbal communication on a daily basis to teach. Class size, gender, and classification did not really matter in this study. Previous research has also found that nonverbal communication is a very important factor in teaching as well. My study supported previous research, and agreed that nonverbal communication is being taught in the classrooms, and it is important for teachers to teach and use nonverbal communication. Another interesting find was that gender did not play a big part in the overall outcomes. I figured since females tend to notice things more, like proximity, gestures, posture, etc., that females would answer a lot differently than males but that was not true in this case. All students believed pretty much the same things. I was not surprised that students believed nonverbal communication was important because I agree, it is.   After conducting my survey I learned a lot of things from classmates. Some of the things I discovered were, body posture is a very important nonverbal in the classroom. Body posture can tell when students understand the content presented or when they have trouble grasping the major concepts. A student who is slouching in his seat sends a very different message than the student who learns forward or sits erect. I also learned that eye contact plays a very important role in teaching. Teachers often use eye contact in the classroom to decide who is prepared to answer a question, or who has completed a homework assignment. If a student does not want to be called on they will try and have no eye contact with the teacher, and that indicates to the teacher they do not know the answer or wish to not speak. Students also responded that distance is used on a daily basis in the classroom. The teachers are supposed to stand in the front, and the students sit in desks in the middle and back. I also discovered that students would interact more comfortably with a teacher when they are in same vertical plane. Dress being a form of nonverbal communication, I discovered plays a role in every classroom. Teachers dress appropriately for class everyday, as in dress pants, dresses, nice shirts, etc. Effective teaching depends on successful communication. By definition of non-verbal communication without uttering a single word, teachers and students constantly send messages to each other (Thompson, 2012). Limits and Future Study Although my study found a lot of reliable information, there were some limitations. When conducting my survey, although it turned out very helpful, I would have changed the questions and been a little more descriptive with them. For example, I would have not only asked if the certain nonverbals were used in the classroom, I would have also asked when and how these forms of communication were used. Another limitation was class classification. There were a wide variety of grade levels that took my survey, and all teachers in every grade level have a different way of teaching, so I would have tried to get maybe all Juniors or all Seniors to take my survey. I would have tried to have all people who take the same classes with the same teachers to take the survey. Future researchers could look more in to how students use nonverbal [communication to communicate rather than just teachers. I think students use just as much nonverbal communication as teachers do and that would be an interesting research to conduct also. This research was conducted to show the importance of nonverbal communication while teaching in the classroom. Nonverbal communication plays an essential role in the classroom so I believe more studies should be done concerning nonverbal communication. References Carli, L. (1995). Nonverbal behavior, gender, and influence. Journal Of Personality And Social Psychology, 68(6), 1030-1041. Duggan, T. (2012). Nonverbal cues between men and women in the workplace. Hearst Newspapers. Retrieved from http://smallbusiness.chron.com/nonverbal-cues-men-women-workplace- 11424.html. Key, Mary Ritchie. (1977) Nonverbal communication: a research guide & bibliography. Metuchen, N.J.: Scarecrow Press Mayo, C., & Henley, N. (1981). Gender and nonverbal behavior. New York : Springer-Verlag. Molcho, S. (1985). Body speech. New York, NY: St. Martin’s Press. Pliner, P., Alloway, T.,Krames, L. (1974). Nonverbal communication: Advances in the study of communication and affect. New York: Plenum Press. Speer, D. C. (1972). NonVerbal Communication. Beverly Hills, Sage Publications. Thompson, J. (2012). The science and fun of nonverbal communication [Electronic Version]. Are man and woman equals in nonverbal communication? Weitz, S. (1974) Nonverbal communication: Readings with commentary. New York: Oxford University Press. Wilmont, W. (1995). Relational Communication. New York: McGraw-Hill.