Monday, September 30, 2019

Sociology 101 Study Guide Exam 4

Deviance 1) defining deviance is difficult and subjective (sociologists don’t agree). 2) for our purpose deviance must A) violate significant norms. B) Result in negative evaluation for reaction. 1) Conflict theory. – stress that the power elite uses the legal system to control worker and to stabilize the social order, all with the goal of keeping itself in power. The poor pose a threat, for if they rebel as a group they can dislodge members of the power elite from their place of privilege. To prevent this, the power elite makes certain that heavy penalties come down on those who’s crimes could upset the social order. 2) Functional theory- Argue that crime is a natural part of society. Stress that the sociall classes differ in opportunities for income and education, so they differ in opportunities for crime. As a result, street crime is higher among the lower social classes and white-collar crime is higher among the higher social classes. The growing crime rates of women illustrate how changing gender roles have given women more access to what sociologist call â€Å"illegitimate opportunities. † 3) Social foundations- Labeling Theory-questions who applies what label to whom, why they do this, and what happens as a result of this labeling.The significance of reputations, how they help set us on paths that propel us into deviance or that diver us away from it. Anomie Theory-concept developed by Emile Durkheim to describe an absence of clear societal norms and values. In the concept of anomie individuals lack a sense of social regulation: people feel unguided in the choices they have to make.Differential Association-a theory developed by Edwin Sutherland proposing that through interaction with others, individuals learn the values, attitudes, techniques, and motives for criminal behavior (how people learn to become criminals).Crime 1). Elements – 2). Categories- Mental illness 1) Dr. Thomas Szasz – mental illness are neither mental nor illness. They are simply problem behaviors.2) Rosenhahn study-A study done proving â€Å"it is clear that we cannot distinguish th e sane from the insane in psychiatric labels might be a solution and recommended education to make psychiatric workers more aware of the social psychology of their facilities. In this study 8 â€Å"mentally healthy† people took hallucinations attempting to gain admission to 12 different psychiatric hospitals in five different states. All were admitted and diagnosed with psychiatric disorders.After admission they acted normal again and told staff they felt fine, all were forced to admit to having t a mental illness and agree to take antipsychotic drugs as a condition of their release. All but one was diagnosed with schizophrenia. The second part of his study involved an offended hospital challenging Rosenhan to send pseudopatients to its facility, which its staff would then detect. Rosenhan agreed and in the following weeks out of 193 new patients the staff identified 41 as potential pseudopatients, with 19 of these receiving suspicion from at least 1 psychiatrist and 1 other staff member.In fact Rosenhan had sent no one to the hospital Substance Abuse1) Types of drug use-2) Social policy-3) Conflict view-Individuals and groups in society struggle to maximize their share of the limited resources that exist and are desired by humans. Given that there are limited resources, the struggle inevitably leads to conflict and competition. These struggles can lead to changes in institutions and societies as different groups come into power. Social control- The techniques and strategies for preventing deviant human behavior in any society.1) Formal- Expressed though law as statues, rules and regulations against deviant behavior. Usually carried out by those in a position of power and/or authority such as a police officer, judge, or principal of a school.2) Informal- Denominates customs, traditions, norms and other social values inherited by the individual. Informal sanctions may include ridicule, sarcasm, criticism and disapproval. In extreme cases sanctions may in clude social discrimination and exclusion. Prejudice- An attitude or prejudging, usually in a negative way.Discrimination1) Individual- Treatment or consideration of, or making a distinction in favor of or against, a person based on the race, class, group, or category to which that person or thing belongs rather than on the individual.2) Institutional- The unfair, indirect treatment of an individual embedding in the operating procedures, policies, laws, or objectives of large organizations. Can occur without conscious cause, is often subtle and nearly invisible, reinforced by the interrelationship of social institutions.Example- jobs not hiring people under the height of 5’4† which eliminates most Mexicans and women, or in other countries women aren’t allowed to participate in some religious activities or government. Post-Industrial Society- Society based on information, services, and high technology, rather than on raw materials and manufacturing.Economic System s1) Capitalism-An economic system characterized by the private ownership of the means of production, the pursuit of profit, and market competition.2) Socialism-An economic system characterized b the public ownership of the means of production, central planning, and the distribution o goods without a profit motive. Genocide- The attempt to destroy a group of people because of their presumed race or ethnicity (ethnic cleansing). Minority-People who are singled out for unequal treatment and who regard themselves as objects of collective discrimination. Plessey vs Ferguson- Decision by the US Supreme Court that confirmed the principle of â€Å"separate but equal† and minority segregation.Brown vs Board of Education-This case took on segregation within school systems, or the separation of white and black students within public schools. Up until this case, many stats had laws establishing separate schools for white students and another for blacks. This landmark case made those laws unconstitutional. This case set the foundations for the civil rights movement. Exploitation Theory- occurs when one social group is able to take for itself what is produced by another group.The concept is central to the idea of social oppression, especially from a Marxist perspective, and can also include noneconomic forms, such as he sexual exploitation of women by men under patriarchy. Amalgamation-(melting pot) all groups should combine their traditions calues and characteristics with one another to create a new group. Assimilation-The loss of a subaltern group’s native language and culture under pressure to assimilate to those of a dominant cultural group.Contact Hypothesis-This is the principle that brings people together who are in conflict (or where one is bullying the other), the conflict will subside as they get to understand one another.Power1) Authority-Power that people consider legitimate, as rightly exercised over them; also called legitimate power.2) Tradition al-Those who exercise authority do so because they continue a tradition and support the preservation and continuation of existing values and social ties. For example Queen is Head of States in Britain, a position she inherited on the basis of traditional rules of succession for the monarchy.3) Rational Legal- Those in authority give orders (and expect to be obeyed) because the office they fill gives them the right to give orders. Anyone who fills the same position has the right to issue orders. Orders are only to be obeyed if they are relevant to the situation in which they are given. Example, a teacher orders â€Å"complete your homework by Thursday† the order is expected to be obeyed, but if the same teacher asked the student to go get her milk from the store, they wouldn’t be expected to obey.4) Charismatic-People obey because of the personal qualities of the person doing the telling. Well-known charismatic figures include Jesus Christ, Hitler, and Chairman Mao. How ever, charismatic figures may arise in any social grouping and such people assume positions of authority over others on the basis of personal qualities of leadership b other group members.5) Coercive-People forced to do as they are told under threat of punishment. For example a prison or a school classroom.6) Renumerative-Power rest on the material means provided by money or some other reward which the members desire and the organization controls. Government-Political authority; a group of people who have the power to make and enforce laws for a country or area.1) Monarchy-A state or nation in which the supreme power is actually or nominally lodged in monarch. The head of state is often for life or until abdication.2) Democracy-Have the consent of the people. The officials xercising power have legitimate authority because they have been elected, and the mechanism for changing the government is through peaceful and regular elections.3) Oligarchy-Political power effectively rest with a small, elitre segment of society. Greek for â€Å" few rule†4) Totalitarianism-The state regulates nearly every aspect of public and private behavior.5) Dictatorship-A government headed by a dictator or more generally any authoritarian or totalitarian government. Power Elite-C. Wright Mill’s term for the top people in U. S. corporations, military, and political who make the nation’s major decisions. Types of Work-

ESL teaching methodologies

The techniques and approaches found in TESOL differ dramatically from those of other areas of teaching because of its student centred and dynamic nature. Furthermore, since TESOL takes place in a multicultural environment; that is, the ESL classroom, intercultural aspects should also be considered, addressed, and ideally, taught. As a result, the cultural diversity found in TESOL and the interactive nature of this field of teaching has an impact on the way language is presented and practised.According to the online articled Why to activate your ESL students' Background Schema, published by Laura Greenwood (2011) on bridgetefl. com, â€Å"it is important to activate your students' experiences with and knowledge of the topic of the listening/ reading†. By activating students' schematta, the teacher is not only directing the students into the topic and creating interest in it but also encouraging them to use language in context.Additionally, experienced and creative ESL teachers may be able to pre-teach contextualized vocabulary whilst activating students' schematta because any unknown lexical items found in listening and reading passages are in fact related to the topic of the text/listening, so the teacher has a context to teach (elicit) these words. Another important strategy adopted by ESL teachers is language elicitation.Rather than introducing a word by saying: â€Å"this is a word and that is what it means† or teaching a grammar point by simply telling the students its rules and form, TESOL teachers often use an essential technique called elicitation, through which students can be involved in the process of discovering and understanding anguage; that is, the teacher uses different techniques to elicit lexical items or grammatical structures that they want to introduce to their students.However, it is usually the case that ESL learners may not know the word or grammatical item that the teacher is trying to elicit, but they will at least know th e concept of the linguistic item intended to be taught, which is still relevant, because knowing the concept of a word or grammar point is considered to be as important as knowing the form. Eliciting† (2009, section 4) states that there are cultures where students are more sed to a teacher centred way of knowledge instruction, which means that they see the teacher as the only person who has the authority to provide knowledge, therefore when eliciting language, TESOL teachers should consider the fact that students from these cultures are less likely to actively participate when the class are asked open questions (who can tell me†¦? Does anybody know†¦? ), and instead try to nominate students to answer questions more often. In fact, the ideal ESL teacher is described by Harmer, J. (2007, p. 08) as â€Å"one who is democratic rather than autocratic, and one who fosters learner autonomy through the use of group work and by acting more of a resource than a transmitter of knowledge†, which contradicts the role of the teacher in many cultures, where they are seen as the sole provider of knowledge.However, when activating schematta and eliciting language, which are essential techniques adopted in TESOL, the students' input is vital, and in order to achieve that, different teachers with different personalities and teaching styles use different techniques to It is common knowledge that language and culture are interrelated, and through the language, English in this regard, ESL learners can, or ideally they should, acquire intercultural knowledge in order to communicate more competently. With this concept in mind, Ability English – an ELICOS centre in Sydney – included an intercultural communication program in their syllabus.Nicholas Kirk, who is the director of studies and designed the course, argues that â€Å"it is almost impossible to teach language in isolation from culture†, therefore he believes that cross-cultural ommun ication should be taught in order to help ESL students use their language skills more effectively. Role plays, group activities, reading and listening passages, videos, among other resources and types of activities can be used to practise language skills (speaking, listening, reading, writing) and other linguistics elements, such as grammar, lexis, and pronunciation, while training students so that they can achieve intercultural competence.In other words, ESL teachers can raise students' awareness to cross-cultural areas, including eye contact, personal space, body anguage, face-saving, individualism and collectivism, and concurrently, or possibly subsequently, use the contextualized content to practise and/or introduce language, enhancing not only their students' language skills but also their interpersonal and interactional effectiveness.Having the language skills is undoubtedly necessary in order to be in contact with people from different cultures, but understanding such culture s is also important in this globalized world, especially in the workplace, since the ultimate goal of ESL learners is to be able to use English to successfully ommunicate with people from other cultural backgrounds. Considering the fact that TESOL allows more flexibility than in other fields of teaching, and that language is a vital element of culture, linguistic and cross-cultural aspects may be taught in conjunction by ESL teachers.In sum, I would like to stress that the teacher's knowledge of the linguistic items being taught is unarguably important in TESOL, as it is in all areas of teaching; however, in the ESL teaching context, it is equally important to use a variety of ethods and strategies to get the students to actively participate in their learning process, since the ESL classroom is an environment where the focus is on the students, rather than on the teacher, resulting in more STT than TTT, which is a primary concept in TESOL.ESL students have one goal in common: to lea rn English to be able to communicate with people from different cultures, but due to multicultural nature of ESL classes, TESOL teachers need to be culturally sensitive, and if possible, in addition to teaching language, devote some time to training their students to be ore inter-culturally competent to help them use language in a multicultural context more effectively.

Saturday, September 28, 2019

Of mice and men theme power Essay

By examining the relationship between the protagonist geroge and lennie , and the relationship between curly and his wife, this response will attempt to argue that indeed the only power others have over us , is the power we give them. this response will also attempt to examine techniques and description to make and shape meaning in the world of this novel. How Power is Presented in Of Mice and Men The theme of power in Of Mice and Men is presented by Steinbeck in a variety of ways, including characterisation, dialogue and imagery. The main themes of power in the novella include physical power, seduction and the power of hierarchy. The theme of physical power is mainly represented through the character Lennie. The power of seduction is shown through Curley’s wife. Whereas the power of hierarchy is portrayed through the Boss, Slim and Curly. In the novella Of Mice and Men, Steinbeck presents physical power through the character Lennie Small. Lennie is a huge character, with immense physical strength. We can deduce this, from the opening description â€Å"A huge man† . The description here has foreshadowed Lennie’s physical stature and strength. His physical power, is a recurring theme throughout the novella. It is again shown, when George talks to Slim about his previous life with Lennie, â€Å"coulda bust every bone in my body†. Here through the use of dialogue, the reader is shown the physical power Lennie has over George. It is ironic, that even though Lennie has the advantage of physical power. George is the more dominant one. We can see this, by the way George reprimands Lennie for disobeying instructions, â€Å"you wasn’t gonna say a word†. This dialogue, foreshadows Lennie’s lack of mental power, to follow George’s instructions. Curley, The Boss and George are all connected because they have power over someone. In the Novella, The boss is in control of everything. Also he answers to no one. â€Å"Hey, what’s your stake in this guy†. This dialogue is between George and The Boss, he is questioning George on his power over Lennie. This quote shows that he can control who works for him and who doesn’t. He can fire someone just be cause he doesn’t  like them.

Friday, September 27, 2019

Estate Redevelopment Program of Brownfield Site in US Essay

Estate Redevelopment Program of Brownfield Site in US - Essay Example The existence of these incentives programs is made possible by the sole fact that the Brownfield program can help in boosting tax revenue, creating jobs, reducing environmental hazards, promoting general economic health and cleaning up neighborhood eyesores. Without a doubt, real estate redevelopment in any country is a complex undertaking. It doesn’t matter whether the land in question is either clean or contaminated, bottom line is that the processes of assembling land, financing, and planning of redevelopment encounters many challenges. There have been different responses to the reuse of contaminated property due to political, cultural and economic differences. Each nation has a different approach to Brownfield since it shaped by the degree to which it is burdened by properties which are contaminated, as well as other factors such as population density, land availability, historic preservation objectives, and other governmental priorities. But given the diversity of America n States and towns, these tools and approaches- to be modified as needed- may provide new ideas to practitioners within the United States. ...BEDI grant funds are emphasized on a particular use and primarily targeted for use on the redevelopment of Brownfields sites in economic development projects and the increase of economic opportunities for low and moderate income persons as part of the creation or retention of businesses, jobs, and increases in the local tax base. The stimulus for private sector parties and local governments to go on and foresee the redevelopment is the BEDI funds. They as well as continue phased redevelopment on brownfield sites where either potential or actual environmental conditions are known and there is an existence of redevelopment plans. There is an emphasis by the HUD on the use of BEDI and the section 108 loan guarantee funds to finance activities and projects that have the ability to produce results after a short while and bring about economic benefi ts. Applications on whose scope is limited to factors such as site acquisition, no immediately planned redevelopment or remediation are not encouraged by the HUD. Through the BEDI funds, enhancement of security and improvement of the viability of a project especially if it is financed with a new section 108 guaranteed loan commitments. The BEDI program is seen as a possible way to spur the return of brownfields to productive economic use through financial assistance to public entities in the redevelopment of brownfields. It as well enhances the security and improvement of the viability of a project which has the financing of section 108 guaranteed loan authorities. Hence, due to this, the BEDI grants must be used in conjunction with a new section 108 guaranteed loan commitment.

The elemments of the funds of knowledge Essay Example | Topics and Well Written Essays - 250 words

The elemments of the funds of knowledge - Essay Example The information learned from teachers about their students is the student’s funds of knowledge. The paper captures the elements of funds of knowledge. According to this concept, many families had much knowledge that the learning institutions did not know about and were unused. Researchers realized that there were rural households having some technical and entrepreneurial skills. Each family had some knowledge to share with the rest of the families. Therefore, the sharing of information creates a network that when harnessed can be a precious intellectual resource. The concept advocates that the teachers have a role in developing effective instructional approaches that enhance learning. Additionally, teachers must use activities that involve students as thoughtful learners in a socially meaningful task. In conclusion, the researcher behind this concept urges teachers to create their social networks of providing help to one another in taking advantage of the community resources. The student’s reliance on the teacher grows steadily while the resources in the community continuously become scarce. In employing the concept, teachers will have a better opportunity in helping minority and bilingual kids achieve authentic literacy. Hence, they will foster a sense of togetherness in the community and bestow an efficient system of

Thursday, September 26, 2019

The Television Action Program And Provide Methods to Strategically Essay

The Television Action Program And Provide Methods to Strategically Position - Essay Example The rotary is divided into three categories namely, Rotary Club, Rotary foundation and Rotary international (Rotary International, 2013a). The Rotary club is dedicated towards bringing together individuals from different facets to build relationships, exchange ideas and take necessary actions to improve the program. The international clubs work by providing support to other rotary clubs situated across the globe. This is done by coordinating the campaigns, initiatives and global programs. The rotary foundations use donations in order to fund various projects by community partners as well as rotary members across the globe. Generally, these findings are voluntarily contributed by members, friends as well as willing third parties. The club has also successfully made many partners over time. Some of them include Centers for Disease Control and Prevention, World Health Organizations, United Nations, Shelter Box and Mercychips (Rotary International, 2013c). History and success People star ted bidding and buying services and products from the Rotary Auctions and soon it had gained popularity. Since then, Rotary auction programs were even known as commercial enterprise, another store and such. Many broadcasters started identifying the Rotary club as a good investment as well as promotional strategy (Rotary International, 2013b). The auctions were a perfect fit for the people living in suburban areas. Household antics such as, old books, knickknacks, designer goods and conversation pieces, were the first to be disposed off (Smith, 2002). This was followed by old furniture, consumer durables and other household equipments, which were about to be replaced by new ones. Retailers also took this... This paper approves that the primary goal of this project was to evaluate the current strengths and weaknesses of the online auctioning program of RCWS at Windsor. Through primary and secondary research, it was found that the television auction program has been popular and preferred due to lot of factors. It is one of the earliest methods of bidding process after the emergence of television. Before that, bidding process used to happen in one place and very few people were able to participate in the process. Looking at the current marketing trend as well as the changing demographic profile, a mixed approach can be implemented. This paper makes a conclusion that with the advent of online world, the popularity of auctioning programs has started to decrease. Now sellers as well as buyers are more interested in online or internet auctioning because of its efficiency as well as promptness. Television auctioning took place over the telephone which was the major channel. At present, majority of the population owns internet and prefer online bidding. Thus, it has become extremely important to evaluate strategies as well as alternatives in order to revive the television auctioning program. There are two alternatives that had been suggested for the rotary club. Firstly, fostering of partnerships with other local clubs and the secondly, introduction of online bidding process. The recommended approach suggested a mix of both the approaches, which requires strategically implementing each plan during specific part of the year and to specific target segments.

Wednesday, September 25, 2019

Management 100 assessment Essay Example | Topics and Well Written Essays - 1500 words

Management 100 assessment - Essay Example To expedite training, several professional chefs and executive leadership will perform a series of training programs to familiarise the staff with Italian cooking procedures, ingredients lists and how to conform to Volare administrative guidelines. This report highlights the current political, legal, socio-cultural and technological environments in India as part of the business’ comprehensive SWOT analysis to determine whether India is actually a viable business opportunity. The report aims to identify the current business environment in India as well as offer recommendations as to how to proceed in this potential business expansion. India is a developing democracy led by the United Progressive Alliance, a regime in control by electoral process (accessdemocracy.org, 2007). This emerging democracy is similar to that of Australia in which the people are given significant freedoms and are not ruled by a governmental authority which demands subservience. Because there is no research evidence which suggests that there are on-going feuds between parties attempting to gain control over the country, Volare Restaurant will experience no business interruption due to violence or other negative consequences as a result of aggression. The government appears to be relatively stable overall. A great deal of India’s current economic success comes from foreign direct investment, suggesting a country which has very liberal policies regarding the expansion of foreign businesses into the country. India is a booming economy which has many sectors that are funded directly by different venture capitalists (Rangaswami, 2008), with no research evidence suggesting that government entities attempt to regulate the flow of international business into India. The lack of governmental regulation regarding new, international businesses represents a

Tuesday, September 24, 2019

Motivation in the Workplace Research Paper Example | Topics and Well Written Essays - 750 words

Motivation in the Workplace - Research Paper Example According to Maslow’s theory on the five levels of employee’s needs, these would be physiological, safety, social, ego, and self-actualizing. In this theory, he put emphasis on the need to satisfy the lower level needs first before the higher levels to get utmost motivation at work (K., & of, y. t. (1987)). Thus, this goes to show that one needs to work on physiological needs first before one reaches self-actualization which is the highest motivational factor in the workplace. To be able to understand the theory more, let us apply this in a more practical term by getting to know what really is one’s goal for work. Practically, people work to earn money (Heathfield, M.(n.d.)). This is because of the fact that to be able to get motivated at work, one needs to see how work provides for their family and loved one’s such as food, home, leisure, and etc which are physiological needs that man need to be satisfied with. However, though this is one thing that easil y motivates one to go on each day working, making money as your center inspiration for work will not get you motivated for long especially when things go wrong at work or you feel like you are not getting the compensation that you deserve which is unavoidable in the work place. That is why, the key to getting a more powerful motivation at work is from something that you would not rely on anyone to give you, such as perhaps your passion and love for what you do or the self-fulfillment you get from doing what you do best at work. Thus, this goes to show that motivation in the workplace really begins with self, loving the career path you have chosen which is something that will give you every reason to go to work every day. However, there are other factors that would contribute to being motivated at work which will enable you to stay happy in your chosen job. Some of which are to feel belongingness with your peers at work and to have a great relationship with them which will make work seem a lot lighter, the opportunity of growth and learning, and leadership opportunities where you are able to set goals and have a team support it (Heathfield, M.(n.d.)). We all know that a part of man’s nature is to be able to feel belongingness to a group, have that certain kind of support system, and to be less of an island at work which will make more of an interesting routine. Indeed, aside from relying on self to get you motivated at work by choosing to do something that you love is to get motivation from your work environment and the people that surrounds you. Another side of the work towards getting utmost motivation on the so called job routine everyone is in would now rely on one’s boss or manager. This is because of the fact that one of the people in the workplace that really has an effect to every employee’s performance and attitude towards work is the boss (Employee motivation: Motivation in the workplace- theory and practice. (n.d.)). We all know that each boss would give you a distinct kind of relationship and training which would affect greatly on how you are at work. Thus, we get to know the reality of the need to have motivation programs in the workplace to help people work altogether for a certain goal where the best way to start for bosses to be able to do so is to understand human nature itself. How? Well, as human needs are a huge part of human nature, one

Monday, September 23, 2019

Family Related Issues Assignment Example | Topics and Well Written Essays - 1250 words

Family Related Issues - Assignment Example Department of Labor, 2010). Logically, if a loco parentis is a suitably related person to the employee to qualify for care under the FMLA, then a biological father, regardless of the quality or quantity of his parenting, qualifies. Legally, the law designates â€Å"biological† parent, but that brings up an interesting dilemma: what about a biological parent who gave up his/her child for adoption? In recent years, many adopted children have found their biological parents, or vice versa. Does the parent who relinquished his/her rights as the child’s parent qualify as a parent under the FMLA? Taking the law literally, s/he does because s/he is the biological parent. However, a judge may not interpret the spirit of the law in that way. The caveat for such tenuous relationships between employee and parent is the fact that the employee must document his/her relationship with the parent before taking family leave. In the same paragraph of the FMLA that defines the relationship s eligible for family leave, section j, titled â€Å"Documenting relationships,† it says, â€Å"For purposes of confirmation of family relationship, the employer may require the employee giving notice of the need for leave to provide reasonable documentation or statement of family relationship. This documentation may take the form of a simple statement from the employee, or a child's birth certificate, a court document,  etc.  The employer is entitled to examine documentation such as a birth certificate,  etc.† (U.S. Department of Labor, 2010). It seems as if the employer could demand some sort of unrealistic documentation of the eligibility of parent or employee to qualify for the family leave especially if time was an issue (i.e., the parent was dying), so if an employer wanted to prevent an employee from taking family leave, s/he could be in compliance with the law, but just unreasonable about the proof of the right to do so. That would probably discourage mos t employees from attempting to take family leave. 2. Explain whether the size of the business can have any effect on whether Tony is eligible for family leave under the FMLA.   The size of a business does matter. In the video, â€Å"Family Related Issues: Family and Medical Leave Act,† in response to Tony, the employee’s verbal request for leave, Herman, the boss, replies, â€Å"That's out of the question. This is a small business. Everyone is crucial.†Ã‚  Tony answers, â€Å"Small? You've got more than fifty employees, if you count everyone.† Herman counters with â€Å"Not full-time employees.† In Herman’s mind allowing Tony three weeks for family leave would cause him to lose money. He has just praised Tony for being the top salesman (Family and Medical Leave Act, 2004). However, Herman is wrong. Not all employers are required by federal law to allow family leave, but those with 50 or more employees are. Paragraph 825.105 of the FMLA giv es a lengthy description of how an employer, by virtue of the number of employees s/he employs, must comply with the federal law. Some of the more obvious characteristics that make an employer obliged to comply is the location of his/her business. That is, it must be within the United States or

Sunday, September 22, 2019

Hoosiers Essay Example for Free

Hoosiers Essay ‘Hoosiers’ is a sports film made in 1986 about a basketball team of high school of a small town in Indiana. The film represents a time during 1952 when every high school in Indiana used to compete in one or the other state championships. The film is based on the new coach of the basketball team, Norman Dale who in fact has a past with a spot and has been out of the game for nearly more than a decade. The people in the town are adamant to fire him because they are not sure about the coach, not at all trust him and also dislike his coaching style. Despite all these opposing, Coach Dale sets himself focused and finally brings the whole team together and helps it to win the state championship and at the same time wins the heart of the people too. Coach Dale explains to the team members that it becomes necessary to apply different leadership styles in different situations. One of the styles that help the team members to unite and win the championship is authoritative style. Initially, in fact immediately in his first interaction with the team members, Coach Dale applies this style on them and asks Ray to keep out of the game just because he didn’t follow his instructions word by word. The movie is of course about a high school basketball team but it depicts that a person’s leadership and right directions can lead even a community and if one were focused on his goal, he would definitely achieve it. Authoritative style is, in fact, uniting the members of the team by focusing on a common goal that has to be achieved but here the members are to follow the instructions of their leader on the way of achieving the goal. But in this movie it was not only the leadership style but also lot of other characteristics of Coach Dale like his optimism, self-confidence, farsightedness, enthusiasm, toughness and of course motivation, that helped the team to win and follow his instructions. There are times when authoritative style of leadership seems to look like dictatorial or bossy but it best fits in situations when the leader has the best knowledge and experience as compared to other members of the team or when time limit is less for the group to take decisions. Authoritative style of leadership becomes important when the goal is common but the group members are not very sure about the ways to achieve it but the leader has a concrete idea, which if followed there is maximum chance of achieving the goal. The whole and sole responsibility lies on the leader’s shoulders and he or she must have the expertise and should possess all the basic and detailed information to handle the situation. In the movie, Coach Dale has his goal focused and applies this style of leadership most of the time because he has the self-confidence and farsightedness in him along with the experience of the game much more than the other members of the team. Initially his players don’t listen to him and two among them even walk away because they don’t trust him and to follow someone it is very important to have faith in his words. The movie focuses on the significance of determination and importance of right leadership in not only a basketball game but in life too. When it becomes difficult to  achieve the target in life and you have someone who has the confidence and expertise to guide you, you must follow him and trust him.

Saturday, September 21, 2019

British Armed Forces

British Armed Forces Management now are aware of the importance of employees, hence using the correct recruitment and selection methods are crucial part of management functions. The success of any organisation depends largely on acquiring the right balance of employees, with the right skills and abilities. Most companies have an established personnel department responsible for   this function. (Armstrong, M. 2009) Poor recruitment and selection techniques can result in rise in cost, lower morale, and a rise in labour turnover. As a result of these, the aim of management is to reduce cost and maximise productivity. This assignment looks at recruitment and selection methods used in the British Armed Forces, selection methods, reliability and validity. (Noe, R.A. et al, 2004) However, interviews and its benefits and types are also dealt with in details. The different types and drawbacks of test, and government legislation form the basis of employment and organisation has to follow set procedures as such. These are all discussed in subsequent chapters. (Noe, R.A. et al, 2004) This assignment focuses on recruitment and methods of selection processes. These systems may be the first formal interaction which candidates have with the organisation. Their impact may extend across a range of stages in the pre-employment relationship with the organisation, not only during the initial attraction, the selection process and the offer of employment, but also in the subsequent attrition, and decision by existing staff to leave.   Example Toyotas recruitment and selection practices are tailored to find the best possible applicants to hire. (Beardwell, J., and Claydon, T. 2007) 1.2 Recruitment and selection in the British Armed Forces The British Armed Forces described recruiting as the measures taken in order to attract a pool of candidates for selection. Recruits are then taking in for training in order to prepare them for their careers in the Army. The training is a continuous process throughout a soldiers career. (www.armedforces.co.uk, 2011) 1.2.1 Army Recruiting and Training Directorate (ARTD) This body is in charge of the step by step progress of potential recruits from the initial recruitment through to the selection process, specialist training and deployment in the army field. (www.armedforces.co.uk, 2011) The ARTD has an estimated annual budget approximately  £700m in which they have enlist 13000 potential candidates, and train 100000 soldiers and officers. The ARTD functions operations are categorised into three phases; such are, general training, Specialist training and Career training. (www.bbc.co.uk, 2011) 1.2.2 Soldier Selection The selection process requires all potential recruit to do an entry assessment at the Armys Careers Office.   Here potential recruits will undertake a touch screen British Army Recruit Battery (BARB) test, psychometric test all computer based designed to see which area in the Army is best suited for the recruit. The tests also include a numeric and literacy test.. (www.armedforces.co.uk, 2011) Candidates who successfully passed both the tests and interviews will be booked for further test. This test is normally a two days course at an Army Development and Selection Centre (ADSC). Here candidates will undergo a thorough medical examination, physical assessment tests, and fitness checks to determine the suitability for an Army career. (www.armedforces.co.uk, 2011) At the end of the two days course, candidates will be informed whether they are success or not, hence, if successful candidates can be given a place in any of the trade they wish to undertake, a Phase 1 training, which is a 14 weeks course, designed to give candidates all the required skills to be a soldier.   At the first day of training, recruits will formally enlist in the British Army, and Phase 2 specialised training will begin at the Army Training Regiment, Pirbright, Surrey. (www.armedforces.co.uk, 2011) 3.1 Methods of Selection Selection is the process of identifying the suitability of applicants from a given pool of candidates. The main reasons of carrying out selection are: (Dessler, G. 2011) To gather relevant information about jobs, applicants and organisations in order to ensure a better quality decisions. To change information and predict future behaviour To facilitate cost-benefits for the investment made in an employee To check, recruit and place job candidates in the best interests of organisation and applicants. (Dessler, G. 2011) 3.1.1 Reliability For employers to ensure that selection has been free of any kind of bias the reliability of the tests has to be demonstrated. Reliability refers to the logical coherence of scores collected by the same person when tested over time on the same test. If test outcomes are not consistent, it will be unethical to take any measures on the basis of the test.   It shows the extent to which similarities or differences in scores could be associate with errors. Dunnette (1966) has identified four sources of errors. (Mathis, R.L. and Jackson, J.H. 2007) Errors due to inadequate sampling of contents indicating that the items for the two tests may have been slightly different. Errors due to chance response tendencies indicating guessing or random responding to the items. Errors due to changes in the testing environment indicating the effect of physical conditions such as light, temperature, time of the day. Errors due to the changes in the person taking the test indicating the influence of health, fatigue, mood, and practice. The different types of reliability can be found in the appendix sections. (Mathis, R.L. and Jackson, J.H. 2007) 3.1.2 Validity This is the most important requirement of a test. Validity means degree to which a test measures what it claims to measure. A test with a high validity means it is nearly comparable to the tests objective. A test with a weak validity means it does not measure what it intend to measure. As a results, there is no prove to use the test outcomes for their primary objective. There are different ways to establish the validity of a test. The different types of validity can be found in the appendix sections. (Legge, K. 2004) 3.2 Ability Tests These are designed to measure individuals capabilities to carry out a task in a specific and unique manner. There are many different types of ability test; (Milmore, M. 2003) 3.2.1 Cognitive ability tests This measures a persons thinking, memory, reasoning, verbal and numerical capabilities. This can be used to show applicants knowledge of terminology and concepts, word fluency, comprehension, spatial orientation, conceptual reason, general and mutual ability. Organisation should ensure that these tests determine cognitive abilities than a job related. (Armstrong, M. 2009) 3.2.2 Physical Ability Tests This measures what a person can do with his/her strength, endurance, and flexibility. For example 1, the British Armed Forces uses this type of test to assess new recruits to ascertain the suitability for a career in the Army. (www.thearmedforces.co.uk, 2011) Another Example 2 is Ford Motor Company, where line workers regularly lift and carry equipment, climbs ladders and performs other physical tasks.(Mathis, R.L. and Jackson, J.H. 2007) Another example 3, Township Fire Department also uses physical ability test (PAT) in assessing potential applicant and highlighted the importance of physical fitness of fire fighters. (Armstrong, M. 2009) Example 4 Portland police bureau uses this to determine the suitability of professional police officers. (Armstrong, M. 2009) 3.3 Personality Tests This is a unique mixture of individual characteristics that can affect how an individual interacts in his/her work environment. As a result, a large number of organisations use different personality tests that determine the extent to which applicants characteristics suits specific job criteria. (Torrington, D., Hall, L., and Taylor, S., 2008) Example 6, the Finish Line, a large retail chain specialising in sporting products, offers job applicants a web-based test which evaluates their personal tendencies and test scores are use to group individuals for the hiring decision. (Mathis, R.L. and Jackson, J.H. 2007) Another example 7 is Blockbuster and Sports Authority also uses similar tools in their pre-employment screening. (The Economist, 2011) Example 8 a California based technology firm also found that the use of personality tests enhanced the selection decision made in the company. (Financial Times, 2010) 3.4 Assessment Centres This consists of various selection techniques, and group selection methods which are considered as a major element, as with work simulation programs and presentation. Assessment centres are used to assess, in depth, a group of broadly similar applicants, using a set of competencies required for the post on offer and a series of behavioural statements which indicate how these competencies are played out in practice. Example 5, Cadbury Schweppes. (Beardwell, J., and Claydon, T. 2007) Example, Energis utilises a series of assessment centres. 3.5 Honesty tests and Drug test Many organizations formerly employed polygraph tests, or lie detectors, to evaluate job applicants, but this changed with the passage of the Polygraph Act in 1988.   This act prohibited the use of polygraphs in employment screening for most organizations. A new technique known as the honesty paper-and-pencil tests was born. This typically ask candidates directly about their attitude towards theft or their past experiences with theft. (Noe, R.A., et al 2004) For example 9, Nordstorm, the large department store chain, uses Reid Survey to screen for violent tendencies, drug use and dishonesty. (The New York Times, 2010) As with theft, there is a growing perception of the problems caused by drug use among employees. For example 10, Fortune 1000 chief executives cited substance abuse as a significant problem in their organization. (Noe, R.A., et al 2004) 3.6 Polygraphs This is more generally and incorrectly termed as the â€Å"lie detector† which is a mechanical device that measures a persons heart rate, galvanic skin responses and breathing rate. The ideology of this device is that if a person answers a question wrongly, the bodys physiological responses will â€Å"show† that a person gave an incorrect response through the polygraphs recording machine. They play a vital role in criminal investigations and background checks. For examples 11,companies such as Pick n Pay, KFC and First National Bank all uses the polygraph to assess the trustworthiness of potential candidates. (Brown, C. (2010) 3.7 References and Biographical Data References are information that an employer gets from other people who know the applicant, either through friends or previous employer. The evidence on the reliability and validity of reference checks suggests that these are, at best, weak predictors of future success on the job. One major reason for this is that most reference letters are so positive that it is difficult to differential applicants. (Van den Brink, et al, 2010) For example 14,Northwestern Bells district manager of management employment notes â€Å"They all say, ‘This is the greatest individual the world have ever seen, the next president, at least..It is not always accurate. (Noe, R.A. et al, 2004) For example 15, Intuit Corporation tries to get around these problems by requesting references in bulk sometimes asking for as many as 12 letters of reference. The evidence on the utility of biographical information gathered from candidates is far more accurate. The biographical information form also provides a written document that the organisation can verify via outside checks. (Pollitt, D. 2007) For example 16, APCOA Inc. conducts a battery of checks depending on the position, and such investigation may include driving records, credit history and criminal record. (Ordanini, A., and Silvestri, G. 2008) 3.8 Problems with using test There are a number of problems associated with using tests. (Brown, G. T. L. 2008) In most cases, tests may not always be fair as there may be an element of racial, social and sexual bias in the questions and scoring system. For instance, some cultures may be unused to ‘working against the clock. (Hao, Z., and Liden, R.C. 2011) Validation procedures take a lot of time, but yet still are essential to the use of tests. Issues such as the use of web testing, new types of tests, like emotional intelligence tests, are being developed without sufficient validation. (Tulip 2002) The criteria used in defining good job performance are usually inadequate, hence such criteria are subjective and to some extent for the mediocre correlations between job performance and test results. (Collings, D.G., and Wood, G. 2009) Most tests are job specific and unique. Therefore, when the job for which the test is used changes, then the test can no longer be said to relate with job performance in the same manner. (Mathis, R.L. and Jackson, J.H. 2007) 4.1 Government Policy and Legislation The final standard that any form of selection method should adhere to is the law. Legislation has a vital role in the recruitment and selection process especially in preventing discrimination on the grounds of disability, sex, race and age. (Noe, R.A. et al, 2004) The Civil Rights Act of 1991, an extension of the Civil Rights Acts of 1964 protects individuals from discrimination based on race, colour, sex, religion, and national origin with respect to hiring as well as compensation and working conditions. There are three major differences between the two Acts. (CIPD, 2010). One recent example 12 can be seen at Coca-Cola and this is highlighted in the â€Å"Competing by Meeting Stakeholders Needs† box; (Lavigna, R.J, and Hays S.W. 2004) Sex and Race DiscriminationThe Sex Discrimination Act (1975) was introduced to protect people and made it unlawful to discriminate based on sex or marital status either directly or indirectly in the field of employment. However, the Race Relations Act (1976) also prohibits employers from discriminating individuals on the grounds of race, colour and nationality. (Torrington, D., Hall, L., and Taylor, S., 2008) Age Discrimination In the UK, age discrimination was introduced in 2006 and makes it unlawful for employers to discriminate based on age in recruiting, promotion and training. (Noe, R.A. et al, 2004) Examples 13 of companies sued under this act include CBS Inc., McDonnell Douglas, Northwest Airlines, Disney, and Martin Marietta. (Noe, R.A. et al, 2004) 5.1 Selection Interviews An interview is a discussion between and employer and a potential candidate for the benefit of both parties to get to know each other for the purpose of filling a vacant position within a company. There are two major reasons for conducting an interview; as an initial screening, and to ascertain that the individual has met minimum qualifications required, and then an in depth interview with HR staff. (Singh, P. 2008) 5.2 Types of selection interviews 5.3 Structured Interviews This conducted by using standardised questions for all candidates to ensure comparisons can be done easily. It provides the opportunity   for the interviewer to design relevant questions and also to facilitate a standardised interviewee evaluation. It is useful in the initial screening process because many applicants can be effectively evaluated and compared. (Valentinis, L., et al 2009) 5.3.1 Behavioural Interview The interviewers often use an experiential type of structured interview. This is a method in which the interviewer will give applicants a job scenario (in which he/she will be looking for certain skills be it multi tasking, flexibility, diplomacy, patience, marketing tactics, and so on) and ask for the candidates opinion in exact steps. (Holtbrugge, D., et al 2010) Example, ATT and Accenture have been using behavioural interviewing for about 15 years now, and because increasing numbers of employers are using behaviour-based methods to screen job candidates, understanding how to excel in this interview environment is becoming a crucial job-hunting skill. Example 17,Capital one uses tests that assist in the evaluation of important behavioural and cultural-fit job criteria. (Mathis, R.L. and Jackson, J.H. 2007) Example Century 18, Theatre also made use of this test and finds it to be saving them money and resources. A recent study indicated that â€Å"past behaviour† structured-type interviews are better at identifying achievement at work than are situational interviews, hence showing the efficacy of this interview strategy. (Mathis, R.L. and Jackson, J.H. 2007) For example 19,the Struder Group consulting firm, after working with a multitude of health care firms across the nation, identified the use of behavioural interviews as a positive practice in organisations. (Gump, S.E. 2006) 5.3.2 Competency Interview This type of interview is similar to the behavioural interview except that the questions are designed to provide the interviewer with something to measure the applicants response against. Competency-based interviews are structured, with questions that relate directly to the essential criteria and competencies required for the post. Using competencies as a benchmark to predict job candidate success is useful because interviewers can identify the factors needed in specific jobs. (Doherty, R. (2010) However, this interview takes time and sometimes is of more benefit to management-oriented people. However, it is also important that you fit in with the team, and with the employers culture and style. A competency-based interview is designed to ask you additional questions about your character, soft skills and personal attributes that let both you and the employer determine whether you fit their needs. (Cardy. R.L., et al 2002) 5.3.3 Situational interview In situational interviewing, job-seekers are asked to respond to a specific situation they may face on the job, and some aspects of it are similar to behavioural interviews. These types of questions are designed to draw out more of your analytical and problem-solving skills, as well as how you handle problems with short notice and minimal preparation. (Dessler, G. 2011) For example 20, a variation of situational format that is used by companies such as GE and Microsoft is termed the case study interview, which requires a job applicant to find out and correct organisational challenges during the meeting. (Beardwell, J., and Claydon, T. 2007) 5.4 Unstructured or Less-structured interview An unstructured interview is one where there may be a script to get the process started, but once the interview gets going the interviewer will start to follow her own points of interest and stop following any script. (Searle, R.H. 2003) An unstructured interview occurs when the interviewer improvises by asking questions that are not predetermined. A semi structured interview is a guided conversation in which broad questions are asked and new questions arise as a result of the discussion. (Searle, R.H. 2003) 5.4.1 Stress Job Interviews The stress interviewing technique is typically used only for positions in which the job-seeker will be facing stress on the job, and the interviewer wants to see how well you can handle the pressure. The key to surviving stress interviews is to remain calm, keep a sense of humor, and avoid getting angry or defensive. (Ball, F.W., and Ball, B. 2010) 6.1 Advantages of interviews The following are the advantages of using interview as a method of selection: Interviews provide opportunities for interviewers to ask probing questions about the candidates experience and to explore the extent to which the candidates competences match those specified for the job; it enable interviewers to describe the job and the organisation in more detail, suggesting some of the terms of the psychological contract; provide opportunities for candidates to ask questions about the job and to clarify issues concerning training, career prospects, the organisation and terms conditions of employment; The interviewer may try to stress you in one of several ways, such as asking four or five questions in a row, acting rude or sarcastic, disagreeing with you, or simply keeping you waiting for a long period. (Armstrong, M. 2009) 6.2 Disadvantages of interview Snap judgments: some interviewers decide whether an applicant is suitable withing the first two to four minutes of the interview, and spend the rest of the time searching for crucial evidence to support their judgement. Negative emphasis: when evaluating suitability, the unfavourable information regarding a candidate is often more emphasised than the information that favours the candidate. Biases and stereotyping: a bias can be describe as a situation where the interviewer favours or select people that they consider to be the same as them based on various personal factors. However, candidates ethnic names and accents can negatively impact personal evaluations. Also, older candidates are most of the time less likely to be interviewed and hired compared to younger applicants. (Mathis, R.L. and Jackson, J.H. 2007) 7.1 Conclusions A year and a half ago, organisations such as investment banks example HSBC, blue chips and consulting firms were competing with dotcoms companies for example Amazon, and Facebookover recruiting the best people. But in the present environment, there are waves of redundancies hence many are grateful that they have a job. However, boom or bust, good recruitment and selection practices are essential. In conclusions, this assignment agrees with the statement; â€Å"the most efficient solution to the problem of interview is to do away with interview and substitute paper-and-pencil measures† This is because research has demonstrated that interviews are an inefficient method of predicting future success in a job. According to Smart (1983) argues that only 94 out of 1000 interviewee respond honestly in conventional interviews. (Armstrong, M. 2009) Factors such as poor reliability and validity of test scores are also major problems of interviews. Different interviewers have their own different styles and approaches, inconsistent handling of different candidates, variation in assessment criteria, biases, and errors are all factors that limits the use of interviews as a method of selection. (Armstrong, M. 2009)

Friday, September 20, 2019

Ebook Security With Adobe Adapt DRM

Ebook Security With Adobe Adapt DRM Abstract EBooks can be secured in various ways dependant on device or format. The report focuses on the encryption method used by Adobe in their Adept DRM used to secure EPUB and PDF formats. The report describes what a DRM is and its uses and purposes within the industry, how Adobe have adapted this for their purpose, the RSA and AES encryptions used, along with any advancements and vulnerabilities with the process. Recommendations are then given on how the process could be improved and conclusions drawn on the overall effectiveness of the system. Table of Contents 2. Literature review 2.1 What is DRM 2.2 RSA with PKCS#1 v1.5 padding 2.2.1 PKCS #1 2.2.2 RSA 2.2.2.1 GENERATE A PUBLIC KEY AND PRIVATE KEY 2.2.3 Padding 2.3 AES in CBC mode with a random generated IV 4. Vulnerabilities Security Known attacks Side-channel attacks NIST/CSEC validation Test vectors 5. Recommendations 6. Conclusion 7. References 2. Literature review 2.1 What is DRM? Digital Rights Management or DRMs restrict the ability to print, modify, lend or use the extended features of purchased digital media specifically EBooks. Restriction levels are dependent on publishers, distributors, device and even time. These restrictions are also used to limit the number of E-Readers a book can be viewed on and time restrictions on features can be added. DRMs come in different forms, at present there are eight main types, excluding obscure formats or those used in non-English countries, and a large proportion of these are incompatible with each other. While there is no de-facto standard, Adobe DRM is the most prolific, although Amazon Kindle and Apple iBooks use proprietary DRMs. The Adobe ADEPT DRM system has five key parts: Adobe Content server is responsible for the storage and management of EBooks. Adobe Activation Server is responsible for storing and tracking Adobe IDs and authorised devices. Adobe Content Server Message (ACSM) file carries the details of the book including name, synopsis and location. Adobe ID is the unique identification that is associated with the user. This is required to unlock the ACSM. Adobe Reader Software Development Kit (SDK) is used for distributers to create their own mobile reading apps. (Jenny Ellis and Kyle Cook (2013)) The following process is used when a purchased EBook with an Adobe Adept DRM is opened with Adobe Digital Editions. 1. A unique user key is created for the user account encrypted with RSA with PKCS#1 v1.5 padding by the E-Reader software. The account information not the device is used to create the key therefore allowing an EBook with DRM to be read on various devices. This is required to open the ACSM file. 2. Once an EBook is purchased a key for decryption known as the book key or ACSM is sent to the user. This book key is encrypted by the distributor using the unique user key created in step one. The book encryption is AES with Cipher Block Chaining with an Initialization vector that is randomly generated. 3.T he E-Reader software uses the user key to decrypt the book key and subsequently the book key is used to decrypt the EBook and allow access to the device or software. Copying is prevented by requiring the user key to decrypt the book key as it is not stored in a decrypted form on the device or software. To enable reading on another device it requires authorisation, once complete the user key is sent and the device is registered allowing EBook to be read on the newly enabled device. (Xiao Zhang 201) Image 01: The DRM Process 2.2 RSA with PKCS#1 v1.5 padding RSA with Public Key Cryptography Standards (PKCS) #1 and padding is used to encrypt the unique user account key, below is a description of how each part works to protect the user identification and eBook. 2.2.1 PKCS #1 PKCS #1 is the first standard of mathematical recommendations and properties for the correct implementation of RSA public and private keys. The key pairs are based on a modulus of two distinct large prime numbers. (Weisstein 2015) 2.2.2 RSA Image 02: How RSA Encryption Works (Page Don 2010) In 1977 Ron Rivest, Adi Shamir and Leonard Adleman first described RSA public key or asymmetric cryptography. RSA uses two keys, one public one private that are mathematically linked. As the name suggests public keys can be shared with anyone whereas the private key must be kept secure. Either key can be used to encrypt the data and the opposite key is used to decrypt. RSA if implemented correctly can provide confidentiality, integrity and non-reputability of electronic communications and data storage. (Rouse 2014) 2.2.2.1 Generating Public and Private Keys The first step to generating the public and private keys is two prime numbers. A prime number is a number greater 1 and is only divisible by 1 or itself. Examples of prime numbers are: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41. These two prime numbers p and q are multiplied together to give n and multiplied together minus one to give t. For Example: p = 29q= 31 n = p * q = 29 * 31 ∠´ n = 899 t = ( p -1 ) * ( q 1) = ( 29 1 ) * ( 31 1 ) ∠´ t = 840 Another prime number e is required, although e needs to be a relative prime to t, therefore t cannot be divisible by e. Since t = 840, e cannot be 2, 3, 5 or 7 ∠´ e can be 11, 13, 17 etc. 11 was selected as it was the first relative prime to t. ∠´ e = 11. The last figure required for the calculations is d. The formula used to ascertain d is: d * e = 1 mod t ∠´ (d * 11) / 840 will result in the remainder of 1. To find d the inverse of e mod t is required and is often computed using the Extended Euclidean Algorithm. ∠´ ( 611* 11) / 840 = 8 r 1 ∠´ d = 611. The public key is n and e ∠´ 899 and 11. The private key is n and d ∠´ 899 and 611. (Page Don 2010) 2.3 AES in CBC mode with a random generated IV AES with Cipher Block Chaining with an Initialization vector that is randomly generated is used to encrypt the book key or ACSM, below is a description of how each part works to protect the eBook to prevent unauthorised use. 3. Vulnerabilities On paper, this encryption scheme ensures a strong DRM mechanism. However, it was soon observed that the software used to read ePubs and PDFs, Adobe Digital Editions, uses a very weak obfuscation to hide the per-user key. An attack that uses reverse-engineering on the software reveals a rather easy method of retrieving the per-user key from the software and use it to decrypt other Adept encrypted PDF or ePub file. Newer versions of the Adobe Digital Editions use more cryptic ways of hiding the per-user key, but attacks still exist to retrieve it from the registry 4. Recommendations Adobe Digital Editions, uses a very weak obfuscation to hide the per-user key. An attack that uses reverse-engineering on the software reveals a rather easy method of retrieving the per-user key from the software and use it to decrypt other Adept encrypted PDF or ePub file. Newer versions of the Adobe Digital Editions use more cryptic ways of hiding the per-user key, but attacks still exist to retrieve it from the registry  for better useable security and privacy Write with  the  knowledge  you have gained during  the  lectures  and  also  sensible  intuition  about improvements that can be made to ensure better security and privacy of all involved state holders. à ¯Ã¢â‚¬Å¡Ã‚ §Ã‚  You are  not  asked to  provide  workable solutions there should be no limit  to your imagination; however with  sensible intuition. You can discuss systems, frameworks, protocols, tools, best practices, government  regulations etc. 5. Conclusion highlight important facts and findings. 6. References http://www.inthelibrarywiththeleadpipe.org/2013/building-a-community-of-readers-social-reading-and-an-aggregated-ebook-reading-app-for-libraries/ http://www.cse.wustl.edu/~jain/cse571-11/ftp/drm/#sec2.3.1 E-Book Security and Preventing Theft and Unauthorised Editing http://inkwelleditorial.com/prevent-ebook-theft http://ebookforum.info/how-can-i-stop-theft-of-my-ebook/ http://www.star-force.com/press/articles/?news=2562 DRM http://ebookarchitects.com/learn-about-ebooks/drm/ https://www.editionguard.com/

Thursday, September 19, 2019

The End of World War I :: World War I History

The End of World War I As the news of the individual surrender spread, fellow Germans saw that they were losing the war and started mutinies. Many people told the Kaiser to seek an armistice with the allies. However, he did not show any intensions of giving up. With the end so close, many American newspapers started to create rumors that the armistice had signed been signed by the Germans. They assumed that our leaders were suing for peace. They were still only considering signing an armistice. The American armistice was based on Woodrow Wilson's fourteen-point plan. He did have a hard time convincing the other allies that the fourteen-point plan was going to work. Wilson who was wanted peace without actually winning the war. By the time the armistice was signed, the people of Germany were happy that the war had ended. The treaty was signed at Rethondes, France at 5:00 pm on November 11 1918. Two days earlier Kaiser Williams of Germany had abdicated and fled to the Netherlands. Prince Max of Beden had immediately accepted defeat. The word quickly passed along the front and at 11:00 the battles should stop. Many notes had passed between Prince Williams and President Wilson in the days that led to the armistice. All of the matters were discussed through notes although a representative was sent to explain the idea behind the fourteen point and other American theories that led to the formation of the armistice. After the armistice was signed and the war ended many of the Americans flooded the towns located near the front, they celebrated. Many sang their national anthem. The streets were crowded with people. The town center was so filled that you could hardly see anything. Church bells ringed through out Europe to praise the end of the war. Many people even sung huge flags of either America or France. Many of the soldiers just stared and wondered what was going on. They had seen all the death and did not realize why the men celebrated. Many people endorsed the fourteen-point plan. Some even thought that he would win the noble peace prize for his work during the tragic war. Many Americans believed that their president their war hero had ended the war with the fourteen points for peace. Many of the allies wanted to put and end to the war by claming victory and puncture the economy of Germany forever. The End of World War I :: World War I History The End of World War I As the news of the individual surrender spread, fellow Germans saw that they were losing the war and started mutinies. Many people told the Kaiser to seek an armistice with the allies. However, he did not show any intensions of giving up. With the end so close, many American newspapers started to create rumors that the armistice had signed been signed by the Germans. They assumed that our leaders were suing for peace. They were still only considering signing an armistice. The American armistice was based on Woodrow Wilson's fourteen-point plan. He did have a hard time convincing the other allies that the fourteen-point plan was going to work. Wilson who was wanted peace without actually winning the war. By the time the armistice was signed, the people of Germany were happy that the war had ended. The treaty was signed at Rethondes, France at 5:00 pm on November 11 1918. Two days earlier Kaiser Williams of Germany had abdicated and fled to the Netherlands. Prince Max of Beden had immediately accepted defeat. The word quickly passed along the front and at 11:00 the battles should stop. Many notes had passed between Prince Williams and President Wilson in the days that led to the armistice. All of the matters were discussed through notes although a representative was sent to explain the idea behind the fourteen point and other American theories that led to the formation of the armistice. After the armistice was signed and the war ended many of the Americans flooded the towns located near the front, they celebrated. Many sang their national anthem. The streets were crowded with people. The town center was so filled that you could hardly see anything. Church bells ringed through out Europe to praise the end of the war. Many people even sung huge flags of either America or France. Many of the soldiers just stared and wondered what was going on. They had seen all the death and did not realize why the men celebrated. Many people endorsed the fourteen-point plan. Some even thought that he would win the noble peace prize for his work during the tragic war. Many Americans believed that their president their war hero had ended the war with the fourteen points for peace. Many of the allies wanted to put and end to the war by claming victory and puncture the economy of Germany forever.

Wednesday, September 18, 2019

Zen Buddhisim and Japan Essay -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Zen Buddhism and Japan   Ã‚  Ã‚  Ã‚  Ã‚  Japan and the development of Zen Buddhism went hand in hand towards the beginning of the sixth century. Buddhism was in full bloom in India and the Chinese were adapting it to there Lifestyle when several Japanese clans began picking it up. Zen Buddhism   Ã‚  Ã‚  Ã‚  Ã‚  Zen Buddhism is a combination of Indian and Chinese thought process revolving around the world as it is and the discipline of finding enlightenment. The idea of enlightenment or Satori as the Japanese called it was the central point of Buddhism The Chinese had several ways of looking at the things that were contradicted by Indian lifestyles and thus you have the creation of Zen Buddhism. The Chinese weren’t as philosophically minded as their Indian counterparts, rather looking at things in a very practical way. The Chinese were always devoted to world affairs, but always kept touch of reality. The Chinese weren’t looking for God, or answers from a higher source, looking within for the answers. This is one way the Zen Buddhism was greatly different from most other religions was its emphasis on asking questions and seeking answers thought the use of meditation. The monks that followed Zen Buddhists weren’t asked to recite group prayer or any oth er deeds of piety, but rather just ask questions and seek answers. The basis of Zen Buddhism also puts an unprecedented emphasis on community. A monk of any level, or the master of of a Monastery all have the same role in community and work together on all levels. No matter how mundane the work might be, the group emphasis rules above all thus creating every man equal. Zen teachings believe in handling a thing rather than an abstraction and this is an example of this. Rather than asking a god figure, or waiting for god’s intervention, Buddhist monks believe in asking the question to themselves or to a higher monk where they can get a grounded answer, although it was usually cryptic.   Ã‚  Ã‚  Ã‚  Ã‚  These cryptic answers however relate to one way one achieves enlightenment, through the use of Zen verbalism. This verbalism is very characteristic of the Chinese way, as the answer is always grounded in something very real. Most Zen teachings that are written down are reflective of thi... ...d that they will find enlightenment through their determination to die. If left alive these warriors will feel as though they have failed, and are cowardly, thus they fight with an urgency unlike most others. Their desire to obtain complete master of Bushido is unfortunately only obtainable by their demise. This method of training and preparing soldiers is unlike most other and is highly effective in creating the perfect soldier, one that fights with an awareness like none other, and another who trains with the sole purpose of ending up in a fatal situation.   Ã‚  Ã‚  Ã‚  Ã‚  Zen Buddhism has had a tremendous impact on Japan and China, influencing the way everything is today. Today Zen is a commonly used term and is widespread about the world. Many Zen centers have been set up, and a greater focus on meditation is quite popular. The Zen boom is just that though, to many people cannot commit themselves to fully dedicating themselves to its teachings and apply it, but if Japan is any measure its success is very positive. Japan has firmly set itself up as a premier country, with a deep history and a very rich culture of which are developed with the help of Zen Buddhism.

Tuesday, September 17, 2019

Clothes of the future Essay

With this new time and age of technological advancements, the manufacturing of smart clothes has brought about a textile revolution. This involves the integration of electronic components and Nano-technology within fabrics and fibres resulting in the birth of intelligent fabrics possessing specific properties. Smart materials are capable of ‘thinking’ and ‘acting’ by sensing the conditions of the immediate environment. These are sensitive to the wearer’s body conditions (sweating & trembling), temperature requirements & stability and their movements. Classification of Smart Textiles: Passive Smart Textiles- These can only sense the environment conditions or stimuli, and hence are also known as 1st Generation Smart Textiles. Active Smart Textiles-These 2nd Generation Smart Textiles have both sensors and actuators. The actuators act upon the signal or stimuli detected either directly or from a central control unit. They are chameleonic, water resistant, shape memory, vapor absorbing, heat evolving fabrics or electrically heated suits. Ultra Smart Textiles- These are the 3rd Generation very Smart Textiles which can sense, react, and adopt themselves to the environment conditions and stimuli. Applications of Smart Textile can be very interesting to know. The usage of Smart textiles range from protective wear, sports, medical and fashion to clothes having anti stress properties. Functional Textiles† are designed to serve a specific purpose having added features. Therefore, we now have fabrics that protect against U.V Radiation and anti-bacterial products. Fibres designed with moisture management systems help in quick evaporation of sweat & perspiration. Similarly, there are Reflective Textiles used for preparing safety garments. Some interesting examples of such extraordinary Functional Textiles used today are: The jacket that can see: This technology boasts the development of GPSoverIP Jacket which has an inbuilt mobile phone, an mp3 player at the same time containing features for locating people. The person wearing this jacket can be easily located within buildings with its’ inbuilt tracking system that works just like a GPS. The Smart Bra: Developed by Wallace et al at the University of Wollongong, the Smart Bra can change its properties according to the breast movement, i.e. it can tighten, loosen the straps,  stiffen or relax its’ cups to adjust the breast motion, preventing breast pain and sag. This bra is essentially useful for women who are active in sports. Fitness component inside sports underwear: This technology, again is very useful for athletes as it incorporates ‘beat clip’ i.e., a fitness component with a mobile radio connection sewn into sports underwear. It then displays on a mobile phone, the wearers’ fitness conditions such as heart rate signals. Fabric protection against mobile phone radiation: a German engineered fabric using special yarns called ‘eBlocker’ is being incorporated into the inner pockets of jackets, which absorbs almost 100% of radiation emanating from mobile phones without affecting the functioning of the mobile phone in any way. Sensory baby vest: A team of researchers have improvised a special vest for babies .This special vest has sensors attached to it that help in constant monitoring of the baby’s’ vital organs such as heart, lungs ,skin and at the same time detects body temperature. The sensors are attached such that they, in no way, disturb the baby while it is asleep. Light Emitting: Luminex is a new fabric (non reflective) that can emit light. They are optical capable of illuminating themselves in darkened situations. Developing Future U.S. Soldier Uniforms: DuPont in alliance with Massachusetts Institute of Technology (MIT) attempts to develop materials that would help equip the U.S. soldier of the future with uniforms and gear that keep them safe them against chemical and biological warfare. Engineers and scientists are working to develop ideas such as a uniform that is almost invisible and soft clothing that can become a rigid cast when a soldier breaks his or her leg. Fibres That Can Change Colour and Shape on Command: Smart fibres can function as conductive â€Å"wires† and react to signals from electricity, heat or pressure. Researchers are experimenting with different fibre profiles – of various shapes — that can be made to contract or expand to loosen and tighten clothing to make the wearer warmer or cooler. For example, conductive fibres could change colour on command from an electric signal that changes the reflective quality of specially dyed fibre/cloth Emitting Scents: The Smart Second Skin Dress – emitting scents depending on your mood and requirements. One such invention is the ‘Sleep Suit’ which gives out the scent of lavender for insomniacs when they wake to calm the wearer and send them back to sleep. One can manage music and mobile phone from a control panel, with backlit digital display, located externally on  your sleeve. Fashion is moving forward†¦and so is technology. As computers keep getting smaller, it enables us to incorporate miniaturised hi-tech components into clothes and shoes. Textile manufacturers have to redefine ‘functionality’ and move beyond the historical focus of protection and appearance and find their way onto the high street renamed as ‘Warp Wear’, ‘Smart Clothes’ and ‘E-textiles’.

Monday, September 16, 2019

The Main Arguments of Evolution Theory

International Management Prof. dr. Niels Noorderhaven Lecture 1 Agenda †¢ †¢ †¢ 1. 2. 3. Introduction and organizational matters Does â€Å"international† still matter? Conceptual foundations of international business strategy (1) †¢ †¢ Case: Honda in the USA Literature: Textbook chapter 1 (pp 13-33 + 59-62) Team Lectures Niels Noorderhaven Cases Fons Naus Ana Aranda Gutierrez Zhengyu Li Teaching strategy Complementarity of lectures – readings †¢ Individual case participation †¢ Each lecture, one or several cases from the book will be expanded to put the theory into practice †¢ Importance of research articles Grading †¢ 70% MC exam – See Study manual for correction formula †¢ Exam dates December 13, 2012 and April 12, 2013 †¢ 30% 2 Interactive lectures – individual participation †¢ Interactive lectures grades of 2010 and 2011 can be transferred Book †¢ http://www. cambridge. rg/features/manag ement/verbeke/ Does â€Å"international† still matter? 7 Transportation & communication costs fall 17 September 2012 8 Tariffs fall, anti-dumping measures rise anti- 17 September 2012 9 Globalization Theory: †¢ Linguistic, trade and cultural barriers become less important †¢ ‘Stateless’ MNCs †¢ Within MNCs worldwide diffusion of technologies, knowledge and information Convergence of world economies 17 September 2012 10 Why is nationality important to people? Individual identity and social identity †¢ Three processes of social identity formation: †¢ social categorization †¢ social comparison †¢ social identification †¢ (Self-)categorization: what is the salient category? 17 September 2012 11 Why is nationality important to people? †¢ Positive stereotyping of â€Å"in-group†, negative stereotyping of â€Å"out-group† †¢ Nationality differences are particularly salient when people have no common history †¢ Nationality then becomes a source for one’s own identity and for the ascribed identity of the other 7 September 2012 12 Does â€Å"international† still matter? Yes, because †¦. †¢ Cultural , institutional and language differences persist †¢ Leading to differences in (business) decision making †¢ Nationality forms an important basis for social categorization processes †¢ Leading to shortcuts like cultural attribution and stereotyping With the effect that doing business across borders is different than domestic business 13 Conceptual foundations of international business strategy 4 Definition of international business strategy International business strategy means effectively and efficiently matching a multinational enterprise’s (MNE’s) internal strengths (relative to competitors) with the opportunities and challenges found in geographically dispersed environments that cross international borders. Such matching is a precond ition to creating value and satisfying stakeholder goals, both domestically and internationally. 15 TABLE OF CONTENTS (1) Introduction and overview of the book’s framework †¢ Part one: Core concepts (1) Conceptual foundations of international business strategy (2) The critical role of firm-specific advantages (3) The nature of home country location advantages (4) The problem with host country location advantages (5) Combining firm-specific advantages and location advantages in an MNE network 16 TABLE OF CONTENTS (2) †¢ Part two: Functional issues (6) (7) (8) (9) (10) International innovation International sourcing and production International finance International marketing Managing managers in the multinational enterprise 7 TABLE OF CONTENTS (3) †¢ Part three: Dynamics of global strategy (11) Entry mode dynamics 1: foreign distributors (12) Entry mode dynamics 2: strategic alliance partners (13) Entry mode dynamics 3: mergers and acquisitions (14) The role of emerging economies (15a) International strategies of corporate social responsibility (15b) International strategies of environmental sustainability 18 The seven concepts of the unifying framework †¢ †¢ †¢ †¢ †¢ †¢ Internationally transferable (or non-location bound) firmspecific advantages (FSAs) Non-transferable (or location-bound) FSAs Location advantages Investment in – and value creation through – recombination Complementary resources of external actors Bounded rationality Bounded reliability The MNE’s unique resource base †¢ Physical resources (natural resources, buildings, plant equipment). †¢ Financial resources (equity and loan capital) †¢ Human resources (individuals and teams, entrepreneurial and operational skills). Upstream knowledge (sourcing knowledge, product and process-related technological knowledge). †¢ Downstream knowledge (marketing, sales, distribution and after sales service). †¢ Admin istrative knowledge (organizational structure, culture and systems). †¢ Reputational resources (brand names, reputation for honest business dealings). International transferability of FSAs? †¢ Paradox: If the FSA consists of easily codifiable knowledge (i. e. , if it can be articulated explicitly, as in a handbook or blueprint), then it can be cheaply transferred abroad, but it can also be easily imitated by other firms.Though expensive and time-consuming to transfer tacit knowledge across borders, the benefit to the MNE is that this knowledge is also difficult to imitate. It is often a key source of competitive advantage when doing business abroad. Some FSAs are not transferable abroad: location-bound locationFSAs (1) Four main types: †¢ Stand-alone resources linked to location advantages (privileged retail locations). †¢ Local marketing knowledge and reputational resources, such as brand names (may not be applicable to a host country context, or valued to the s ame extent). Local best practices (i. e. routines), such as incentive systems or buyer-supplier relations (may not work abroad). †¢ Domestic recombination capability (may not work in foreign markets – e. g. , because co-location of resources is needed). Some FSAs are not transferable abroad: location-bound locationFSAs (2) †¢ Even if transferability of the relevant resources were technically possible, this does not mean potential for profitable deployment, i. e. the resource bundles that may be transferable from a technical perspective (e. g. , the way n which a product is marketed at home), do not constitute an FSA abroad. Location advantages †¢ Entire set of strengths of a location, and accessible by firms in that location. †¢ Should always be assessed relative to the strengths of other locations. †¢ Instrumental to FSAs Motivations for foreign expansion †¢ Natural resource seeking – Verbeke: physical, financial or human resources †¢ Market seeking †¢ Strategic resource seeking – e. g. , knowledge, finance †¢ Efficiency seeking – E. g. , low labor cost Case: Honda in the USA Background Prior to 1970s exports of motorcycles and cars †¢ Drivers of foreign production: – Rising value of the yen against US$ – Fear of import restrictions – The Clean Air Act in the US – First oil crisis †¢ Motivation for expansion (natural resource, market, strategic resource, efficiency seeking? ) Honda’s approach †¢ After four-year decision process Honda of America Manufacturing established in Marysville, Ohio, in 1978 †¢ Top priority: attain Japanese-level quality and efficiency – – – – – Selection of employees Training program Fly in managers and workers from Japan Develop lean supplier network Upgrade supplier quality level 1980: start production of cars †¢ Present: 9 production plants in USA Honda’s FSAs †¢ Non-location bound FSAs: – – – – – – – Know-how four-strike engines with optimal power-to-weight ratio Management principles Quality systems Employee selection processes Training and knowledge transfer routines Manufacturing expertise Supplier management approach †¢ †¢ Location-bound FSAs in the host country: – High demand for specific products Resource recombination: – – – Use four-strike engines in many products (motorcycles, small cars, generators, †¦) Design and manufacturing skills + knowledge of consumer preferences in USA Melding existing and new resources through management exchange program Exploit new capabilities worldwide Complementary resources of external actors †¢ Opportunity to study American way of production at Ford †¢ Extensive use of American experts and consultants (especially for selecting location) †¢ Critical role of suppliers Bounded rationality issues lack of knowledge local conditions †¢ Suppliers’ lack of familiarity with Honda †¢ New employees lack of familiarity with â€Å"The Honda Way† Bounded reliability issues †¢ Moral hazard/adverse selection employees †¢ American managers have local priorities Deliberate strategy? Agenda for next lecture 1. 2. 3. 4. Four types of MNEs Recombination Bounded rationality & reliability Firm-specific advantages (FSAs) †¢ Cases: 3M & IKEA †¢ Literature: Textbook chapter 1 (pp 33-76) + chapter 2 NB: Class will be in SZ 31

Sunday, September 15, 2019

Immigration, Social Problem

Immigration, A Social problem People believe that immigration is generally a problem to the economy. Resorbing a negative abstract and a source of taking up valuable resources. The government has kept a social problem amongst the economic impact of the immigrants around us. Illegal immigrants, also known as aliens, are still being observed and noticed as racial profiling and being noticed as a minority groups still occur. One of which is the country closest to us, Mexico, whom is believed to start controversy to the US citizens as they are believed to create alliance to the Mexican drug war.Even thought there are still immigrants in this county, there are believes that the number of immigrants coming from Mexico to the United States has sharply declined. America is a country based and built by the immigrants. We are all immigrants in this country but it is true that some immigrants hurt the country but in many ways it was the immigrants that improved United States in the first place. Some immigrants are small business owners whom try to survive and live up to the American Dream.Even if some immigrants build the country there are always people who impact the social structure. Now day’s immigration has become a political factor and not observed as a human being struggling to better him or her selves from the life they used to live, these are citizens not criminals. Much of the perception about immigrants triggered by competition at the job market, and pressure on housing market are due to high numbers of in coming immigrants but not necessarily the immigrant’s government so keenly want to control.The reason why there has been valid and real concern about immigration is because of the unfettered immigration allowed by labor and the obvious failure of their policy's in the inner cities. The aspect of letting fewer immigrants in will be more manageable and easier to integrate, instead of mass immigration creating disenfranchised environment and the imm igrant populations cannot possibly make the most from being in the US at this time of low job resources.Over the year it seems that the number of the immigrants coming to the United States from Mexico has been sharply declined which could be do to the lack of jobs, higher risks of border crossing, low resources more risks and so on. Many factors are probably behind the trend but mostly its being believed that the number one thing is the lack of job in United States. It really shows how bad it has become here when people are leaving and others do not want to immigrate. Also believed that people aren’t immigrating because they can't even afford the gas, food, utilities, rent, mortgages, one in every seven Americans are on welfare.They come here for work, but people here are losing jobs everyday. In the end the solution to immigration has already occurred, which is the lack of jobs. The immigrants only want to provide better future for there children and I really don’t be lieve that we should stop them from coming over. I immigrated to this country for a better future from a country that was in a war for ten years and living in United States has given me a better percentage of survival then if I lived in any other country.

Saturday, September 14, 2019

Family and marriage ten theories Essay

1. Family Ecology- The ecological context of the family affects family life and children’s outcomes. It explores how the family is influenced by the environment.This theory studies how family lives and decisions. It basically brings forth the idea that every choice that you make affects your family, your lifestyle, the surrounding events as well as historical events. Key Concepts Natural physical-biological environment- This concept deals with climate and climate change, soil, plants and animals. Social- Cultural environment- This concepts deals with human made things as well as cultural artifacts. Theorist/ Individual- This concept was discovered/ or created by ecologist Strength and Weaknesses- Some strengths of this theory is that What You Think- I think that this theory is totally correct. I feel like every choice I make does affect my family. It affects their lifestyle as well as how they view things, as well as how they form their opinions. These decisions that I am making now, affects how we live and will affect how they decide they will live when they get older. These decisions are things like, where we live, how we live, work ethics, as well as the food we eat. 2. The Family Life Course Development Framework – Families experience predictable change over time. This basically brings forth the idea that families go thru unpredictable changes, which add and subtract from their family composition. This means birth, death and the leaving home of a family member. Key Concepts Family Life Course- Events that add and subtract from a family’s composition Developmental Tasks- tasks that have to be completed before you can transition to the next stage. On Time Transitions- Events that occur when they are supposed to, as opposed to being too early, or too late. Role Sequencing- The order in which major transitions take place. Theorist/ Individual- Life Course Therapist, and Ueker and Stokes Strength and Weaknesses Some of the strengths of this theory is that it analyzes the family as a unit. What You Think- This theory basically states that family life begins with marriage. This is crazy and untrue. I say this because nowadays family life begins when you have a kid as opposed to when you get married. 3. The Structure- Functional Perspective- The family performs essential functions for society. This deals with the way families fulfill basic societal needs, such as raising children responsibly, providing economical support, and emotional security. Key Concepts Social Institution- Family Structure Family Functions Functional Alternatives Theorist/ Individual- Social Scientist Strength and Weaknesses- Some of the strengths is that it analyzes the way families raise their kids, as well as how the family meets the needs of its members. The weaknesses of this theory is that it analyzes the family as a whole, as opposed to analyzes each person individually and how they deal with each other. What You Think- I think that each perspective is uniquely different and this perspective analyzes how families fulfill its members needs. The needs that they analyze, are basically what makes a family functional. These needs are things that each members needs to feel like they play a part in the unit. 4. The Interaction- Constructionist Perspective By means of interaction, humans construct socio-cultural meanings. The internal dynamics of a group of interacting individuals construct the family. Key Concepts Interaction Symbol Meaning Role Making Social Construction of Reality Destruction Postmodernism Theorist/ Individual Strength and Weaknesses- The strengths of this theory is that it looks at the family as a whole to see what is being done collectively to create the closeness. One of the weaknesses is that it does not look at the obvious, it should analyze the person that keeps the family together. Each member is following the lead of one person, who’s main goal is to keep the family together. What You Think- I think this theory basically analyzes family practices and what things, like rituals, bring them together, or create a apparent closeness. These are things that can be used to identify, or analyze another persons behavior, when they don’t come from a family like structure. 5. Exchange Theory- The resources that individuals bring to a relationship or family affect the formation,continuation, nature and power dynamics of a relationship. Social exchanges are compiled to create networks and social capital. This meaning that when people are engaged in social exchanges they limit their costs and maximize their rewards. Key Concepts Resources Rewards and Cost Family Power Social Networks Social Support Theorist/ Individual- Social Therapist Strength and Weaknesses- The strengths of this theory is that it analyzes relationships and people’s economic perspective on forming the relationships. The weaknesses are that the perspective analyzes the people’s economic perspective on forming relationships but it doesn’t analyze thoroughly what type of person they are, and how they attract friends, and form relationships. What You Think- I think this is a great theory. It basically means that when you are forming relationships with people you are analyzing what you can get from the relationship, as opposed to what you are giving in return, or what you have to bring to the table. It basically states the person with less committment to the relationship has more power.  This is because the person with less committments not the person competing for the relationship,as if they don’t care either way, whereas the other person actually cares and wants the relationship to bloom. 6. Family Systems Theory- The family as a whole is more than the sum of its parts. This meaning that the family, becomes whole, although it is comprised of interrelated parts. Key Concepts System- a combination of elements or components that are integrated and organized as a whole. Equilibrium- balance Boundaries- ideas about who is in the family and who is out  Family Therapy- Theorist/ Individual- Psychotherapist Strength and Weaknesses- Some of the strengths are that the theory is that it bases its theory off of research of the family and how it is comprised of different parts. One weakness is that it does not analyze the different personalities within the family as well as the family interactions to determine what keeps them balanced. What You Think- I think that the Family Systems theory is a theory that basically researches the family and it looks at a system as a combination of elements. This is good because it looks at how the family actually interacts together. 7. Conflict and Feminist Theory- Gender is central to the analysis of the family; male dominance in society and in the family is oppresive of women. It is the opposite of structure functional theory. The theory argues that human physiology, genetics, and hormones predisposed individuals to certain behaviors. Key Concepts Male dominance Power Inequality- Theorist/ Individual- theoretical scientist/ social scientist Strength and Weaknesses- Some strengths of these two theories are that they basically analyze what causes certain people to be treated unfair and unequally. It basically tries to ask and answer the question as to what makes males more dominant than females. One of the weaknesses is that it can not effectively  answer this problem, nor solve it because it still exists. What You Think- Conflict Theory analyzes unequal Power. Feminist Theory analyzes gender issues. 8. The Biosocial Perspective- Evolution of the human species has put in place certain biological endowments that shape and limit family life choices. Key Concepts Evolutionary heritage Genes Hormones Brain Processes Inclusive Fitness Theorist/ Individual- Behaviorist Strength and Weaknesses- One of the strengths is that it analyzes the fact that a persons environment helps shape them. One of the weaknesses is that their research found that they could not the factors considered were dependent upon each other, as opposed to just one. What You Think- I think that this theory basically analyzes how a person sees the world and how their behaviors are affected by their environment and family life. 9.Attachment Theory- Early Childhood experience with caregivers shape psychological attachment styles. This brings forth the idea that during infancy and childhood a young person develops a style of attaching to people. Key Concepts Secure Insecure Anxious Attachment Styles Theorist/ Individual- Behaviorist Strength and Weaknesses- some of the strengths are that it analyzes why kids act the way they do and how they get attached to people. The weaknesses are that it does not leave the door open to explain if they are conditions that worsen the child’s ability to attach to a person, or What You Think- I think that the theory is dead on and it explains why a child acts a certain way towards people they don’t know, meeting new people, and why they don’t want to be seperated from their care giver.