Tuesday, December 31, 2019

Depression And Its Effects On Depression - 1316 Words

Abstract This topic came from the thought that depression is something that all of us have experienced at some point in our lives. It focuses on adolescents because during this period we are young and vulnerable and may not know how to cope with situations or circumstances that may lead us into depression. Factors such as going through puberty and issues at home with parents can all cause depression. This paper will talk about what is depression, how families can affect depression in the child, and how depression can lead to long term effects. What is depression? Depression is one of the most common mental disorders. It does not only affect your mind but your entire body as well. Depression can lead to things such as loss of interest in your everyday activities, weight loss or gain, insomnia, feelings of unworthiness and even thoughts of suicide. Luckily, depression can be cured through medication and therapy. Many people believe that the older they are the less likely they are to su ffer from this mental disorder. They believe that they are wiser and know how to handle curveballs when life throws it at them. However, depression does not discriminate meaning that no matter what age or gender you are, you can be at risk of experiencing it. Early adolescents range from the age groups of 9-13 years old and this is the period in which they are the most vulnerable. These are the most important years because many changes are occurring. During these years, adolescents areShow MoreRelatedDepression And Its Effects On Depression1531 Words   |  7 Pagesknown as depression. Depression causes a deep sadness to a person and can have major effects on a human being’s life. As humans know life is sacred and no one wants to live life in a depressed state. In some cases depression can be repressed and even cured. Certain treatments like therapy and antidepressants are viable solutions for depression. About nine percent of Americans suffer from some form of depression. The different types of depressions include: dysthymia, postpartum depression, seasonalRead MoreDepression And Its Effects On Depression1434 Words   |  6 Pagesthey will likely to suffer from depression. What is the meaning of depression? Depression can actual ly affect people’s thought and feelings, people who suffer from depression may feel sad, hopeless and lose their direction in doing things. Even though depression is a common illness in the society, people still consider depression as a sensitive topic and does not talk much about it. In fact, people have to be aware of this serious problem and try to overcome depression by standing strong together withRead MoreDepression And Its Effects On Depression1411 Words   |  6 Pages Depression is a broad area because it has to do with the emotional state of a person. It can either make you stronger or break you down to nothing. Many people don’t notice they’re depressed because they’re either in denial or can function regularly with the condition. What is depression? Depression is a state of mind along with feelings of loneliness, hopelessness, and or uncertainty in life. Depression can trigger in so many areas in life such as: losing a child, employment, home or evenRead MoreDepression And Its Effects On Depression1687 Words   |  7 Pages Depression is a psychoneurotic disorder characterized by lingering sadness, inactivity, and difficulty in thinking and concentration. Depression is one of the most common psychiatric conditions encountered (â€Å"Depression†). Doctors have all types of antidepressants that have been used worldwide for patients with depression. Introduced in the late 1950’s, antidepressants were used to accomplish their task by inhibiting the body’s reabsorption of these neurotransmitters, thus allowing them to accumulateRead MoreDepression And Its Effects On Depression1371 Words   |  6 Pages Depression is a widely misunderstood disorder. It is a psychological condition that greatly effects the way one thinks, feels and subsequently behaves. â€Å"Some authorities have estimated that at least 12% of the adult population have had or will have an episode of depression of sufficient clini cal severity to warrant treatment† (Schuyler and Katz as cited by Beck, 1979, p.1). Depression is not fleeting and effects individuals differently. The treatment of depression has become extensively medicalizedRead MoreDepression And Its Effects On Depression1317 Words   |  6 PagesDepression, a word we all have heard, not all of us understand, and a select few are trying to dissect. However, in doing so, theories are created, and sometimes those same theories will have negatives consequences. In an attempt to further understand depression, I chose Depression’s Upside. If one were simply reading the title, one would assume this would be about some sort of break through in the Psychology field of research, or at the very least an optimistic view on depression. However, the entireRead MoreDepression And Its Effects On Depression1490 Words   |  6 PagesIn popular culture depression has become a thing that is seemingly almost sought after. A lot of youth use depressio n to have an edge or some kind of thing that makes them different. I feel like this ideology invalidates people with real mental illness and diagnosed depression. I say this but have also fallen victim to this aesthetic or aura that a lot of people portray. Although hard to define, depression can basically be summed up to be the lack of hope or courage pertaining to your life. It causesRead MoreDepression And Its Effects On Depression1093 Words   |  5 PagesDepression is in fact a legitimate mental disorder. There is too much research to doubt its existence. However, the title of â€Å"depression† is being handed out like cotton candy at the state fair. Too many people cry wolf for society to completely believe and understand the seriousness of the condition. With the number of people being diagnosed with depression growing, more and more people begin to feel that the condition is merely fabricated and can simply be cured with willpower and a little effortRead MoreDepression And Its Effects On Depression2333 Words   |  10 PagesDepression is an illness that no one enjoys talking about, and that is because of what the disease is itself. Since I have been clinically depressed, I understand first-hand the sinking feeling that comes with it. Imagine a leech on your body permanently sucking enjoyment and happiness instead of blood, or imagine being stranded within a bottomless pit with no sight of the sun. That is how I describe depression. However, there are ways to get through it and kick off that leech or climb out of thatRead MoreThe Effects Of Depression And Its Effects On Depression1642 Words   |  7 Pages Depression, 2 Every single day, across the entire world, people are diagnosed with clinical depression. I think a lot of people tend to see depression as a excuse/reasoning for something they ve done. In reality, there have been many discussions done and research studies completed on depression to see whether or not it is genetically passed down or learned through experiences/influences. I think it is safe to say that both genetic and environmental factors play a role in depression. In

Monday, December 23, 2019

Prince Escalus from Shakespeares Romeo and Juliet The...

In Romeo and Juliet by William Shakespeare, Shakespeare uses Romeus and Juliet by Arthur Brooke as a source, where he changes details, like the role of the Prince, to add more meaning to the play through his showing of an ideal monarch. Prince Escalus in Romeo and Juliet is the ruler of Verona, which is the setting of the play. He is based on the Prince in Romeus and Juliet. When Shakespeare took his character, he changed his characteristics, slightly but in an important way. The Prince is first mentioned as the ruler of the town of Verona in Romeus and Juliet. In Romeo and Juliet, the Prince is first seen stopping the street fight between the families and servants. From the beginning, the Prince is seen as being a strict, but fair†¦show more content†¦Both sides cooperate and reach out and agree on peace. Shakespeare here continues his use of the Prince as a model of the ideal leader by being just in his judgements and asking for peace for the good of Verona. This ju dgement is very different in Romeus and Juliet. The Prince does let Friar Laurence and Balthasar go, but he sentenced the Apothecary to be hanged and banished the Nurse. Friar Laurence was discharged and voluntarily left to go to a hermitage where he died five years later. Shakespeare does change this and makes the last scene less harsh and easier for the reader. He also uses this to make the Prince a kinder and a more just ruler. Shakespeare wrote during the Elizabethan Age. At this time Queen Elizabeth I ruled England and she was admired by the people. The English were coming off the monarchy of Henry VIII and he was not a good king. Shakespeare was showing the idealized monarch in this play through Prince Escalus. In Romeus and Juliet, the Prince was almost a one-dimensional character. Shakespeare took that and made him into a just and reasonable ruler. Prince Escalus is shown caring for his citizens, putting them first in his judgements. He greatly cared for the peace of Verona, doing all he could to ensure that amidst the fighting of the Montagues and Capulets there would be peace. Through the Prince’s efforts, peace did come to Verona,

Sunday, December 15, 2019

Self-esteem and Impression Management Free Essays

Consideration of a person’s perspective â€Å"self† and the processes used to determine behaviors is one element of social psychology. Some of the processes and theories are: impression management, social tuning, social comparisons, mindsets, and intrinsic and extrinsic motivation. This work will examine the basic premises of each of these along with personal examples provided by the author. We will write a custom essay sample on Self-esteem and Impression Management or any similar topic only for you Order Now Impression Management Impression management is the use of conscious or subconscious behaviors by a person to manipulate the others’ opinions about them. This can be done in a variety of ways including showering others with praise and compliments and giving gifts with the motivation of developing a favorable opinion of the giver. Adolescence is a phase of life that is particularly susceptible to impression management. When I was twelve years old, my family was transferred from inner city St. Louis to a tiny town of 2,000 people in northeast Arkansas. This town was very elitist and there was very little inroad for â€Å"new kids† to find a place of belonging. Almost exclusively, the junior high students had been classmates since kindergarten, and their social in-groups were intact. There was one girl who reached out to make me feel welcome, and her name was Laura Beth Williams. She had long, curly, strawberry blonde hair, and wore the cutest clothes. Her dad owned a local nursery and she had four sisters. She invited me to sit at her lunch table, told me where to go at lunch time, and gave me insight about teachers and classes. I was so grateful to her that I wanted to do something nice in return, and I also wanted the other students to think well of me and to consider including me too. One day I took a turquoise ring to school with the intention of giving it to Laura Beth to show my appreciation. As I thought of what I might do, and the possible responses of my classmates, I was so excited. Then, my excitement incited something that would be my demise. Instead of simply presenting the perfectly lovely piece of costume jewelry, my mind began to create a much more elaborate scenario that snowballed to catastrophe. When we got to our first hour study hall, I made a big deal of making certain that several people saw my ring. As they asked, I told them that my maternal grandfather was a full-blooded Native American (he actually was), and that he had given me this gorgeous piece of turquoise jewelry which I wanted to give to Laura Beth as thanks for her help and welcoming manner. As I had hoped, the class was impressed and I knew my status was immediately elevated in this new social group. All was well until one of the boys asked to see the ring. As he examined it, I heard an ominous snicker before he loudly announced, â€Å"Hey, Gina, is your grandpa’s name Chief Avon? † Naturally, I was mortified and began to cry and repent about fabricating the story. What is interesting is that from that time forward, the students were much more helpful and welcoming. That was the day that I learned a valuable lesson about lying and trying to impress other people. According to Segev, Shoham, and Ruvio (2013) found that being self-conscious can be positively related with gift giving in adolescence. Adolescents value peer relationships and may give gifts as a way to ensure that they have friends. Social Tuning Social tuning is the tendency for human beings to be more attracted to the thoughts, feelings, and behaviors of their own social group. This gravitation toward similar knowledge, customs, and beliefs is one element of the development of culture. My daughter, Nikki, is a typical 20-something American young woman. She has grown up with many of the niceties and luxuries of our country and as most of us are, is a bit spoiled. When she was 22, Nikki answered a call to serve as a teacher-missionary in an orphanage in Honduras. She went to language school in Nicaragua and spent two years teaching elementary students in the mountains near Tegucigalpa. Upon her return to the U. S., Nikki would often lapse into Spanish, especially when she got nervous or excited, and she loved to go to the Mexican restaurants in town. She said it â€Å"felt more like home†. It has been two years since her return, and now Nikki no longer breaks out in Spanish, and she doesn’t frequent Mexican restaurants as often. Although living in Honduras for over two years did not make Nikki a Honduran, social tuning began an enculturation process. A 2010 study actually showed that there is a psychological and cognitive tendency for people to be more prominent within one’s in-group. The study specifically explored words, paintings, and time pressure. Not only did the study explore reactions to stimulus among those who shared cultural similarities, but the researchers found that the cognition and psychological reaction was lessened when the participants thought that the other participants were unlike them. Social Comparisons Human beings naturally compare themselves to other human beings, both individually and corporately. This phenomenon is called social comparison, and it can be either positive or negative. For example, if a person who has had three speeding tickets is comparing their driving record to the driving records of other people, they may feel good about their driving if they have fewer accidents or tickets and bad about their driving skills compared to the person who has never had an accident or a ticket. The comparison actually does not change the person’s driving ability, only their perception of their driving ability. Recent research demonstrates that it is the quality rather than the frequency of social networking experiences that places individuals at risk for negative mental health outcomes. However, the mechanisms that account for this association have yet to be examined. Accordingly, this study examined whether the tendency to negatively compare oneself with others while using Facebook leads to increases in depressive symptoms, and whether this association is mediated by increases in rumination. A sample of 268 college-age young adults completed an initial online survey and a 3-week follow-up. Path analysis was used to test the hypothesized model, wherein negative social comparison on Facebook was predicted to be associated with increases in rumination, which, in turn, was predicted to be associated with depressive symptoms. The model controlled for general social comparison to test the specific effect of social comparison on Facebook over and above the tendency to engage in social comparison in general. Results indicated that the hypothesized mediation effect was significant. In sum, in the context of social networking, negatively comparing oneself with others may place individuals at risk for rumination and, in turn, depressive symptoms. Findings increase understanding of the mechanisms that link social networking use to negative mental health outcomes and suggest a continued emphasis on examining the specific proces How to cite Self-esteem and Impression Management, Essays

Friday, December 6, 2019

Use Of Strategic Management In The Turnaround Of Nissan - Free Sample

Question: Discuss use of strategic management in the turnaround of Nissan by Carlos Ghosn? Answer: Introduction Jr. Thompson, A. A (2009) confirms that the job of the management is to fulfill the objectives of the organization. Management uses different approaches and tactics to succeed in the task. These tactics and approaches are referred as strategic management. Collins, C. J (2001) says there is need of a leap in strategic management in some cases. Here the discussion will be on the rebuilding of Nissan after its successful collaboration with Renault. Carlos Ghosn who is termed as genius in turnaround did his magic. Nissan overcome its over $200 million losses and near $20 billion debt and made profit only in two years. Here the study will try to understand how Ghosn applied different strategies in business to make this successful turnaround in so quick time. His model and methods will be studied under the light of various methodologies of business strategy. Strategy making and its application is highly important. It requires proper study and knowledge to make the strategies purposeful and worthy. Here the study will try to see how the Carlos Ghosn applied the strategies for the turnaround of the Nissan. This will clear how the strategies can be used in favor of the organization. It will help the management in future to understand the how the process of making and implementing strategy should be done to make the organization successful. Analysis Process of strategic planning Contribution of organizational goals, objectives and competencies in business strategy Pearce II, A. J (2010) in his book opines that organizational objectives, goals and competencies are very important in making of business strategy. In the case of Nissan Carlos at first made the objectives very clear. It was to make the company profitable. In this process the goals were to cut down the extra costs, enhancing the quality and quantity of production. It was all planned according to the competencies of the company. As the objectives and goals were clear and the competencies were well studied it helped to make best suited strategies. In generally this is the base of the successful business strategies. This base work helps in making realistic targets and also helps in reaching those. Understanding and using the impact of external internal and competitive factors in making business strategy According to Heath. C (2010) every organization has these three factors in it function. Lets discuss the factor and its impact in the strategy making of Nissan: External: Heizer, J. H (2003) briefly describes that external factors mainly mean the economy of the country, market scenario and polices of the state regarding business. These factors create impact on the making of objectives and goals. Thus it also impacts on the strategy making of the organization. In the case of Nissan, Carlos made the decision of stopping the functioning of few plants in Japan. But in Japan jobs are considered to be permanent. Thus to solve the problem Nissan offered voluntary retirement to many employees and transferred some employees in new plants. The plants were required to close to make production costs less but the external factor created problem. Carlos handled it will made the strategy work by understanding the factor. Internal: internal factors are considered to be as the employees, work environment and infrastructure. These are very important factors in understanding the competencies of the organization. Mintzberg. H (2005) thoughts are properly applied by Carlos at the start tried to understand the employees through on field experience. Japan was completely unknown to him but he didnt try any books to know about Japan. He gave importance on field experience. This helped him to understand the Japanese well and this experience was used in strategy making. Competitive: David, R. F (2006) says this is factor that silently works with every business strategy. Strategy making must consider the position of its competitor firms in the market, there current stand and policies etc. in 2005 when Carlos Ghosn joined Nissan as CEO, the company was lagging behind in the car making competition. It was still dealing with its old designs. Carlos made the Change by understanding the weakness of the organization and quickly focused on developing new designs. This gave the organization competitive advantage in the later years. Planning techniques used by Carlos in Nissan Senge, M. P (2006) opines that there are different planning techniques applied in business strategy. Here the techniques applied showed by Carlos Ghosn showed that there is need to regard different aspects of the organization to construct successful planning technique. Here the strategy considered all the factors involved, internal, external and competitive. It made the strategy strong from every angle. Thus they didnt have much problem from different aspects linked with organization. They used those factors and made the strategy successful for the company. Organizational evaluation Organizational audits Kaplan, S. R (2004) says audits are very important to make strategies. This was carefully done by the manager. At first he tried to find out the strengths of the company by understanding the Japanese work culture. It seemed that the managers and superiors are very much respected by the employee in the country. The employees also maintained a very good relation among their sector of work. But soon it was discovered that there are some weaknesses too. Goldratt, M. E (2004) explains employees are less keen to take responsibilities. They are also not accustomed to work in different groups. This pointed out the failure of the company. It was the system that was not urging the employees to take responsibilities and didnt ask them to take charge. Soon it was change by Carlos, employees were urged to spoke about their ideas, and they were compelled to work in combined groups. Opportunities were also clear to the management. It knew the markets of cars are growing all over the world and Nissan has the strength to capitalize on that. This is why the importance was given in smart production. It was done by deducting the costs and applying new methods and techniques in work. In the end the task of auditing the scenario was completed by understanding the threats the organization. It was soon very clear to the management the organization was having production plants that were not contributing to the cause of the company. Those were running under lose. It was clear that the organization was running with extra number of employees than they required. It was posing threat the company might continue spending extra in their production cost and they will keep running in lose. It forced the decision of ending the function of different plants in Japan. Many employees were given voluntary retirement through the process of Golden Handshake. Many of the employees were transferred to new plants. Thus the balance was restored in the company and its methods. It is clear from the above analysis that the processed SWOT analysis was applied by the management to understand the actual situation of the organization. SWOT analysis is always been very successful to understand the success of the organization. Here the organization and its management prove the fact that it is also very crucial to implement useful strategies in the organization. Environmental audit and purpose in strategy making Internal environment: Bossidy. L (2002) makes clear that internal factors and its impact in the organization is already stated. Here this audit showed that employees were not interested and were not also able to work in cross functional group. These cross functional groups were formed by the organization to make the process of organization smooth and successful. But the employees were not interested. Thus they were urged and motivated to participate in such groups. Transparency was also made to keep the employees aware of the strategies and processes. This compelled the management to organize several meetings to maintain the transparency in the hierarchical Japanese system. External environment: management knew they were required to make the numbers of employees and plants less to reduce the extra cost. Osterwalder. A (2010) says in Japan jobs were treated as permanent. This made the management to take new ways to stop production in plants ad detain employees. They took the note from the external factors and offered Golden Handshake to the employees. It was voluntary retirement scheme. Many employees accepted that and some employees were transferred to other plants to reduce the costs in production. Competitive environment: Pink, H. Daniel (2009) makes it evident that competition was always there in car market. Nissan was lagging behind in that competition. It was happening due to the old models of the cars and use of old technologies. On the other hand the competitors were using new techniques and models in the market. Thus initiatives were taken to build new models and application of new technologies was done to make the process of car making worthy and up to the mark. This analysis shows the organization was able to make changes in the organization. This was happened due to the proper analysis of the organizational environments. This helped the organization and the management to take proper decisions to apply methods that can give advantage to the organization (David, 2006). Stake holder analysis and its importance Fried. J (2010) says often people dont consider that the how much important role the stakeholders play in the development of the organization. A management must consider the mindset and the demands of the stakeholder to apply the strategies properly. Ansof, I. H (1970) states that stakeholders are those who play important role in the functioning of the organization. This is why after joining Nissan Carlos took the steps to rebuild and change the strategies of the organization so that the stakeholders feel motivated and interested in the organization. He announced that the main aim will be to make Nissan profitable. This was a very important announcement for the stakeholders. As their money is involved in the company, it encouraged them. Drucker, F. P (2006) says it is highly important to make strategies in a way that it balances the interest of the stakeholders with the organization. Stakeholders are also very important part of the organization. Thus strategies must consider their views and objectives. Importance of strategy evaluation and selection Analyzing factors involved in business and using them in strategy Pricing: Hill, W.L. C (2009) opines in his book that pricing is a factor that should be cautiously handled in the competitive market. Pricing gives a great amount competitive advantage if it is rightly made. In the case of Nissan it was important to make changes in the procedure of car making to develop the quality. But the organization also kept it is mind that they cant raise the price too much. This is why the importance was given in the cost cutting. Management was putting importance to reduce the cost of production they took different measures to ensure that. Advertising: Kotter, P. J (1996) says advertising of the products are very much required in the modern market. Strategies must include proper advertising techniques to ensure that organization and its products are getting enough lime light. It ensures that the products are there in the consumers mind. This is why Carlos met with the dealers continuously to make sure that the cars reach to the prospective consumers. He ensured that organization makes proper advertising to get into the market. Advertisings were used to rebuild the image of Nissan. It was dome to highlight the new models in the market. This gave the organization a new branding in the consumer mind. Customer Relationship management: Lencioni. P (2002) describes it as a part that can harm the organization badly if not taken care properly. It gives a great scope to the organization to make a good image in front of the consumers. Nissan management knew that. Thus Carlos Ghosn held several meetings with showroom owner and car dealers so that Nissan gets proper importance in the showrooms. He wanted to make sure that the consumers get impressed with the products of Nissan. (STP) Segmentation- Targeting- Positioning: Hill, W.L. C (2008) opines that implementation of strategy will be rightly done only if these three mentioned attributes are well placed. STP gives the chance of getting into right position by deciding the purpose of the strategy. It confirms the targets and methods of application. Studies from Gladwell. M (2008) clears this is why it is very important to maintain the STP in the strategy making process. It helps the organization to utilize the work power available in the organization by making the process transparent easy to follow. Here the process of strategy making regarded all the mentioned factors. Management took note from all the factors and tried to improve them by applying different strategies. This showed that they intent of the management were to understand the different aspects of the proper strategy making. This is why the steps taken by the Nissan management fall under the proper strategy making process. As the evaluation of the organization and the factors involved in the process was done rightly, it was easy to understand the requirements. This helped the management to form proper strategy. As the requirements were clear to the management they were supported by the purpose. This made sure that organization reach the point where it can get benefit from the mentioned factors in the strategy making. This is why understanding the factors and their evaluation is so important in strategy making. Implementation of strategy Roles of different sectors of organization in strategy making Gladwell. M (2008) says that the three important sectors of the management are managers, leaders and the employees. Here the study will consider the roles of these three different sectors. Management Leader Employees Strategies are developed by the managers. Management is the place from where the strategies come from. Management understands the requirements and makes the strategy for the organization that will suit the scenario. Job of the leaders is to understand this strategy properly. As the leader will take are that the process to implement the strategies are being followed in the organization. Employees are the base of the success. They fulfill the strategies made by the management and supervised by the leaders. Pedersen, T. (2014) shows an employee carries the process of implementing the strategies. Management must understand different factors involved in the strategy making. This is important because it is important for making helpful strategies. Pedersen, T. (2014) says Leaders should also understand the scenario of the company, state of the employees mind. As the leaders are required to work in the field it is important for them to understand the scenario well. Employee must remain aware of the strategies and the procedure. Employees are those who people who carry out the orders. This is why awareness is very important part in the strategy implementation. Management handles the organization. This is why management must give attention to the employees and leaders on the subject of strategy implementation. As they are working on the field, they know the actual circumstances very well. Advices from them can make the implementation process and the strategies more worthy and successful. Leaders should communicate with management and the employees properly. They are working in the middle. Their communication is very important to keep the things clear in the application of the strategies. This helps all the parties to remain clear about the task and makes the chances less of miss management. Employees should make responsible efforts to implement the strategies. They should play proper role in the implementation as it is very much depended on their behavior. They should give inputs to develop the process of strategy implementation. Management of the Nissan understood the different roles of the participants in the organization. This is why the management put importance in the participation of the employees. They are required to implement the strategies properly. This is why management gave immense importance on the understanding of the employees. Meetings were held in the organization to make the employees aware. Transparency was the main factor in the implementation of the strategy. It was given the most importance to make the strategies worthy and purposeful. Understanding the required resource for implementation of strategy Implementing the strategies require various kind support from the organization. This requirement must be understood by the management. Nissan made this possible by understanding the state of the organization. Carlos Ghosn made investigation to understand the requirements and made the following steps. 1. Cost cutting: Management saw that the company must reduce the cost of production. The production cost was rising due to some reasons. These reasons include extra number of plants, old methods in production. To recover from these problems, management closed plants those were not contributing to organization. It also used it collaboration with Renault and held meetings with their engineers to develop new processes of production. This helps the cause and production cost were less in no time.2. Developing man power: Man power is an important factor in implementation of strategies. Right quality and quantity is very much required to implement strategies. This is why management put efforts to make the employees responsible. They also took care that the employees come out of their comfort zone to work in different ways and to implement strategies. The employees were urged to work in cross functional groups. This was done to make the employees understand about the whole scenario involved in the production (Yin, 2009).3. Infrastructure: infrastructure helps organization to reach new heights. This is why every organization make efforts and to keep the infrastructure level high. Nissan understood that their infrastructure was not up to the mark. Thus they made changes in the infrastructure level and made changes to enhance the quality of the infrastructure. It was done by implementing methods that are modern and enable to give high performance. Targets and timescale in implementing strategies Targets are important part of strategy implementation. Every strategy has some targets. This target marks the success of the strategies. Strategies should divide the targets in small parts. As soon as the targets are divided into parts, those should be ascertained to achieve part by part. This helps the process; it helps because as soon as the first target is made then the second target comes into the redder. It ensures that the strategy is in the right path. These require the following steps: Monitoring: monitoring is an important part of strategy implementation. Monitoring helps the management to understand that the strategy is working. It also helps in achieving the short term goals. Thus the monitoring process should have proper time lapse and methods to make it successful. Timescale: this is perhaps the most important part to make the monitoring successful. As every objectives and targets are divided into small parts, it requires proper time also to achieve. Thus the monitoring must have proper time gap so that it can rightly examine the facts. In the case of Nissan, the management made proper structure in the monitoring. It made purposeful monitoring to understand the progress. This progress is important to know make changes in the strategy. If the strategy is not working well then management will be able to know it. It will also help the management to make changes in the strategy if required. Recommendations It is highly important for management to make strategies after considering various facts attached with the organization. There are various factors involved in the organizational functions. Management must take care of these different factors. Strategies are more likely to be successful if the associated facts are well regarded. In the case of Nissan, Carlos Ghosn understood these various factors. He made efforts to understand the culture of Japan, the employees, problems of those employees and the production process. Only then the useful strategies came out. The strategies were so helpful because it considered all the factors related. It took measures to rectify the wrong practices (Boone Kurtz, 2012) It is recommended the management should give patient look to the organization and the related factors to develop useful strategies for the organization. Only then the strategies will be worthy. It is also important to make the process transparent. One can see that the strategies worked in the Nissan because it was very velar to the employees. It created the scope for those employees to contribute in the strategy. This is also very important; organization must make the employees responsible. If employees feel motivated to contribute then the process is more likely to be successful. Employees are the back bone of the organization. It is advised the organizations and management give importance to their understanding properly. (McNabb, 2013) Conclusion The study has showed various factors involved in the organization and its strategies. The importance of these factors are shown in the light of Nissan and its successful CEO. It shows that the success of Nissan is achieved by these proper understanding of factors and rightly application. Factors involved in the strategy making deals with various sectors of the organization also. These sectors also require proper guidance and monitoring. Carlos Ghosn was successful in understanding these different sectors of the organization. It helped him to apply the strategies so that it can contribute in the development of these sectors. Robbins, S., Judge, T.A. and Millet, B. (2013) says organization is constructed with different people. Carlos in his process made steps to connect with this people. He made efforts to influence this people in favor of the organization by holding meetings. This helped the organization to attain the goals by combining the efforts of different peoples (Tan, 2012). It can be also seen that from the study the making the objectives clear is also important. As the objectives were clear for the Nissan, it helped them to make the strategies pointed. It helped the organization in application. References Collins, C. J (2001) Good to Great: Why Some companies Make the Leap. and Others Dont. Harper Business Jr. Thompson, A. A (2009). Crafting And Executing Strategy: Text and Readings. Irwin/McGraw-Hill Covey, R. Stephen (2004). The 7 Habits of Highly Effective People Powerful Lessons in Personal Change. Free Press (NO) Pearce II, A. J (2010). Strategic Management. Irwin/McGraw-Hill Heath. C (2010). Switch: How to Change Things When Change Is Hard. Crown Business Mintzberg. H (2005). Strategy Safari: A Guided Tour Through Wilds of Strategic Management. Free Press Senge, M. P (2006). The Fifth Discipline: The Art and Practice of The Learning Organization. Crown Business Kaplan, S. R (2004). Strategy Maps: Converting Intangible Assets into Tangible Outcomes. Harvard Business Review Press Goldratt, M. E (2004). The Goal: A Process of Ongoing Improvement. North River Pr David, R. F (2006). Strategic Management: Concepts and Cases. Prentice Hall Heizer, J. H (2003). Operations Management. Pearson Bossidy. L (2002). Execution: The Discipline of Getting Things Done. Crown Business Wheelen, T. J (2005). Strategic Management and Business Policy. Prentic Hall Osterwalder. A (2010). Business Model Genration: A Hamdbook For Visionaries, Game Changers, and Challengers. Kindley edition: Alexanadar Osterwalder Yves Pigneur Pink, H. Daniel (2009). Drive: The surprising Truth about What Motivates Us. Riverhead Books David, R. F (2006). Strategic Management: Concepts and Cases. Prentic Hall Fried. J (2010). Rework. Crown Business Ansof, I. H (1970). Corporate Strategy. Penguin Books Drucker, F. P (2006). The Effective Executive: The Definitive Guide to Getting Things Done. Harper Business Hill, W.L. C (2009). Cases in Strategic Management: An Integrated Approach. Cengage Learning Kotter, P. J (1996). Leading Change. Business Review Press Lencioni. P (2002). The five Dysfunctions of a Team: A leadership Fable. Jossey-Bass Hill, W.L. C (2008). Global Business Today. Lrwin/McGraw Hill Gladwell. M (2008). Outliers: The Story of Success. Little Brown and Company Thiel. P (2014). Zero to One: Notes on Startups, or How to Build the Future. Crown business Pedersen, T. (2014) Employee motivation to work vital to companys success [online]. Available from: https://psychcentral.com/news/2014/03/14/employee-motivation-to-work-vital-to-companys-success/67094.html [Accessed 30 May 2015]. Yin, R.K. (2009) Case study research: design and methods. 4th ed. London: Sage. Boone, L. and Kurtz, D. (2012) Contemporary marketing. Cengage McNabb, D.E. (2013) Research methods in public administration and non-profit management. 3rd ed. M. E. Sharpe Inc Robbins, S., Judge, T.A. and Millet, B. (2013). Organizational behaviour. New Jersey: Pearson Education. Tan, S.K. (2012) Generation X and Y and their motivation: Proceedings of the 8th European conference on management leadership. Academic Conference Limited

Friday, November 29, 2019

An Essay on Rising Sun and Song by John Donne †Literature

An Essay on Rising Sun and Song by John Donne – Literature Free Online Research Papers An Essay on Rising Sun and Song by John Donne Literature Recently in our English classes we have been looking at two poems by the London born poet John Donne. The son of a wealthy iron monger, john was born in 1572 but died at a fairly young age after contracting the lung disease tuberculosis. He was an incredibly famous poet, especially in the English literature circle as he mostly did love poems or religious poems towards the end of his career. In my coursework I will be looking at two of his better known poems, â€Å"Rising Sun† and â€Å"Song†. These are both love poems written by john just when he starts a relationship and just when he has ended one in unpleasant circumstances. I feel that john must have been pretty fed-up with relationships as in 1601 he became a priest. This is about the time he started writing religious poems more regularly than love poems but john was also very good at writing religious poems as well. John sadly died in 1631 on the 31st of March. The first poem I will be looking at is â€Å"Rising Sun†. The poem is an â€Å"aubade†, this is a poem which was written to praise the dawn of day, and these poems were very popular in the 17th century. John wrote this poem in dedication of the love that he felt for his girlfriend in 1601. It could be connected to how the sun rises as he wakes up after the first night with his girlfriend. But as he does so he gets quite angry at the fact the sun has woken him up then he starts off by telling the sun to go right around the world and wake up everybody else and then maybe it can come back into his bedroom. By the end of this poem the reader gets the impression that john feels his love for this woman is more important than the sun. The poem is opened up very suddenly and confidently, this confidence is taken on all throughout the poem as john feels he needs to belittle or put down the big and important things, just to compare how big and important his love is for his girlfriend/ at one point in the poem john calls the sun a â€Å"busy old fool† as he points out that every morning the sun wakes people up even if they don’t want to. Throughout the poem there is a constant question being asked, this is why do lovers have to follow the same rules as everybody else? and also why do lovers have to be subjected to seasons? As he points out that their love serves no seasons or time alike. Throughout the poem you get the impression that john is angry or bitter that the sun of all things had to wake him up. This is john very cleverly separates himself and his lover from the majority of England, he does this by stating all of the people in England from apprentices to school boys, then he tells the sun to wak e them up as their lives are not as important as his and his partners. In the last paragraph I picked up on the fact that john told the sun to go and wake up the entire population of England, this is the effect of exaggeration on a very large scale. John likes to exaggerate in his poems to try and get his point across a bit better, he does this in â€Å"Rising Sun† and also â€Å"Song†. This technique is called hyperbole. While John was writing this poem he decided to base it on how the solar system works (based on what the majority of people thought at the time). This is that the earth is the centre of the universe and all starts and planets orbit it. Even though John was well educated and probably knew this information to be incorrect it worlds well with the poem as all throughout we get the impression that John feels that the earth is centre of the universe and his bedroom is at the centre of the Earth. This poem is really far-fetched and at times childish, but the reader isn’t meant to take this to heart as john has wrote this i n celebration of his love and not as a hard hitting piece of English literature. In the previous paragraph I picked up on the fact that John exaggerates in his poems and also to put down or belittle things. A perfect example of this comes at the end of the first stanza when john says that love or even why should love have to serve time like everything else or even go through seasons as love is far too special to be subject to the rule. John is trying to say that lovers are in a timeless place and that time is not important as he refers to it as a big piece of cloth which has been ripped up into piece to make hours minutes and seconds. In the second stanza John incorporated a wider view other than just England. Straight away John targets the sun to pick on, just to prove how great his love is. He does this by saying however powerful the sun is or however important he can just eclipse it by closing his eyes, but he doesn’t want too as he wouldn’t be able to look at his girlfriend. In the second part of the stanza this is when he includes the rest of the world into his poem which in the 17th century most people thought only went as far as east and West Indies. He then tells the sun to get the countries most valuable products, but even then the sun wouldn’t have anything as special as what john has got. At very start of the third stanza john targets the most influential people and probably the most powerful ones in England in the 17th century. He starts the third with the line â€Å"shes all states, and all princes, I†. This means that his partner is more important than the political powers (states) and also the royal ones (princes). To follow this up john then writes a short sentence for effect, â€Å"nothing else is†. This is a very bold statement as he is saying no question my love is better than the most powerful things in England. This sentence along with the opening line gives the third stanza a very confident and brash opening, just like the third stanza john starts with a very hard hitting line which gets the readers attention, but also gives them something to think about. I feel that john has done a good job with this poem as the first stanza was a very hard piece of writing to follow-up but he has managed to keep the reader interested. John uses the ideas of pretence and empherall in the last stanza. John then says â€Å"honours mimic and all wealth alchemy†, John means that all the honours that one man can get and all the money he can accumulate are worthless if he has not experienced love. In â€Å"Rising Sun† the sun wakes John up in the morning as he is trying to sleep, he then tells it to leave his bedroom and go to wake other people up in England. After his rant it works out that John has told the sun to wake up the entire population of England. John then says don’t just wake up the people of England, make it the entire world. After the sun has done a full circle, John invites it back into his bedroom. By doing this he suggest that he has the power to tell the sun to go away and he has this power as he is in love. Throughout the poem it is basically just one big comparison, as the sun is going round the world and visiting place with vast riches and worldly goods. John is saying that those things are nice but not as good as the feeling of love. When john ends this poem by saying â€Å"this bed thy centre is, these walls thy sphere† he is putting his bedroom at the centre of the world. If you think back to the poem it is based upon the geocentric belief of the universe, and upon this basis we get the impression that john feels his bedroom is at the centre of the universe too. As the suns job is to warm the world John says â€Å"to warm the world, that’s done in warming us†, this means that this can be achieved by not warming throughout the world but just warming our bedroom. I am now going to look at the second poem, â€Å"Song†. This is a complete contrast to â€Å"Rising Sun† as john wrote this at the end of his relationship. In the poem John uses exaggeration as; he did in the previous poem, to prove his point. Many poets used exaggeration at this time. In â€Å"Rising Sun† John’s argument is that there is nothing better than love but in â€Å"Song† John asks â€Å"can you find a woman that is both beautiful and faithful†. It is clear from looking at â€Å"Song† that John has lost his naà ¯ve views of love that he possessed in â€Å"Rising Sun†. His confidence in the power of love has been waned and now he appears more cautious and almost bitter. However, it is not John’s intention to appear bitter or angry to the reader and this is apparent in the vocabulary and tempo of the poem. In the first stanza of â€Å"Song† it is just one big list of impossible tasks. John says â€Å"go and catch a falling star† this is impossible as they are far away and far too fast. He also says â€Å"get with child and mandrake root†. A mandrake root that bears an uncanny resemblance to a human being, superstition has it that mandrake roots only grow where semen lands. He then carries on with the list saying â€Å"tell me, where all past years are† and â€Å"who cleft devils foot†. He says â€Å"teach me to hear mermaids singing†, myth has it that when pirates are at large there would be a group of mermaids sitting on a congregation of rocks in the pacific ocean singing beautiful songs which would lure the pirates towards the rocks, causing their ships to run aground. There was also a myth that if you heard mermaids singing you would go insane. This line works well with the idea of the poem as John is implying that beautiful women are only out to do one thing, which is to wreck as many men’s lives as they possible can and leave them with nothing. In the next line I feel John incorporates his own feelings into the poem, he writes â€Å"or keep off envy’s stinging†. This tells me that his partner has been unfaithful to him and he feels envious or jealous. He doesn’t want to feel these emotions but it is impossible not too if your partner has been unfaithful. John ends the firth stanza on a bitter note â€Å"and find – what wind – serves to advance an honest mind†. John is trying to say that in love you don’t get any reward for being faithful. In the second verse john uses time and scale distance just like he did in â€Å"Rising Sun†. In â€Å"Rising Sun† john tells the sun to go all around the world picking up all the riches it can find, so he can compare them to what he had got then. In this stanza of the poem John is addressing a man to ride over 27years to each end of the world and back until he gets old, expressed by john as he says white haired. And he won’t find a woman that is both beautiful and faithful. This again is a brilliant example of exaggeration on a wider scale, both of these techniques have been used in the two poems and they both incorporated using each end of the world as the furthest possible limit. But both use it to prove totally different points, one very happy, one very negative and the other very positive. John ends the poem ‘‘song’’ very well in my opinion. He says ‘‘if you can find a women who is both beautiful and faithful then tell me, because it would be a pilgrimage to get to her’’. I like the fact that john calls his search for this special kind of women a pilgrimage, as you normally associate pilgrimages as a sacred once in a life time journey in which you get all that you have ever wanted. John then put a semi-colon after this line. This is a very clever idea as it will raise the tension and excitement in the reader. He then follows this up by saying you know what don’t even bother because, by the time I’ll have got there she would have been unfaithful already. That line gives me the impression that john is fed up with love and he doesn’t even want to try to find faithful women. One of the main reasons I like the poem ‘‘song’’ is because of the last stanza, normally the poet wh o is writing a love poem after a break up starts off really upset but gets more happy and cheery as the poem goes on. But not in this one, john starts off bitter and angry and carries it on all throughout the poem. For my final paragraph I will be summarising the two poems. It might sound strange but they are both very similar and also are very different. The two poems use the hyperbole technique and also incorporate distance to prove there points. Both poems have been wrote as a declaration of what john is felling at that time, in ‘‘rising sun’’ john is overjoyed that he is in love and there is nothing better but in ‘‘song’’ it is a much more sombre mood as he has ended that relationship. I like both of the poems I like the fact that in ‘‘rising sun’’ john has the cheek to belittle the sun, but I like johns bitterness in ‘‘song’’. Not one of the two poems are amazing but I do have my favourite and it would have to be ‘‘rising sun’’ I like the fact that john has the cheek to belittle the sun arguably the most powerful thing in the world, and I also like the way he but himself above every one in England. Even though ‘‘song’’ is enjoyable I feel it is just a bit too repetitive at times and maybe a bit childish and easy too understand. Out of the two poems my favourite would have to be ‘‘rising sun’’. Research Papers on An Essay on Rising Sun and Song by John Donne - LiteratureMind TravelHip-Hop is ArtHonest Iagos Truth through DeceptionCanaanite Influence on the Early Israelite ReligionComparison: Letter from Birmingham and Crito19 Century Society: A Deeply Divided EraQuebec and CanadaThe Effects of Illegal ImmigrationPersonal Experience with Teen PregnancyWhere Wild and West Meet

Monday, November 25, 2019

Swingin In the 1930s A Decade of Innovative Music essays

Swingin In the 1930s A Decade of Innovative Music essays Thesis: Music of the 1930's took an interesting ride with swing. It was not only a musical pastime, but a way of life; those who brought it to us, will live on forever. Towards the beginning of the 1930's, the nation was grasped by the effects of a Great Depression. The economy was on hold, but the music was not. As the 1930's began to take shape, they gave birth to a new era of music. The melancholy sound of the early years of the Depression had left people in search of something revitalizing. Around 1931, the Black bands, led by such greats as Duke Ellington and Fletcher Henderson, began to develop the Swing style which would not formally appear for another two years. Simply put, they began to change the make-up of the band, and the time of the pieces. For example, Ellington and Henderson were both responsible for transforming the rhythm section (piano, bass, drums, guitar). Until then, the rhythm section consisted of a piano, tuba, banjo, and drums. Ellington and Henderson took out the tuba and banjo and added a string base to the ensemble. With later advances in technology, the guitar was added to replace the banjo. In regards to time, the two leaders evened things out by taking the "march" time of 2/4 and added a more laid back, steady 4/4 time. (Erenberg, 29) In addition to the change of the concept of the rhythm section and the meter (time), the role of the bandleader himself became the foundation for which he would select his ensemble. As with all bands, orchestras, and chamber ensembles, a conductor is always a necessary commodity. The "big bands" as the swinging bands were named, were previously led by a "conductor" of sorts. Taking a step towards the age of swing, the bandleaders became known for their instrumental abilities, as well as their conducting. In fact, groups began to be formed around the bandleader's instrument. The bandleader became the most important aspect of the new big bands;...

Thursday, November 21, 2019

Definition of Marketing Essay Example | Topics and Well Written Essays - 500 words

Definition of Marketing - Essay Example Marketing is more concerned with developing demand for a product and satisfying customers’ needs and not necessarily for customers to pay for the goods. Customer relationship is a very important and efficient approach that helps in creating and maintaining the good relationship with the customers. Customer relation brings about a strong bond through personal and emotional linkage and the organization can know the actual needs of the customer (Oly, 2007). Loyal customers are quite important as they have a big likelihood of telling more people about your business through the word of mouth. External customers always like to feel needed by the business operators and communication with them is very important. A satisfied customer will always be happy with the business and remain forever, which will help in enhancing the growth of the business. Dealing with customers efficiently increases their satisfaction increasing the chance of making more sales and high profits. A business strategy involves the tactics and methods business persons use to manage their businesses and organizations. Having an effective business strategy helps in retaining the customers especially if there is a program for following up the customers to find out whether the items they bought are in good condition (Oly, 2007). A good organizational and business strategy ensures that resources are used efficiently to avoid wastage. Some of the resources in a business organization are personnel customers, reputation in the market, patents, warehouses, and manufacturing processes. Business strategies should utilize the companys resources to ensure that the company does not lose its customers and has a big market share. Good company strategies enhance its expansion and growth through promotion of vigorous marketing research. Research helps in venturing into new areas to increase its production and promote growth. The other importance of strategy is giving directions and action plans, prioritization and

Wednesday, November 20, 2019

Research Essay Example | Topics and Well Written Essays - 1000 words - 3

Research - Essay Example The common characteristics of all social networks are the provision rather the requirement of making a profile that usually demands some personal information including contact information. A national survey conducted by the American Life Project in collaboration with the Pew research center (as cited in Lenhart & Madded, 2007), revealed that more than half of the teenagers, aged between 12 and 17 years of age regularly use online social networking. A technology being used at such a rate definitely would be having some effects on the lifestyle of its users. According to Pew Internet (cited in Chartier, 2009), a survey in 2008 revealed that the ratio of adult versus teen users of online social networks is 1:2. Teenagers form a group almost double in size to that of adults comprising social network users. Such findings lead to the speculation that adults and teenagers might have different opinions regarding the usability, security issues, productivity and impacts of social networking on one’s life. This study aims at identifying and presenting the differences in opinion that exist among adults and teenagers regarding the usage of online social networking. The main objective is to explore the areas of perceptions regarding online social networking in which the two age groups differ. Different surveys conducted by Pew Internet in 2007 and 2008 have revealed that teenagers use online social networking twice as much as adults do. Keeping in view these striking differences, it is speculated that opinion differences regarding the usage of online social networking might also be prevalent among the two groups. This study is an attempt to reveal such perceptional differences among the two age groups. It is hoped that it will contribute eventually in bridging these opinion gaps among the two groups. If the findings are utilized properly, the study can lead in spreading proper awareness about

Monday, November 18, 2019

What was the scientific revolution all about How did this major Essay

What was the scientific revolution all about How did this major transition change overall lifestyle - Essay Example The books were title ‘De revolutionibus orbium coelestium’ (On the Revolutions of the Heavenly Spheres) and De humani corporis fabrica’ (On the Fabric of the Human body) respectively. The two books were published in 1543. These two books were later followed by the Principia written by Isaac Newton in 1657. Introduction of Newton’s work was viewed as the climax for the works previously carried out in physics and astronomy since the Principia had laid a foundation for future developments in the two fields (Jacob 27). Before the advent of science, religion and philosophy were the main forces, which influenced people’s thinking. More specifically, the power of religion was more significant in Western Europe, and it had control over many aspects. Scientific revolution allowed people to  develop a distinct perspective about the world; science replaced philosophy. Religion-based ways of thinking started to fade out and logic was applied when searching for answers to questions that puzzled people regarding life, death, world and the universe. Therefore, science gave people a chance to solve numerous problems without consulting the gods as was the norm when religious approach was applied in solving issues (Shapin 47). Before the era of the scientific revolution, people used to view the world and the existing things as something only of god’s creation. This fact hindered many scientific developments since many people feared interfering with the gods’ creations, and religion was such a powerful force that united people together and never accepted any scientific development (Shapin 49). At the same time, the philosophical and religious thoughts used in solving problems before the advent of the scientific revolution advanced further. The educated People from the West at the time of the scientific revolution got a chance to advance their scientific skills to greater levels, which improved their

Saturday, November 16, 2019

Analysis and Detection of Metamorphic Viruses

Analysis and Detection of Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being some well known metamorphic viruses are detectable, but it is predicted that in future we might face problem of similar viruses those would be capable of changing their identification and perform malicious tasks. Our objective in this thesis is to perform an in-depth analysis of metamorphic code, and evaluate some best practices for detection of metamorphic viruses. 1.2 Outline This document has been divided into five chapters; first two chapters are for introductory purpose it provides basic information about viruses in Chapter 2 we have tried to give some details about virus evolution how metamorphic viruses came into existence. Chapter 3 includes detailed information about metamorphic Virus, Formal definition, Core components of Architecture and some explanations from a virus writer about metamorphic viruses. Chapter 3 deals with some of techniques which are being used by metamorphic viruses and what advantages these viruses have using those techniques. Chapter 4 contains different type of detection methodologies used to detect metamorphic viruses. It also contains sample code from different metamorphic viruses for their feature comparison. Chapter 2 Computer Virus Introduction 2.1 Introduction The term Virus was first described by Dr. Fred Cohan in his PHD thesis during 1986[1] although different type of computer malware where already exited that time but the term was specifically introduced by Dr. Fred. Thats why in may research papers he is considered the father of Virus Research [2]. According to his formal definition as virus A program that can infect other programs by modifying them to include a possibly evolved copy of itself[1] Based on this definition we have taken some pseudo code of Virus V from his research [25]. program virus:= {1234567; subroutine infect-executable:= {loop:file = get-random-executable-file; if first-line-of-file = 1234567 then goto loop; prepend virus to file; } subroutine do-damage:= {whatever damage is to be done} subroutine trigger-pulled:= {return true if some condition holds} main-program:= {infect-executable; if trigger-pulled then do-damage; goto next;} next:} This is a typical example of a computer virus, we can divide this virus into three major parts first subroutine which is infect-executable it tries to look for and executable file or any other target file which it wants to infect it contains a loop which tried to append the virus body to with the target file. Second subroutine do-damage is the virus code its self for which virus has been written this is called virus payload upon execution it performs some damage to the system. The third subroutine trigger-pulled is some sort of trigger to execute the virus code it could be some condition based on date or system or file. Main code of virus is that once the condition is met we it should append itself to the target file and perform something. If we evaluate this definition modern viruses cannot be considered as virus because there are several different type of viruses which are not performing any harm such as â€Å"Co-Virus†, their main target is to help the original virus by performing such tasks so the execution of original virus could be performed without being detected. Peter Szor has redefined this definition [2] as â€Å"A computer virus is a program that recursively and explicitly copies a possibly evolved version of itself.† This definition is also self explanatory, as the author suggest it recursively and explicitly search for the target files and then infect them with virus code to make possible copies. As we are all aware virus is special kind of malware which always requires a user attention to propagate such as either he access the infracted file or tries to execute infected files. Grimes[26] append this definition with boot sector information and other methodologies as Viruses are not limited to file infections only. 2.1.1 Different Type of Malware In this section we will try to discuss some type of malware which like virus but they are not virus. This section is for information purpose only. Viruses its self could be of different kind based on their activity we can define their category, such as boot sector virus, File Infection Virus or some of advanced Macro Viruses which are used inside Microsoft Office documents to automate the process. Basically all virus follow the same process of infection which is described by Dr. Fred Cohen in V Sample Virus. We will define some of advanced code armoring techniques in Section 2.2. 2.1.1.1 Trojans Trojans are very famous backdoor malware some time they are not considered as virus as their main objective is to let attacker gain access to the target machine without getting noticed by the user. Their main objective is not only to gain access but it could be executing some sort of malicious code. Origin of their name is from Greek History where a giant horse was built to gain access inside the castle and transport soldiers through that horse. Same technique is used with Trojans they tricked users by displaying something on screen and behind it is doing something else. Trojan does not infect files or attach their code to other files usually they contain some sort to joiner utility which help users to embed their code or application inside the Trojan. Trojans can used to gain access to infected systems, mounting share drives or disturbing network traffic through Denial of Services attacks. Some famous examples of Trojans are Netbus, Subseven, Deep Throat ,Beast etc. Some remote administration Trojans can have their client side which can be used to communicate to the infected computer. Above image is Client side of Beast Trojan which can perform so many operations on the target machine once it is connected. 2.1.1.2 Spyware and Adware Spyware are very common problem of todays internet user. They are used to get information about users and monitor their activity with or without his knowledge. Till now antivirus companies are unable to define detection and removal of spyware software because there are some famous companies who are selling spyware software to monitor user activities and they are getting legal support to protect spyware from getting removed by antivirus. With spyware it is quite possible that without user knowledge they transport all user information and activities to some monitoring email address. There is some sort of spyware which are only used to get all key press events by users whatever he is typing or writing in email or entering password. It will be recorded and based on the software settings it can be sent to email or saved on disk. Adware are slightly different than malware they collect information about users internet activity and based on that they tries to display target advertisement to the users or install some software on users system which displays unwanted advertisement to the user. 2.1.1.3 Rootkits Root kits are specially crafted virus; their main objective is to gain administrative level access on the target system. Usually they contain some virus or script to execute the malicious code on target machine, enable root level access for the attacker and hide the process, allowing attacker full access to machine without getting noticed. Detailed information about root kits is beyond the topic. Based on their functionality we can say that they hijack the target system and monitor all system calls. They are now capable of patching kernel also so attacker can get higher level of permissions. Security researchers have demonstrated a new technology called â€Å"Blue-Pill†[27] which has helped them creating a super root kit without getting any performance degradation or system restart. They have used virtualization support inside processor to run in a virtual machine mode. 2.1.1.4 Worms Worms are considered as the most advanced version of malware unlike virus they do not require any user interaction to propagate, but like virus they can replicate their code by infecting other target files. They can be combined with Trojan horses to execute on target machine. But unlike virus they are always dependent on some software for their execution without that specific software they cannot perform their actions. These try to exploit vulnerabilities of software or operating system to perform malicious actions. Love Bug is one of famous worm example it used Microsoft Emailing software to distribute its copies. CodeRed and Nimda are some other examples which used Microsoft protocols to distribute and infect other systems. 2.2 Virus Evolution Viruses are evolved throughout the time thats why today we are dealing with the most advanced type of viruses of all time. Most of time researchers are challenged by the virus writers to detect their created virus and create vaccine for it. In the following section we will describe some of the techniques which are used by virus to satisfy the main objective of Virus writer that is â€Å"Make Virus Completely Undetectable†. From time to time they have used different techniques in this section we will discuss those techniques and how those techniques lead toward metamorphic viruses. 2.2.1 Encryption Encryption is the main sources of information hiding. It has been used some centuries the same way virus writers are using encryption to avoid detection by antivirus. A decryptor is attached with the main virus code to decryp the virus body and performs the action. lea si, Start ; position to decrypt (dynamically set) mov sp, 0682 ; length of encrypted body (1666 bytes) Decrypt: xor [si],si ; decryption key/counter 1 xor [si],sp ; decryption key/counter 2 inc si ; increment one counter dec sp ; decrement the other jnz Decrypt ; loop until all bytes are decrypted Start: ; Encrypted/Decrypted Virus Body The above code is from [5] for Cascade Virus. In the same article the author has suggested four major reasons why some virus writer will use encryption: Prevention against code analysis: With encryption it becomes quite difficult to disassemble the virus code and examining the code for instructions which can be quite interesting for the virus researchers. For example if someone is performing specific operations such as calling INT 26H or calling specific Crypto API. By using encryption users will bet get an idea about what are the intentions of users because most of file contents will be encrypted and it is quite possible it may contain some Junk Code also. Making disassembling more difficult: Virus writers can used encryption not only to make it difficult they can also us to make this process more time consuming and difficult they can include more junk code inside or wrong instruction so the researchers will not be able to perform static analysis of code and get some confusing idea about the code itself. Making virus temper proof: Same like real life business products some virus writers do not want their virus code to be used by others with their name or generate new variant from their code because it is quite possible someone will decrypt virus and again generate another virus by modifying the code. This is also some sort of prevention from reverse engineering the virus. Avoid detection: This is the core objective of virus write to evade detection by Anti Virus software, based on time to time new techniques have been developed in following section we will discuss some of these techniques how they use encryption. Mostly the virus contains the decryptor within their code this had helped the Virus researchers to detect viruses based on their decryption signature. But this method is not very successful as it may raise an exception in case some other software tries to use similar methodologies to decrypt data. As time evolved they have developed some new interesting techniques. Most of time in assembly they use simply XOR ing operations help then in decrypting virus code. For example in above code of Cascade Virus it is using XOR to decrypt each byte of virus code unless all body is decrypted. With XOR they have some advantage first of all it is very simple operating and second XOR ing the same values twice yields the first value this operating can help them in decryption and making it more confusing during static code analysis. Peter Szor has described some of these strategies which can be used to make process of encryption and decryption more difficult [2-Chapter7], according to him: Virus Writers are not require to store decryption key inside the virus body some advanced virus such as RDA.Fighter generate their decryption key upon execution. This technique is called Random Key Decryption. They use brute force method to generate key during run-time. These Viruses are very hard to detect. It is under control by the attacker how he wants to modify the flow of decryption algorithm, it can be forward or backward or it is also possible to have multiple loops inside a single body. Or multiple layers of encryption. Second most important factor is the key size which can make decryption process more difficult based on the key length. Obfuscation is another factor involved in it. In Metamorphic Viruses Similie.D was one of the virus which used non-linear encryption and decrypts the virus body in semi-random order and most important thing is that it access the encrypted portion of virus body only once.[3] There is another factor involved in virus encryption such as virus is encrypted with very strong algorithm such as IDEA virus [9] which contains several decryptors. Main source of interest is that it is quite easy to detect virus and remove it but it is extremely difficult to repair the infected file as on second layer of IDEA it uses RDA for key generation. Microsoft Crypto API is part of Windows operating system. This can also be used for malicious purpose, Virus writers can use Crypto API to encrypt data with some secret key or call their API through virus code to perform encryption. It is also difficult to detect this because other program such as Internet Explorer also uses this API to encrypt transmission over secure channel. There is another variation in decryption which was demonstrated by W95/Silcer Virus that the first portion of virus which is already decrypted force Windows Loader to relocate infected software images once they are executed loaded in to memory. For the purpose of decryption the virus itself transfers relocation information. There are other possibilities such as some virus use file name as their decryption key in such case if file name is modified virus cannot execute and there is possibility we will not be able to recover that file after infection. Other methods such as it can use decryptor code itself as decryption key it help them in such condition if someone is analyzing code or virus execution is under a debugger it will raise an exception. 2.2.2 Oligomorphism With encrypted virus it is quite possible to find the decryption mechanism to challenge this situation virus writers implemented a new technique to create multiple decryptors and use them randomly while they are infecting other files. Major difference between Encryption and Oligomorphism is that in encryption is uses same decryptor for encryption purpose while in oligomorphic virus have multiple decryptors and they can use any of them during the process. Whale Virus was first of this kind to use multiple decryptors. W95/Memorial[7] is one of very famous examples of oligomprphic viruses it uses 96 different type of decryptors. mov ebp,00405000h ; select base mov ecx,0550h ; this many bytes lea esi,[ebp+0000002E] ; offset of Start add ecx,[ebp+00000029] ; plus this many bytes mov al,[ebp+0000002D] ; pick the first key Decrypt: nop ; junk nop ; junk xor [esi],al ; decrypt a byte inc esi ; next byte nop ; junk inc al ; slide the key dec ecx ; are there any more bytes to decrypt? jnz Decrypt ; until all bytes are decrypted jmp Start ; decryption done, execute body ; Data area Start: ; encrypted/decrypted virus body Sliding key feature can also be noted as with this feature it is quite possible to change instructions for decryptor. If we get other instance of same virus it has little variations there is a little change in loop instruction Another Variant of W95 Memorial mov ecx,0550h ; this many bytes mov ebp,013BC000h ; select base lea esi,[ebp+0000002E] ; offset of Start add ecx,[ebp+00000029] ; plus this many bytes mov al,[ebp+0000002D] ; pick the first key Decrypt: nop ; junk nop ; junk xor [esi],al ; decrypt a byte inc esi ; next byte nop ; junk inc al ; slide the key loop Decrypt ; until all bytes are decrypted jmp Start ; Decryption done, execute body ; Data area Start: ; Encrypted/decrypted virus body . It has been mentioned [2] that a virus is only called Oligomorphic if it can mutate its decryptor slightly. Detecting Oligomorphic virus is extremely difficult because as they have random decryptors it is quite possible that our virus detecting mechanism will not able to detect if there are quite large number of decryptors. 2.2.3 Polymorphism The term Polymorphism came from Greek origin Poly means multiple and morphi means forms. We can say that these types of viruses can take multiple forms. They are much advanced than their ancestors like Oligomorphic virus they rely on mutating their decryptor in such a way so it generates number of variation of same virus. Core of their operation is their engine which helps them in mutating. For each infection their mutation engine generates a completely new instruction set for decrypter. This process help them in generating a completely new virus having exact functionality as their parents but the sequence of instruction is entirely different from others[28]. Antivirus software are challenged by their method as every time a new file is infected it generated a new encryption code and decryptor so those software who are relying on virus decryptor signature will not be able to detect those viruses as new offspring are completely different in decryptors signature. Research has already shown that it is possible for a mutation engine to generate several million different type of decryptor code for new viruses [28]. Dark Mutation Engine is one of very famous example of polymorphic virus following code has been taken from [2]. mov bp,A16C ; This Block initializes BP ; to Start-delta mov cl,03 ; (delta is 0x0D2B in this example) ror bp,cl mov cx,bp mov bp,856E or bp,740F mov si,bp mov bp,3B92 add bp,si xor bp,cx sub bp,B10C ; Huh finally BP is set, but remains an ; obfuscated pointer to encrypted body Decrypt: mov bx,[bp+0D2B] ; pick next word ; (first time at Start) add bx,9D64 ; decrypt it xchg [bp+0D2B],bx ; put decrypted value to place mov bx,8F31 ; this block increments BP by 2 sub bx,bp mov bp,8F33 sub bp,bx ; and controls the length of decryption jnz Decrypt ; are all bytes decrypted? Start: ; encrypted/decrypted virus body Idea behind making a code engine was that in beginning virus writing was very difficult and time consuming so the experienced virus writers helped novice in virus generating by giving them code mutation engine with little modification they can use this engine within their own virus code and it can perform same operations. Based on the virus type and engine capabilities it can enhance the virus functionality there are several viruses which can use Microsoft CryptoAPI in their polymorphic operations. Marburg is also one of very famous polymorphic virus which has entirely different mechanism in file infection. till now we could think that infection method if polymorphic virus could be same just decryptor is changing but that virus introduced some of new methodologies like key length in encryption could be different and each file which it is infecting is using different encryption mechanism.[8] Start: ; Encrypted/Decrypted Virus body is placed here Routine-6: dec esi ; decrement loop counter ret Routine-3: mov esi,439FE661h ; set loop counter in ESI ret Routine-4: xor byte ptr [edi],6F ; decrypt with a constant byte ret Routine-5: add edi,0001h ; point to next byte to decrypt ret Decryptor_Start: call Routine-1 ; set EDI to Start call Routine-3 ; set loop counter Decrypt: call Routine-4 ; decrypt call Routine-5 ; get next call Routine-6 ; decrement loop register cmp esi,439FD271h ; is everything decrypted? jnz Decrypt ; not yet, continue to decrypt jmp Start ; jump to decrypted start Routine-1: call Routine-2 ; Call to POP trick! Routine-2: pop edi sub edi,143Ah ; EDI points to Start ret There are examples of other viruses which shows that 2.2.4 Metamorphism After all these evolution in virus, now we are dealing with one of the most advanced version of these viruses. Polymorphic viruses were really challenging to detect and remove from system, but it was just a matter of time Researchers tried to build solutions against polymorphic viruses. Viruses writer tired to work on something really amazing a virus which would be able to rebuild itself with same functionality but entirely different from the parent. This proposed solution was first implemented in W32/Apparition, If it finds a compiler in some machine it tries to rebuild itself into completely new shape. Following code has been taken from [2] two different variants of W95/Regswap . This virus was first of its kind to implement metamorphism in shifting registers. a.) 5A pop edx BF04000000 mov edi,0004h 8BF5 mov esi,ebp B80C000000 mov eax,000Ch 81C288000000 add edx,0088h 8B1A mov ebx,[edx] 899C8618110000 mov [esi+eax*4+00001118],ebx b.) 58 pop eax BB04000000 mov ebx,0004h 8BD5 mov edx,ebp BF0C000000 mov edi,000Ch 81C088000000 add eax,0088h 8B30 mov esi,[eax] 89B4BA18110000 mov [edx+edi*4+00001118],esi Although till now there is no big incident reported due to metamorphism as normal computers do not contain such utilities like compilers or scripting support to rebuild virus but this situation could be very dangerous for Linux machine where scripting languages and compilers are enabled by default. Upcoming versions of Microsoft Windows are also having support of .Net and MSIL which is capable of generating such virus very easily MSIL/Gastropod is one of famous example of metamorphic virus. In upcoming section we will describe main architecture of metamorphic viruses. Chapter 3 Metamorphic Virus Architecture The idea behind metamorphic legacies came from the same biological aspect that the parents are mutating and generating new offsprings which are entirely different than their parents but they are performing the same actions as their parents were doing. Virus Writers have adopted the same idea and implemented in the form of metamorphic virus. Power of any virus relies in its power to bypass the Antivirus Scanner and perform actions. Usually constants in their virus body, specific register allocation, patterns or heuristics scanning are some of the common ways to detect a virus. Metamorphic Viruses are one of those kinds which are capable of transforming their code into new generation, these viruses are capable of changing their syntax but their semantics remain same throughout generations. Polymorphic viruses were difficult to detect but their main weakness was their decryption mechanism once researchers found their decryption methodology and add this as a signature to antivirus products through this they were able to detect full generation of polymorphic virus but in case of metamorphic virus this approach fails because the syntax of code and mechanism of operation is entirely different throughout generations. They are considered as shape shifters [2] because each generation is entirely different than each other. Metamorphic engines are mostly buggy, this could be our luck that till now there is no perfect metamorphic engine available. It has been reported that metamorphism has been used as a mean of software security the same way it has been used in viruses to for their protection. They can be used stand alone by which they are self generating viruses and capable of performing actions on target system or they could take help from the surrounding environment in downloading some plug-in form internet or generating their new copies. Metamorphic viruses are capable of changing arrangement of their instruction. This ability gives them ability to generate new undetectable virus for examples if a virus contains n number of subroutines it will generate n! different type of generations. In case of BADBoy Virus it has 8 subroutines and it is capable of rearranging its subroutines it can generate 8! = 40320 type of different virus. This grows if number of subroutine increases inside the Virus Body. Above image is a code module of Badboy Virus in file it just need to take care of Entery Point whereregardless of where it is located remaining subroutines are access through jump instructions throughout the code. Zperm is another exam of metamorphic virus the above code sample is from Zperm virus which shows its rearrangement of code. 3.1 Formal Definition This formal definition is presented in [13] according to this definition let à ¡Ã‚ µÃ‚  P(d,p) represented as a function which is going to be computed by a program P in the current environment (d,p) in this case p represents programs stored on computer and d represents data processed. D(d,p) and S(p) are two recursive functions , T(d,p) is a trigger and is an injury condition and I(d,p) is considered as injury condition. In Case of this we can say that pair (v,v) are recursive functions and( v and v) are metamorphic virus if all conditions X(v,v) satisfies. Where T(d,p) ,I(d,p),S(d,p) is entirely different than T'(d,p) ,I'(d,p),S'(d,p). Based on that we can say that v and v are metamorphic virus and they are performing same actions. Polymorphic Virus share their kernel but in metamorphic virus each virus has its own kernel. 3.2 Core Architecture In this section we will discuss major components of metamorphic virus, although there are several other components already explained but architecture represented in [10] is considered as best. According to original author they have divided metamorphic virus in to two categories close-world or open-world. Open World are those who integrate with executing environment and perform some actions such are download some spyware etc. Here we will describe functional architecture of closed world viruses. Most of them perform binary transformation. 3.2.1 Locate Own Code The virus must be able to locate its code from inside the infected file or its own body each time it is transforming into new form or infecting a new file, metamorphic virus which are infecting other files and use them as their carrier must be capable of locating their code from inside the infected file. Mostly in file they use some predefined location of their startup code this location is mostly constant and remains contestant throughout the other generations. There are only few incidents when Engine tries to put dynamic locations. 3.2.2 Decode Once the code of virus is located by metamorphic engine it tries to obtain some sort of blue print information about how to transform. Although this is one of the drawback of metamorphic virus that within them self it they contain their architecture about how they are getting transformed. This information is very critical because this information is further encoded inside body of new virus. This unit can also retrieve information about flags, bit-vectors, markers, hints which will help in building new viruses. There is a drawback of this approach as it is required by the virus engine itself so virus write cannot obfuscate this area. 3.2.3 Analyze Once the core information is gathered there is other information which is very critical for proper execution of metamorphic virus. Without this information transformation cannot be performed. Metamorphic engine must have information about the register liveliness. If it is not available from Decode phase the engine must be capable of constructing it via def-use analysis. Control Flow Graph is also required by transformation phase because this will help in the rewriting logic and flow of the program. Control Flow graph is required in case if the malware itself is capable of generating the code which can shrink or grow in new generations and also it is required to process the control flow logic which is further transformed into code. In the following code it has gather its main idea about code what it is required to perform and it is further transforming it to simplified instructions. 1) mov [esi+4], 9 mov [esi+4], 6 add [esi+4], 3 2) mov [ebp+8], ecx push eax mov eax, ecx mov [ebp+8], eax pop eax 3) push 4 mov eax, 4 push eax 4) push eax push eax mov eax, 2Bh 3.2.4 Transform This unit is most important area of virus as it is capable of generating new virus. Most of virus logic resides here. This unit generate new instruction blocks semantically which are exactly same like its code but syntax is a bit different. Here some sort of obfuscation is also performed, metamorphic engine tries to rename registers , inserts NOP and garbage instructions and reorder the execution of block. Following code block has been taken from their examples in [10]. 1) mov eax, 10 mov eax, 5 add eax,5 2) mov eax, 5 sub eax, 10 mov eax, 1 add eax, 2 sub eax, 8 3) mov eax, 5 add eax, 5 mov eax, 10 4) cmp eax, 5 ja L1 cmp eax, 2 je L2 cmp eax, 5 jb L3 L1 : mov ebx, 3 jmp L4 L2 : mov ebx, 10 jmp L4 L3 : mov ebx, 10 jmp L4 L4 cmp eax, 5 ja L1 cmp eax, 5 jb L2 L1 : mov ebx, 3 jmp L3 L2 : mov ebx, 10 jmp L3 L3 3.2.5 Attach Attach unit it only available in those viruses which infect files and use them as source of replication. Transform unit not only transforms own code but also the code of target file, where it sets some entry point to virus main routine. During the attachment process it also shuffle the code

Wednesday, November 13, 2019

Nuclear Energy :: Environment Science Essays

Nuclear Energy Everything in life must have a beginning. It is a scientific fact. This is the same as Nuclear Energy. Nuclear energy wasn’t just discovered, it was created. Nuclear energy is the energy released by a nuclear reaction, especially by fission or fusion. From its first controlled chain reaction to be waste disposal problems, nuclear energy has made major steps. Nuclear energy began in Chicago at Stagg Field. The company that was responsible for this was Enrico Fermi. Here the company was able to create the first controlled chain reaction. The first reactors were based on natural uranium as the nuclear fuel, graphite as the moderator and water as the coolant (Prasar). This opened the floodgates for al nuclear energy. Now that we know to control the dangerous energy, we can use it without fearing drastic measures. In 1955 underwater combat was changed forever. The first submarine, The USS Nautilus, was fueled on nuclear power. The nautilus broke all submarine records for underwater speed and endurance. It was launched in Thames River after Mamie Eisenhower smashed a bottle of champagne across the bow. Due to running on nuclear energy, this made the Nautilus able to travel for great distances at a top speed of 25 knots or more. This made the submarine a much more potent fighting craft and placed the USA a step ahead of all other countries in underwater war (Norris). Even though it was a remarkable task during the year, the navy only expected even greater submarines to come in the future. Admiral Robert B. Carney, Chief of Naval Operations commented that, â€Å"as remarkable as this development seems to us now, the Nautilus will probably appear to our sons and grandsons as a quaint old piece of machinery which introduced the transition to a new age of power† (Norris). As the saying goes, â€Å"You must take the good with the bad† this certainly applies with Nuclear energy. In 1957 began the first of the accidents. Over in Liverpool, England a fire erupted in a graphite-cooled reactor. This caused a 200 square mile area to become contaminated.

Monday, November 11, 2019

Greek Mythology and Immediate Satisfaction Essay

In Euripides Medea is in a state of struggle with her husband Jason. At one point she and Jason settled down and have established a family, they have also attained a degree of fame and respectability. But then Jason ends up abandoning Medea along with their two children because he fell in love with Glauce, this turn of events has crushed Medea emotionally. She is at a point where she curses her own existence. Meanwhile Jason ended up remarrying Glauce who is the daughter of Creon the king of Corinth. Creon banishes Medea and her children from the city. I believe Creon knows that there might be a possibility of Medea plotting revenge. That is why he has taken this action. Medea continues her quest for justice. Medea begs Creon for another extra day to stay so that she can plot a revenge for Creon and Glauce. Medea has spoken to Jason trying to sympathize bringing him into her confidence and sent with her children a poisonous coronet and a dress made out of gold to kill Glauce. They accepted the gift and Glauce has also worn it, .Glauce died from the robe and so did Creon after he had embraced her and absorbed the poison himself. She also ended up killing her own children’s. She did this to make Jason suffer; everything Jason had valued has been lost through the deaths that conclude the tragedy. I believe what Medea did was wrong. Taking her anger out on her children and also Jason’s new wife is not the right thing to do. I don’t think a human being has the right to take one’s life that should be up to god. I understand what Medea went through is very hard. Any person that would love someone dearly and go through what Medea went through would obviously be very hurt. It may cause anyone to plot revenge. The id from freud’s conception has played a part for Medea. She demands immediate satisfaction and when that happened she experienced pleasure. The ego was when she sent the dress and the coronet to Glauce. The ego has no concept of right or wrong; something is good simply if it achieves its end of satisfying without causing harm to itself or to the id. she accomplished her plan by sending the coronet and the dress. The super ego is when she leaves Coronth.