Featured Post

Kmarts Downfall Essay Example | Topics and Well Written Essays - 750 words

Kmarts Downfall - Essay Example The opposition model built up by Porter is a scientific device for considering industry conduct and corpo...

Monday, December 30, 2019

Analysis Of The Poem Migrant Hostel - 1331 Words

Identity is moulded by a multitude of different sources, and this is demonstrated on personal, social, historical and cultural levels. The intricacy of the relationship depicted in Feliks Skrzynecki, between the narrator and his father presents a perspective on the author s personal identity. Post card illustrates the historical perception of identity, representing a disparity of identity between the narrator and his parents caused by a lack of presence in Warsaw. The perception of social identity is demonstrated in The Shipping News, where the main character, Quoyle is socially disabled and unable to conform to society. Cultural identity is shown in the poem Migrant Hostel, where the narrator explores the different perceptions of†¦show more content†¦The quote, Watching me peg my tents, Further and further south of Hadrian s Wall illustrates the above as well provides a reference for the irony that the poet is learning Latin instead of his native language, Polish. Feliks Sk rzynecki accurately portrays the perception of personal identity by drawing differences between the relationships of two characters on a personal level. Skrzynecki s Post card portrays a narrator who is a first generation immigrant, lamenting at the fact that he never experienced his place of origin, something which he believes, is integral to his heritage and historical identity. Throughout this poem, the poet is associated with a feeling of guilt as a result of his incomplete historical identity. This is shown by the tone of Warsaw, Old Town, I never knew you, except in third person. This is a symbol of the poet s disconnection to his heritage; that his information regarding his identity s history is not his own, but in fact inherited from the generations before him. Historical identity is also depicted through the differences between the poet s incomplete identity and his parent’s completeShow MoreRelatedFeliks Skrzynecki853 Words   |  4 Pagessense of belonging through traditions and vogues. 1. Feliks Skrzynecki is a poem about the authors (Peter Skrzyneckis’) stepfather. The poem demonstrates the strong feeling of belonging Peter feels with his family. However it also expresses the detachment Peter feels from his cultural heritage. This is shown in the lines ‘Remnants of a language I inherited unknowingly’. The use of first person (‘I’) through out the poem is used to show the perception that Peter has of his father, and how he always

Sunday, December 22, 2019

Women s Liberty Through Literature - 1105 Words

Women’s Liberty Through Literature Kendall N. Player English 4 AP Literature Mrs. Johnson The role of women in society has been well documented through world literature. Works such as The Canterbury Tales by Geoffrey Chaucer, Hamlet by William Shakespeare,The Education of Women by Daniel Defoe, and A Doll’s House by Henrik Ibsen. These works come from a wide variety of time periods, they range from the middle ages to the modern era, where the first was published around 900 years before the last. Women make up approximately half of the population of the world, yet throughout literature approximately half the works written are nowhere close to how many were written by women. Even with such population, most works do not even focus on women. Few works dealt with the role of women in society throughout the history of literature but it has become more and more of a recurring theme as time past. Works like The Canterbury Tales by Geoffrey Chaucer and Hamlet by William Shakespeare were rare for their time for how they portray women characters. Works like The Education of Women by Daniel Defoe and A Doll’s House by Henrik Ibsen were wrote in a time of change and were not as rare as the other works published in the same time period. â€Å"Geoffrey Chaucer slams the role of women in his novel, The Canterbury Tales. Chaucer tells three stories told by women. Each of these women do not fully fulfill the images connected with the role the character is supposed toShow MoreRelatedEurope Witnessed Revolutions Essay786 Words   |  4 Pages Through out the course of the 19th century, Europe witnessed revolutions, radical political changes, and industrial advancements, which had an impact on shaping the art and culture of this time. By examining literature, art, and cultural changes of the 19th century, historians can provide a different perspective of the events that took place. At the start of the 19th century, Napoleon was defeated along with his militaristic agenda, and Europe now entered many new phases of social reform. IndustrializationRead MoreAnalysis Of Andy And Nora s Play Out If They Were From The 21st Century United States?1574 Words   |  7 Pagesin a time period where women have almost no rights to their finances or education. They are at the will of their husband or fathers who are the sole breadwinners for a family while the woman is expected to be the homemaker. Nora must literally beg for money to spend on herself later. â€Å"You might give me money Torvald. Only what you can spare; then I can buy myself something with it later† (Ibsen 6). The Dependency on the patriarch is almost the only means of a married women gaining financial leverageRead MoreThe Effect of Cultural and Historical Situations on American Literature 1173 Words   |  5 PagesProfessor Brattoli †American literature is almost always tied to historical an d social events of the era in which it was written.† There is a connection between literary works from different time periods. This connection is how history, current events and social events have impacted American Literature. Literary works and writing styles have been affected and influence by the world around us. This is seen in many of the works assigned forRead MoreCivil Liberties and Civil Rights Essay1296 Words   |  6 PagesCivil Liberties (And how they differ from civil rights) If the fires of freedom and civil liberties burn low in other lands, they must be made brighter in our own. If in other lands the press and books and literature of all kinds are censored, we must redouble our efforts here to keep them free. If in other lands the eternal truths of the past are threatened by intolerance, we must provide a safe place for their perpetuation. Franklin Delano Roosevelt, 1938 (Isaacs 66) Freedom of speechRead MoreLiterary Analysis Of Scarlet O Hara896 Words   |  4 PagesEnglish Literature and Composition 1 January 2015 Literary Perceptions of Women Delicate, modest, well mannered, fragile, and gentle have been amongst the words used to depict the traditional, ideal woman for generations. Movies, television shows, and written literary works have continually painted the portrait of a nearly unattainable female image, and have established an atmosphere of subordination and distinction between the two genders. In even the most canonized literary works, women are oftenRead MoreThe Narrative Of The Life Of Frederick Douglass1566 Words   |  7 Pagestime he escaped to freedom in the north. When Douglass wrote this book, slavery was still legal in a large portion of the United States. After Douglass’ escape to freedom and his continuation of his education, he became an abolitionist through his works of literature and speeches. In â€Å"The Blessings of Slavery†, by George Fitzhugh he states that southern slaves for the most part are the freest and happiest people in the world. He also goes on to say a number of other t hings that basically establishRead MoreThe First Half Of The 19th Century1497 Words   |  6 Pagesgroup that was very important and prominent in this area, they were called the transcendentalists. The transcendentalists were a group of writers and thinkers who were active in the 1830’s. This group is based out of New England. They began to meet and discuss new developments in philosophy, theology, and literature. The gatherings were informal and different members came and went. The transcendentalists today include Ralph Emerson, Henry Thoreau, Margaret Fuller, William Channing, Bronson Alcott,Read MoreWomen s Rights Of Women Essay1455 Words   |  6 Pagesa myriad of women have expressed through outlets such as public assemblies, literature, and speeches. There have been three waves of the women’s movement, each targeting a variety of issues within each era. The third wave was in 1995, where Hillary Clinton spoke in Beijing, China, claiming that women’s rights were the same as human rights, that every aspiring girl deserved the civil liberties that every man was given around the world. Moreover, the movement had shifted towards women in developingRead Mor eThe Truth : Early American Assumptions Uncovered1572 Words   |  7 Pagestime he escaped to freedom in the north. When Douglass wrote this book, slavery was still legal in a large portion of the United States. After Douglass’ escape to freedom and his continuation of his education, he became an abolitionist through his works of literature and speeches. In â€Å"The Blessings of Slavery†, by George Fitzhugh he states that southern slaves for the most part are the freest and happiest people in the world. He also goes on to say a number of other things that basically establishRead MoreAnalysis Of The Declaration Of Independance, Ain t I A Woman, And Letters From Birmingham Jail1153 Words   |  5 Pagesdifferent perspectives and ideas. The natural mixing of American culture leads to change whether for better or for worse, as time goes on, so does America and the American people. American literature commonly has strong themes of unity and equality. The clearest way to see the voice of a culture is through its literature, essays by american authors like The Declaration of Independance, Ain’t I a Woman, and Letters from Birmingham Jail. One important document from America is the Declaration of Independence

Saturday, December 14, 2019

What is the Preparation and Stability of Calamine Suspension Free Essays

Introduction: Suspensions are solid dipersion of insoluble or sparingly-soluble drugs, in aqueous like keltrol or oily vehicles such as emulsion. Suspension are used for oral administration, external application to the skin (topical) or parenteral administration.These particles suspended into liquid medium do not dissolve but have dispersed in according to the particles size, and can settle to form to layer (drug layer/fluid medium) due to gravity(sedimentation). We will write a custom essay sample on What is the Preparation and Stability of Calamine Suspension? or any similar topic only for you Order Now Due to this reason Suspension agents are used to redistribute the suspension on shaking. In order for a drug to have impact the solid particles should not be greater than micrometers to aid in dispersion and absorption within the body and to avoid in creams a gritty effect.In this experiment we looked at calamine lotion suspension in which sodium citrate (preservative) and betonies are the suspension agents. (1,2) Method: 7.5g of calamine and 2,5g of zinc oxide was weighed and grinded in a pestle and mortar to a fine powder, 2.5ml of glycerin was added to this power mixture and grinded to a fine mixture which took roughly 2-5 minutes. The remaining residues of the glycerin within the cylinder were washed out with 6 5ml portions of water. This was transferred into a 50ml cylinder with the slurry from the mortar and made to bulk (50ml) with water. Clingfilm was used to wrap the top of the cylinder to prevent leaks while gently inverting the cylinder repeatedly until the product was homogenous. This was then placed on the bench and timer was started to record the volume of sediment and overall volume in ml. Results were tabulated. Discussion The results ands graph show that formula D sedimentation was the most rapid followed by formulae A It would have been expected that formula A would have the highest sedimentation rate due there not being any bentonite and sodium citrate present. Formula D is result is accurate this is due to errors. Comparing Formula B and I as both had 1.5g of one Flocculants in mixture, formula B which only contained bentonite, the sedimentation rate was slightly faster. Formula F which contained both, but bentonite is excess, this mixture had the slowest sedimentation rate A combination of the two flocculants shows to be the most effective Conclusion From the experiment we were able to achieve fairly good results, the results showed that bentonite and sodium citrate played a key role in the rate of sedimentation as it provided and maintained the viscosity of the suspension and the uniformity. Also we can also conclude that bentonite is also more effective that sodium citrate as a suspension agent. References: (1) http://pharmacy.wilkes.edu/kibbeweb/lab5.html date:14/03/11 (2) http://www.lumamericas.com/ date 14/03/11 How to cite What is the Preparation and Stability of Calamine Suspension?, Essay examples

Friday, December 6, 2019

Eggs free essay sample

Woods is a short poem about a young women growing up and how her relationship with her father and how her bitterness for him shaped her own relationship with her own child as she grew up and became a mother. The poem is dramatic and cleverly written in the voice of the woman herself. Her tone is serious and it is filled with antipathy. Diction is the foundation of this poem, and Susan Wood’s choice of words such as â€Å"hated† and â€Å"furious† emphasize the anger that brews within this young woman. Susan Wood’s uses the analogy of an egg to represent the fragile and somewhat hateful relationship between this father and daughter as well as her resentment of him. However, I believe that the young woman feels a bit guilty for hating her father: â€Å"And I hated my father, the one cock in the henhouse, who laid the plate on the table and made me eat, who told me not to get up until I was done, every bite. We will write a custom essay sample on Eggs or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page And I hated how I gagged and cried, day after day†¦Ã¢â‚¬  (lines -6-13). She realizes the father works hard to put food on the table, and she should be grateful for that, but she just can’t let go of her the anger she carries within her â€Å"shell† for her father. She was angry that she was forced to eat the eggs that she didn’t like and if she didn’t eat them, she went to school hungry: â€Å"†¦I’d go off to school like that, again, hungry. † (lines 14-15). We soon realize that the young woman is carrying a secret of her own. She is pregnant, and is angry at herself and her unborn child: â€Å"I hated myself, hated the egg growing in secret deep inside my body, the secret about to be spilled to the world, and maybe I did. † (lines 19-22). We clearly see that when the young woman becomes a mother she finds herself treating her own child with the same anger and coldness that she received from her father.

Thursday, November 28, 2019

Dave A Scandal In The White House Essays - Dave, Films,

Dave: A Scandal In The White House Dave: A Scandal in the White House The President of the United States is regarded as a leader and a role model to the nation. However, many people associate him with scandal and a bad reputation of dishonesty. Hollywood often portrays the role of the presidency in movies and television shows. Some of these portrayals are fictional, but some are accurate. Dave is a movie, starring Kevin Kline as the President and his double that shows a scandal in the White House. They are trying to show how the American people view the President and his actions. Dave shows the overall role that the President has with some accurate details and some glamorized ones of the presidency. Dave is a movie in which the Secret Service finds a double for the President who ends up acting as President while the real one is in a coma. Dave Kovich, the acting President, goes from being a person that finds jobs for people to being the President before he realizes what is going on. He assumes the duties of the President until the White House chief of staff, Bob Alexander, takes the scandal too far and Dave fires him. To cover up the scandal without getting caught, Dave pretends to have a stroke in order to switch the real president and allow the real Bill Mitchell to finally die and the Vice President to take over. The Vice President had not taken over before now because Bob Alexander was trying to get him kicked out of office by blaming him for a previous S & L scandal that he and the real President had actually done. Many of the events in the movie are accurate. The daily actions that Dave has as President show some of the tasks of the presidency. After taking over the job, Dave has to learn the members of the Cabinet and his staff. These are the people that he works with everyday to run the White House and the country, so he has to know who he is working with and what each of them do. He also had to learn about the budget and how to make cuts. He wants to save a bill that will help the homeless get funding, but there is not enough money in the budget. He works with all of the members of the Cabinet to make cuts in each of their departments to make room in the budget for the homeless shelters that he had visited with the First Lady, Sigourney Weaver. Dave is also taught about the branches of government and how the President interacts with each of the branches because he could not pretend to be the President without knowing how the Federal Government works. The movie shows the events that he did i n a typical day, such as visiting the homeless shelters, a factory, attending public functions with his wife, and holding press conferences. These real events needed to be portrayed to show the accuracy of the presidency that Hollywood is trying to portray. If the entire movie was fictional, the scandal of having a double for the President would not be believable, and many people would not watch the movie. Many actual Presidents of the United States and their were mentioned. This adds to the accuracy of the details of the role of the President that Dave is now playing. More of the events in Dave are inaccurate and could never actually happen in real life. Even though most of the routine events of his day were normal and actually occur, the way he became the President could never really happen. There are too many officials and secret service men that would find out what the Press Secretary and Chief of Staff are doing. According to the Twenty-Fifth Amendment, the Vice President would be acting President as soon as the real one went into a coma. The scandal that they pull off to try and frame the Vice President would not be able to keep him from being President in reality. Also, there would never be a person that looks enough like the President to mislead the entire nation in the first place.

Monday, November 25, 2019

Maia, Greek Nymph and Mother of Hermes

Maia, Greek Nymph and Mother of Hermes The Greek nymph Maia was  the  mother of Hermes (in Roman religion, he was called Mercury) with Zeus and was associated, by the Romans, with the goddess of spring, Maia Maiestas. Background and Personal Life A daughter of the Titan  Atlas  - he of the big muscles and carrying the world on his shoulders - and Pleione, Maia was one of the seven mountain nymphs known as  Pleiades  (Taygete, Elektra, Alkyone, Asterope, Kelaino, Maia, and Merope). Her sisters went on to marry some bigwigs in ancient Greece, but Maia snagged the biggest of them all - Zeus himself!   Her son  Hermes was proud of his heritage, saying in Euripides  Ion, Atlas, who wears away heaven, the ancient home of the gods, on his bronze shoulders, was the father of Maia  by a goddess; she bore me, Hermes, to great Zeus; and I am the gods servant. Although Zeus was already married to Hera, that didnt stop him from loving on nymphs and mortal women alike. He  and  Maia had a fling. In the, their affair is recounted: Ever she avoided the throng of the blessed gods and lived in a shadowy cave, and there the Son of Cronos [Zeus] used to lie with the rich-tressed nymph at dead of night, while white-armed Hera lay bound in sweet sleep: and neither deathless god nor mortal man knew it.   This  caused Maia to give birth to their precocious baby boy. She hid out from Hera in a cave on Mount Cyllene. In the Virgil has Aeneas mention, Mercury: Your sire is Mercury, whom long beforeOn cold Cyllenes top fair  Maia  bore.Maia  the fair, on fame if we rely,Was Atlas daughter, who sustains the sky. When I Grow Up... In Sophocles play  Trackers, the eponymous nymph of the mountain recounts how she took care of baby Hermes: This business is a secret even among the gods, so that no news of it may come to Hera.  Cyllene adds, You see, Zeus came secretly to Atlass house ... to the deep-girdled goddess  ... and in a cave begot a single son. I am bringing him up myself, for his mothers strength is shaken by sickness as if by a storm. Hermes grew up  really  fast. Cyllene marvels, He grows, day by day, in a very unusual way, and Im astounded and afraid. Its not even six days since he was born, and he already stands as tall as a young man. Half a day after his birth, he was already making music! The  Homeric Hymn (4) to Hermes  says, Born with the dawning, at mid-day he played on the lyre, and in the evening he stole the cattle of far-shooting Apollo on the fourth day of the month; for on that day queenly  Maia  bare him. How did Hermes steal Apollos oxen? The fourth Homeric Hymn recounts how the trickster was really into stealing his older half-brothers herds. He  picked up a  tortoise, scooped out its meat, and strung sheep gut across it to create the first lyre. Then, he cut off from the herd fifty loud-lowing kine, and drove them straggling-wise across a sandy place, turning their hoof-prints aside by sweeping them away. So he took fifty of Apollos best cows - and covered his tracks so the god couldnt find them! Hermes killed a cow and cooked up some  delicious steak, but when he came  home to Mama Maia, she wasnt too thrilled with his knavery. Hermes replied (no doubt in baby talk), Mother, why do you seek to frighten me like a feeble child whose heart knows few words of blame, a fearful babe that fears its mothers scolding? But he wasnt a baby, and Apollo soon  discovered his misdeeds. Baby Hermes tried to fake sleep, but Apollo wasnt fooled. Apollo brought the baby before Zeus - a tribunal of their dad! Zeus forced Hermes to show Apollo where the cows were hidden. In fact, the infant deity was so charming that Apollo decided to give his domain as lords of herdsmen   - and all his cattle - to Hermes. In exchange, Hermes gave Apollo the lyre hed invented - and thus lordship over music. -Edited by Carly Silver

Thursday, November 21, 2019

Art presentation Essay Example | Topics and Well Written Essays - 750 words - 2

Art presentation - Essay Example The Baroque period incorporates artistic works that is based upon catholic and protestant lines. On the other hand, Rococo art mainly focused on the pleasures and interests of the artists rather than events happening around them. Bernini is a renowned artist during this Baroque era and bases his works across Italy. He dominated the art world of Rome in the seventeenth century and received special treatments from the popes, as well as cardinals. He also confronted the contemporary artistic traditions that existed during the era. One of his most creative artwork is The Ecstasy of Saint Theresa. This work involves intense Christian art and is one of the most illustrated artwork that exemplifies spiritual aspects of the Catholic faith. The sculpture has two figures; Teresa and an angel, standing slightly above her pointing a golden spear towards Teresa’s heart. Bernini uses a very rare form to illustrate Teresa’s religious ecstasy when the angel appeared to her with a golden spear. He uses this to illustrate the intense satisfaction and desire in which God had favored her. He also expresses pain that accompanies her favor and intense desire for God’s consent. Bernini emphasizes on her erotic euphoria by displaying her open mouth and closed eyes. He also does this by hanging her limbs. The movement and drama of the sculpture is illustrated by the heavy and tangled fabric of her clothes even though the purity portrayed in her face largely contrasts with the fabric texture. The angel seems to be happily staring at Teresa as he waits to pierce her heart using the spear of divine love. This sculpture illustrates the spiritual pleasure that the saints experience in serving Christ. The imagery employed by Bernini in The Ecstasy of Saint Theresaillustrates the sensual pleasure in a way that conveys the perceptible nature of Teresa’s experience. Baroque art era also dominated across Flanders and Spain. This period is characterized by the breaking of the Lowland

Wednesday, November 20, 2019

Analytical chemistry assignment 12 questions Essay

Analytical chemistry assignment 12 questions - Essay Example In other cases, the matrix can constitute the interferent, which alters the results of the chemical analysis procedure. The accuracy of a chemical measurement explains how close the results obtained are to the true value. It is essential to establish the accuracy of a chemical measurement before interpreting the results obtained from the measurement. To determine the accuracy of an analytical measurement, one is required to calibrate it with a known standard. For instance, you can determine the accuracy of a weighing scale by comparing it with a fully functional one. Calibration refers to the process of comparing two measurements or methods whereby one is of a known magnitude or accuracy, made using a standard device or procedure and the other made in as alike a way as possible using a second device or method. The second device or method is usually referred to as the unit under test. To calibrate an analytical method, one needs to compare the results of the measurement to a set standard and making adjustments as required. The steps involved in making a chemical measurement include: selection of an analytical method, sample collection, sample processing, elimination of interferences, measurement, and calculation of results and estimation of the reliability of the results. To collect toxic fumes from a room, a known volume of the contaminated air is drawn through a glass fibre filter. The sample is then desorbed using the appropriate chemical substance and then analyzed by gas chromatography using a flame ionisation detector. Care should be observed to avoid inhalation of the fumes during the collection and analysis process. Urine collection methods vary depending on the analyte being tested. Drugs differ in the way in which they are metabolized in the body, including the components that are excreted through the urine. Depending on the analyte being investigated, urine samples can be collected during different times to

Monday, November 18, 2019

BUSINESS RESEARCH METHODS Essay Example | Topics and Well Written Essays - 1500 words - 1

BUSINESS RESEARCH METHODS - Essay Example It is of high importance to mention that the better levels of technology powered connectivity are resulting in the successful diffusion of various global trends, which emerges from various markets around the world. Because of faster evolution of the globalized trends, it can be said that the consumers are getting more and more aware of their needs and wants. It also has to be said that the better connectivity is helping the rapid dispersion of global trends from the well established markets to the emerging markets, thereby creating the opportunity for development of consumer demands. This entire cycle of increasing in consumer demand is having a direct impact on the part of the consumers in a circular manner. Faced by growing domestic demands in the marketplace, multiple companies located in various markets around the world are increasingly trying their level best to enter the new markets as they promote significant amount of business opportunity As a result, a major shift of power balances is happening in the markets from the sellers to the buyers. The shift is more happening because of the large number of alternatives that are being currently made available in the market. This has brought the focus on communicating the value of the products to the right set of consumers. While doing so, the companies and business organizations focus on the process of usage of celebrity endorsers. The buying process is in general bifurcated into three phases, that is, ‘pre-purchase’, ‘purchase’ as well as ‘post-purchase’ (Rayport & Jaworski, 2003, p. 119). The decision making process of the consumers comprises of need recognition, search for information, alternative evaluation, purchase as well as post purchase analysis (Lamb and et.al, 2011, p. 189). With the rise of competition in the modern business world, marketing communication has become vibrant and filled with endorsements. As a result, it has become very challenging for brands to get noticed by the

Friday, November 15, 2019

Community Health Visit: Klinik Kesihatan

Community Health Visit: Klinik Kesihatan An Introduction to the Malaysian Healthcare System Most of us have been exposed to the Malaysian healthecare system one way another, be it, private clinics or government ones, even hospitals at times. The Malaysian healthcare system can be said to consist of a broad umbrella structure that encompasses the provision of healthcare to both urban, not to mentioni also, the rural regions of our beloved country. In general however, it can be classified under the public or private sector, which is very obvious in our country. The public sector which is backed financially by the government, constitutes a whopping 80% of the total health services in our country, the remaining 20%, needless to say, is provided by the private sector. The backbone, or in other words, basis of Malaysian Healthcare, is formed on the foundations of the complementary network of private and government clinics together with hospitals that are available to the public. Each state of our country have their respective General Hospitals located in the states capital. District hospitals will be present in most administrative districts. Health Centers (Klinik Kesihatan) will supplement these district hospitals. Under Health Centers, are the Rural Clinics (Klinik Desa). Comparing the healthcare system in Malaysia with other first world countries such as the United States of America and the United Kingdom, the healthcare system in Malaysia is heavily subsidized by our government, in the aforementioned first world countries, treatment costs can rocket sky high. Our government has made sure that the price the people pay for treatment from the public sector his reasonable and affordable to the majority of citizens. At least 5% of the national budget is allocated to healthcare system expenditures. Our government has listed the 8 elements of primary healthcare. To fulfill the 8 ELEMENTS, they provide these services as follows: Maternal and Child Healthcare Outpatient services Basic Dental Health Nutrition Environmental sanitation Essential drugs Control of Communicable Diseases Health Education Laboratory services Organization of Klinik Kesihatan Bukit Pelanduk Klinik Kesihatan Bukit Pelanduk is located in the state of Negeri Sembilan, Port Dickson to be even more specific. There are 12 villages in the Jimah District area, and this Klinik Kesihatan is located there. On the 29th of July 1986, operations begin to go on in this clinic and the clinic has served as major centre for the treatment and recovery of the Japanese Encephalities and Nipah virus infected patients. The vaccination for the deadly Nipah virus. There are subsidiary clinics such as Klinik Desa Chuah under the jurisdiction of Klinik Kesihatan Bukit Pelanduk that provides the medical services such as maternal and child healthcare services. Klinik Kesihatan Bukit Pelanduk is also located within the radius of 30 km from the Tuanku Jaafar Hospital and the Port Dickson Hospital in Negeri Sembilan Oganisation Chart Community nurse Public Health assistant U19 (6) U17 (1) Altogether there are 33 staff workers. Klinik Kesihatan Mantin is headed by an Administrative Doctor, who is directly responsible to the District Health Officer. Under the Administrative Doctor are two posts, which are the Assistant Medical Officer, and the Head Nurse. The Head Nurse is an authoritative figure, there are 7 components of the staff directly under her, which are the Assistant Pharmaceutical officer Medical Lab Technician, Assistant Medical officer, Senior Community nurse, Public Health nurse, Health nurse, and the Trained nurse. Under the Senior Community nurse would be the Community nurse, and the Public Health assistant. Components of Health Services. The Klinik Kesihatan Bukit Pelandok has 6 main departments which are the Outpatient, Maternal and Child Health, Pharmacy, Laboratory, Dental Health, and Emergency Department. The outpatient department is by far the biggest service rendered to the public and can be broken down in the diagram below The outpatient department consists of the diabetic, hypertension, mental health, healthy teen and out patient clinic. The out patient procedures of obtaining medical services is shown in the diagram on the left. The outpatient department in other words, functions as the primary healthcare clinic. It is headed by an Administrator doctor( Medical Office). The out patient clinic sees an estimated 100 patients every single day. And the head nurse and assistant medical officers will do their utmost best to carry out their respective responsibilities to assist the Administrator doctor in any duties relevant to them. The Maternal and Child Health Clinic is headed together by the administrator doctor and the head nurse. This helps in reducing the workload of the administrator doctor. The head nurse together with the staff under her will such as community nurses, will conduct frequent home visits and provide antenatal check-ups for pregnant women within that area. Diagram on the left shows a brief summary of Maternal and Child Health services. The Laboratory Department, which is headed by a medical lab technician. The medical laboratory is not as well equipped as those major hospitals, hence the Laboratory Department of Klinik Kesihatan will collaborate with the Laboratory Department of the Tuanku JaafarHospital such as urine protein tests, thyroid function tests, lipid profile and renal function tests. Diagram on left shows a brief summary of services provided by the Laboratory Department of Bukit Pelandok. Another important component of Klinik Kesihatan Bukit Pelandok. After consulting the medical officers, patients who are eligible for prescriptions, will have their medication prescriptions handed to the assistant pharmaceutical officer, who will then supply the patients and inform them of the usage of the medication. Klinik Kesihatan Bukit Pelandok also has a dental department, the dental functions under the same operational hours of the clinic. Tooth extraction, filling, scaling, whitening are provided services. Major oral surgeries however would be referred to the Tuanku Jaafar and Port Dickson hospitals. Last but not least, there is also an Emergency Department, this department is equipped to handle minor emergencies, it also has an ambulance and paramedics. The bar chart on the left shows the ethnicity of the total number of patients in 2010. Services Provided by Klinik Kesihatan Bukit Pelandok. I have already stated the various departments of Klinik Kesihatan Bukit Pelandok in the Components of Health Services provided section. The departments of this clinic provides a wide range of treatment modalities, hence allowing the clinic to ensure that patients enjoy effective treatment. The outpatient department is the most busy of all the departments. The purposes of the outpatient department are to provide immediate treatment to patients who are acutely or chronically sick, and also to act as a control for the clinic against infective disease such as Tuberculosis. Klinik Kesihatan Bukit Pelandok also provides the Tuberculosis Direct Observed Therapy Short-course treatment. Moving on to the Maternal and Child Health care department, the clinic mainly focuses on prenatal, antenatal, not to forget postnatal care of both the mother and foetus. There is a target to be achieved, which is the target of zero maternal deaths. They are accomplishing this target in a certain number of ways which include immediate diagnosis and treatment of pre-eclampsia, immunization of the mother and frequent antenatal check-ups up until the estimated delivery date. There are also activities scheduled by the department for disabled children on a case by case basis. For the Laboratory Department, their main role is to enable the clinician in conducting relevant laboratory studies that will help in the diagnosis and management of the disease. The Laboratory Department allows the clinic to receive results much faster compared to the time it takes to receive results from a nearby hospital. Some common tests conducted by this department are as follows: Blood tests for HbA1c, lipid profile, platelet count, ESR Light microscopy on blood smears to detect blood disorders such as anemia, or parasites in the blood smears. Urinalysis for toxins, glycosuria, urea and red blood cell casts. Pregnancy test Other more intricate and complicated tests such as FTA-Abs for treponema pallidum, would require samples to be obtained and sent to the Tuanku Jaafar or Port Dickson General Hospital for processing. The pharmacy is responsible for dispensing medication in safe and legal amounts to patients, and to advise patients on practicing compliance in taking their medications. Patients will also be counseled on the side effects and contraindications of the drugs. Reflections From observing the complex structure of roles and responsibilities held by the different components and departments of Klinik Kesihatan Bukit Pelandok, it brings to light the vast value of this particular clinic in the provision and primary healthcare of the residents in Bukit Pelandok. Many of the patients who visit this clinic are of the Malay ethnicity, I for particular, am one who is not fluent in Bahasa Melayu compared to the English language. I learnt that this could be a barrier in communicating with patients who can only speak the Malay language. I have decided that I will brush up my Bahasa Melayu, and master a few of the colloquial terms so that next time I would be able to communicate even better in the Malay language. This clinic visit has taught me that every component of the staff has a part to play, and has managed to teach me invaluable lessons of becoming a team player. Section II: Household Survey Introduction Bukit Pelanduk is most famous for the Nipah outbreak. Prior to the outbreak, during the 90s, it contain the largest pig farming communities in Southeast Asia. In between October 1998 and May 1999, that was the darkest time in Bukit Pelanduk recent history, there were approximately 104 deaths out of 258 cases of Nipah infected patients. Towards the Chinese new year in the middle of March 1999, a pig breeder from Sungai Nipah, which is located south of seremban, died suddenly triggering massive panic. Nearly half the population of the village migrated elsewhere out of fear towards the killer disease. The virus spread like a raging wildfire out of control causing many pig farmers not to mention villagers to abandon their farms and homes in panic. By March 1999, Bukit Pelanduk had become something like a ghost town due to the mass exodus. The ministry of health then decided to raise the level of this epidemic to the level of national crisis. A Cabinet-level task force was set up, and then headed by the then Deputy Prime Minister Abdullah Ahmad Badawi. What was confusing was that at that time, the government adamantly insisted that it was right in tagging the disease as Japanese Encephalities, however both farmers and scientists opposed this theory and suspected that it was a different strain or virus altogether. The virus then spread to Kampung Sawah, Kampung India and even Sepang. Farmers consulted temple mediums, and promptly put up red banners at the mediums advice in and around their houses to ward off the angel of death. After months of futility in treating the outbreak as Japanese Encephalitis, the government finally decided to call in the Department of Medical Micribiology of University of Malaysas medical faculty for assistance in dealing with this disease. Dr Chua Kaw Bing was the doctor who managed to isolate the virus in five days. 12 days later, it was identified as a new Hendra-like virus and tagged as Nipah. Over one million pigs, or half our contrys pig population at that time, were culled. Around 36000 ppl suffered unemployment due to the destruction of farms. According to the United Nations Food and Agriculture Organization, it is estimated close to RM 500 million of pig production was lost. Today, pig farming is no longer allowed legally in Bukit Pelanduk. Since the outbreak, the young had drifted elsewhere in search of a living. Only the old remain, to live out their days. Objectives The objectives of the study are To describe the social demographic of community To identify vectors and pests To comprehend health seeking behaviour To determine the housing conditions To understand food, nutrition and health awareness To determine working environment And to determine the knowledge, attitude and practices on dengue among the community. Methodology (Methods and Materials) The household group consisting of 15 members. We met up before going to Bukit Pelandok in IMU to discuss our strategies and to plan ahead before the Bukit Pelandok visit. Household questions and objectives for the Bukit Pelandok visit was meticulously discussed and great care was poured into the formation of our questionnaire. The questionnaire was in the English language and pretested to make sure no discrepancies arose when certain terms were used. After countless hours of discussion we finally agreed on a descriptive cross-sectional study upon the target population which were the residents of Bukit Pelandok. Due to obvious time constraints, not to mention logistical ones, the art of the convenience sampling technique was called to the fore with households being identified as the basic unit of due analysis. The survey was conducted over 2 working days around the 7 housing areas within a five kilometer radius which are as follows Kampung Sawah Kampung Pachitan Kampung Jawa Kampung Cina Kampung India   Rumah Rakyat Taman Bayan Most of us were well conversant in English as well as the Malay language, and we were able to translate all of the questions confidently into Mandarin as well. As names and specific home addresses were not included as part and parcel of the questionnaire, we managed to obtain consent of participants as well as guaranteeing their anonymity and confidentiality of their responses in the survey. To display the results in an attractive and efficient manner, descriptive statistics were employed in the formulation of the results which would be put under the results chapter. Formulation of results in this survey was done with the SPSS 18 program together with the dedication of the data entry and analysis team. The following is a brief summary of the study: Study location: Bukit Pelandok, Negeri Sembilan Study period: 17-18 February 2011. Total population of Port Dickson: 90 000 people Target population: Community in the 7 areas mentioned above. Sampling technique: Convenience sampling technique Sample size: 234 Basic unit of analysis: Household Study design: Descriptive cross sectional study Study instruments: Pre-coded and pretested questionnaires in the English language via face to face verbal interviews. Data entry and analysis: SPSS 18 Operational definitions Results Table 2.2 above shows the literacy level of respondents. For the male population, 50 out of 79 males ,63.29 % are literate whereas for the female population, 108 out of 155, 69.68% are literate. Women have a higher literacy level than men it appears. Figure 2.3 Figure 2.3 shows that the most common occupation of respondents are housewives, 108 out of 234, or 46.15%. the second most common occupation is the skilled manual/clerical which stands at 38 respondents, or 16.24%. Only 5 of the respondents were students, representing only a meager 2.14%. Figure 2.4 Figure 2.4 shows that the most of the respondents have a monthly household income of around RM 1000-RM1999 which was 84 out of 234, 35.90%. There were 11 respondents, 4.70% who were of the highest income bracket (>RM 5000) Figure 2.5 Figure 2.5 above shows that majority houses in Bukit Pelandok are of the detached type, 65.81%. Figure 2.6 Figure 2.6 shows that 53.2% of houses are made out of brick whereas 39.5% and 7.3% are made out of brick and wood, and wood respectively. Table 2.3 : The Housing Characteristics of Respondents in Bukit Pelandok (n = 234) Table 2.3 shows that 97.9% of the houses have 24 hour availability of electricity whereas 98.7 % have availability of piped water supply. Garbage collection facility was low as only 46.2% of the houses had that facility. Availability of a proper sewage system was high too at 85.9%. 231 out of 234 respondents did know where the nearest health clinic was, a 98.7% majority of them. 219, 93.7% of them claim they will seek medical assistance if sick. 70.5% would choose the government clinic for medical assistance whereas 26.9% will go to seek medical assistance from a private clinic. Discussion From Figure 2.3, the bar chart shows that a huge number of respondents are housewives. This is because the time we carried out the survey was during office working hours. Hence most respondents who were the most likely to be at home during this period of time tend to be housewives. From Table 2.3 more than half of respondents claim that they do not enjoy proper garbage collection privileges. When we asked more about garbage disposal practices in that area, we found out that about once a week, rubbish is brought to a place designated by the village chief (ketua kampung). There the rubbish is either burnt or buried. If villagers feel that this is a complicated process, they would burn or bury their own rubbish in their own backyards. From Figure 2.4, the majority of respondents household income can be appreciated to be below the RM 2000 mark. Most of the residents of this area belong to the skilled/ unskilled manual field of profession as stated in the operational definitions, hence their income is lower. Limitations While conducting the study, the survey team realized that we ran into several limitations. That was inevitable. And we will list it down below. The first limitation encountered by our team was the coverage in the area of our study. A limited area makes it difficult for any study to be effectively correlated and to allow for generalizations to be made. Certain questions in the survey were not specific for respondents such as the awareness of job related risks. If the head of household is not there to answer the questionnaire, the respondent might not be able to give a very accurate answer. Therefore certain conclusions about the population of Bukit Pelandok could not be accurately derived. There were variations between the way interviewers would ask the questions. Hence there might be a slight discrepancy between explanations of questions and answers from one interviewer to another. This means that the standardized understanding of questions by respondents would have been slightly affected. The reliability of the information provided by the respondents is very hard to verify also. We depend on truthful answers and had no concrete way to validate whatever the respondent answered. There were instances also where non responses were encountered. During the survey there were also noticeable language barriers between interviewers and respondents. There was an instance where an Indian lady could only communicate well in Mandarin, hence the Malay interviewers would have had a real difficult time if not for his Mandarin-speaking partner. Conclusion Bukit Pelandok is an area where the residents put more faith in western medicine and most of them will seek medical treatment and advice from the Government Health Clinic. Local authorities need to beef up their services and improve garbage collection facilities among this area to prevent air pollution which results from open burning. Reflections I feel that this project has taught me some very important lessons and even practical skills, for example, in the entering and formulation of graphs and tables by the SPSS 18 program. This will help me in my future career as a medical doctor in the world of medical presenting, teaching and learning. This project also gave me an experience of conducting a household survey together with my batch mates, we learnt how to delegate and carry out our respective responsibilities as a team. We also managed to learn from our mentors on how to facilitate this type of household survey research. Section III-Research Report Abstract The objectives of this research survey conducted were to investigate the social status of the community and the knowledge, attitude and practices (KAP) on dengue among rural communities in Bukit Pelandok, Negeri Sembilan. Convenient sampling was used as time was a major limiting factor. 234 and 250 people participated in the household and research survey respectively. Participants age were 18 years old and above, had the ability to converse and communicate in the Malay, English, and Mandarin language, resided permanently in the area, and holding a Malaysian citizenship. In our survey, we used a pretested, precoded, and well structured questionnaire in the English language for data collection via a face to face interview with participants. Introduction According to the WHO, the Dengue virus is transmitted through infected Aedes mosquitos with any single one of four dengue viruses when it bites a human being. This virus is more prevalent in the tropical and sub-tropical areas on Earth. After an infective bite, symptoms start presenting within the next 3-14 days. As the name dengue fever implies, it is a febrile illness that affects humans in all stages of life be it infants, young children or adults. The symptoms present with a wide range from a mild fever, to an immobilizing high fever, which is usually accompanied by severe headaches, muscle, joint pain and the occasional bout of rashes. Up to the present day, sadly, there are still no specific antiviral medicines to battle dengue. Hydration is of utmost importance when managing a patient with dengue fever. Aspirin or non steroidal anti-inflammatory drugs are not recommended for the treatment of dengue fever. The most widely feared complication is the dengue haemorrhagic fever which is accompanied with fever, abdominal pain, bleeding and vomiting. It is potentially lethal and usually this complication affects children. Prompt clinical diagnosis and meticulous clinical management by experienced doctors and nurses usually increase the rate of survival of patients. Over the past decade, dengue has emerged as one of the most common mosquito-borne viral disease among humans. On a global scale, an estimated 2.5 billion people reside in areas where the dengue viruse can be easily transmitted. From a geographical point of view, the spread of both the vectors (Aedes mosquito) and the dengue viruses has led to a resurgence globally of an epidemic dengue fever. Together with this epidemic, there is emergence of the dengue hemorrhagic fever (DHF) in the past quarter of the century. The main vector of dengue is the Aedes aegypti ¼Ã…’ there are four different but related viruses that cause dengue. The recovery from infection by one type will provide lifelong immunity only against that particular serotype. In other words, it means a human being can be infected by another serotype of dengue virus for a subsequent time. Dengue Hemorrhagic Fever was first identified during the 1950s in the Philippines and Thailand when those two countries experienced dengue epidemics. Around 1970, about nine countries had witnessed the DHF epidemic and continues to rise in our present day. All four dengue viruses are endemic in the Americas and Asia and has become one of the leading causes of hospitalization and mortalities among children in a few of their countries. Until now, vector control is the most widely used method for the dengue and DHF prevention. Broad research on dengue vaccines are still being conducted. Literature Review. A number of literature reviews provided me with a very handy guide to the socio-demography and KAP regarding dengue among the community of Bukit Pelandok, Negeri Sembilan. Since i had limited time to conduct the research, the literature reviews gave me an overview and acted as a stepping stone to getting the research report together. Even for professionals, literature reviews are useful reports that keep them updated about what is current in their field. 4 journals from the internet and online journal communities were reviewed before writing this report. This included studies on KAP among the adult population in Malaysia, Thailand and Myanmar. The quality of the journals was merely acceptable as most of them used convenience sampling. Only one journal used a cross sectional multistage sampling, this was the journal regarding Dengue-related Knowledge among Caregivers in Myanmar. From these journals, the group conducting the research managed to fine tune the questions in the questionnaire that was used so that the answers would be helpful and informative. According to the journal by Dr Farizah Hairi, out of all of the 200 respondents surveyed in Kuala Kangsar, only one had never heard of dengue. And the main source of information came from the television or radio. 88.5 % of the of the respondents thought that the cause of dengue was mosquitoes whereas only 2.5% knew it was the dengue virus to be exact. Out of these 200 respondents, only 91 could name Aedes as the type of mosquito that could transmit the dengue virus. The knowledge on the Aedes mosquito was quite poor. Only 25 percent of the respondents were able to mention that covering the stored water as a prevention method. The good news was that 192 (96%) of the respondents understood that presence of Aedes larvae in their residence was against the law. The practice of dengue control , the most common forms of prevention were using mosquito coils together with insecticides. Majority of respondents (96%) did consider the dengue virus as a very serious disease. All of the 200 respondents stated that they would seek treatment if they were infected with dengue. Out of the 200, 192 which is a large proportion felt that prevention was better than cure. 90.5% of the respondents support programmes or activities which are organized by the health authorities targeted at the elimination of Aedes mosquitoes. 91% of respondents too felt it was justified to punish those guilty of harbouring Aedes larvae in their residence. Based on the type of scoring system used which was described in the methodology of that particular journal, 68.5% of respondents possessed good knowledge of dengue and Aedes, whereas 91.5% had a positive attitude towards dengue control. What was disappointing was that only 51.5% of respondents actually adopted measures to prevent and control dengue and its vector. Research Question The following is the main research question that all the questions in the questionnaire are helping to answer. What is the current level of knowledge, attitudes practices for prevention of the Dengue virus among the semi-urban community? Objectives General objective To assess the Knowledge, Attitude and Practice on Dengue among the Bukit Pelanduk community. Specific Objectives: To determine the level of knowledge of the local communities on Dengue To appraise the attitude of the local communities towards Dengue To describe the practices taken by the local community to prevent Dengue infection Methodology For the KAP of dengue research survey, we used a cross-sectional study in Bukit Pelandok. Type of sampling used was convenience sampling. The sample size of the study was targeted at 250, we managed to hit that mark. A pre-tested and well structured questionnaire on KAP of Dengue was used. The household survey was carried out within the range of a 5 km radius around the Bukit Pelanduk Health Clinic which included -Kampung Chuah -Kampung Sawah -Kampung Pachitan -Kampung Cina -Rumah Rakyat -Taman Bayan From the 14th to the 16th of February 2011, we did some brainstorming to finalise the topic and questions. After that we sent the questionnaires for printing. 2 members of the group were sent to Bukit Pelandok to check out the area before the day we went to conduct the research. We then had to divide determine the criteria of interviewees which would be fit for selection to answer the questionnaires. The criteria the interviewees must fulfil is that they be above 18 years old, a resident of that household, and a Malaysian citizen. Our questionnaire had 4 main components which included socio-demographics, knowledge, attitude and practices. The medium used to conduct the interview were the Malay, English, and Mandarin language. On the 17th to 18th of February 2011, we proceeded to the execution of the research study. We divided the research group into 13 pairs. On the 1st day, we covered areas within walking distance, which was as far as up to Kampung Cina and Kampung Sawah. The 2nd day , we were dropped off by group members who had cars and managed to cover further areas as far as up to Taman Bayan and Chuah. As like the previous household survey, there was a key emphasis placed on obtaining consent from respondents of the survey as well as maintaining their anonymity and confidentiality of any of their responses to the survey. The descriptive statistics program, SPSS 18, was employed in the formulation of the results of the survey. The SPSS 18 greatly helped in data entry together with analysis. A P-value of less than 0.05 was used to prove the validity of the collected data unless otherwise stated. The scoring system used is as follows. Knowledge 10 vital questions à ¢Ã¢â‚¬ °Ã‚ ¥ 7 correct GOOD knowledge Attitude 6 vital questions à ¢Ã¢â‚¬ °Ã‚ ¥ 4 Yes GOOD attitude Practice 7 vital questions à ¢Ã¢â‚¬ °Ã‚ ¥ 4 Yes GOOD practice There were some protocols that we followed to reduce bias or error while conducting the interview. We did our best to avoid suggestive questions, and the questionnaire was pretested among our own group members. There was a briefing held to convey the standardization of questioning. House allocations were done to prevent overlap and we tried our best to extensive coverage of Bukit Pelandok. Our group also double checked the SPSS data after input. Results Socio Demographic data Gender Figure 3.1 shows the gender of respondents .60.4% and 39.6% were female and male respectively out of 250 respondents. Age group Figure 3.2 shows the age group of the respondents, a majority, 40.4% were middle aged. Ethinicity Figure 3.3 shows the Malay ethnicity is 59.6%, the majority. Figure 3.4 shows the educa Literature Review: Methods Of Virus Protection Literature Review: Methods Of Virus Protection Computer viruses are most critical area in computer science. All computer users in the world are suffering from this threat. Viruses reproduce themselves and spread through computer to computer as well as network to network. There are some antivirus software and some best practices to prevent from computer viruses. As well as this literature review contains the present situation of computer viruses, protection from computer viruses and how new antivirus software performs on computer viruses. end{abstract} section{Introduction} The only secure computer is one thats unplugged, locked in a safe and buried 20 feet under the ground in a secret locationÃÆ' ¯Ãƒâ€šÃ‚ ¿Ãƒâ€šÃ‚ ½ Dennis Huges, FBI begin{sloppypar} end{sloppypar} The above statement shows the current security situation of computers and the role computer viruses play in computer world. begin{sloppypar} end{sloppypar} Computer virus is a program that can execute itself with the help of another infected executable program without knowledge of computer user and infect to computer. Viruses usually copy itself in current host and another new host also. So generally viruses are infecting to executable files. Some kinds of viruses only reproduce itself within the current host and from the current host to another host and spread in the host. Those are harmless than viruses that damage to the computer program, activities and data in the computer. begin{sloppypar} end{sloppypar} But there are some other malicious software other than the viruses. Those are called malware. These malicious software can spread without help of executable program. begin{sloppypar} end{sloppypar} Computer viruses are also computer programs. So anyone who has a personal computer can create a virus program with few lines of codes. This means birth places of viruses are widely available. Also a virus is activated in host computer; the infection can spread through network (LAN or Internet) to other computers. begin{sloppypar} end{sloppypar} Virus attaches itself to other program and spreads with them. Most of the time virus attaches to executable program, when the infected executable program is running then virus is also executing behind that process. Also computer viruses can infiltrate to operating system. So all operating systems like MS Windows, PC Dos, Unix and Macintosh OS have probability to infect with viruses. begin{sloppypar} end{sloppypar} Some viruses do some destruction as soon as they enter a system. But some of others are programmed to lie dormant until activate by some signal. The signal may be mouse click, specific date, time or specific common sequence of keystrokes. As an example the famous Michelangelo virus, it is set to activate his birthday March 6. begin{sloppypar} end{sloppypar} Protecting the computers from the malicious software is the most challenging thing. But there are many ways to protect the computers from computer viruses. Although there are lots of methods to protect the computers from viruses, the computer users also have a responsibility to protect the computers from computer viruses. From the next section of review is considered about different types of Malware. cite{1} newpage section{Different types of Malware} There are different types of Malware spread in computer world. But it can mainly identified as follow. begin{itemize} item Viruses item Worms item Trojan Horses item Logic Bomb end{itemize} begin{figure}[h] par includegraphics[bb =0 0 100 325 ]{virus.png} caption{Malware Growth by Year} cite{10} par end{figure} newpage subsection{Viruses} Virus is block of executable code that is attached itself to another executable program by attaching external code, overwriting or replacing of the executable program code. When the computer user execute the infected program the automatically activate virus also by executing the hide block of code. This is the way how virus is infected to computer without knowing of user. But viruses get help from computer user to propagate in his machine. begin{sloppypar} end{sloppypar} There are several types of viruses; they are categorized into various categories according to the way how they infect to system and what part of system is. Figure1 shows how Malware growth with year. It clearly show increase of Malware in year by year. cite{1,5} begin{itemize} item Boot sector viruses item Macro viruses item File infecting viruses item Polymorphic viruses item Stealth viruses item Multi-partite viruses item Resident viruses item Companion viruses item FAT viruses end{itemize} subsubsection{Boot sector viruses} Boot sector viruses are infected to the boot sector of computer otherwise master boot record of computer. Boot sector viruses are very difficult to detect because the master boot sector is the first thing loaded when computer started. So if this virus effect to computer, the virus get fully control of the machine. begin{sloppypar} end{sloppypar} When boot sector virus infect to computer, they first move or replace the original boot code with infected boot code. Then the original boot code move to another sector of on disk and labeled that part as bad sector. So it will not use in future. The important thing is 75 per cent of viruses attacks are reported from boot sector viruses. The main and only way computer can infected with this virus is boot computer using infected disk. So some modern anti-virus software is designed to check infected disk, when boot using disk and before boot strap is loaded.cite{1,2} subsubsection{Macro viruses} In computing macro virus is virus that is crated using macro language. Macro language built into software such as word processor. So macro viruses propagate with applications which are used macros. In most of the time macro viruses infected with MS Office Word, MS Office Excel. However many of windows applications have to potential infected macro viruses too. begin{sloppypar} end{sloppypar} Because some applications allow macro program to be embedded in documents. So when the document is opening the macro run automatically. Also macro viruses spread rapidly because of peoples share data, documents and also use internet to get data and email document. Therefore Microsoft suggests opening file without macros or user can verify there is no damage macro with the document. But these methods are also not worked at all macro viruses.cite{2,3} subsubsection{File infecting viruses } File infecting viruses are infected to flies, and sometime they are allocated memory of computer. Files infecting viruses are infected with executable files, but most of the time it infect to executable files with extensions .COM, .EXE and .OVL. begin{sloppypar} end{sloppypar} Consider with boot sector viruses these are easy to detect. If the file infecting virus infects to some document, usually it increases the size of the file. Therefore Anti-virus software can detect those viruses using that feature.cite{1} subsubsection{Polymorphic viruses} Polymorphic viruses are change there appearance in each time when it infect to computer. So it is very difficult to detect theses type of viruses. begin{sloppypar} end{sloppypar} Polymorphic viruses also block of programming code, so they are encrypting there code using different algorithms every time they attack to system. Some polymorphic viruses can assume over two billion different guises. Therefore anti-virus software should make with good algorithmic scanning techniques instead of simple string based scanning techniques.cite{1,4} subsubsection{Stealth viruses} Stealth virus is a virus that hides its track after infecting to system. These types of viruses also try to hide from operating system and Anti-virus software. Therefore stealth viruses always stay in memory then they can intercept all attempts to use the operating system. Therefore these viruses waste memory available for user and hide it form both user and Anti-virus software. It hides changes it creates to files, directory structure and operating system also. begin{sloppypar} end{sloppypar} When detected theses type of viruses using Anti-viruses software, then first it should disable the virus before correct the memory location in memory because stealth viruses also stay in memory.cite{1,6} subsubsection{Multi-partite viruses} Multi-partite viruses infect both boot sector and executable program. Therefore this type of virus very difficulty detected.cite{1} subsubsection{Resident viruses} Permanent viruses reside in the RAM.cite{7} subsubsection{Companion viruses} These are working like resident viruses or direct action viruses. subsubsection{FAT viruses} These infect to the file allocation table. subsection{Worms} Worms is a self-replicating computer malware type. It spread copy of itself to other host using computer network. Worms different than viruses how the reproduce and spread. It was known viruses want host program or boot sector to activate it need file transfer (infected file) to another computer to spread to it. But worms did not want any host files to execute and they can execute independently and spread using network. Therefore they normally find addresses to propagate and they pick addresses in three ways, begin{itemize} item Randomly generate addresses item Find addresses in system tables item Find addresses in a program end{itemize} begin{sloppypar} end{sloppypar} The threat of worms is equivalent to that of viruses. Computer worms can damage and destroyed some important files and it can crash critical programs to stop working sometime. The very prominent examples of worms are the MS-Blaster and Sasser worms.cite{1,2,8} subsection{Trojan horses} Trojan horses are distractive programs that hide in some valuable and useful software in internet. Some time worms and viruses hide within Trojan horses. The different between virus an Trojan hours is Trojan did not spread itself. begin{sloppypar} end{sloppypar} Normally Trojan hours spread into two parts those are client side and server side. When the client Trojan executes in computer the server the attacker otherwise server can get high level control of the client computer. begin{sloppypar} end{sloppypar} The Trojan hours spread in several ways, most of the time with infected e-mail attachment. Also virus developers use some chat program like Yahoo messenger, Skype to spread these Trojans. begin{sloppypar} end{sloppypar} Commonly there are several types of Trojan horses like remote access Trojan, password sending Trojan, key loggers, destructive Trojan, FTP Trojan and proxy Trojan.cite{1,9} subsection{Logic bomb} The logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.cite{1,10} newpage section{How viruses spread} Virus is one kind of malicious software which does some kind of harm to the activities of the computer. They always need a host program or any executable program to be executed its code. As viruses cannot execute its code by itself, the virus has to get the help of another file. Because of this reason, the viruses can effect only to several kinds of files such as html files with JavaScript, word documents and spread sheets. As the files with the extension .gif, .jpg,.wav,.mp3 files considered as pure data files, a virus cannot do a harm to these files. begin{sloppypar} end{sloppypar} What the viruses do to spread is copying its code to another executable file. Then when that executable file is executed by another person the code of the virus is also executing and it then starts to search for files it can reside in the same computer or in the other computer which has been connected to the computer. Then the newly attacked programs are also trying to search for files which it can attack. If the infected file sends to another computer by a removable media, the computer virus infects to that computer too. begin{sloppypar} end{sloppypar} There are number of ways which a virus can enter into a computer. Most of the time viruses are spreading through the internet. As creation of viruses is rapidly increasing and internet is everywhere available, spread of the computer viruses has increase more and more. Computer viruses are coming to the computer with e-mails in e-mail attachments. When the user opens the e-mail, the computer virus enters into the computer and grows in the computer. Another way of entering a virus into a users computer is by downloading something from some web sites. Through floppy disks or another removable media, it is possible for a virus to enter into a computer.cite{1} section{What the computer viruses and other malicious software can and cannot do} begin{itemize} item Use disk space by the computer viruses in vain. item Delete or modify the content of the infected files. item Interrupt to some operations of the infected computer. item Display some messages or images. item Decrease the performance of the computer. item Block the computer networks. item Do not do any harm to the hardware components that are connected to the computer. end{itemize} section{Protection from computer viruses} Once a computer infects with some computer viruses, the computer users cannot identify whether a computer virus has entered into the computer or computer system as some computer viruses are in idle mode for some period of time. The computer users can know that a computer virus has entered into the computer only by looking at the evidence of the destruction they have done. So the computer users must always consider about the safety of their computer before a virus do some destruction to the computer. begin{sloppypar} end{sloppypar} As most of the computer users are now aware of the computer viruses, they specially pay their attention to limit the chance for a computer virus to enter into their computer. By just installing an anti virus software the users cannot give the responsibility of protecting the computer from computer viruses only to the anti virus software programs. The computer users also have the responsibility of protecting the computer from computer viruses. Although most of the computer users trust and use an anti virus software to protect their computers from computer viruses, there are best practices which should be followed by the computer users. begin{itemize} item When downloading software or any other thing from web sites the users should always be careful to download them from reliable web sites. item As viruses can come with e-mail attachments when the computer user checks the e-mails, messages from unknown contacts should not be opened. item If the user is logging into the computer with admin privileges, the chance to be infected by some computer viruses or malware is greater than the user log into the computer with user privileges. As some viruses cannot enter into the computer when the user logged as a user, log into the computer with user privileges is safer. item Restrict the other users from write privilege is another option. item Put passwords that cannot be easily guessed by another person. item Backup data. item Use only trusted software. end{itemize} begin{sloppypar} end{sloppypar} How much the company or person has to pay for an anti virus software, today most of the computer users are used to get the service of an anti virus software as the data are worth than the amount they pay to protect their computer or computer system. So installing an anti virus software program has become the most popular and reliable method of protecting from computer viruses. cite{14} newpage subsection{Computer virus protection with anti virus software programs} As computer viruses are available everywhere in the world, the better way to protect the systems is installing an anti virus software in them. Because of that reason, there are lots of anti virus software providers to provide their services to the customers. Various anti virus software providers are providing their service to the customers in various ways. They are client pull method, provider push with consent method, subscription method and care taking method. begin{sloppypar} end{sloppypar} Client pull method After a request from the client or customer for the service of an anti virus software, the service provider provides their service to the client. In this method as its name said, client should take the initiative to get the service. begin{sloppypar} end{sloppypar} Provider push with consent method The service providers sends email notification about their product and then the customers download the anti virus software and install it on the computer. begin{sloppypar} end{sloppypar} Subscription method The client agree to an agreement with the service provider. In this method when the vendor updates the anti virus software, the updates will automatically downloaded into the customers computer. begin{sloppypar} end{sloppypar} Care taking method In this method none of the individual computer user should not do anything to protect the computer from viruses. The service provider provides the service as a whole. begin{sloppypar} end{sloppypar} The mechanisms used by various kinds of anti virus programs to detect a computer virus is not able to catch all the viruses or not able to not to catch the non virus things. Traditional anti virus software used two methods to detect a computer virus.cite{15,16} subsubsection{String matching technique} Some anti virus providers stored the codes of the computer viruses in a virus dictionary and when performing a scan, the anti virus software searches the scanning file for a piece of code from the virus dictionary. If a matching character is met, then the anti virus software detects that file as a suspicious file and alerts the user saying there is a suspicious file in the computer. begin{sloppypar} end{sloppypar} But if a virus creator creates and release a new computer virus, as the code of that virus is not available in the virus dictionary, the anti virus program is not able to detect that virus. So the anti virus software which use this technique cannot guarantee that all the computer viruses can be detected by itself.cite{17} subsubsection{Detecting a virus by monitoring the behavior of the program} The anti virus programs which use this technique is monitoring the behavior of the scanned program and if there is an unusual behavior, the anti virus program detect it as an infected program and report it to the user. begin{sloppypar} end{sloppypar} But if the anti virus software detect a non infected program as an infected program and after reporting it to the user if the user deletes it from the computer, a problem arise. begin{sloppypar} end{sloppypar} Although the anti virus software can be trusted, there are some fake anti virus software which do not provide a protection against computer viruses. They have created only with the objective of earning money from the computer users by intruding them. Because of this reason, the computer users also have the ability to download and install only the trusted anti virus software.cite{17} subsection{Antivirus software rating} The latest antivirus software rates in the world.cite{11} begin{itemize} item BitDefender Antivirus 2010 This provides a great security, simple usability, effective use of resources, and a valuable pricetag and provides up to date technologies to combat viruses and other malware.Active virus control is the latest technology they are looking for to give a great security by always observing the behavior of a file. cite{19} item Kaspersky Anti-Virus 2010 All around protection from number of threats like viruses, Trojans, bots, worms, and spyware. This is more easy to use as it has created with user friendly navigations. cite{20} item Webroot AntiVirus with SpySweeper 2010 A comprehensive desktop anti virus package which is used a multi-layered approach.Webroot AntiVirus with Spy Sweeper also features proactive technology to find malware before it does any harm to the computer. cite{21} item Norton AntiVirus 2010 Great protection level against malware but a problem arises when uninstalling the software as its partial ninstallation. This uses traditional signature based detection mechanism to detect malware. cite{22} item ESET Nod32 Antivirus 4 Kind of desktop anti virus software. But this doesnt provide a complete security and misses some protection. This is not in the competition with other anti virus software. cite{23} item AVG Anti-Virus 9 Includes antivirus and antispyware protection. provides complette protection from harmful downloads and web cites. cite{24} item F-Secure Anti-Virus 2010 Great desktop anti virus. Has one of the most effective scan procedure and test results are shown to prove that. When installing this anti virus software, it has been automatically configured to remove the other anti virus software installed to the computer. cite{25} item G DATA AntiVirus 2011 Uses two distinct antivirus scanning engines, behavioral/heuristic protection, and even self-learning fingerprinting.This provides protection against malware spreading via emails and IM. The types of malware which are detected by this anti virus software are,phishing scams, dialers, adware, malicious scripts, Trojans, rootkits and worms. cite{26} item Avira AntiVir Premium item Trend Micro AntiVirus + AntiSpyware end{itemize} section{Cryptography and viruses} Cryptography is technique use to safe some data from other unauthorized people. Most of the time this is used when transfers data from computer to another one. But the problem is virus programmers also use this technique to their viruses. begin{sloppypar} end{sloppypar} In cryptography there are different kind of cryptography methods available but most of the time the programmer who create viruses use symmetric single key cryptography. Actually what happen in cryptography is data encrypt using key and send that encrypted data to recipient then recipient decrypt and get original data using the key. This method is so safe because the encrypted data can not anyone understand. begin{sloppypar} end{sloppypar} Normally anti-virus program detect virus using the code of the virus. If there any virus with encrypted code then anti virus software can not identify those viruses. begin{sloppypar} end{sloppypar} Virus creators using cryptography, they encrypt the code of the virus. So some viruses change their aspects moment to moment and system to system but the key is same but is encrypted with virus code. So the virus is safe from anti-virus software, till the code is encrypted. begin{sloppypar} end{sloppypar} But some cryptography viruses keep their key in separate places instead of keep with the same file. So good anti virus software can detect the places which keys are stored. Then it can decrypt the virus code and delete it. begin{sloppypar} end{sloppypar} Therefore computer system is protected some operating system developers keep the system fies as encrypted. So even though, there are some advantages and the facilities in using cryptography systems to be it prctically applicapable in virus preventation more advanced features of cryptography should be applied.cite{13} newpage section{Conclusion} As computer usage and internet usage is increasing in the modern world, the computer virus creation and the computer virus infection has become a common thing. Computer viruses can destroy a whole computer system or computer network within few seconds. But for any kind of company, the data they have should have confidentiality, integrity and availability. But sometimes those three things will be lost by the computer viruses. So most of the computers users are now try to avoid from the computer viruses. begin{sloppypar} end{sloppypar} But computer virus infection has become so common thing because of the unawareness and the careless of the computer users about computer viruses. If the computer is attacked by a computer virus, the computer users do not do the correct thing to avoid spreading the virus to the other computers. That is why the computer viruses are spreading all over the world quickly. If a new computer virus is found from a users computer, the anti virus software providers are unable to provide a solution to the problem before it spread everywhere. The computer user has great responsibility to not to let a computer virus enter into the computer. To mitigate the destruction, this can happen to the computer from computer viruses, begin{itemize} item Aware the computer users about computer viruses. item Backup the data. item Put passwords which cannot easily guess by the outsiders. item Not to give write permission to the other persons. item Do not open suspicious e-mails from unknown contacts. item Download and use only the recommended software. item Install an anti virus software. item Always keep the anti virus database up to date. item Use only the recommended anti virus software. end{itemize} begin{sloppypar} end{sloppypar} As computer users are now searching for the best anti virus software which can give the best protection to their computers from computer malware, the anti virus market has grown and saturated with various kinds of anti virus software. But the problem is that though there are more anti virus software with the target of providing a better protection; virus creators are more powerful than anti virus program creators. They encrypt the code of the computer virus so that any of the anti viruses cannot detect that computer virus. begin{sloppypar} end{sloppypar} Considering all the fact we can come to a conclusion that any of the computer in the world cannot be there with no virus attack and any of the computer virus protection methods cannot eradicate the computer viruses from the computer forever. newpage begin{thebibliography}{widest entry} bibitem{1} McAfee,emph{An Introduction to Computer Viruses and other Destructive Programs},Available at: http://www.mcafee.com/common/media/vil/pdf/av_white.pdf bibitem{2} Markus Hanhisalo,emph{computer Viruses},Available at:http://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html# 1.Introduction% 20to% 20Computer% 20Viruses bibitem{3} Top Bits,2010, {http://www.topbits.com/types-of-computer-viruses.html} bibitem{4} Spamlaws,2009,emph{Understanding the Polymorphic Virus},Available at: http://www.spamlaws.com/polymorphic-virus.html bibitem{5} Ward Takamiya,Jocelyn Kasamoto,emph{An Introduction to Computer Viruses} bibitem{6} Spamlaws,2009,emph{Spotting the Stealth Virus},Available at:http://www.spamlaws.com/stealth-virus.html bibitem{7}Spamlaws,2009, emph{Understanding the Resident Virus},Available at:http://www.spamlaws.com/resident-virus.html bibitem{8} Top Bits,2010{http://www.topbits.com/computer-worm.html} bibitem{9} Top Bits,2010{http://www.topbits.com/trojan-virus.html} bibitem{10} Top Bits,2010,{http://www.topbits.com/logic-bomb.html} bibitem{11} emph{AntiVirus Software Review },http://anti-virus-software-review.toptenreviews.com/ bibitem{12} emph{Computer knowledge virus tutorial},Available at:www.cknow.com bibitem{13} Charles P. Pfleeger,Shari Lawrence Pfleeger emph{Security in Computing (4th Edition) } bibitem{14} Stanley A. Kurzban, emph{Defending against viruses and worms},Available at:http://portal.acm.org/citation.cfm?id=68697 bibitem{15} emph{How does anti-virus software work?},Available at:http://www.antivirusworld.com/articles/antivirus.php bibitem{16} emph{How Antivirus Software Detect Computer Viruses},Available at:http://security-antivirus-software.suite101.com/article.cfm/how-antivirus-software-detect-computer-viruses bibitem{17} emph{How AntiVirus Works},Available at:http://www.antivirusware.com/articles/how-anti-virus-works.htm bibitem{18} http://www.darkgovernment.com/news/tag/hacking bibitem{19} emph{BitDefender Antivirus 2010} http://anti-virus-software-review.toptenreviews.com/bitdefender-review.html bibitem{20} emph{Kaspersky Anti-Virus 2010}http://anti-virus-software-review.toptenreviews.com/kaspersky-review.html bibitem{21} emph{Webroot AntiVirus with SpySweeper Review}http://anti-virus-software-review.toptenreviews.com/webroot-antivirus-review.html bibitem{22} emph{Norton AntiVirus 2010}http://anti-virus-software-review.toptenreviews.com/norton-review.html bibitem{23} emph{ESET Nod32 Antivirus 4}http://anti-virus-software-review.toptenreviews.com/eset-nod32-review.html bibitem{24} emph{AVG Anti-Virus 9}http://anti-virus-software-review.toptenreviews.com/avg-review.html bibitem{25} emph{F-Secure Anti-Virus 2010}http://anti-virus-software-review.toptenreviews.com/f-secure-review.html bibitem{26} emph {GDATA AntiVirus 2011}http://anti-virus-software-review.toptenreviews.com/antiviruskit-review.html end{thebibliography} end{document}

Wednesday, November 13, 2019

Free Essays on Homers Odyssey: Death and Rebirth :: Odyssey essays

Odyssey Death and Rebirth in the Odyssey The Odyssey, by Homer, is a classical piece of Greek literature. Throughout The Odyssey, the Blind Bard makes use of many literary techniques in order to lend meaning to the poem beyond its existence as a work of historic fiction and aid his readers in the comprehension of the tale. One of these techniques is the use of motifs. A motif is a recurring theme that is used throughout the work. In The Odyssey, Homer makes use of many motifs including eating/drinking, Odysseus's anger, bathing, and disguise, just to name a few. However, perhaps the most important of Homer's motifs is the symbolic death and rebirth theme. This motif is used throughout The Odyssey to emphasize the growth and enlightenment of the characters. The first example of this motif occurs with Telemachos early in the text. Telemachos, in book I, is visited by the goddess Athena in disguise. In their conversation, Telemachos reveals the pain and suffering that he is experiencing as a result of living without knowing the status of his father, fearing that he is dead. ". . . and he left pain and lamentation to me. Nor is it for him alone that I grieve in my pain now (The Odyssey, Latimore, I. 242-3)." Symbolically, at this point in the text, Telemachos is dead. He is willing to take no action to save his home from the suitors or take any initiative to determine the status of his missing father. However, his symbolic death is not without a rebirth. Athene, disguised as Mentes, brings Telemachos back to life. She convinces him that he must take action to preserve his household and determine the fate of his father. This prompts Telemachos to take over his father's role in the household and journey forward to gather information about his missing father. His rebirth is further carried out in the story when he is reunited with his father; together, the two act to regain control of their household from the derelict suitors. The next example of the death and rebirth motif occurs with our introduction to the story's main character and hero, Odysseus. Homer introduces Odysseus on the Kalypso's island. On a purely literal level, Odysseus's stay with Kalypso

Monday, November 11, 2019

Leadership. Big Five personality traits Essay

After studying this chapter, you should be able to: 1. Define leadership and contrast leadership and management. 2. Summarize the conclusions of trait theories of leadership. 3. Identify the central tenets and main limitations of behavioral theories. 4. Assess contingency theories of leadership by their level of support. 5. Compare and contrast charismatic and transformational leadership. 6. Define authentic leadership and show why effective leaders exemplify ethics and trust. 7. Demonstrate the role mentoring plays in our understanding of leadership. 8. Address challenges to the effectiveness of leadership. 9. Assess whether charismatic and transformational leadership generalize across cultures. I am more afraid of an army of 100 sheep led by a lion than an army of 100 lions led by a sheep. Talleyrand Private Equity’s Poster Boy If it’s true that â€Å"Nice guys finish last,† there is no better proof than Stephen Schwarzman, chief executive of the Blackstone Group, who says his mission in life is to â€Å"inflict pain† and â€Å"kill off† his rivals. â€Å"I want war,† he told the Wall Street Journal, â€Å"not a series of skirmishes.† And win in business he has. In 20 years, he has made Blackstone one of the most profitable—and most feared—investment groups on Wall Street, with assets approaching $200 billion. Though these are not easy times for any investment bank, Blackstone has largely avoided the pitfalls of subprime mortgages and mortgage-backed securities. Some of this strategy might be considered good fortune—Blackstone invests much more heavily in commercial than in residential real estate. However, some credit is due to Schwarzman’s foresight. As he notes, â€Å"We were cautious in the so-called golden age. We were the least aggressive of all the big firms in the first half of 2007. We were very concerned about the high prices of deals and the vast amount of liquidity fuelling the boom. . . . Things always come to an end, and when they do they end badly.† Not only is Schwarzman smart and driven; he likes  the attention his success has drawn. When he turned 60, his birthday party might have made Caligula blush. The affair was emceed by comedian Martin Short. Rod Stewart performed. Marvin Hamlisch put on a number from A Chorus Line. Singer Patti LaBelle led the Abyssinian Baptist Church choir in a song about Schwarzman. Who staged this event? Schwarzman himself! When Blackstone executives prepared a video tribute to him to be played at the event, Schwarzman intervened to squelch any roasting or other jokes played at his expense. Schwarzman owns residences in Manhattan (a 35-room Park Avenue triplex, for which he paid $37 million), in the Hamptons (a Federal-style house, for which he paid $34 million), in Palm Beach (a 13,000-square-foot mansion, which, at $20.5 million, is the slum of the bunch), in Saint-Tropez, and in Jamaica. â€Å"I love houses,† Schwarzman says. The New Yorker called him â€Å"the designated villain of an era . . . of heedless self-indulgence.† As you might imagine, Schwarzman is not the easiest guy to work for. While sunning himself at his Palm Beach estate, he complained that an employee wasn’t wearing the proper black shoes with his uniform. On another occasion, he reportedly fired a Blackstone executive for the sound his nose made when he breathed. Given his success, his lifestyle, and his combative personality, you might imagine Schwarzman is immune to the ridicule, resentment, and criticism he receives. â€Å"How does it feel?† he asked, and then answered his own question: â€Å"Unattractive. No thinking person wants to be reduced to a caricature.†1 As Blackstone’s Stephen Schwarzman shows, leaders often are not like other people. But what makes them so? Intelligence? Drive? Luck? A certain leadership style? These are some of the questions we’ll tackle in this chapter. To assess yourself on another set of qualities that we’ll discuss shortly, take the following self-assessment. In this chapter, we look at what makes an effective leader and what differentiates leaders from nonleaders. First, we present trait theories, which dominated the study of leadership up to the late 1940s. Then we discuss behavioral theories, popular until the late 1960s. Next, we introduce contingency and interactive theories. Finally, we discuss the most contemporary approaches: charismatic, transformational, and authentic leadership. But first, let’s clarify what we mean by leadership. Self-Assessment Library: What’s My Leadership Style? In the Self-Assessment Library (available on CD and online) take assessment II.B.1 (What’s My Leadership Style?) and answer the following questions. 1. How did you score on the two scales? 2. Do you think a leader can be both task oriented and people oriented? Do you think there are situations in which a leader has to make a choice between the two styles? 3. Do you think your leadership style will change over time? Why or why not? What Is Leadership? 1. Define leadership and contrast leadership and management. Leadership and management are often confused. What’s the difference? John Kotter of the Harvard Business School argues that management is about coping with complexity.2 Good management brings about order and consistency by drawing up formal plans, designing rigid organization structures, and monitoring results against the plans. Leadership, in contrast, is about coping with change. Leaders establish direction by developing a vision of the future; then they align people by communicating this vision and inspiring them to overcome hurdles. Although Kotter provides separate definitions of the two terms, both researchers and practicing managers frequently make no such distinctions. So we need to present leadership in a way that can capture how it is used in theory and practice. We define leadership as the ability to influence a group toward the achievement of a vision or set of goals. The source of this influence may be formal, such as that provided by managerial rank in an organization. But not all leaders are managers, nor, for that matter, are all managers leaders. Just because an organization provides its managers with certain formal rights is no assurance they will lead effectively. Nonsanctioned leadership—the ability to influence that arises outside the formal structure of the organization—is often as important or more important than formal influence. In other words, leaders can emerge from within a group as well as by formal appointment. Organizations need strong leadership and strong management for optimal effectiveness. We need leaders today to challenge the status quo, create visions of the future, and  inspire organizational members to want to achieve the visions. We also need managers to formulate detailed plans, create efficient organizational structures, and oversee day-to-day operations. OB Poll: Confidence in Business Leaders Falling Source: Based on Edelman trust Barometer 2008 (http://www.edelman.com/TRUST/2008/TrustBarometer08_Final.pdf) Trait Theories Summarize the conclusions of trait theories of leadership. Throughout history, strong leaders—Buddha, Napoleon, Mao, Churchill, Roosevelt, Reagan—have been described in terms of their traits. Trait theories of leadership thus focus on personal qualities and characteristics. We recognize leaders like South Africa’s Nelson Mandela, Virgin Group CEO Richard Branson, Apple co-founder Steve Jobs, and American Express chairman Ken Chenault as charismatic, enthusiastic, and courageous. The search for personality, social, physical, or intellectual attributes that differentiate leaders from nonleaders goes back to the earliest stages of leadership research. Early research efforts at isolating leadership traits resulted in a number of dead ends. A review in the late 1960s of 20 different studies identified nearly 80 leadership traits, but only 5 were common to 4 or more of the investigations.3 By the 1990s, after numerous studies and analyses, about the best we could say was that most leaders â€Å"are not like other people,† but the particular traits that characterized them varied a great deal from review to review.4 It was a pretty confusing state of affairs. A breakthrough, of sorts, came when researchers began organizing traits around the Big Five personality framework (see Chapter 5).5 Most of the dozens of traits in various leadership reviews fit under one of the Big Five (ambition and energy are part of extraversion, for instance), giving strong support to traits as predictors of leadership. The personal qualities and characteristics of Richard Branson, chairman of Virgin Group, make him a great leader. Branson is described as fun-loving, sensitive to the needs of others, hard working, innovative, charismatic, enthusiastic, energetic, decisive, and risk taking. These traits helped the British entrepreneur build one of the most recognized and respected brands in the world for products and services in the business areas of travel, entertainment, and lifestyle. Jason Kempin/FilmMagic/Getty Images, Inc. A comprehensive review of the leadership literature, when organized around the Big Five, has found extraversion to be the most important trait of effective leaders6 but more strongly related to leader emergence than to leader effectiveness. Sociable and dominant people are more likely to assert themselves in group situations, but leaders need to make sure they’re not too assertive—one study found leaders who scored very high on assertiveness were less effective than those who were moderately high.7 Unlike agreeableness and emotional stability, conscientiousness and openness to experience also showed strong relationships to leadership, though not quite as strong as extraversion. Overall, the trait approach does have something to offer. Leaders who like being around people and are able to assert themselves (extraverted), disciplined and able to keep commitments they make (conscientious), and creative and flexible (open) do have an apparent advantage when it comes to leadership, suggesting good leaders do have key traits in common. One reason is that conscientiousness and extraversion are positively related to leaders’ self-efficacy, which explained most of the variance in subordinates’ ratings of leader performance.8 People are more likely to follow someone who is confident she’s going in the right direction. Another trait that may indicate effective leadership is emotional intelligence (EI), discussed in Chapter 4. Advocates of EI argue that without it, a person can have outstanding training, a highly analytical mind, a compelling vision, and an endless supply of terrific ideas but still not make a great leader. This may be especially true as individuals move up in an organization.9 Why is EI so critical to effective leadership? A core component of EI is empathy. Empathetic leaders can sense others’ needs, listen to what followers say (and don’t say), and read the reactions of others. As one leader noted, â€Å"The caring part of empathy, especially for the people with whom you work, is what inspires people to stay with a leader when the going gets rough. The mere fact that someone cares is more often than not rewarded with loyalty.†10