Wednesday, December 25, 2019

New Epoch of Information and Technology - Free Essay Example

Sample details Pages: 28 Words: 8256 Downloads: 3 Date added: 2017/06/26 Category Statistics Essay Did you like this example? 1. INTRODUCTION 1.1 Background and Motivation The new epoch of information and technology has begun. The use of the internet is transforming how business is done locally and globally. Due to major technical developments, the internal information system development is moving to an external development and provision model, driven by the needs for lower costs, faster implementation, easier-to-use applications and effective use of scarce resources (Locket et al., 2006). The internet has revolutionised the computer and communication world like nothing before. The invention of the internet has a worldwide broadcasting capability, it is a medium of collaboration and interaction between individuals and their computers without any limitation in their geographical location. The origin of the internet can be found in the United States department of defences Advanced Research Project Agency (ARPA). The aim of the ARPA was to develop a nationwide computer system where military personnel could share message without any barrier irrespective of their location (Freedom, 2008). In 1960s United States funded researchers in California to explore ways through which computers could share information. In 1969, the research group connected the computers of some universities in the United States to share information being physically apart. The network was named as ARPA network or ARPAnet (Freedom, 2008). Don’t waste time! Our writers will create an original "New Epoch of Information and Technology" essay for you Create order The last few years have witnessed technological changes among which prominent is electronic commerce, or the exchange of products (tangible and otherwise) and payments via telecommunication systems (Kalakota Whinston, 1997). Payment systems are a core group of strategic information system which contribute towards economic development, especially in emerging economies, and forms the foundation for financial sector. Most of the industries have been influenced in some way or the other by e-commerce, nowhere the effect of e-commerce is more apparent in online banking (e Marketer, 2000). The online banking overcomes the traditional banking and its way of queuing up to get the transaction done. Internet banking is no more taking out time from the schedule to go to the bank, it is the easiest and the safest way of banking. An individual can get reports about the account, statement etc. with just click of a button (Online banking question, 2008). Apart from ease of use there are some barrie rs in online banking. The main issue is that of trust. Customers may wonder if their transaction went through successfully or the clicked the correct button. Also online banking can take some time to start and can be difficult to learn at first for the beginners. Thus, the physical separation of the bank with the customers and that of the customer with the financial advisor, the overall perceived insecurity of the internet provides unique challenge to the bank to develop a safer internet banking (Mukherjee, ) The internet technology are rapidly changing the personal financial services are being delivered. Several banks in India have introduced internet banking to make the banking faster, easier and to reduce the costs. Despite such developments by the banks these facilities are largely unnoticed by the customers. Online banking is the newest channel for retail banking services. Online banking refers to several types of services in which the customer can carry out most of the services balance reporting, inter-account transfer and bill payment (Sathe, 1999). Europe has been the leader in online banking technology (Schneider, 2001). At the end of 2000 only 20 percent of the United States banks offered online banking ad only 20 percent of the customers with internet connection used online banking. In Europe 75 million users used online banking by 2005. Most popular Online banking Activities Most Popular Internet Activities 2005   Ãƒâ€šÃ‚  Ãƒâ€šÃ‚  Ãƒâ€šÃ‚   Visitor Activities E-mail General web surfing/ browsing Reading news Shopping/ buying goods online Entertainment news Looking for and reading information about hobbies Online banking Looking for and reading medical information Instant messaging Looking for and reading travel information and making travel arrangements Table: Most popular internet activities in 2005 Source: U.S.C. Annenberg School Center for Digital Future, 2005 cited in Laudon and Traver, 2007, p.220) However, one of the major concerns regarding not using the internet has been highlighted by many authors and that issue is security. Chesher and Kaura (1998) points that the most important reason that has kept both consumers and business away from the internet is its security issue. Security is considered as the primary issue than any other issue. Nevertheless, efforts have been made to overcome this issue in the form of software, digital certificate, signed message, encrypted message and so on (Chesher ad Kaura, 1998 M) As the organisation continue to invest in ICT, the usage behaviour of the consumer becomes very important topic in research on its implementation. To understand the usage behaviour of the consumers we will use technology Acceptance Model (TAM), this is an established model of computer usage and has been validated through testing with a number of technologies. From the Asian market experience, it is clear that internet banking is here to stay and would be major way to acquire and provide service to the customers. The banks that have launched online banking products and services increased from 6% in 1998 to 75% in 2003. According to IDC, in countries like Korea and Singapore 10% of their population uses internet banking. These markets are way ahead of India both in terms of online banking penetration and internet penetration. India is a big potential market and is fast catching up with its counterpart (Kannaberan, Narayan, 2005). Despite all the efforts and investment undertaken by the banks, e-banking facilities have been unnoticed by the customers of India. Therefore, customers perception and trust is of utmost importance. The Indian market has been increasingly attractive for global marketers in the recent years. Although the overall per capita GDP (Gross Domestic Product) is low at $421 (Budhwar, 2001). There are 203 million middle class consumers who are well educated and with salaries more than $5000 in local purchasing power (Ramchandaran, 2000). As a result FDI (Foreign Direct Investment) flow to India increased from $103 million in 1990-91 to $5.1 billion in 2000-01. 1.2 Aims and Objective: The aim of the study is to determine the importance of trust in relation to the online banking. This will lead to explore a range of issues related to trust, security and how well Indian banks adopted online banking. This research also aims to investigate the internet adoption strategy in established banks. The research problem chosen of a great importance especially in developing country like India where banking sector witnessed a major revival in the last decade. The research question is important because the entire multinational bank that came to India tried to persuade people to use online banking but still people dont use it because they dont trust online banking. The research will basically deal with customers trust in online banking and factors that affect it. This is one of the major areas where the bank should concentrate and work upon it. TAM is one of the models that are used widely to explain the factors that affect user acceptance of Information System (Suh, Han). However traditional information system is different from Internet Banking, which uses emerging technology like WWW and internet. With the advancement of WWW and internet, various researches have adjusted TAM to WWW environment to overcome TAMs lack of task forces. Recent studies of user acceptance of WWW have paid attention to perceived playfulness, because WWW is used both for pleasure and play. The studies have verified that perceived playfulness has a significant impact on user acceptance of WWW. In spite of the recent boom in electronic commerce, customers are reluctant to provide sensitive information to websites. Generally the customers are comfortable in providing general information but they are uncomfortable in providing sensitive information like credit card details, personal details. Internet banking sites are one location where most personal information is carried out, that is, financial information. This inhibits the usage of internet banking by customer. Therefore unlike traditional information system, the perceived usefulness and perceived ease of use may not fully reflect customers acceptance of internet banking. Research on customers acceptance of internet banking may therefore enhance the understanding of a customers belief to use internet banking. TAM is an established model of computer usage and has been validated through testing with a number of technologies (Davis et al., 1989; Igbaria et al., 1994, Lederer et al., 1998). And it has also been found that TAMs ability to explain attitude towards using an Information System is better than other models like Theory of Reasoned Action, Theory of Planned Behaviour (Mathieson, 1991 (CP)). The studies have proved that TAM explains around 40% of the variance in the usage extension ad behaviour. We will use Technology Acceptance Model (TAM) as a base model for this research, and adjust the model to reflect the characteristic of Internet banking and Trust. 2. Literature Review 2.1 Introduction to ICT The world is it the midst of general purpose technology revolution. Information and communication technology has developed in the context of rapidly changing business environment. For several years, there have been talks about topics like new global political and economic orders, liberalization of trade, growing environment concerns, deregulations, rapid technological developments especially information and communication technology and terrorists attack and so on. For business perspective only few are driving forces while others are just facilitating or inhibiting factors (Li, 2007 M). Two changes that have contributed to the current transformation are the changing nature of the economy and rapid development and proliferation of the ICTs. ICT in general and internet in particular are changing the way businesses are done all over the world. The internet is a source of data and information and its value depends on the provider, its relevance timeliness and accuracy (Lany and Powell, 2003 M). The internet has created new communication channel that is bringing people together cheaply, efficiently and presenting many opportunities and challenges for the business community. People around the world are using the internet to service their need and wants and thus the internet is presently the potential for extending markets, developing new products, services and achieving profitability (Combe, 2006). Due to this the worldwide number of internet users has increased from record 16 million in 1995 to 1.5 billion in 2008 (Internet worldwide stats, 2009). The ICT revolution has already led to some profound changes and many more yet to come. The internet is particularly important as it is acting as a contemporary platform on which many of the new important developments are taking place. 2.2 Internet Banking and India Internet banking has witnessed wide acceptance internationally and catching up fast in India with more and more banks entering into fray. The British legacy left behind large and small privately held banks. In the late 60s all the private banks were nationalised, which led to the emergence of the public sector banks. In 1960s banks used latest technologies in massive way, led in particularly by new private or Multinational Banks. In the context of online banking private banks have been early adopters whereas public banks are lagging behind. Reserve Bank of Indias survey in 2001 revealed that 46 major banks operating in India, around 50% of them either offered internet banking services or planned to offer in the near future. Only 1% of the internet users utilised internet banking services in 1998, the internet banking user base increased by 16.7% by 2000 (Icmrindia,). Major Banks like ICICI bank, HDFC bank, IDBI, Bank of Punjab etc were offering online banking services. The banks began to collaborate with utility companies to provide online services to the customers. ICICI bank collaborated with Infinity, which was already a leader in online banking in India to pay their online bills. HDFC through payment gateway allowed its customers to make online payments. As more banks entered into online banking fray, the competition between the banks deepened. This forced the banks to search for new market, customers and adopt new technology. Multinational and private banks have been very successful in India in setting up internet banking, this is because they already had automated banking environment. Most of the multinational banks have already have internet banking in other countries that can be copied in India. Unfortunately nationalised banks or public sector banks have been unable to evolve as fast as private banks because in many organisations there may be a mix of both automated and manual system, both the system runs parallel created by the small vendors. This creates chaos and makes network management a nightmare. ICICI Bank started banking way back in 1996 and other banks soon followed it. During 1995-99 ICICI Bank invested Rupees 50 million in online banking technology solutions. Year 1996 to 1998 marked the adoption phase because of the increased usage of internet in 1999 due to the lower internet service provider charges. The industry estimates the cost of internet banking at Re. 0.10 per transaction whereas the charges of other conventional methods such as ATM at Re. 0.45 per transaction, phone banking at Re. 0.35 per transaction. Thus, this shows that internet banking is more cost effective. State Bank of India (SBI), which is one of the oldest bank of India launched internet banking in July 2001 and it has 18,000 registered customers across 150 branches. Some of the reason why public sector banks are lethargic because there is a lack of zeal and mindset towards adopting new technology , second reason is the highly politicised unions which act as a barrier as they feel that internet bank ing will expose their low productive levels. The list of the Indian banks includes: Allahabad Bank Andra Bank Axis Bank Ltd. Bank of Baroda Bank of India Bank of Maharashtra Canara Bank Central bank of India City Union Bank Ltd. Corporation Bank Dena Bank Development Credit Bank Ltd. HDFC bank Ltd. IDBI Ltd Indian Bank Indian Overseas Bank Indusind Bank Ltd. Ing Vysya Bank Ltd. Kotan Mahindra Bank Ltd. Nainital Bank Ltd. Oriental Bank of Commerce Punjab National Bank Punjab Sindh Bank SBI Commercial and International Bank Ltd. State Bank of Bikaner Jaipur State Bank of Hydrabad State Bank of Indore State Bank of Mysore State Bank of Patiala State Bank of Travancore Syndicate Bank Tamilnad Mercantile Bank The Bank of Rajasthan Ltd. The Catholic Syrian Bank Ltd. The Dhanalakshmi Bank Ltd. The Jammu Kashmir Bank Ltd. The Karnataka Bank Ltd. Karur Vysya Bank Ltd. The Lakshmi Vilas Bank Ltd. The Ratnakar Bank Ltd. The Sangli Bank Ltd. The South Indian Bank Ltd. The United Western Bank Ltd. UCO Bank Union Bank of India United Bank Of India Vijaya Bank Yes Bank (Financial Technologies, 2009) The services offered by the banks on the internet are: Information Kiosks: In this the bank provides information about various products and services offered by the banks. The bank solves the queries of the customers through emails. Basic Internet banking: In this the banks allows the customers to open the account and pay bills. E-Commerce banking: Banks acts as a e-market place and enables the customers to transfer the money from their account, bill payment, sale and purchase of securities etc. The Wallis report (1997) stated that consumers will use those financial products and suppliers which offer best value for money and they are educated about it. Hence, in case of adoption of internet banking, it is necessary that bank should make consumers aware about availability of the product and how it adds value to the products. The perceived usefulness and in electronic banking according to Trethowan and silicone (Daniel, 1999) was sales orientation, convenience and low costs. The importance of perceived usefulness has been recognised in the field of internet banking (Gwiting, Ndubisi, 2006; Ericson et al. , 2005; Polatoglu and ekin, 2001). According to them usefulness is probability that technology can improve how user completes a task. However, Gerrard and Cunningham (2003) stated that perceived usefulness depend upon the services offered like checking bank balance, applying for a loan, paying bills, transferring money abroad and obtaining information on mutual funds. The grea ter the perceived usefulness of electronic banking services, the more electronic banking will be adopted. Threats to information security and fraud related to electronic transaction have increased at an alarming rate, resulting in reduced trust in transactions online (The Hindu, 2009). In online banking in India not many fraud activities have taken place. But in internet banking one cannot depend heavily on luck. No institution or bank can afford to depend on luck. The institutions have to adopt security procedures to suit the environment, in order to increase the trust ad faith in the user of online banking. Trust in online banking is new and emerging field of internet in management research. Literatures on online banking are focussed more on general (main). For example Khiaonarong (2000) examined electric payment system and discussed laws supporting electric payment system, risk reduction method. Tan and Teo (2000) explored intentions to use internet banking services through attitude subjective norms and behavioural controls. Daniel (1999) examined online banking issues like culture of innovations, market share and organizational restrictions. Mole (1998) examined behavioural issues pertaining to online banking, such as satisfaction, price sensitivity. Sathye (1999) studied the effect of security, ease of use, awareness and pricing. Trust has been defined in various ways. Trust is willingness to rely on an average partner in whom one has confidence (Moorman et. al ., 1993). Morgan and Hunt (1994) felt trust exists When one party has confidence in an exchange partners reliability and integrity. Mc.Knight and Chervany classifies the definition of trust in four types: deposition of trust, institution-based trust, trusting belief and trusting intention. Deposition of trust means the extent to which one displays consistent willingness to be dependent in general in any situation. This is primarily derived from psychology. Institution-based trust means that one believes that conditions conducive to situational success in an endeavour or aspect of ones life are in place. This type of trust is derived from sociology. Trusting belief is one where one beliefs that the other party has one or more characteristic beneficial to oneself. Trusting intention means that one is willing to depend on the other party even though one c annot control that party. Thrusting belief and trusting intention are primarily derived from social psychology. Husted (1989) states that the trust is a complicated construct because of wide spectrum of approaches that defines it, makes it difficult to define ad operationalise. Trust can be defined in three perspectives Cognitive, economic and social. A cognitive definition of trust represents an optimistic expectation for an outcome of an event. To be specific it is a confidence I the result of an uncertain event. Zand (1972) defines trust as it is a positive expectation about the outcome, with a lack of control over the actions of others. The transaction-cost theory of trust states that a potential trustor examines the cost and benefits inherent in trusting abother party. The cost of trust is examined because the trustee may ivolve opportunistic or detrimental behaviour to maximise self interest (RBSir). The social perspective states that the trust can arise irrespective of economic consideration. When a number of people share common values, beliefs are known as reference groups. This helps in building trust in the group. Howard (1994) states that the group has a strong influence on individuals beliefs and their valuation of products and services. The question of trust may be even more important in online banking environment than in offline banking environment. Because building trust is particularly important where there are risk and uncertainty. In the internet environment all the users are spread around the world that access critical files on computers and information via internet. Therefore, internet becomes risky from the view point of security because parties involved in the transaction that is customer and the bank are not at the same place. Customers cannot depend on physical activity, handshakes and body signals because the customer cannot see the teller. Because of this, customer trust is of major factor enhancing the growth of internet banking (Shu, Han). The growth of online e-commerce activity has encouraged a lot of research on user trust in online environment. Researchers in this area have generally used institutional trust developed by Zuker (1986). Institutional trust refers to the development of trust within a n economic framework and using third party mechanism such as certification ad regulation to establish trust. 2.3 Dimensions and antecedents of Trust Now we will discuss about trust and its dimensions, antecedents and consequences. The dimensions of the trust are: Reputation Perceived Risk Reputation: Reputation is one of the dimensions of trust. Reputation is defined as Overall quality character as seen or judged by people in general (Malaga, 2001). When customers uses online banking they would have banks reputation in mind. Reputation is very important for trust worthiness. The more the reputation of the bank the more it will encourage people to do online transactions. And if the people think that a bank has a poor reputation, then they will be discouraged to use online banking. Reputation arises from a particular brand name, previous interaction, endorsement from trusted third parties (Egger, 2000). Perceived Risk: Perceived risk is a key dimension of trust. The issue of trust arises as the bank and the customers are physically apart, difficulty in predicting problems, relationships are difficult to maintain and also the cyber laws are not well defined (main). The issue of trust also arises because economic transactions involve risk (main). Experienced online banking users have more information about online banking, thus leading to less risk and more trust in online transactions (Ba, 2001). The extent to which they trust the electronic system is likely to co-relate with trust when engaging in online banking (lee, Turban, 2001). When customers assess their trust certain issue that arises in their mind are competency of electronic system, network and download speed, reliability, connectivity and availability (Lee and Turban, 2001). The main issue to the customers would be reliability of the network because when customer transfers important financial data over the network there are provision that unauthorised parties ca intercept the transfer of information. Antecedents of Trust Shared Value Communication Opportunistic Behavior Shared Value: Extent to which both the partners have common belief about goals, policy and behaviours whether they are wrong or right important or unimportant (main). In online banking environment shared value means extent to which they have common beliefs on ethics, security and privacy. Ethical value means chances of being given incomplete or wroEthical value means chances of being given incomplete or wrong product information and selling customers information to the third party. Honesty and Ethics help build trust (Huemer, 1998, main). A number of surveys have found high level of customers concern about privacy in online banking (Ackerman et al., 1999, main). The main concern for customers is privacy violation which means misusing personal information of the customers. Due to technical development and low cost of data transmission, now it had become easier for companies collect data from the customers and sharing it with the third party (Clay and Strauss, 2000). Security is one of the most important factors in building trust. Customers believe that internet payment channel are not secure and can be intercepted, this reduces customers trust in online banking and discourages them in using it (main). However, recent development in the internet environment has made the customers less concerned about internet security (Swaminathan et al., 1999). Communication: Communication can be defined as sharing of formal as well as informal and timely information (Anderson and Narus, 1990). The variables of the communication are openness, speed of response and quality of information. Trust is build by openness in communication and their relationship with the bank. Geten and Straub (2001) research found that electronic system plays an important role in building trust with the customers. The ability of the site to communicate with the customer in terms of openness, speed of response and quality of information will influence the site to address the need of the customers, who in turn will respond to it. Thus, the higher the degree of communication displayed by the banks site, the greater will be the influence on the customers trust. Ways to increase online communication by the sites include fast response, personalized message and real-time interactions (Geten and Straub, 2001). Opportunistic Behaviour: Opportunistic behaviour can be defined as self-interest seeking guile (Williamson, 1975). The integrity of the online banks and obligations depend on the extent of regulatory control, which is a major determinant of the customers trust in online banking environment (Lee and turban, 2001, main). Customers have low level of trust due to high risk of opportunistic behaviour by online banks and poor developed rules (Clay and Strauss, 2000, main). Online identities can be forged (Ba, 2001, main), sites can be counterfeit (bailey and Bakes, 1997, main). Because of the lack of adequate regulatory control customers believe that their personal information may be used without their consent during or after navigation (Li et al., 2001). Klang (2001) stated that customers first access banks interest and then judge its integrity. Thus, it can be seen that integrity of the online bank is very important in gaining the trust of the customers. 2.4 Technology Acceptance Model Organisations invest in Information Systems for many reasons. For example cutting costs, producing more at the same cost, improving quality of services and products (lederer et al., 1998 (CP)). Users attitude towards the acceptance of new Information System plays an important role in successful adoption of the information system (Venkatesh and Davis 1996 (CP)). The more accepting the new information system the user are, the more they are willing to accept changes in their practices (Succi and walter, 1999 (CP)). Thus, the usage of a system can be an indicator of information system success. If the user does not rely on the system their behaviour would become negative for the Information System. One of the most widely used model for studying Information System acceptance is Technology acceptance Model (TAM) which helps in determining the use of system. The TAM model is an information system that shows how the users accept and use a technology. The model reflects that when a user is give or provided with a new software package, a number of factor will influence their decisions. They are: Perceived Usefulness: Fred Davis defines perceived usefulness is the extent to which a person believes that using a particular system would enhance their job performance. Finally perceived usefulness is influenced by ease of use and external variable, which could be training, documentation and user support. Perceived Ease of Use: Davis defined this as a the extent to which a person believes that using a particular system would be free from effort (Davis 1989). According to Technology Acceptance Model (TAM) the two factors are very important in determining computer acceptance. TAM is an adoption of the TRA (Theory of Reasoned Action) which was developed by Ajzen and Fishbein. TAM was developed by Fred Davis (1986, 1989) to explain software adoption based on TRA. Theory of Reasoned Action (TRA) is based on the assumption that consumers behave rationally and they evaluate systematically all the available information. TRA also assumes that people take into account the effect of their actions ad based on this reasoning make decision to whether take action or not (Ajzen and Fishbein, 1980 (CP)). Individuals will use computers if they feel that there would be positive benefits associated with it. Technology Acceptance Model hypothesises that: The more the perceived usefulness of the technology the more is the adaptation. The more is the ease of use of technology, the more is the adoption. The lower the benefit of the innovation the less is the adoption. In addition to individual characteristics like age, gender, qualification and previous experience in adopting technology, there are some social factors. They are: Apprehensiveness: it refers to the anxiety of using a new medium or technology (Rao, ). The adoption of the telephone in early years led to apprehensiveness. A firm would never risk by adopting indigenously developed technology as it involves cost and chances of failure are enormous (Rao, ). For example, bank employees are always worries about computerisation of data. Intrinsic Motivation: It leads to activities where there is no reward for the work but the activity itself. Intrinsic motivation arises from people need to feel satisfied and competent in dealing with their environment. There is an inner motivation to learn. For example: in case of new recruits, learning for them is an investment. Compatibility: it is the judgement of the decision makers to evaluate the compatibility of the new technology. The more the new technology is similar to the existing one, the higher is the confidence to learn the new technology. Social pressure: Social norm have most significant affect on system usage. Norm is the most frequent occurring and observable for the members of a particular society. For certain products, the social message that the product conveys to its users is the only benefit that the adopters receive (Rao, ). Enhanced Value: Apart from the benefits derived directly, there could be some benefits that are derived indirectly such as generations or enhancement of quality image. Such benefits can create extra value for the user. Therefore, adopting a new technology may not only be from the firms utilisation point of use but also the extra value added with the new technology. The more experience an adopter has, the better will be the understanding of a new technology. This will lead to the appreciation of the added value with the new technology by the user or the adopter. Technology suppliers commitment: new technology teds to carry high risk. A good commitment from the supplier can help reduce the level of risk related with it. It can be done through providing adequate information to the user. Resource commitment from the supplier can help the adopter to accept the new technology. In this world when the technology is changing rapidly the buyer is worried about the life of the technology that he is adopting. This problem can be delt by the supplier by promising to upgrade their product or buy back of hardware and change of the software. Adoption experience: adoption experience is the accumulated knowledge of the user and working relationship with the suppliers. Any previous experience with the technology helps the adopters to collect all the relevant information related to technology. The adopters know the needs and the requirements of the new technology and can understand the support required from the supplier of the technology. 2.5 Some other Information System Some other Information Systems are: Theory of Reasoned Action: Theory of reasoned Action (TRA) was developed by Martin Fishbein and Icek Ajzen (1975, 1980). Theory of reasoned action consists of three components: Behaviour intention Attitude Subjective norm. Behaviour intention is a measure of ones intention to execute a specified behaviour. Attitude is defined as an individuals positive or negative feelings for behaviour (Warshaw, Bagozzi and Davis, 1989). Subjective norm is a persons perception of what people think that the individual should do. Subjective norm is a type of pressure. A persons participation in any behaviour is influenced strongly by people around them. In this theory persons behaviour consists of two factors: Belief that certain behaviour would lead to some outcome. An evaluation of the outcome of the behaviour. Thus, if an outcome is beneficial for the individual then he/she tends to participates in the behaviour (Mischigan State University, 2008). Theory of Planned Behaviour: The theory of planned behaviour (TPB) was proposed by Icek Ajzen. Theory of planned behaviour helps us to understand how we can change the behaviour of the people. TPB is an extension of Theory of Reasoned Action of Ajzen and Fishbein (1975, 1980). There are three considerations that guide human behaviour. Behavioural belief: behavioural belief is an individuals belief about consequences of certain behaviour. Normative Belief: It is the perception about certain behaviour which is influenced by the judgement of others. Control Belief: Control beliefs are the belief that facilitate or impede the performance of behaviour. Behavioural Beliefs generates favourable or unfavourable attitude towards behaviour, normative belief results in social pressure and control beliefs gives rise to behavioural control. Thus, in combination attitude towards behaviour leads to the formation of behavioural intention. If the attitude is more favourable, the perceived control will be greater and the persons intention to perform the behaviour will be stronger (12 Manage, 2009). Task Technology fit Model: Task technology fit model was developed by Goodhue (1995), Goodhue ad Thompson (1995) at individual level. At group level it was developed by Zigrus and Buckland (1998). TTF model states that a good fit between technology, task and team can lead to better performance (Dennis et al, 2001, Goodhue, 2005, Zigrus and Buckland, 1998). In TTF Goodhue examines three factors: 1. Individual ability 2. Technology characteristic 3. Task requirement. He evaluates the influence of these three factors on performance and user evaluation of information technology system. Goodhue argues that TTF is the extent to technology functions, matches task requirements and individual abilities. Goodhue and Thompson (1995) developed a measure for TTF that consists of eight factors. They are as follows: Quality Locatability Authorization Compatibility Ease of use Production timeliness System reliability Relationship with the users. Each factor is evaluated between two to ten questions with responses on seven point scale from strongly agree to strongly disagree. However TTF focuses only of fit between user and technology and task and technology. It ignores the interaction between user and task (Mehlan et al, 2006). Goodhue argues that user evaluation is a substitute of TTF and it is appropriate for both mandatory and voluntary user information technology system. TAM is one of the models that are used widely to explain the factors that affect user acceptance of Information System (Suh, Han). However traditional information system is different from Internet Banking, which uses emerging technology like WWW and internet. With the advancement of WWW and internet, various researches have adjusted TAM to WWW environment to overcome TAMs lack of task forces. Recent studies of user acceptance of WWW have paid attention to perceived playfulness, because WWW is used both for pleasure and play. The studies have verified that perceived playfulness has a significant impact on user acceptance of WWW. Technology Acceptance Model 2 (TAM2) is the extension of TAM and it includes additional constructs like social influence process (Subjective norm, Voluntariness and Image) and cognitive instrumental process (job relevance, perceived ease of use, output quality). TAM2 reflects three interrelated social forces faced by an individual to adopt or reject a new technology. They are: Subjective norm, Voluntariness and image. Subjective norm can be defined as persons perception that most people who are important to him think he should or should not perform the behaviour in question (Fishbein and Ajzen, 1975, p.32). Subjective Norm is included as a direct determinant of behavioural intention in Theory of Reasoned Action (Fishbein and Ajzen, 1975). The reason for the direct effect of subjective norm is that people may choose behaviour even if they do not agree towards the behaviour or its consequences, but if one or more referent thinks that they should then they are influenced to do so. Voluntariness and compliance with social influence: mixed findings regarding subjective norm was discovered by Hartwick and Barki (1994). After separating the respondents into mandatory and voluntary usage, they found that the subjective norm had a great effect on mandatory but not on voluntary setting. Casual mechanism is referred as compliance. TAM 2 theorizes that the direct compliance based effect of subjective norm on intention, perceived usefulness and perceived ease of use will occur on mandatory but not on voluntary system usage setting (Venkatesh and Davis, 2000). Voluntariness as a moderating variable defined as the extent to which potential adopters perceive the adoption decision to be non-madatory (Agarwal and Prasad, 1997, Hartwick and Barki, 1994). If the users do not accept the information system the organisation will not be benefitted from the information system (Davis, 1993. Davis ad Venkatesh, 1996). The more willing to the information system users are the more willing they are to make changes in their practices and time to start using new information system (Succi and Watler, 1999). Usage of a particular system is an indicator of information system success and acceptance of computer. If the users do not trust the system and its information then their behaviour towards could be negative. Therefore, it is important to find out the reason why people use or do not use the information system. This information will help both the designer and the developers in their work (Mathesion, 1991). According to Technology Acceptance Model (TAM), the two factors, Perceived usefulness and perceived ease of use are of primary significance for computer acceptance. This is because if a user feels that using a particular information system will enhance his job performance and would require less effort, then only the user will use the information system. In case of online banking and Technology Acceptance Model, Perceived Usefulness is the degree to which individual feels that using online banking will enhance his/her performance and perceived ease of use refers to the degree to which an individual feels that using online banking would be free from effort. Thus online banking involving complex procedures or requires customers to learn new software will discourage people from using online baking. The case to TAM will arise only when people trust online banking and use it, TAM will be not used when people are not using online banking. TAM comes into play or use only when people use onli ne banking. Thus, this shows that trust is the centre to online banking and TAM and it is a basic foundation for the use of online baking and Technology Acceptance Model. Therefore, we hypothesise that as trust increases the use of online banking also increases. Hypothesis Stated in formal fashion, my study two five hypothesis. There is a positive relationship between ease of use and trust. There is a positive relationship between perceived ease of use and trust. 3. Research Methodology: 3.1 Research Design: The research design for this study investigates the factors that have an influence on customers acceptance of internet banking. I present an additional belief, trust and its dimensions to the Technology Acceptance Model to reflect the importance of trust in online banking environment. Online banking is of great use to the customers. It helps in saving time, cost, it can be used at anytime of the day irrespective of the location. All these benefits enhance the performance of the customers banking activity. A customer will therefore expect these services when he/she uses online banking. Trust is identified by three main antecedents. They are shared value, communication and opportunistic behaviour whereas Technology Acceptance Model is identified by two main characteristics like Perceived ease of use and Perceived usefulness. Verifying the TAM-Trust related hypothesis in the context of Online Banking will help us determine the importance of trust in Online Banking. Shared value is the extent to which the customers and bank share a common belief about what goal, policies are important or unimportant, right or wrong (Morgan ad Hunt, 1994). Based on the operational definition of Perceived usefulness, I assume that Perceived usefulness will help establish trust or shared value if the customers believe that online banking is useful. (Suh, Han). H1. Perceived Usefulness has a positive impact on Shared Value of the customer. Trust id negotiated through openness in communication. Communication has various variables like speed of response, quality of information and openness (Mukherjee and Nath). A customer will trust online banking only when his/her communication with the bank is fast, open and useful. Slow communication and low response rate from the bank will discourage people from trusting the bank. Thus, more the communication will be useful and open to the customer the greater will be the trust between the customer and the bank. H2. There is a positive relationship between communication and Perceived Usefulness in building trust. Opportunistic behaviour is conceptualised as regulatory control and information asymmetry. Due to high risk of opportunistic behaviour by online banks and poor developed rules and regulations, customers have low level of trust in online banking (Mukherjee and Nath). Thus, less opportunistic behaviour showed by the bank will increase the level of trust and usefulness from the customers point of view. H3. There is a negative relationship between Opportunistic Behaviour and Perceived Usefulness. Perceived ease of use is the extent to which using of a system would be free from effort (Davis, 1989). If the terms and conditions of the shared value of the bank is easy and free from effort then it will enhance trust and encourage customer to use online banking. H4. There is a positive relationship between Perceived ease of use and shared value. The customers trust also depends upon his/her communication with the bank. Communication is directly related to Perceived ease of use. If the communication of the customer with the bank is effort free and comfortable, customers would be encouraged to use online banking. So we hypothesise H5. There is a positive relationship between communication and Perceived ease of use. 3.2 Research Method This chapter covers the operational description of the research explaining the methodology strategy used in this study. In order to achieve the research objectives, the most appropriate method to collect the data. Data is collected both by primary and secondary research. The reasons for using these methods and how the overall study was conducted will be explained in this section. The methodology used has some limitations which will be discussed at the end of this chapter. Research is a systematic study on a particular matter employing facts investigation and data collection (Collins, 1989). Research can also be defined as a systematic and methodical process of enquiry and investigation with a view of increasing knowledge (Collins and Hussey, 2009). The objectives of the research can be summarized as follows: To provide solution to the problem. To explore and analyse more general issues. To generate new knowledge To explain new phenomenon. (Collins and Hussey, 2009) Research is conducted using two main strategies. They are Qualitative and Quantitative. (Bryman and Bell, 2008). Quantitative method is a phenomenon which concentrates on phenomena of measurement. In this the data can be shown in mathematical format or in statistical software by producing different charts and graphs. In simple words quantitative method can be measured. 3.2.1 Choosing Quantitative method This research mainly used quantitative method because quantitative method can be construed as a research strategy that emphasizes quantification in the collection and analysis of the data and also because: It involves a deductive approach between theory and research in which the accent is placed on the testing of theories. It involves a view a social reality as an external, objective reality. It incorporated the practices and norms of the natural scientific model and of positivism in particular (Bryman and Bell, 2008). Quantitative Data Analysis There are two types of quantitative data analysis. Descriptive analysis Inferential analysis Descriptive data analysis is also called as exploratory data analysis. It is concerned with describing data, it is also useful for summarising data and presenting it in tables, charts, graphs and other diagrammatic forms which enables us to comprehend pattern and relationships which are not apparent in raw data. Graphical presentation does not only present data in more compact form but the form that positively aids hypothesis confirmation (Hussey and Hussey, 1997). The four main groups of techniques which can be used are: presenting frequencies, measuring location, measuring dispersion ad measuring change. Inferential data analysis is also known as confirmatory data analysis. It involves using quantitative data collected from a sample to draw conclusions about a complete population (Hussey and Hussey, 1997). Four groups of inferential statistics which are used while conducting confirmatory data analysis are: estimating form samples, measuring associations, measuring difference, forecasting. [WHY DISCRIPTIVE] 3.2.2 Primary Data Primary Data Collection: Primary Data is the information that is collected first hand by the author (William, 2003). The data is original and is used for the first time in the research. There are many methods of collecting Primary data for example interview, questionnaire and observations. This research adopted self-completion questionnaire. It is sometimes referred to as self-administered questionnaire. In self-completion questionnaire the respondents answer the question by completing the questions themselves (Bryman and Bell, 2008). Self-completion questionnaire can be done in several forms. One of the most used methods is mail or postal questionnaire. In this the questionnaire is sent to the respondents through the post, who in turn after filling the questionnaire is asked to return it by post. In many ways self-completion questionnaire and interview are similar methods of business research. The basic difference between them is that there is no interviewer to ask the question, the respondent must read the questions and answer themselves (Bryman and Bell, 2008). As there are no interviewer to ask the question must be simple and easy to follow. As compared to interview the self-completion questionnaire should be: The questionnaire should have fewer open questions and more closed questions because they are easier to answer. Questionnaire should have easy-to-follow to reduce the risk that the respondents will fail to answer (Bryman and Bell, 2008). 3.2.3 Why Questionnaire In this research the author has use questionnaire to collect primary data. Some advantages of self-completion questionnaire over interview are: It is cheaper to Administer: The cheapness of the self-completion questionnaire is especially advantageous if you have a sample that is geographically widely dispersed (Bryman and Bell, 2008). Interviewing can be expensive. The postal questionnaire will be much cheaper because interviewing involves a lot of time as conducting personal interview is a long process. Thus, the postal questionnaire enjoys cost advantage. Quicker to administer: questionnaire can be sent out by post or distributed in large numbers at a same time but in interviews conducting personal interview takes a lot of time. Many questionnaires can be sent out by post in one batch. Also, it is very important to note that all the sent questionnaire do no t come back immediately ad they may take several week to be returned. There may be a need to send a follow up letter to those who fail to return the questionnaire. No variability of the interviewer: Self-completion questionnaire do not suffer from the problem of question being asked in different ways by the interviewer. Convenience for respondents: Completing a questionnaire is convenient for respondents because they can fill the questionnaire whenever they want and at the speed that they want. 3.3 Sample Selecting a sample is a fundamental element of a positivist study. A sample is made up of some members of a population. A population may refer to a body of people under consideration for research purpose. (Hussey and Hussey, 1997). A good sample is one in which the result obtained for a sample can be taken as true for the whole population. A sample technique is broadly classified in two categories: probability and no probability sampling technique. In probability sampling technique sample is selected randomly from a sampling framework. In a non probability a sample is drawn based on the personal judgement of the researcher (Malhotra, 2007) This study has used non probability sampling technique to collect data because of the restriction of time, unavailability of sample framework of online banking users in India. The study conducted online surveys to collect data. For online surveys a snowball sampling technique was to distribute questionnaire online. An initial group of 20 respondents were identified from personal sources. These respondents were asked to suggest people and questionnaire was distributed among them. The final valid respondent sample to the structured questionnaire consisted of 120 internet surfers in India. The respondents chosen were students, professionals, self-employed and housewives. Reliability and Validity A research is evaluated using two most prominent criteria namely reliability and validity from a methodological point of view. Reliability refers to a consistency for a measure of a concept in a piece of research (Finn et al., 2000). Reliability has greater importance in a quantitative research. For example: if you ask the same question to a respondent repeatedly, the answer would be same (Bryman and Bell, 2008). According to Bryman and Bell (2008, p.165) Validity refers to the issue of whether or not an indicator that is desired to gauge a concept really measures that concept. Validity is the most important criterion of research. It is also concerned with the integrity of the conclusion that are generated from research. There are different types of validity. There are mentioned below: Measurement Validity: It is also known as Construct Validity. Measurement validity primarily applies to quantitative research and to the search for measures of social scientific concept. It is generally related to whether or not a measure that is desired of a concept really does reflect the concept that it is supposed to be denoting. Measurement validity is very much related to reliability. If a measure of a concept is unstable, fluctuates then it is unreliable. It cannot provide a valid measure of the concept (Bryman and Bell, 2008). Internal Validity: It is concerned with a question of whether a conclusion that incorporates a casual relationship between two or more variable holds water. For example: In our study shared value causes trust, can we be sure that it is only shared value that is responsible for causing trust and nothing else. Thus, Internal Validity raises question: how confident can we be that independent variable is responsible for the change identified in dependent variable. External Validity: External Validity refers to the question of whether the result of a study can be generalised beyond specific research context. How people or organisations are selected to participate in research becomes very crucial in this issue. It is because of External Validity that the quantitative researchers are so keen to generate samples. Ecological Validity: The issue of Ecological Validity relates to the naturalness of research approach and has considerable relevance to quantitative research. The criterion is concerned whether social scientific findings are applicable to peoples every day, natural social setting. Thus, business research may sometime produce findings that are technically valid but little to do with the happenings in the peoples everyday life. Furthermore, result deriving from a study using questionnaire the unnaturalness of the fact of having to answer a questionnaire may mean that the findings have limited Ecological Validity, but the questionnaire may have measurement validity and reasonable level of internal validity. (Bryman and Bell, 2008).

Tuesday, December 17, 2019

Anastasia Essay - 1247 Words

nbsp;nbsp;nbsp;nbsp;nbsp;Anastasia nbsp;nbsp;nbsp;nbsp;nbsp; Anastasia, Grand Duchess of Russia, was a very mischievous little girl with a sharp sense of humor (McGuire 18). She was always described as having long fine fingers and baby blue eyes. As she grew older, her personality changed drastically because of her dramatic childhood. Her eyes and fingers remained the same but her wonderful personality had disappeared (Klier and Mingay 193). The daughter of Czar Nicholas II, Anastasia, may have survived the Russian Revolution, but what became of her, baffled historians. Czar Nicholas was the last emperor of Russia and ruled from 1894 until 1917. Throughout his life Nicholas lived within the shadows of his father (Lieven 1).†¦show more content†¦Russia was quickly declining so Nicholas decided to ask Sergey White to advance the Russian industry as quickly as possible. The economy grew rapidly and as a result, poor working conditions and low wages increased (Lieven 3). Nicholas had so much trouble with the Bolsheviks that he decided to Abdicate. All of the Romanovs became prisoners of a new government (King 298). To ensure their safety, the Imperial Family was forced to leave Russia and go to Ekaterinburg at once (Lieven 3). Here they were imprisoned in the Impatiev House. On July 16, 1918, all the members of the Imperial Family had been killed in the basement of the Impatiev House (King 376). Anastasia had been shot and beaten, but had enough might to suddenly sit up and scream until she had been silenced. The massacre had only taken 3 minutes and in that short time span the room was covered with blood (Klier and Mingay 52). The 11 bodies were then taken to the Four Brothers Mine by Yurovsky (Halliday 134). Later that night, they were burned and the remains were placed in a mineshaft (McGuire 39). nbsp;nbsp;nbsp;nbsp;nbsp;Many stories were going around Russia at this time. No one knew for sure where the tsarina and her daughters were. Some people thought that she and her daughters had been taken to Perm by the Bolsheviks, but others thought that this wasShow MoreRelatedThe American Dream Myth : Anastasia And Anastasia1422 Words   |  6 Pageswith social class affects how one operates in life when it comes to making decisions and motives for committing actions. A childhood motion picture that depicts this idea is Anastasia. Anastasia is an American produced, fictional musical loosely based off of the Russian Empire Grand Duchess Anastasia Nikolaevna Romanova. Anastasia follows the orphaned Grand Duchess Anya, who suffers from retrograde amnesia, on her quest to find her family. She is joined by two swindlers who seek to con the Dowager EmpressRead MoreThe Story of Russian Princess Anastasia Romanov717 Words   |  3 Pages Almost everyone knows the story of Russian Princess Anastasia Romanov, but not everyone knows about her father, Tsar Nicholas II, and his role in his family’s banishment and death. The last Tsar of Russia was forced to abdicate his throne by the Russian people who wanted change, like how he is allegorized by Mr. Jones in George Orwell’s Animal Farm. Tsar Nicholas II is the eldest of the six children that Tsar Alexander III and Maria Feodorovna. The Tsar was born on May 18, 1868, in Pushkin, RussiaRead MoreAnastasias Pov : Anastasia Pov 1717 Words   |  7 PagesAnastasia s Pov: I am running. As fast as my feet will let me. He was very, very drunk. He always is. I race up the stairs and lock my bedroom door. I hide under my bed, he won t see me here. I am truly frightened. Stupid girl. He yells outside my door, his hands hitting the door hard. I am going to teach you not to fucking be late ever again. He hits the door again and then I hear him run down the stairs and it suddenly goes quiet. I am scared. I hope he will leave. I come out of underneathRead MoreIvan the Terrible Essay956 Words   |  4 PagesIvan to take a wife. He held what was little more than a beauty contest amongst the noble women. Ivan was charmed by the beautiful Anastasia Romanovna, and married her soon after. It was against all odds a love match; there would be 13 years of happy marriage, although only two children would survive to adulthood. During these happy years of marriage Anastasia acted as quieting force in Ivans life. It was in these years that Ivan would consolidate Russia, he ruled advisory counselor, andRead MoreEssay on Love the Right Chemistry by Anastasia Toufexis544 Words   |  3 PagesThe article love: the right chemistry by Anastasia Toufexis efforts to explain the concept of love from a scientific aspect in which an amateur will understand. Briefly this essay explains and describe in a scientific way how peoples stimulation of the body works when youre falling in love. The new scientific researches have given the answer through human physiology how genes behave when your feelings for example get swept away. The justification for this is explained by how the brain getsRead MoreWhat Is Money Laundering?1551 Words   |  7 Pagesliquor smuggling, and other rackets and came under the guidance of crime boss Giuseppe Masseria. Lansky and Siegel had also established a team of certified murderers for hire, the model for the later Murder, Inc., headed by Louis Buchalter and Albert Anastasia. Lansky became an established citizen in 1928. By 1936, Lansky had reputable gambling operations in Florida, New Orleans, and Cuba. These gaming operations were effective as they were initiated upon two originations which were the methodical proficiencyRead MoreMajor Risk Factors For Many Residents Living At St. Augustine1337 Words   |  6 PagesFloodplains can be recharged in areas of groundwater and reduce the frequency and duration of low flows of surface water (â€Å"Flood hazard†, n.d.). Some local natural floodplains in St. Augustine and St. Johns County are the Guana River State Park and Anastasia State Park. According to the demographic profile of St. Augustine, many of the residents live near those floodplain areas (â€Å"Flood hazard†, n.d.). Documents of previous floods show that St. Augustine is prone to flooding from normal rainfall coincidingRead MoreKitchen Witches : A Comedy Written By Caroline Smith And Directed By Anastasia Van Allen969 Words   |  4 PagesKitchen Witches Review Kitchen Witches, a comedy written by Caroline Smith and directed by Anastasia Van Allen, has quite a deceptive title, it is not set with a pair of Witches and their day to day lives†¦ Well that is close to truth. The play’s magic not focused on potions and charms, but is how easily the truth is hidden by a petty grudge between two women’s antics to reveal something so much more meaningful. The performance was set in present day Boise, Idaho at a community studio, with us, theRead MoreThe Romsnovs: The Final Chapter1183 Words   |  5 Pagesauthentication of bones belonging to the Romanovs. Another large section is dedicated to discrediting many impostors that arose in the time after their deaths such as solving the mystery of Anna Anderson, a woman who claimed to be the missing Grand Duchess Anastasia Nicholaevna. In the biography, Massie would recount all of this and how the death of the Romanovs would baffle countries across the globe into trying to uncover the secrets of their deaths and how it would forever change Russia’s view on governmentRead More Rasputin Essay931 Words   |  4 Pagesglance and predict the weather for farmers. This cast a religious glow of sanctity about him. These were all factors that led up to him presenting himself to the Imperial Palace in 1905. Besides gaining the friendship of Grand Duchess Militza and Anastasia, Rasputin also gained the trust of Anna Vyrubova, Empress Alexandras trusted companion. It was under the recommendation of the Grand Duchesses and Anna Vyrubova that Rasputin was summoned to appear before Alexandra. He showed up in crude country

Monday, December 9, 2019

William Shakespeares Othello Argumentative Essay Example For Students

William Shakespeares Othello Argumentative Essay William Shakespeares OthelloTragedies frequently focus on a tragic hero that has a flaw that ultimately leads to his downfall. That flaw is commonly referred to as a tragic flaw that is inborn to the person and can reflect his background. In Aristotles Poetics, he discusses the theory of tragedy and what criteria is essential in an ideal tragedy. According to Aristotle, the tragic flaw is the most important part of the hero and the events that occur in the work is a reflection of that flaw. A tragic flaw is essential in a true tragedy. In William Shakespeares Othello, Othello is a prime example of an Aristotelian tragic hero. His gullibility and jealousy are the main reason of his downfall. Othello deals with love lost because of gullibility and jealousy. Aristotles theory of tragedy, found in the Poetics, deals with the characteristics of plays that make them a true tragedy. Those characteristics are essential in giving a play its true definition. According to Aristotle, the life and soul of tragedy is plot. Incidents in the plot have the best effect if they occur unexpectedly, and in consequence of one another. A great tragedy grips the audience with the plot. Aristotle also states that the sense of the inevitable must be present in tragedy. The tragic hero is also another important factor in an Aristotelian tragedy. The central character must be noble and have a higher stature than most men. The tragic hero must also have better qualities than secondary characters but must also exhibit flaws. The most important part of an Aristotelian tragic hero is the tragic flaw. The flaw is inborn to the person. He must have that flaw throughout his life and it will play the primary role in his downfall. The flaw can also reflect the tragic heros background. Another part of the central character is that he is destroyed by himself, not by others, bad luck, or depravity. These are the criteria necessary to be classified as a ideal tragedy. Othello meets the criteria to be called an Aristotelian tragedy. The main character of Othello is a classical example of a tragic hero. His basic elements matches him up to a true hero as defined by Aristotle. Othello was a soldier all his life. Due to his Moorish descent, he experienced many things that a normal Venetian didnt experience. His nobility and rank of a general made him of a higher stature than anyone else. His nobility and background made him a greatly respected person. That nobility also what attracted Desdemona, his wife. Othello also exhibited great leadership qualities that he earned in the field of battle and by being a leader in Venice. Othellos background also was of a unsophisticated one. He came from a land of bartering and barbarians. His background affected his attitude. Othello was a person that was innocent and base in nature. He was influenced by the way his life was going on. Othellos statement, Perdition catch my soul but I do love thee. And when I love thee not, chaos is come again. (act 3, sc. 3, line 100), showed that he felt his life was only in order if he is loved. His innocence and lack of sophistication is revealed in this statement. The people around him also knew of Othellos attitude. Iago was very quick to see this. In his first soliloquy, Iago said the moor is of a free and open nature that thinks men honest that but seem to be so. (1,3,442) Iago knew of Othellos weakness. Othellos innocence and baseness made him susceptible to being undermined by people. Iago also reveals his plan to use the moors gullibility against him. Othello was clearly a person who believed appearances versus reality. When Othello was told about an affair between Desdemona and Cassio, he started to become jealous. Being that person who believes appearances, he wanted ocular proof of Desdemonas infidelity. Even a superficial piece of evidence would have been sufficient. In his statement, Give me a living reason she is disloyal.(3,3,446), Othello revealed that he would believe in anything he saw. This is a clear example of his gullibility and that appearances could fool him. The Crucible8 Essay He lived for the love and care of a person. The way that he was turned to hatred was ironic. Even though Othello was Shakespeares most loving man, he was subjected and succumbed by the pull of Iago.(Stoll, 323) Iagos scheming inevitably caused Othellos turn for the worse. Othello had suffered an overpowering delusion.(Stoll, 325) The overpowering delusion that he suffers was due to his beliefs of an affair. His primal qualities led him to easily believe anything that was presented to him. Othellos false beliefs drove him into extreme anger and made him plot to kill his wife and lieutenant. The final stages of the play reveal the true gullibility of Othello to the other characters. Iago agreed to help kill Desdemona and Cassio. With Othello, they made a vow of brotherhood to kill his wife and his former lieutenant. When Othello finally did go through with his plan, the dying Desdemona reassured her faith to him. Othello believed Iago and his own false deductions instead of his own wife. Desdemona didnt realize Othellos flaws. In her statement, And but my noble moor is true of mind and made of no such baseness as jealous ones are, it were enough to put them to ill thinking.(3,4,25) she judged Othello opposite to what he really was. She didnt suspect that Othello would suspect her for an affair. In reality, Othello was a gullible person drawn into jealousy and falseness by Iago. Othello had accomplished his plan of killing his wife and destroying a marriage that no reason to be torn apart. Desdemona was the victim of a plot by a gullible man drove into rage because of lies. When Emilia confronted Othello, he admitted to killing his wife but said that she was untrue to him. Emilia repeatedly told Othello that it wasnt true. He responded to Emilia by saying, Ay, twas he that told me on her first. An honest man he is, and hates the slime that sticks on filthy deeds. (5,2,179) Othellos gullibility is also exhibited in this statement. He believed Iago and his lies because he thought that Iago was honest. Othello was drawn in by the appearance of Iago that was given to him. Iagos scheming was so powerful that Othello praised him for his honesty. Othello and Iago were finally caught and their plot was revealed. Iago didnt go through with his vow to kill Cassio. Othello told the officials his reasons for committing murder and that Iago told him of an affair. Iagos response was, Demand me nothing. What you know, you know. From this time forth, I never will speak a word.(5,2,335) Iago told Othello and the others that he didnt tell Othello about an afar. He just made insinuations and suggestions about one. Othello really didnt know of an affair between Desdemona and Cassio. His gullibility led him to be overtaken with appearances. Othello didnt make any real attempt to find out the truth. He relied on Iago to provide a picture of what he thought happened. Because of Othellos mistake to seek the truth, his inevitable downfall became realized when he killed himself. Othellos tragic flaw was being gullible. His background of baseness made him a weak minded person. Iago was an evil man who wanted to see the downfall of Othello. He recognized Othellos flaw and used it to his benefit. Iagos scheme consisted of images and appearances of an affair, but not evidence of one. Othellos stature, and downfall make him a true tragic hero. His tragic flaw, gullibility, the defining criteria of a tragic hero, made Othello a man that he never thought he would be. Othello became a person filled with rage and hatred who wanted to resolve the chaos in his life by putting an end to the affair that he believed was going on. All the structures of Othellos character makes him a prime example for a Aristotelian tragic hero.Shakespeare Essays

Sunday, December 1, 2019

Zeus And Hera Essays - Prayer, Spiritual Practice,

Zeus And Hera Many traditions had developed within American culture that breached this wall of separation. For example, our coins have "In God We Trust" printed into them, The Pledge of Allegiance still contains the phrase "under God," and many of our governmental ceremonies have prayer as their opening activity. For years, many public school districts mandated that the school day begin with some sort of prayer. The first case to come to the Supreme Court regarding school prayer was that of Engel v. Vitale in 1961. A group of ten parents sued the Board of Education of Union Free School District No. 9 in Hyde Park, New York for having the following prayer said aloud in the presence of a teacher every day: "Almighty God, we acknowledge our dependence on Thee, and we beg Thy blessings upon us, our parents, our teachers, and our Country." The prayer was composed by the New York State Board of Regents, which is a state agency, and which had broad supervisory powers over the state's public schools. The prayer was part of the Regents' "Statement on Moral and Spiritual Training In The Schools." A class action was brought by a set of ten parents who felt the prayer was contrary to the religious practices of both the parents and the students, and they maintained that the state's use of this prayer violated that part of the Federal Constitution that states "Congress shall make no law respecting the establishment of religion." This clause was made applicable to state law by the Fourteenth Amendment to the Constitution. The lower courts that heard the case upheld the power of New York to allow the prayer to be said each day as long as no student was forced to participate or if the student was compelled to do so over the parents' objection. Bibliography Selected Historic Decisions of the U.S. Supreme Court - http://www.law.cornell.edu/supct/cases/historic.htm Read about how school prayer played a role in the 1996 election at Education Week On The Web: http://www.edweek.org/context/election/prayer.htm

Tuesday, November 26, 2019

Essay Texting and its Influence on Your Studying Capabilities

Essay Texting and its Influence on Your Studying Capabilities Essay: Texting and its Influence on Your Studying Capabilities Modern society is obsessed with computer technologies. Adults and teenagers, especially youngsters, seldom write even a few notes in their notebooks. Instead, we send emails and texts. In a word, were texting on any possible occasion, considering it to be quicker, more convenient and most of all, more modern than old fashioned hand writing. Communicating via sending short messages has already transformed into a separate communication style. Terms such as textese, meaning sms language, and textisms, which refers to mnemonic devices or word-shortening are widely used via cell phones and on Internet social networks. Obviously, one should make use of all modern communication trends and devices, but one question arises: whether such an influence of technology is positive or negative? So, is texting harmful or beneficial? It turns out that theres no correct answer to this question. Surprisingly, expert opinions on this topic differ greatly. So, according to Dr. Crispin Thurlow, a language and communication expert, the language used in texts can be classified as adaptive and additive rather than necessarily subtractive (Lanir, 2011). Surely such a high evaluation can be viewed as positive. Even so, the fact, that such an opinion was expressed almost 10 years ago should be taken into account, as compared to 2003, the number of children and teenagers communicating via text messages has increased significantly. In 2009, Clare Wood and Beverly Plester became interested in the way texting might influence the level of general literacy and academic achievement. Within this research, abbreviations used in texting were studied. As Dr. Thurlow didnt state any negative ways that ‘textese’ and ‘textisms could affect the studying capabilities of schoolchildren and students, these two experts began with the assumption that texting language was likely to contribute to the literary skills development of those who used it. (Lanir, 2011). However, the findings of the newer research showed that newly-coined shortcuts, called homophones, non-essential and initial letter omission, which initially aims to write the text message quickly and simplify it as much as possible, generally tended to devastate language skills in general, and spelling skills in particular for those who commonly engaged in texting. This resulted in poor academic achievements for students in regard to writing tests and grammar. This drop in language skill is connected to the fact that each written word corresponds to some definite mental template, which in its turn is connected with a phonological sounding system of the language (Nauert, 2011). It goes without saying, that theres no use in lagging behind, and its important to keep up with the times and with modern communication tendencies. On the other hand, it may turn out to be a good idea to draw a distinct line between formal, standardized language and Internet clichà ©s, as well as patterns that are used only for online chatting or on social networks, particularly when texting, and most especially when texting friends and family members via mobile phones. It has to be kept in mind that a well-rounded education demands certain standards, including excellent writing skills. These skills are important for composing resumes or application letters, or any other kind of official writing that has nothing to do with modern slang and texting. Our custom essay writing service is ready to provide you with a non-plagiarized custom written paper on texting related topics.

Saturday, November 23, 2019

The 3-Step Change Management Process That Will Boost Your Career

The 3-Step Change Management Process That Will Boost Your Career Over the course of 40 years, Dr. John Kotter developed an 8-step change management process. Its scope is incredible. And its worked in organizations big and small for decades. Do you want to lead change in your team, your company, or even in your own life? If so, theres huge value there. As marketers, though, we can take a leaner approach and apply it even faster even by the time youre done reading this post. This post is for you if you want to: Lead lasting change in your marketing team, Transform the way you (and your team) work, And become more productive than ever. The 3-Step Change Management Process That Will Boost Your Career by @jordan_loftis via @The 3-Step Change Management Process That Will Boost Your Career You will learn three simple steps to leading (and sustaining) change. Create a sense of urgency. Take action and find quick wins. Go back through the loop to sustain momentum. As youll see, each step is directly driven by your teams goal. At , we talk a lot about goals why? Theyre incredibly important. In fact, our own research shows marketers who set goals are 429% more likely to be successful than those who dont. Im not talking about fluffy New Years resolutions, either. (^^^ After all, the University of Scranton found that 92% of people who make those resolutions dont hit them.) Instead, were tackling specific and challenging goals, which the classic study, Goal Setting And Task Performance, found was a linchpin of success. Specific means there is a number and a deadline on your calendar. Challenging means it will achieve significant growth in your team, organization, or personal career. For example, you may want to leverage this change management process to revolutionize the way your team works. Leverage this change management process to revolutionize the way your team works.The Specific And Challenging Goal To Fuel Your Change Management Process We work with thousands of marketers in over 100 countries. Our customers range from companies like Microsoft to agencies and lean marketing teams. One thing unites them all: they are done with the old, outmoded, crappy way marketing works. Theyre sick of endless spreadsheets Theyre over confusing email threads Theyve had it with single-function tools that werent built for marketers in the first place We call the old way of doing things  makeshift marketing. And it refers to mashing disconnected tools into one martech stack. And thousands of smart marketers are sick of letting it gobble up their budgets and productivity. While thousands have defeated this ugly beast its taken a dead-serious approach to do so. In this case, setting the specific and challenging goal of  transforming from the old way things worked, to the new way. You have to overcome the reality of change aversion. This is our natural inclination to resist change and even to reject a new solution as bad because its different. You have to fight this in your team - and even in yourself. Setting a specific and challenging goal is your first step. It might look something like this: We will refine all of our marketing processes for maximum efficiency by July 1, 2018. Your goal specifically outlines the change youre after AND puts a date on the calendar. This is the focusing force of your new change management process: Create a sense of urgency around accomplishing your goal. Enable action toward your goal by racking up quick wins. Sustain positive momentum even after your goal is accomplished. Step One: Create A Sense Of Urgency First up, lets talk urgency. Recently, I met with my boss, our head of demand generation. Id been working on a project with a pretty important goal. And while I was working hard, my progress didnt have quite the velocity we needed it to. So we had a frank conversation. He told me, Were accelerating the timeline. Were hitting your goal this week, not next month. Thats right my roadmap had a few weeks left to make the project successful. After this conversation, there was just five days! Thankfully, Nathan didnt simply dump an impossible deadline on my shoulders. He offered to go shoulder to shoulder and help accelerate growth. And in just five days, we accomplished what Id planned on achieving in weeks. How did we do this? Urgency. Urgency is a force or impulse that impels or constrains. And its a productive marketers secret weapon. It makes you focus, prioritize, and then act. Urgency makes you focus, prioritize, and then act.How To Create A Sense Of Urgency With Loss Aversion Now, what is your goal? There are many levers to pull to increase urgency in accomplishing it but the most powerful is loss aversion. Research has shown: For human beings â€Å"losses loom larger than gainsand the pain of losing is psychologically about twice as powerful as the pleasure of gaining. (Kahneman Tversky, 1979) If youve ever done any conversion copywriting, you understand this. People prefer to avoid loss rather than acquiring equivalent gains. For example, whats more compelling to you not losing $100 you have? or gaining $100 you dont have? Psychologically, we work harder to avoid loss than to make gains. This is the first lever you can pull to create a sense of urgency. Ask yourself: What will I lose if I dont meet [your goal] by [specific date]? The bigger the goal, the more you have to lose by not hitting it. As depressing as this may sound, its actually invigorating to see whats really at stake if you (and your team) do not change. Step Two: Enable Action With Minimum Viable Marketing (MVM) Next in our change management process, take action and get to quick wins with minimum viable marketing. It helps you quickly test ideas to learn what works - and what doesnt - before you heavily invest into marketing campaigns or projects destined for failure. In Garrett Moons new book,  10x Marketing Formula, he devotes an entire chapter to Minimum Viable Marketing (MVM). He explains: The MVM concept stems from the minimum viable product (MVP) methodology, which was popularized in the world of startups by Eric Ries in a book called The Lean Startup. At their essence, MVPs are a way of quickly validating business ideas by producing the minimum number of features to satisfy early customer or audience needs. The MVP process decreases risk by testing assumptions against reality. For our simple change management process, MVM is the perfect framework for action. First, because it enables you and your team to rack up quick wins that get fast results and build momentum. Second, because it actually allows you to decrease long-term risk by testing ideas in small before you roll them out in large. Heres an excellent example Garrett cites in  10x Marketing Formula: Use A Minimum Viable Project Mentality In 1981 American Airlines was in dire financial straits. They were low on cash and high on expenses. This is never a good place to be. To pull themselves from the money pit, they cooked up what seemed a clever, homerun of a marketing campaign. To get millions dripping into their coffers, they offered  unlimited first-class travel for life  for $250,000. To most of us, a quarter-million bucks sounds steep (and it’s roughly $600,000 in today’s dollars). However, to the consumers who spend as much time in the air as they do on the ground, this was an incredibly good deal. A  Los Angeles Times interview  recounts one of the frequent flyers who took advantage of this deal: â€Å"We thought originally it would be something that firms would buy for top employees,† said Bob Crandall, American’s chairman and chief executive from 1985 to 1998. â€Å"It soon became apparent that the public was smarter than we were.† The unlimited passes were bought mostly by wealthy individuals, including baseball Hall-of-Famer Willie Mays, America’s Cup skipper Dennis Conner and computer magnate Michael Dell. Mike Joyce of Chicago bought his in 1994 after winning a $4.25-million settlement after a car accident. In one 25-day span this year, Joyce flew round trip to London 16 times, flights that would retail for more than $125,000. He didn’t pay a dime. â€Å"I love Rome, I love Sydney, I love Athens,† Joyce said by phone from the Admirals Club at John F. Kennedy International Airport in New York. â€Å"I love Vegas and Frisco.† American Airlines soon went upside down on this big bet- and they still kept it going for nearly ten years! Oops. This historic marketing blunder is a good lesson for us 10x marketers. Because this story is far from an isolated incident. Here’s how it goes. A giant X-factor company puts loads of money into a big campaign. Problem is, this campaign does more harm than good. And whether money is lost from lack of sales, or poorly projected financial impact, the big bet goes belly up. So, test your assumptions by building in stages to learn as quickly as possible. Use MVM In 3 Steps With The Lean Feedback Loop This method of MVM capitalizes on what startups call a â€Å"lean feedback loop.† It works in three stages: Build it. What projects or ideas will do you believe will help you quickly reach your goal? What lean version of this idea can you launch to test it and get quick results? Measure it. Is the idea working? What key data points who if youre toward your goal, remaining stagnant, or even shrinking? Learn from it. Based on key metrics is the idea working, and therefore worth investing more time, energy, and resources into? By working the change management process in this way, youll notice you are concerned with learning as much as winning. Learning is winning. Lets look at some example projects Launching A Podcast With A Lean Loop Build: Smartphone recording of pilot podcast episode shared as a key blog post. Measure: Measure traffic, number of listens or downloads, and listen to comments. Learn: Will a podcast be a viable marketing channel between us and our target audience at this stage? Timeline: One week. Rebranding With A Lean Loop Build: Start with core positioning statements, value propositions, and key messaging. Measure: Present the messaging to sales and target customers on calls for one week to gauge resonance. Record all calls for the marketing team to review. Learn: If the messaging is clear and relevant, continue to the next stages. But repeat this process of testing each major element before investing further. Timeline: One week. Adopting New Marketing Strategy, Processes, Or Tools Build:  Get a free demo of the software with a real person. Ask questions specifically about how it would work for your team. Then,  hold a kickoff meeting with your team to introduce them to the new tool. Measure: Set benchmarks for success. What results are you working for? What numbers will tell you if your new tool is growing them? Learn: Look at the data and make the call. Does your team like the process? Has your tool made your life easier? Are you getting closer to your goals? Timeline: Two weeks. Step Three: Sustain The Momentum Of Your Change Management Process Now that youve gotten results, its time to sustain the momentum youve created. There are tons of amazing books to help you get better marketing results There are game-changing marketing strategies you can adopt There are clever ways to 10x your ROI in short order but the truth is, none of it matters if you dont maintain the results youre getting. This third step is the most important. Why? If you rest on yesterdays success, you will be tomorrows failure. Thankfully, this can be the easiest part of the process. To sustain momentum, propel your team back into the process of urgency and action.

Thursday, November 21, 2019

Political Consensus Decision-Making Essay Example | Topics and Well Written Essays - 1000 words

Political Consensus Decision-Making - Essay Example Perhaps the most notable instance this mode of political consensus has been implemented is in wartime situations. Within the United Kingdom the 20th century witnessed a major instance of wartime consensus proceeding World War II where it’s argued that consensus politics culminated in the Labour party’s victory. This essay considers that the idea of a wartime consensus culminating in Labour’s election victory fades the closer you get to it. The popular perspective had considered that following World War II the political situation in Britain was such that an overwhelming consensus resulted in the election of the Labour Party. Recognition of this perspective takes into account historical perspectives on the Labour Party. While the Labour Party has been in existence since the early years of the 20th century they assumed great control during the period surrounding World War II. In 1940 the Labour Party returned to government as a part of the wartime coalition; during this period Clement Attlee was appointed the Lord Privy Seal (Pimlott 1994, p. 225). Following the end of the war, the Labour Party contested the 1945 general election and won a large-scale victory. Clement Attlee then assumed control and one of the most radical government’s in British history was instituted. It is this victory that many have contested was the result of wartime consensus. ... mplements a number of notions within this spectrum of investigation, perhaps the central thorough-put of his argument is the contention that rather than constituting an actual consensus, this notion has been constructed by individuals attempting to establish a mythic ‘golden age’ of British history. As noted, this perspective has been embraced by a large number of theorists (Rollings 1994; Kelly 2002; Ellison 1994). The broad spectrums of these theoretical perspectives have considered a variety of ideological differences that occurred between the main political parties during this period. Rather than constituting a golden age of consensus politics, Pimlott (1994, p. 231) notes that there was considerable Conservative hostility towards universal welfare benefits. Kelly (2002, p. 21) considers that in 1956 Anthony Crosland made a large-scale plea for the left to oppose conservative ideas; this is believed to demonstrate a general lack of qualitative accord among political perspectives during this period. Pimlott has extended the situation through metaphorical notions. He states (1988, p. 232), â€Å"sandbagged in their electoral trenches, early postwar voters can be seen as the anonymous infantry of two implacably opposed armies in an era of adversarial politics, with the middle-way Liberals floundering in no man’s land.† To a large degree what Pimlott has established with these notions is a mode of myth-making that seemingly implements higher degrees of fact-based understanding. While Pimlott’s perspectives have gained widespread support there also exists a strong contingent of theorists who hold to the consensus perspective (Kavanagh 1994; Addison 1992). Paul Addison is the theorist perhaps most identified with consensus notions of post-war politics (Addison

Tuesday, November 19, 2019

Accounting ratio analysis for Hysan Development Company Limited Essay

Accounting ratio analysis for Hysan Development Company Limited - Essay Example The company has three segments in operating as such in the industry. First, is has its Office segment, which is in charge of leasing of office space and related facilities to various customers from office users. Second, it has its Retail segment, which takes charge of the leasing of space and related facilities, this time to a wide range of retail of retail and leisure operators. Third, it has its Residential segment, which takes charge of the leasing of luxury residential properties and related facilities. The company has continued to expand over the years and as of December 31, 2012, its investment property portfolio has reached an approximate level of more than 4 million gross square feet of office, retail and residential space in Hong Kong. The Companys subsidiaries as of 2012 included HD Treasury Limited, Admmore investments Limited, Hysan China Holdings Limited, Hysan Corporate Services Limited, Hysan (MTN) Limited and Hysan Leasing Company, among others (Reuters, 2014a). Profits are created from the surplus of revenues over expenses. This would require a way to gauge revenues and expenses which are extracted from the financial statements of the companies under study. Various categories of expenses according to functions, get deducted from the revenues for purposes of computing profit or income. First is the direct cost or called cost of sales or revenues is deducted first from revenues to arrive at gross profit. From gross profit, operating income will be derived after deducting further selling and administrative expenses will be deducted to arrive at operating income. From the operating income, net income determination will follow after non-operating incomes or expenses are added/deducted accordingly from the operating income (Johnson, et al, 2003). After producing the various categories of income --- gross profit, operating income and net income, each result

Sunday, November 17, 2019

Love at First Sight Essay Example for Free

Love at First Sight Essay Love at first sight is a phrase that often refers to when, two people fall deeply in love when they just meet. But, how can you fall in love with a person that you dont haehardly know? All that you may know about this person is what they look like, or maybe their personal backround or past. For many reasons this is why Im arguing agianst the possibility for love at first sight. I do believe that somewhere out there, there is somebody that could be your soulmate, but I just cant see how you can love somebody that you dont know. As Juliet says when she finds out Romeo kills Tybalt, Oh serpant heart hid with a flowering face. Anybody can pretend to be somebody there arnt deep down inside, to win over affection or just to be liked. Eventually that person will show their true colors I think that love at first sight is a fairy tail. How many people do you hear about that actually fall in love and get married soon after that and then live happiliy for the rest of their life? I think that you fall in love with a person moreeach and each and every day as you get to know them better. Love is like a peice of dirty laundry that is tosed around like it has no meaning, until its lost all value it ever had when a person said it. People shouldnt tell people that they love them unless they really truley mean it. All of the reasons i have stated are my opinions that support I dont believe in love at first sight.

Thursday, November 14, 2019

Fossil Discoveries in Kansas :: Exploratory Essays Research Papers

Fossil Discoveries in Kansas Did you know, in the state of Oklahoma it is against the law to either hunt or catch whales? Sounds sort of ridiculous when you think logically about it, but according to paleontologists it isn’t that far fetched. Over 65 million years ago Kansas, including the whole Midwest Region of North America from the Arctic Circle to the Gulf of Mexico, was covered by the Sea. Due to the continental uplifts of the mountain ranges in North America during the Pangaea stage, the once shallow sea of Kansas became shut off from the sea-water flow and dried out to what we know it as today. The biome of Kansas over the last 65 million years has become extremely dry and flat, which would account for a once shallow inland sea. For example; Salt Lake City was once in the mist of a glacier that filled the inside â€Å"hole† of the City, causing the surface of it to be extremely flat excluding the surrounding mountains. Recently in an article from Elasmo.com, recognition for Mike Everhart’s discoveries has been noticed. Paleontologists and Archeologists in Western Kansas â€Å"have been finding sources of some of the best Cretaceous marine fossils that have ever been found anywhere in the world.† (Everhart, #1). These fossils, though interesting and vast, have pointed a lot of questions to how and when Kansas was under sea level. From my research, I have found that the only explanations to these issues and debates are the discoveries found consisting of both the archaic sharks and plesiosaurs. In my research, the Oceans of Kansas organization for Paleontology has given me more than enough to focus on when depicting out how to correlate our modern logic about how Kansas is mostly a wasteland to when it used to be an ocean with striving life within. The sharks that have been recently discovered are increasing not only in size, but by type. Mike Everhart, lead Paleontologist of this organization, in April 2002 discovered an extremely large shark called the Cretoxyrhina Mantelli "Ginsu Shark". â€Å"A large lamniform shark found worldwide from Turonian into Campanian time during the Late Cretaceous.   Much the same size as a modern Great White (but not closely related), the Ginsu shark reached lengths of more than 6 meters before becoming extinct about 82 million years ago.

Tuesday, November 12, 2019

Aviation Security

Prior to the 9/11 attack, the US Aviation had little concern over the threat of either hijacking or terrorism. Surveys detailing the passengers’ concerns in flights were more directed towards the airlines’ maintenance and safety than the risk of being hijacked or being attacked by terrorists (Rosenzweig and Kochems, 2005). But after the 9/11 attack, especially with terrorists having used planes as the instruments for initiating a global anxiety over terrorism, aviation security has become an utmost priority of the Department of Homeland Security (Decker, 2005).Increased international concern over terrorist-related aviation security heightened after the attack. This is evidenced by several complaints and questions issued immediately after 9/11. According to the Citizens’ Complaint and Petition as filed with NY AG Eliot Spitzer on November 2004, New York citizens were dissatisfied with official investigations done regarding the attack. Some of the implications of t he complaint include the citizens’ suspicion of unsatisfactory intelligence prior to September 11 and that some government officials are responsible for the attack and are directly to blame for the tragedy.In other words, the citizens doubt that the tragedy was a result of mere incompetence on the part of the intelligence committee but more of an act of complicity between the terrorists and some officials. Quoting from the complaint: â€Å"A majority of citizens come to suspect high crimes and treachery within their own government, but cannot find officials with enough courage, power or independence to thoroughly investigate their concerns and restore the public trust (2004). †Moreover, the citizens are concerned that the government is deliberately hiding the real results of the investigation regarding the 9/11 attack keeping their questions from being answered and their peace of mind untended. Representative Cynthia McKinney of Georgia responded to a 9/11 briefing say ing that a number of families of the 9/11 tragedy’s victims share her concerns about the truth on all aspects about the 9/11 attack: â€Å"This calls for another look at the government's account of 9/11, which guides so much of what has happened since.Mistakes of fact, intentional or not, have changed and guided America into costly wars and increased insecurity at home. They need to be addressed and scrutinized, not dismissed and used to attack those who discover or raise those (2005). † Although not stated directly such complaints imply the citizens’ concern for justice and the assurance that their government could be trusted with providing them with their right to a safe environment.Such actions and concerns by the citizens force the government to respond by enhancing security measures especially in aviation, and improving intelligence and investigative capabilities as demanded by the rising anxiety resulting from the tragedy. The complaint also expressed conc erns over the taxing effect of â€Å"exaggerated† security measures on civil liberty but notwithstanding, most are still willing to sacrifice the said liberty in exchange for the safety that they demand to be ensured of.In this era of terrorist threat, the citizens regard their civil liberty as second only to their safety. This proves the growing concern of the public over security with its extent emphasized by the object they are willing to exchange it for (O’Connor, 2006). In ensuring the safety of the people and the state, one very important factor to consider is the efficiency in allocation of resources. Clearly, it would be unwise to try to protect everything from terrorist attacks because of limited resources and the asymmetric aspect of risks and consequences afforded to different assets.Here assets refer to people, structures, places, ideas, or any possible object (or non-object) that terrorists may direct their attack to (Rosenzweig and Kochems, 2005). The Sec retary of the Department of Homeland Security, Michael Chertoff, recognizes the state’s limitation in resources and emphasized in one of his speeches, the need for an â€Å"objective measure of risk (Rosenzweig and Kochems, 2005). † Here is where the risk-based approach to counterterrorism comes.In other words, prioritization is very important in ensuring the efficiency in allocation of resources. The efficiency in allocation of resources can be realized by using the risk-based approach. Risk-based Approach to counterterrorism involves the identification and analysis of risks or threats, vulnerability, and criticality. The assessment of these factors is critical in determining how to allocate resources efficiently for maximum prevention of terrorism, which is the main purpose counterterrorism (Decker, 2005).The analysis of threats involves the identification of current assets that are most at risk to terrorist attacks, the capacity of the terrorists to attack the asset , the chance of success of the possible attack and the possible consequences if such attacks were successful (Decker, 2005). If the analysis of threats involves the risks, the analysis of vulnerabilities involves the assessment of the state’s limitations in terms of resources, capabilities and assets.The identification of possible structures which are most at risk to being attacked, the limitations of intelligence, the limitations in terms of funds, are aspects which are important in the analysis of vulnerabilities because these weaknesses, aside from being easily manipulated by terrorists to their advantage, could also cripple our forces if successfully attacked (Decker, 2005). The analysis of criticality involves the possible effect of a successful attack.Here, the differences in consequences afforded by successful attacks are considered. It is important to consider in the analysis of criticality, the assets’ functions and the degree to which a successful attack woul d cause damage not only to the states’ functions but also to the peoples’ psychological status and moral excellence (Decker, 2005). To summarize, risk is the primary consideration in the actions and decisions executed for the prevention of terrorism.Analyzing the processes involved in the risk-based approach to counterterrorism, we can deduce that the factors influencing the â€Å"objective† value attributed to â€Å"risk† are the probability of attack, the probability of a successful attack and the probable degree of damage caused by the successful attack (Rosenzweig and Kochems, 2005). Considering the factors involved in the assessment of risk, aviation deserves to be one of those included in the list of high priority assets. The success of the 9/11 attack exemplifies the degree of risk involved in aviation.The probability of attack is high considering the limitations in security especially when an airline is not on land, which also increases its chance of success. The damage involved includes the lives of civilians, the loss of the airline involved, disruption in economic activity and abstract losses such as psychological and morale discord. In response to the threat associated with aviation, TSA Administrator Kip Hawley announced changes in security procedures. These changes include more intensive screenings and a longer list of prohibited items.Understandably, firearms, ammunition and any other explosive including fireworks are not permitted at the checkpoint and in any checked or carry-on baggage. Lighters, pocketknives, teargas and other weapons of self-defense are now prohibited at checkpoint (â€Å"TSA reminds passengers to:†¦ †, 2006). A more intensive detection procedure for greater threats such as explosives and guns is now implemented. One security tactic implemented in aviation is that of unpredictability. This is called the layered-screening approach. Various random methods are now used to screen passenger s.According to Hawley, it is important that the aviation security is equipped with the â€Å"weapon of uncertainty† so as not to let terrorists gain the advantage of knowledge to easily maneuver situations for the accomplishment of their terrorist plans. Also, according to Hawley, this tactic will help the security team in focusing endeavors to preventing individuals from gaining access to the object of their harmful intent (â€Å"TSA Unveils Enhanced Security Screening Procedures and Changes to the Prohibited Items List†, 2005). Before, aviation security measures include only passing through metal detectors and the screening of baggage.The new security measure now includes additional screenings such as screening of shoes and clothes for explosives, more extensive inspections of baggage and the passenger himself. All these additional measures are done randomly in accordance with the layered screening approach (â€Å"TSA Unveils Enhanced Security Screening Procedures a nd Changes to the Prohibited Items List†, 2005). Secure Flight is a program specially designed for the enhancement of aviation security, specifically targeted to the prevention of terrorist attacks.This program involves the screening of passengers against a terrorist watch list provided by the FBI: an enhanced screening process, identity authentication process, checking of a passenger name against a database and an appeals process for misidentified passengers (Elias, 2005). It is developed to displace the Computer Assisted Prescreening System. The reliability of the program has been questioned because of possible damage to civil liberties, as names are not always unique (Singel, 2004).Although the detection of terrorist-passengers is essential in ensuring safety, the program’s imperviousness to hackers is questionable. Just recently, the Associated Press reported the suspension of the program because of this issue. Still, Hawley recognizes that the program is essential to aviation security (â€Å"Secure Flight†, 2006). In any case, the main problems associated with security checks involve damages to civil liberties and privacy. Programs like Secure Flight, CAPPS and Clear, operated by a private company, Verified Identity Pass, Inc. are continually being suspended due to issues concerning privacy.In a report done by the Department of Homeland Security, the Electronic Privacy Information Center (EPIC), EPIC impels the TSA to suspend all private programs including Clear until the concerns over the implications of the programs on privacy are resolved, especially with the use of databases and watch lists. Also, EPIC impels the suspension of the programs until regulations are polished to comply with laws on Privacy (â€Å"Comments on the Electronic Privacy Information Center†, 2005). PDD 39 or the US Counterterrorism Policy formally states the US’ position regarding terrorism.It outlines the country’s purposes and procedures in implementing counterterrorism strategies. It treats all aspects of terrorism whether it is direct or indirect participation both as a crime and a threat to the national security. In this regard, the US Policy on counterterrorism vows to apply all means to fight terrorism (Clinton, 1995). Specifically, the US counterterrorism policy aims to reduce the state’s vulnerabilities against possible threats, deter terrorism, enhance facilities, prevent entrance of weapons of mass destruction and further lead agency responsibilities.The implementation of such tasks is delegated to specific departments. In the case of aviation, it is the TSA, part of the Department of Homeland Security that is tasked in ensuring the safety of flight passengers as well as the transportation of cargo. In the event of increased threats of terrorism, the TSA’s security measures as outlined in the previous paragraphs, have been satisfactory in providing the citizens security (â€Å"Aviation Securi ty: Efforts to measure†¦Ã¢â‚¬ , 2003). For instance, the more intensive screening done to passengers is consistent to the US counterterrorism policies.One, it prevents the entrance of terrorists and thus their inducing terror to the citizens inside national boundaries. Also, the intensive screening and enhanced detection capacities prevent the entrance of weapons of mass destruction, reducing the risks such weapons afford the citizens and other assets of the nation. Specifically, the TSA policy involved in the prevention of weapons of mass destruction is the stricter monitoring of freight, as well as the passengers’ baggage (â€Å"Airport Passenger Screening:†¦Ã¢â‚¬ , 2003).Other TSA policies that are consistent with the US counterterrorism policy is its enhanced list of prohibited items. Now that pocketknives, teargas and even lighters are prohibited at checkpoint, the probability of hijacking is reduced. Efforts like training screeners also deter terrorism by d ecreasing the likelihood of small detection errors that could have caused heavy damage to the nation. Proposals like the implementation of CAPP and Secure flight, although plagued by criticisms (Singel, 2004), are also aimed to comply with the US Counterterrorism policies.Both of which could be placed under the â€Å"enhancing counterterrorism capabilities† aspect of the US counterterrorism policies. Counterterrorism measures, aside from its mission being to combat terrorism, are done to give the citizens a perception of safety with its heightened efforts to ensure their security. This is very evident in the security measures implemented in airports where passengers are doubly screened, to the dismay of those with terrorist purposes and those shouting for their civil liberties.Given the extra efforts by the Department of Homeland Security to grant the citizens their right to safety, the citizens were supposed to feel extra safe. This is not the case. Extra efforts to provide the citizens the safety they deserve only confirms the degree of danger they perceive to be in to. To add to this, the media overly emphasize the risk posed by terrorism fueling with publicity-derived strength.If the government’s efforts are directed towards giving the citizens security or at least a perception of it, the terrorists, being what they are, aim to instill fear and terror, if not physically with bombs, at least psychologically. It appears that the media and the perpetrators of terror are living symbiotically: the media are giving the terrorists its required publicity to instill terror in the minds of the people and the terrorists provide the media with good stories to tell.In addition, it is the media which gives so much coverage to the extra counterterrorist efforts given by the government which reflects not only the strengths but also its weaknesses. The very idea that the efforts of the government to provide the citizens with security are with loopholes has mu ch more effect in the people’s minds even if its strengths outweighs the weaknesses. The result is the realization of terrorist goals which is to instill fear and terror in every possible way as well as influence the media audience with distrust in the government’s security efforts (Bowdish, 2006).The internet seems to provide the terrorists with one of the best means to disseminate fear, taking advantage of the anonymity and its fast-paced nature. Lots of websites in the internet are now being maintained, unbeknownst to the civilians, by terrorists (Glass, 2001). This medium is especially useful in speedy dissemination of visuals and ideas that instill fear. Other methods include: manipulating reports by promoting contrived neutrality, indirectly aimed at making civilians question any actions done by the state, its policies, security measures and its legitimacy.Some civilians, with their good intention of fighting for freedom are unknowingly influenced by propaganda t actically planned by terrorists (Bowdish, 2006). They are unknowing victims of terrorist machinations. With the government’s passing of new policies aimed at securing the people, specifically, the layered screening done in airports, and the new and unpredictable methods strategically imposed to prevent easy entrance of terrorists in the US, the government has satisfactorily defended the state and most importantly its citizens from terrorism.Unfortunately, the government could only do so with the physical aspect of terrorism. Information can easily be manipulated and with very minimal censorship through the media and from this terrorist weapon, the government can do very little to protect the citizens. The government is not in control of the information disseminated in the media, nor do they have the power to choose which information to be withheld and which information to be broadcasted.In addition, it would not be unwise to control the media as this would only add to the psy chological effect that the terrorists, with the help of the media, are producing (Bowdish, 2006). Counterterrorism methods employed today are very much similar to the methods employed in the 1980’s during the Drug War when in 1984; President Ronald Reagan militarized the drug war starting from urine testing and forfeiture of properties towards a decreased threshold of arrest with only hearsay evidence and the use of surveillance systems (â€Å"Drug War†, 2004).Similar to the counterterrorism methods expounded in the revised US Patriot Act, the government officials have expanded powers over gathering information which involves, like that in the Drug War, lower threshold of evidence needed for the arrest of suspected individuals, and forfeiture of properties of those suspected to be working for terrorists. Like in the Drug War, the efforts and procedures employed in combating terrorism are not fully supported by the citizens.Both in the 1980s drug war and today’s counterterrorism involve the citizens’ derision over the loss of their civil liberty and their petition for human rights (â€Å"Drug War†, 2004). In both events, there is an increase in government spending, in 1980’s, to contain drug use and at present, to combat terrorism and increase national security. During the drug war, campaigns for and against the legalization of marijuana had spread in all mediums of communication: radio, newspaper and television. In today’s war against terrorism, the internet has been added to the list of mediums used in campaigns.Like today’s war against terrorism, the efforts in reducing drug use in the 1980s seemed to be futile. Despite the government’s efforts in preventing increase in drug use through the passage of laws and implementation of stricter penalties, the rate of drug abuse had not changed significantly. Today’s war on terrorism involves the same seemingly futile efforts. Terrorists, being as they are, would not be easily deterred by any law or security measure (Bowdish, 2006). They would always try to find means to gain access to whatever vulnerability the nation may have and actuate their terrorist plans.But still, even with this seeming futility, the government is supposed to act towards the betterment of the society and that betterment does not include any hazard and that includes both drugs and terrorism. References â€Å"Airport Passenger Screening: Preliminary Observations on Progress Made and Challenges Remaining†. (Sep 2003). General Accounting Office Report to the Chairman, Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives. Washington DC: US. â€Å"Aviation Security: Efforts to Measure Effectiveness and Strengthen Security Programs†. (20 Nov.2003). General Accounting Office Testimony Before the Committee on Government Reform, House of Representatives. Washington DC: Berrick, C. Bowdish, R. (5 May 20 06). Cerberus to Mind: Media as Sentinel in the Fight against Terrorism. Strategic Insights. 5 (5). â€Å"Citizens' Complaint and Petition as Filed With NY AG Eliot Spitzer† (19 November 2004). The Justice for 9/11 Steering Committee. USA. Clinton, W. (21 Jun. 2005). PDD 39: US Policy on Counterterrorism. The White House. Washington, D. C. â€Å"Comments of the Electronic Privacy Information Center† (08 Dec. 2005). Department of Homeland Security.Washington DC: Rotenberg, M. Decker, R. (2005). Homeland Security: A Risk Management Approach Can Guide Preperedness Efforts. Testimony before the Senate Committee on Government Affairs. USA. â€Å"Drug War 101†. (n. d. ). Human Rights and Drug War Website. Retrieved 10 August 2006 from the World Wide Web: http://www. hr95. org/dw101. htm. Elias, B. et. al. (04 Mar 2005). Homeland Security: Air Passenger Prescreening and Counterterrorism. CRS Report for Congress. US. The Library of Congress. Glass, A. (Dec. 2001). The W ar on Terrorism Goes Online: Media and Government Response to First Post-Internet Crisis.Press, Politics and Public Policy Working Paper Series. The Joan Shorenstein Center, Harvard University. McKinney, C. (10 Aug. 2005). Response to a Coverage of the 9/11 Briefings. Washington, DC. O’Connor, T. (06 Jun 2006). Civic Liberties in Domestic Terrorism. In Megalinks in Criminal Justice. Retrieved August 10, 2006, from http://faculty. ncwc. edu/toconnor/429/429lect19. htm. Rosenzweig P. and Kochems A. (2005). Risk Assessment and Risk Management: Necessary Tools for Homeland Security. Backgrounder. (1889), pp. 1-4. â€Å"Secure Flight† (Feb. 2006).Center for media and Democracy. Retrieved 10 August 2006 from the World Wide Web: http://www. sourcewatch. org/index. php? title=Secure_Flight. Singel, R. (27 Aug. 2004). Secure Flight Gets Wary Welcome. Wired News. Retrieved 10 August 2006 from the World Wide Web: http://www. wired. com/news/privacy/0,1848,64748,00. html â€Å"TS A Reminds Passengers to:† (31 May 2006). Oklahoma Office of Homeland Security. Oklahoma:USA. â€Å"TSA Unveils Enhanced Security Screening Procedures and Changes to the Prohibited Items List† (06 Dec 2005). Oklahoma Office of Homeland Security. Oklahoma: USA.