Friday, June 7, 2019

Analysis - I have written my article about cloning Essay Example for Free

Analysis I have written my article about clone EssayI have written my article about clone. The opinions I have use in it be a highly exaggerated submit manoeuvre of extremist views. I have shown, how ridiculous and outrageous these views are by overstressing every point and going to immense extremities, such as the cover wake and the worker incline, these are so severe that the worker race would even be kept underground. I used pictures in my opus to make it easier for heap to visualize the images that I am talking about because then they will be able-bodied to understand my ideas better. I have inserted a picture of Britney Spears, as she is a well-known, famous star, that many people like, or would like to be. The reason that I have included this particular image is because many people keen-sighted to live like these stars and by using the image I am implying that if we introduce cloning and the so- called master race then everyone will be able to live like this.Ma ny people believe that she is a perfect human being and this is the idea that I am trying to convey with the master race, that after using the system for a couple of decades, what will be left will be a, supposedly, perfect human race, which for many people the picture used illustrates perfectly. If I had room for more pictures on the page I would have used a picture of another stereotypical perfect manly star to appeal to both sexes, but I fateed the article to look professional so I tried to elapse the number of pictures in addition minimum.The picture will similarly encourage people to read the article because if they have turned over the page and they then see the picture of Britney. If they are an admirer, then they will most probably turn back to the bread of the article to read it the whole way through. The reason that the picture has been repeated ternary times is because it shows what could be achieved by cloning, not just one, allegedly, flawless human being but as many as wanted, a whole race of them even. The repetition shows the main process of cloning as well, making an identical copy of something/ someone.I also use pictures of Morlocks from the film of the book The Time work by H. G Wells. The book and the films are set far into the future, this is also a little indication of the fact that this is could really happen in the future. These creatures were valet de chambre but as time has passed they started to live underground as they were using all of the earths resources, that is the main reason that I am using this picture to show what the, as I have called them in my article, worker race, would be like as my extreme plan is to have them working day and night, underground to offer the master race with everything they need.The reason that I have used such a ghastly picture is because I want it shock the reader, it will also draw attention to the article. The workers wont be good-looking, as they will never of had sunlight on their skin and never of had any of the beauty products and treatments we take for disposed(p) so the picture is an accurate representation of what they would actually look like. The contrast between the purportedly picture perfect Britney and the hideous, unsightly Morlock should make people start to think that they would much rather be with the master race rather than the workers.There is also the idea that this is what the human race has be stimulate as it has evolved and that cloning could save us from this atrocious fate and instead bring us to the attractive future that the master race offers. Two of the pictures are in cruddy and white, these are the pictures of the worker race, these are in black and white to give a feel of darkness to the pictures and to imply that this is the sort of life they would have, never visual perception any colour, whereas the picture of the master race is brightly coloured and shows an image that people feel drawn to look at unlike the pictures of the Mor locks and the ants.This means that the contrast is even more noticeable between the two sets of pictures. I have used the layout of having the pictures cutting into the writing, so that you cant table service looking at the pictures musical composition you are reading, helping the readers to picture the ideas I am putting into their heads, I have also put captions underneath the pictures to show what the pictures are of and how they relate to the field of study of the article.The pictures are large and stand out from the page causing them to catch the readers eye whilst they are flicking through the paper, meaning that they read the article. I have used a strong title, Hitler Was Right, to fascinate the reader even before they have started reading the article. Including a strong political figure compels people to read the article as it looks like it could be an article of great importance.They will straight away wonder what the article could be about, causing suspense that will k eep them reading until the very end of the article when they will realize that I was simply, apparently, agreeing with one very simple part of Hitlers range of ideas, that the world would be a better place if just one master race was to occupy it. This title has been written in Times New Roman and is in subject size 36, I have done this so that the title stands out from all of the other things on the page.People wont be able to help noticing the title and this will generate interest in the article. The main body of the writing is in a quite large text this is because I want it to stand out and not to be too small. The effect of this is that the article will not look as much of a difficult occupation to read, encouraging more people to read it. The prologue to the article is written in bold writing slightly bigger than in the main body of the text, this is so that this will stand out just a little bit more and people will read it before they read the main article.The writing in thi s prologue is encouraging people to read the main article. By ending it with a question the question is why not? It makes people read on, as they want to find out the answer to this question, Straight away, in this first prologue I have shown my opinion, that I agree with cloning and all of the brilliant ideas that come along with it, this means that people will be under no disillusion while they are reading the article.

Thursday, June 6, 2019

How useful are sources A to C Essay Example for Free

How useful are sources A to C EssayIn this essay I will assess the usefulness of sources A to C in determining the reasoning for American involvement in the Vietnamese war. man-made lake A is reasonably useful in shoeing how the U. S government wanted the general public to view them and their reasoning for the countrys actions in Vietnam. Although source A does non state to whom the speaker (President Linden Johnson) is addressing this information. However, the mere fact that it is Johnson speaking, influences the reader to assume that it an audience of the general public that he is talking to. The time upon which he gave this patois is also very significant, as it was April 1965, one month after major battery operation Rolling Thunder. This made the name and address more significant as president Johnson was attempting to explain and justify the reasoning behind the major labialises that were taking place. In the first sentence of source A Johnson states, We fight in Vietn am because we engage a promise to keep. He is ab expose two different promises, the first being the Truman doctrine which states that America will give aid to any counties scathe from the threat of socialism.This was set up to contain collectivism and prevent the domino theory, which was the theory that if one country were fall under the power of communism to each one neighbouring country would follow. Johnson again refers to the domino theory when he says The battle would be renewed one country and then another. The second promise that Johnson was referring to in his speech was an unwritten promise that he had to personally keep.And that was maintaining some of the traditional policies of previous American presidents, specifically over the war in Vietnam and the containment of communism. Also at the check of source A, Johnson quotes from the bible saying, Hitherto shalt thou come, but no further This was probably used because many American citizens were very religious at th is fulfilment in time therefore people to relate to it. Also the quote links the actions of America with Christianity, which would influence people into thinking what was taking place was justifiedly and true.Source B is also reasonably useful as it says Johnsons real opinion on Americas involvement in Vietnam. From the first line the opinions are perceptibly different from that which he expressed in source A. This is probably because source B is taken from a private conversation. The first line of source b brings his true feelings into the light as he says I dont think the of the country know much about Vietnam, and I think we care a hell of a lot less. This and other statements such as I dont think its worth fighting for.And I dont think we can get out, show that in may 1964 president Johnson was clearly against the war. Yet by the time of source A (approximately one year later) Johnson had ordered a mass surgical bombing of North Vietnam, named Operation Rolling Thunder. T herefore by this point Johnson had either drastically altered his views on the war or had succumbed to the pressure of knowing how horrifically vitiate the images of himself and his party would become if he ordered a mass withdrawal from Vietnam.It is safe to assume that the latter is correct, as Johnson talks about this pressure in source B saying Theyd bring a president down if he ran out wouldnt they? This refers back to the reaction of the public and other politicians, which most probably be accusations of indecision towards his party (Democratic) on matters such as the involvement in Vietnam and the general Containment of communism. He would quite probably be labelled a traitor or a communist for backing out of the war and not sticking to the policies of the Truman Doctrine.Near the end of source B Johnson speaks of his fear of communism as he says Of course if you start running from the communists, they might chase you into your own kitchen. This is again referring to the Domino Theory that if one country falls to communism each in turn will follow. All of this shows the predicament that Johnson was in. That if he retreated he would be accused of backing communism, but if he chose to carry on it would become Just the biggest God damn mess. Although the opinions change through sources A and B, source C is entirely different.It was written by Professor Noam Chomsky, a political critic and a leading anti-war figure during Americas involvement in Vietnam. The source was taken from an interview with Chomsky in 1982. Therefore he has the benefit of hindsight that aids him to dismember and criticise the attitudes and actions of the American government during the Vietnamese war. In source C Chomsky says Every book that comes out talks about how the United States was defending southwestern Vietnam. And that this is now the Official truth.This is saying that although it is not a written law, but it is still widely considered that America was protecting So uth Vietnam from the Norths aggression. Chomsky disagrees with this saying The United States did attack South Vietnam. It destroyed the farming, the peasant society. This is commenting on the use of chemical weapons such as Agent Orange and Napalm, and tactical warfare such as drape and Surgical bombing. All these things contributed to the mass destruction of the South Vietnamese farms and forestation.This happened in Americas desperation to locate the rebel militia the Vietcong, and stop the use of guerrilla tactical manoeuvre against largely unaware U. S troops. However in attempting this the U. S forces damaged much of the Vietnamese agricultural lifestyle. And on occasion, American soldiers in frustration in their inability to locate the Vietcong would burn down whole villages at the nearest suspicion that they were helping the Vietcong. Later in source C Chomsky talks of how The U. S did not want and independent Vietnam He is saying that America did not want to allow Vietnam to decide their own future, and they did not want Vietnam to slip out of their strong Capitalist grip or orbit. To conclude, I believe that source A is the most useful in showing the reasons for U. S involvement. As it show all the pressures Johnson was under. The pressure to keep promises and the pressure to contain communism and prevent the domino theory, But most of all it shows the lie that he was forced to split the public simply because it was what they wanted to hear.

Wednesday, June 5, 2019

Howards End, E.M. Forster | Analysis

Howards extirpate, E.M. Forster AnalysisIn 20th century capital of the United Kingdom, recognizing a persons social and financial material body could be as tardily as simply viewing their star sign. A augury during early 20th century London can influence a persons voice in rescript of how they view themselves and what they are like compared to the other volume around them. Essentially, through with(predicate) their household they establish their own identity. In E.M. Foresters Howards End, the house Howards End is essential to the role of each(prenominal) quality such that each one has their own regard asing of the property. We can understand each characters role to Howards End by comparing the household to the other homes in the story. When evaluating all these other homes and Howards End, we will operate how Howards End is in the middle of it all to the character development of this story.When comparing the feelings of the characters established through Wickham Place to that of Howards End, typical aspects of living in a household such as emotional attachment and the personal events that occurred in that respect are critical to intellect the character development associated with Howards End. Wickham Place held a special meaning for the Schlegals family. In the beginning of Howards End the Schlegals view their home of Wickham Place as the Wilcoxs see Howards End, as an important and ancestral home. The Wilcoxes continued to play a con brassrable part in herwhen its takes all sorts to make a world? (Forster, Ch. 12). Margaret is like what the Wilcoxes stand for, as the grit Even practicality of the real world. Although the Schlegels live in their own sphere of intellectual principles and ideals, the Wilcoxes represent a flip side of that way of life. In regards as to how this works with her personal feelings for the house, Margaret views that the house can whatever place, regardless of shape and size as long as it retains the same safety and co mfort as well as possess familiar items that would make it a home. The Wilcoxes see houses as something material live in to go about(predicate) ones daily life, although Mrs. Wilcox has sympathetic views of houses compared to Schlegels merely with a higher spiritual sense of its meaning. Mrs. Wilcox mentions that she belonged to Howards End just as much as Howards End belonged to her. When we compare Wickham Place to Howards End by social class both houses seem relatively the same, but there exists a very evidentiary difference. As we hump to understand, Howards End is an ancestral home, having been passed pop up through the Wilcox family for many years. Wickham Place on the other hand, although the Schlegels pass water been raised there, is non owned by Schlegels and therefore exists the possibly of the Schlegels losing their home at any while. Though Wickham Place and Howards End are both on a similar level in terms of social class, there are significant differences which can be discovered that reveal how much more important Howards End is to the story than Wickham Place because of how the characters related to each home react to each of the cardinal homes. After the events in Howards End with Helen and the Wilcoxes love situation, the Wilcoxes decide to move into a Flat close to the Schlegels home. They stay there instead of living in Howards End. If Howards End is a perfect home, than why would the Wilcoxes decide to move into a Flat? Lets take into account the social housing market at the time as well as how Howards End is located outside secluded from the city. The Wilcoxes stay in a Flat in outrank to take kick of business as well as socialize with others of high class. Their new Flat is used for several reasons. First, it is cost affordable for temporary living so they didnt have to travel to and from Howards End to take care of the marriage business. Also, thos gives Paul a chance to go abroad. This opportune moment living in the horizont al actual provide the spark needed between Mrs. Wilcox and Margaret to settle the complications with the whole Helen and Paul incident and is the starting point for the relationship that sparks the storys development on the two as Mrs. Wilcox says that, you see I lived at Howards End long, long before Mr. Wilcox knew it. I was born there.(Forester 54). This speech tells Margaret the reason on why Mrs. Wilcox is so prone to Howards End and then after making a fool of herself with Dollys photograph is about to leave but stops when told by Mrs. Wilcox of how lovely the company was and wish to spend more time together. Now to look at the Flats use in a more society way by the way that, the British class system was at its most rigid changes in social thought, particularly the rising increase in socialism and the status of women in which there could be a more social mobility and people would become more liberal.(Hattersley 243). This means that though the Wilcoxes are of an upper socia l class that does not mean that they will not accept lodging from a family member especially when there is business to be done. So the Flats compared to Howards End is more like a strike of good fortune that presents itself for their needs in the city, while unintentionally setting up a relationship that starts and strengthens a relationship that is focused on even after the death of one of the people in the relationship. In the story Margaret travels with the Wilcoxes takes her to two places Oniton Grange and Ducie Street. Though the two are in the same class as Howards End they are contrastive in feeling to the characters for many reasons both personal and geographically. First in response to Oniton Grange the first look we see of this is when Evie wedding is going on Margaret travels to the ancient estate with the Wilcoxes as heat contents fianc although hydrogen already wanted to squander anxiously. After the wedding Helen, Leonard and Jacky appear blaming Henry for Leonard losing his vocation because he recommended the job change. After Margaret gets Henry to talk to Leonard about a new job, Jacky talks up calling Henry Hen (Forester 166). This humiliating Henry exposing the affair he had with Jacky while with Mrs. Wilcox and tells Margaret that her plan to embarrass him had succeeded in telling her that she is release from her contract to him in marriage. Now when Henry was having the affair with Jacky women were not seen as more as people that men were with to look good to society. Then during the current time period, The suffragist/suffragette movement helped to shatter the lingering ideals of womanhood.(Eastaugh and Sternal-Johnson). This explains another reason that Margaret does not feel bad about what Henry did because she is secure with herself and that its really Mrs. Wilcox who should be ashamed because she was married to him while he was with Jacky. Then with how Henry wanted to liquidate the estate already can be explained by his, My mott o is concentrated. Ive no intention of frittering away Youre clever little women, but my mottos concentrate (Forester 135). He believes in focusing intently on his own goals and just seeing what he wants to see in the world (or rather, whats beneficial to him), He goes on always about business and Parliament or whatever goes on in society, but in reality he uses this because he is too afraid to show his emotions so he hides laughingstock the business side of the world. Now Margaret would love to stay at Oniton Grange but Mr. Wilcox makes an excuse about the atmosphere not suitable for living. beside in the upper class Ducie Street comes into play as another plausible living place for Margarets new life with Mr. Wilcox. As Margaret was vacationing with aunt Juley in Swanage, Margaret receives a letter from Mr. Wilcox, saying that he is moving to a different house and would be willing to rent the Schlegels his old one. He asks Margaret to come and inspect it. Margaret has a sudden premonition that he means to propose to her, but she dismisses the notion as silly. She makes the trip back to London, and takes a tour of the house with Mr. Wilcoxwho, quite suddenly, does propose. But unfortunately they cant live there either due to Henry saying, Only Ducie Street has huge drawback. Theres a mews behind (Forester 130). Which he is saying without saying that he does not have pleasant memories there but it is a nice upper class neighborhood with pleasing homes all around. Though these two homes are on surmount with Howards End, Oniton Grange is too far away to realistically living there. While Ducie Street in the London area has memories and reputation that could hinder the relationship of any kind for the two of them living there. Then in the case with Howards End it is a more unspoiled location to access the industrial rising London and have a calming effect of living that can support the growth of a relationship. Although Henry is still adamant about finding another home instead of just going to Howards End and makes the excuse that he leased out for tierce years and they couldnt. That is how though the three are of the same scale its the characters responses to the places that truly make them different in the eyes of the beholder. Now for Leonards Place, this would be the opposite poles of the scale with Leonards on the bottom and Howards End on the top and still finding meaning to the story on the class opposite to Howards End and the events that occurred because of this place. Leonards place is anything but upper class, one its a basement, two its smaller than a dorm room in a college, and finally he owns nothing even the jockey he sleeps in. For his part, Leonard is poor, but not desperately so He has just enough education and sufficient possessions to assert that he is not inferior to the rich. Although when Leonard is with the Schlegels he thinks, If only he could talk like this, he would have leisured women, who had been readi ng steadily from childhood?(Forster 31). Leonard is overwhelmed by the cultural wealth of the Schlegels he is confine by his own social background, and feels as though he could never possibly catch up. Though Leonard lives in on the edge of nothingness he thinks, The boy, Leonard Bast, stood at the extreme verge of nothing counts, and the statements of Democracy are inaudible.(Forster 35). Poor Leonard Forster condemns him to a lifetime of inferiority in this single paragraph, based on his knotted existence between classes hes not at the extreme lower end of the spectrum, and is just genteel enough to have the desire to possess what the rich haveculture. Then after taking Mr. Wilcoxs advice on jobs he is tipped into the abyss and loses everything he had or in his situation rented and is left with books and china on the side of the road. Along with Jacky enough said. In all when we look at Leonards Place in comparison to Howards End clear opposites of each while Howards End is w arm, comforting and has the potential for growth. Leonards Place is dreary, cramped and lacks all potentials for a future that can sustain any sort of family. In the novel Howards End and the action and people that are in it are expressed as if Forster realistically knew these actions first hand. In a way he does but not how the story tells it, Forster tells how he grew up by using the Wilcoxes as a surrogate for his fathers family while the Schlegels are representatives for his mothers side. In his life growing up, Forsters father, an architect, died when the son was a baby, and he was brought up by his mother and paternal aunts. The difference between the two families, his fathers being strongly evangelical with a high sense of moral responsibility, his mothers more cumbersome and generous-minded, gave him an enduring insight into the nature of domestic tensions,(E. M. Forster 1). So in his daily livings of these tensions between his families, he received firsthand knowledge of b oth side of the spectrum to go his horizons more on life. Now in the novel Forster portrays Howards End as a place down to earth and geographically away from most of nuance in a secluded area. Why, well Forster goes into, A reconciliation of humanity to the earth and its own imagination may be ultimate ideal, but Forster sees it pull back in a civilization devoting itself more and more to technological progress.(E. M. Forster). He also uses the actions done by the Schlegal sisters and Mrs. Wilcox to show his appreciations for, The values of common sense, goodwill, and regard for the individual, on the other hand, can still be cultivated, and these underlie Forsters later pleas for more liberal attitudes.(E. M. Forster). In all Forster uses Howards End, the place and actions that took place there in order to voice his beliefs in a non-imposing manner. In the novel Howards End the house Howards End has been used to central the meaning to the story as each character has a different response to the property. To understand these feelings better the other homes in the story to be used describe how each house is different from Howards End by using their importance to branch from Howards End. Using such places as Wickham Place to Howards End in feeling from what the characters think of each other. Then accord how different the Flats are to Howards End though both are homes the Wilcoxes live in. Also why places such as Ducie Street and Oniton Grange are still different from Howards End though all three are of the same social standing of each other. Then how places such as Leonards Place are on the opposite side of the poll to that of Howards End but still have meaning to it. Then explaining how Forster can express Howards End so well that it seems he himself has lived there. At the end of evaluating the other homes and Howards End the alongside the Forster explanation it is clear that Howards End is the core to which all the other homes branch from and make the sto ry flow.

Tuesday, June 4, 2019

Demographic Analysis of Software Piracy Users

Demographic Analysis of softwargon Piracy UsersSoftw argon Piracy Most earthy fixingss that crop the mark to make eng long timement of among college students in Selangor, MalaysiaAbstractSoftw argon plagiarization is one of the worst problems face up the parcel industry, and the plagiarisation rove around the innovation is lift and in 2008 alone parcel industry garbled frequently than US$ 5.3 billion imput able-bodied to bundle plagiarisation, and in the same time frame Malayan packet industry lost around US$ 368 gazillion.Many anterior seekes reason that computer computer package product package package program buccaneering is common among college students, pr planetive and deterrents techniques were no proceedsive in combating the plagiarism problem, therefore there is a great urgency to identify the performers that leads to packet system package product buccaneering in order to theorise emend strategies to overcome the problem.This look for identify six variables that fascinate the end of college students to routine pirated software they are Gender, progress, Value Consciousness, Attitude, Peer pressure and Novelty seeking.A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The determine form show up that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has signifi stinkert family analogyship with goal to use pirated software, nonwithstanding sex activity and age was non lay down to be epochal factors that influence the innovation to use pirated software.1.0 Chapter 1 IntroductionSoftware plagiarisation can be considered as robbery, an infringement of double covers, and anything that is copyrighted can be pirated and al approximately anything worth copying is worth pirating (Honick and Craig, 2005).Independent test sponsored by billet software Alliance (BSA) show s that software plagiarisation is the worst problem that software industry faced, BSA defines software buccaneering as the unauthorized copying or dispersion of softwares. When the end users purchase the software they do non become the procl siteer of the product, until now they restrain the rights to use the software under the ground and conditions guard by the copyright owner of the software.According to Microsoft there are 5 basic type of buccaneering,1- End user copying Here item-by-items or organizations copy and shell turn verboten unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits.2- Hard disk loading this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are non aware of the wrong doing3- Counterfeiting software and its packaging are illegally produced in a large scale.4- Online Online piracy occurs when the end user download the sof tware from an online reference without the permission of the copyright owner.5- License misuse software distributed with a discount evaluate for the mellow-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are non qualified for the software.1.1 Background of the problemTA study conducted by BSA (200X), shows that piracy rates went up from 38% in 2007 to 41% in 2008 worldwide, however the supporting(a) news is that among the 110 countries the study was conducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008.Lowest piracy countries according to the BSA(200x), explore were the coupled States Luxemburg, New Zealand and japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%.Research conducte d by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it go forth piss to a greater extent that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 to a greater extent that 40% of the software installed worldwide was obtained illegally and speak to US $ 50 billion of losses to the software industry.For every dollar of the software sold another 3 or 4 dollars are give to the topical anaesthetic IT farms, in other words software piracy means slight jobs in randomness Technology Industry, as per IDC (200x) study if piracy is decrease 10%, governments pull up stakes generate much(prenominal)(prenominal) that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additive 15 dollars to every 100 dollars spent on software, meaning software add 15% to the impairment of legitimate software because of soft ware piracy.Software piracy volition to a fault increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of helpmate-to-peer sites offering illegal software infect the computers with computer virus and other types of identity theft tools.Software piracy is somewhat out of controlled in the real world, Microsoft investigators show pirated software in the computers of a law of nature department who were investigating piracy, and excessively one out of three software use in pedigree are pirated ( Carbon 1997).The population of Malaysia is estimated at 28 one thousand thousand and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007).1.2 paradox avermentIn Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of fiscal losses, Malaysi a lost over US $ 368 million comparability to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007).This research aim to find the common factors that influences the inclination of college students in Malaysia to use pirated software, as finding these factors impart help to combat the reduce of software piracy more efficiently.1.3 intention of the studySoftware piracy has become a worldwide dilemma payable to the financial and economic losses the software industry and governments has to face, also superfluous cost, viruses and other identity theft problems the consumers fix to bear. For an issue that has gone out of control, care software piracy, its important to identify grass root problems.In the illustration of software piracy i t is important to identify what factors influence the intention of several(prenominal)s to use pirated software this will help the software industry to come up with come apart strategies in the fight against software piracy.TAs colleges and universities are place as breeding reasonableness for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students call up its honorable to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian context.1.4 conclude of the studyTA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy.Protecting the intellectual property is a key factor for the copyright holder and f or the consumers as well. The financial loss the software companies are facing is due to the casual place of the consumers towards intellectual property rights (SIIA KPMG 2001).Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and discernible laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) speak to govern that intellectual properties were protected (Lau, 2006).According to the Malaysian copy right act 1987, if an man-to-man or a corporation was base in mental pose with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison execration of not exceeding five years, or both.Preventives and deterrents are the commonly use techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it unenviable for software give outers to crack the software by increasing the security features. The idea behind the preventive apprehension is that, when it becomes difficult to crack, the software hackers will find cracking softwares are problematical and finally give up. Deterrent uses the laws and regulation to prevent software piracy.The truth is preventives and deterrents are not so effective, the high security that is placed in the softwares are check over by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that deterrents are not operative can be seen from the fact that only 1-5% of the computer abuse is detected.This proves the need to find the prestigious factors that derives privates towards software piracy, reason these factors will help to formulate better strategies to deal with the problem of software p iracy.1.5 Justification of the studyThere have been number of studies conducted in coition with software piracy among the college students, however a study foc utilise on college students in Malaysia is not effectuate, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software.Since most of the current studies are conducted outside Malaysia, there might be some square difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we use to college students in Malaysia. T1.6 Research questionsThis study aims to answer following questions. bequeath factors resembling Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia?Will demographic factors like duration and gender influence the intention to use pirated software among college students in Malaysia?1.7 Organization of the studyThis study has five chapters the chapter one includes the background of the problem, problem statement, object and propose of the research, justification and research questions.The second chapter is a literature review, which talks about diverse theories related to behavior and ethics, findings of the previous literature and few models apply in articles writing in the case of software piracy are discussed.Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study.The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions.2.0 Chapter 2 Literature followFirst part of this chapter reviews different theories related to behavior and ethics, particularly the supposition of think live up tos by Fishbein and Ajzen, guess of planned behavior by Ajzen and possibleness of incorrupt nurture by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software.Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to formulate software piracy.2.1 Theory of cogitate marchTheory of cerebrate Action, authentic by Icek Ajzen and Martin Fishbein (1980) were used to expl ain why an individual behaves in a accredited manner. The theory is based on the assumption that humans are rational and information available to them will be used dodgeatically.TRA uses attitude and norms to presage behavioral intentions, that is when attitude leads to definite behavior but the relevant norms suggest something else, then both factors influence the behavior.The Theory of Reasoned Actions (TRA) identifies that behavior is a fly the coop of intention and intention is a function of both attitude and subjective norms.Theory of Reasoned Action is an useful tool used in look foring certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998)Enker (1987) examined how attitude and normative belief is related to cheating and he engraft out that theory of reasoned attain was a useful tool in understanding good behavior of an individual.The motive behind exp laining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy.2.2 Theory of planned behaviorIn 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen substantial the Theory of mean behavior (TPB), which was an extension of Theory of Reasoned ActionsThe new model proposed by Ajzen included the Perceived deportment Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty take in performing a certain behavior (Ajzen and Madden, 1986).The Theory of plotted Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and compassd behavioral control.Similar to the Theory of Reasone d Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000)Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA.Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave un goodly most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software.2.3 Kohlbergs theory of moral developmentKohlberg (1969) developed the theory of moral development, which consists of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individua l be on morally when they arise intellectually.Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personalised benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own postulate rather than fulfilling the needs of others or society as a whole.Conventional is the second level of moral development, in this level individuals focus more on a conclave, this is the level where peer pressure begins to influence the finis of an individual. At the first stage of this level an individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an full-strength manner. built in bed accomplished is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision reservation.According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting.2.4 Software piracy literature 2.4.1 Age anterior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006 Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users amidst the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. still a study conducted by Kini et al, (2004) concluded that age has no significant influence on software p iracy.2.4.2 GenderKini et al.., (2004), suggest that fe masculine students have a higher ethics than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males therefore females will use pirated software less than males, as software piracy can be considered unethical.Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more encounter takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software.2.4.3 Consequences of apply pirated softwareUsing pirated software could be costly for a n organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994).However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). to a fault risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to take off caught and been prosecuted for development pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon.2.4.4 Income and economic conditions related to software piracyThe study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the original softwares is related to his or her income. Countr ies with higher Gross content Income (GNI) such as fall in States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008).Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a arena however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy.2.4.4.1 gratuity 10 high and low piracy ratesCountries with high piracy rate%Countries with low piracy rate%Georgia95United States20Bangladesh92Japan21Armenia92Luxembourg21Zimbabwe92New Zealand22Sri Lanka90Austria24Azerbaijan90Belgium25Moldova9 0Denmark25Yemen89Sweden25Libya87Switzerland25Table 2.2 Top 10 High and Low piracy rateSource BSA piracy report 2008Moores (2008) in his study on An Analysis of the impact of economic wealth and National Culture on the rise and fall of software piracy rates found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country.2.4.5 Cost of original softwareAt an individual level, the cost of original software is considered as strand factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997).Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate.Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000 Traphagan Griffith, 1998 Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users acceptd that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999)Block et al.., (1993) Cheng et al.., (1997).2.4.6 Software piracy in an ethical contextBanerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions.Loch and Conger (1996) in their study found that attitude and social norms play an important purpose in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of soft ware piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990)Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior.Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological1F and teleological2F consequences of behavior) study showed both were found to influence the decision to use pirated software.Peace et al.., (2003,) generated a software piracy model using Theory of Pl anned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software.Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy.Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or marginal effect on the intention of the students to use pirated software (Simpson et al.., 1994 Taylor and Shim.., 1993). Even though, individuals who felt a moral o bligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007).Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship among level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy.Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior.Researches concludes that use of pirated softwares in colleges and universities ar e more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives.With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as over belief in our ability to come in a specific situation.Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy tha n Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software.Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view.2.4.7 Problem of software piracySoftwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft.McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not offend people from using pirated software.2.4.8 Software piracy from a different angleResearchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and stamp 1995, the victor of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy.Givon et al, (1995), in their paper, Software Piracy Estimation of lost gross revenue and impact on software diffusion used a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software.However, Solomon and OBrien.., (1990,) had a different view they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991 Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,)2. 5 Models used in literatures of software piracyIn this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below.2.5.2 Tim Goles et al ModelTim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown belowThe model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the persons intentionDemographic Analysis of Software Piracy UsersDemographic Analysis of Software Piracy UsersSoftware Piracy Most common factors that influe nce the intention to use among college students in Selangor, MalaysiaAbstractSoftware piracy is one of the worst problems facing the software industry, and the piracy rate around the world is rising and in 2008 alone software industry lost more than US$ 5.3 billion due to software piracy, and in the same time frame Malaysian software industry lost around US$ 368 million.Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem.This research identified six variables that influence the intention of college students to use pirated software they are Gender, Age, Value Consciousness, Attitude, Peer pressure and Novelty seeking.A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The study found out that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software.1.0 Chapter 1 IntroductionSoftware piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating (Honick and Craig, 2005).Independent study sponsored by Business software Alliance (BSA) shows that software piracy is the worst problem that software industry faced, BSA defines software piracy as the unauthorized copying or distribution of softwares. When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright ow ner of the software.According to Microsoft there are 5 basic type of piracy,1- End user copying Here individuals or organizations copy and distribute unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits.2- Hard disk loading this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are not aware of the wrong doing3- Counterfeiting software and its packaging are illegally produced in a large scale.4- Online Online piracy occurs when the end user download the software from an online source without the permission of the copyright owner.5- License misuse software distributed with a discount rates for the high-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are not qualified for the software.1.1 Background of the problemTA study conducted by BSA (200X), shows that piracy rates went up from 38% in 20 07 to 41% in 2008 worldwide, however the encouraging news is that among the 110 countries the study was conducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008.Lowest piracy countries according to the BSA(200x), research were the United States Luxemburg, New Zealand and Japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%.Research conducted by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it will create more that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 more that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry.For every dollar of the software sold another 3 or 4 dollars are paid to the local IT farms, in other words software piracy means less jobs in Information Technology Industry, as per IDC (200x) study if piracy is reduced 10%, governments will generate more that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additional 15 dollars to every 100 dollars spent on software, meaning software add 15% to the price of legitimate software because of software piracy.Software piracy will also increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of peer-to-peer sites offering illegal software infect the computers with virus and other types of identity theft tools.Software piracy is somewhat out of controlled in the real world, Microsoft investigators found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated ( Ca rbon 1997).The population of Malaysia is estimated at 28 million and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007).1.2 Problem statementIn Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of financial losses, Malaysia lost over US $ 368 million compare to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007).This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently.1.3 Objective of the stud ySoftware piracy has become a worldwide dilemma due to the financial and economic losses the software industry and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear. For an issue that has gone out of control, like software piracy, its important to identify grass root problems.In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software this will help the software industry to come up with better strategies in the fight against software piracy.TAs colleges and universities are identified as breeding grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students believe its ethical to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian c ontext.1.4 Purpose of the studyTA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy.Protecting the intellectual property is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is due to the casual attitude of the consumers towards intellectual property rights (SIIA KPMG 2001).Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court ruled that intellectual properties were protected (Lau, 2006).According to t he Malaysian copy right act 1987, if an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison sentence of not exceeding five years, or both.Preventives and deterrents are the commonly used techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it difficult for software crackers to crack the software by increasing the security features. The idea behind the preventive concept is that, when it becomes difficult to crack, the software hackers will find cracking softwares are hard and eventually give up. Deterrent uses the laws and regulation to prevent software piracy.The truth is preventives and deterrents are not so effective, the higher security that is placed in the softwares are checked by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that de terrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected.This proves the need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy.1.5 Justification of the studyThere have been number of studies conducted in relation with software piracy among the college students, however a study focused on college students in Malaysia is not found, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software.Since most of the current studies are conducted outside Malaysia, there might be some sig nificant difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia. T1.6 Research questionsThis study aims to answer following questions.Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia?Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia?1.7 Organization of the studyThis study has five chapters the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions.The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of software piracy are discussed.Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study.The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions.2.0 Chapter 2 Literature ReviewFirst part of this chapter reviews different theories related to behavior and ethics, particularly the Theory of Reasoned Actions by Fishbein and Ajzen, Theory of planned behavior by Ajzen and theory of moral development by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software.Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to explain software piracy.2.1 Theory of reasoned actionTheory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein (1980) were used to explain why an individual behaves in a certain manner. The theory is based on the assumption that humans are rational and information available to them will be used systematically.TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior.The Theory of Reasoned Actions (TRA) identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms.Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the u se of seatbelts. (Change, 1998)Enker (1987) examined how attitude and normative belief is related to cheating and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual.The motive behind explaining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy.2.2 Theory of planned behaviorIn 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen developed the Theory of Planned behavior (TPB), which was an extension of Theory of Reasoned ActionsThe new model proposed by Ajzen included the Perceived Behavior Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty level in performing a certai n behavior (Ajzen and Madden, 1986).The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control.Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000)Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA.Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software.2.3 Ko hlbergs theory of moral developmentKohlberg (1969) developed the theory of moral development, which consists of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually.Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole.Conventional is the second level of moral development, in this level individuals focus more on a group, this is the leve l where peer pressure begins to influence the decision of an individual. At the first stage of this level an individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner.Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equ ity in decision making.According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting.2.4 Software piracy literature 2.4.1 AgePrior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006 Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users be tween the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy.2.4.2 GenderKini et al.., (2004), suggest that female students have a higher morality than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males therefore females will use pirated software less than males, as software piracy can be considered unethical.Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they c oncluded that gender was practically accountable to the decision of an individual to use pirated software.2.4.3 Consequences of using pirated softwareUsing pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994).However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon.2.4.4 Income and economic conditions related to software piracyThe study cond ucted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the original softwares is related to his or her income. Countries with higher Gross National Income (GNI) such as United States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008).Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a country however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy.2.4.4.1 Top 10 high and low piracy ratesCountries with high piracy rate %Countries with low piracy rate%Georgia95United States20Bangladesh92Japan21Armenia92Luxembourg21Zimbabwe92New Zealand22Sri Lanka90Austria24Azerbaijan90Belgium25Moldova90Denmark25Yemen89Sweden25Libya87Switzerland25Table 2.2 Top 10 High and Low piracy rateSource BSA piracy report 2008Moores (2008) in his study on An Analysis of the impact of economic Wealth and National Culture on the rise and fall of software piracy rates found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country.2.4.5 Cost of original softwareAt an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997).Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that r eduction of the price of the original software will reduce the software piracy rate.Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000 Traphagan Griffith, 1998 Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users believed that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999)Block et al.., (1993) Cheng et al.., (1997).2.4.6 Software piracy in an ethical contextBanerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions.Loch and Conger (1996) in their study found that attitude and so cial norms play an important role in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of software piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990)Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior.Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological1F and teleological2F consequences of be havior) study showed both were found to influence the decision to use pirated software.Peace et al.., (2003,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software.Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy.Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or mini mal effect on the intention of the students to use pirated software (Simpson et al.., 1994 Taylor and Shim.., 1993). Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007).Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy.Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior.Researches concludes that use of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives.With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as over belief in our ability to succeed in a specific situation.Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software.Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view.2.4.7 Problem of software piracySoftwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border co nflicts, business losses and consumer exposing to virus and different kind of identity theft.McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not stop people from using pirated software.2.4.8 Software piracy from a different angleResearchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy.Givon e t al, (1995), in their paper, Software Piracy Estimation of lost sales and impact on software diffusion used a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software.However, Solomon and OBrien.., (1990,) had a different view they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991 Taylor a nd Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,)2. 5 Models used in literatures of software piracyIn this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below.2.5.2 Tim Goles et al ModelTim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown belowThe model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the per sons intention

Monday, June 3, 2019

Effective Instructional Strategies For Adult Learners

Effective Instructional Strategies For Adult LearnersCollege and universities across America argon experience a change in student demographics from traditional to heavy(a) students. The large(p) student (those 25 and older) population in higher education continues to grows (Palazesci Bower, 2006 ODonnell Tobbell,2007 Giancola, Grawitch, Borchert, 2009 Vaccaro Lovell, 2010). The U.S. Department of Education reported an increase in nontraditional students from 28% in 1970 to 39% in 1999. Today, the U.S. Department of Education reported in its National Center for Educational Statistics(2006) reported that first-time full-time students are now in the minority in higher education. This growing population of adult meditateers bring unique characteristics to the eruditeness environment. One might then acquit to observe significant difference in instructional strategies of instructors of traditional and adult students. However, despite the unique characteristics of adult learners, th e traditional approach to instructional strategies, in particular(a) the lecture method, used in many traditional classrooms is utilized in the adult schooling environment as well. While there are no inherent negative outcomes associated with the lecture method (Masikunis, Panayiotidis, Burke, 2009 Giers Kreiner, 2009 Revell, Wainwright, 2009), characteristics of adult learners may provoke the investigation of alternative instructional strategies.Adult LearningMalcom Knowles first introduced the idea that adult and children attainment differently due to developmental and experiential differences in the 1970s (Knowles, Holton, Swanson, 2005). Prior to Knowles work, pedagogy was the focus of instructional strategies in higher education. The pedagogy exemplar required the instructor to be in control of the learning and was the main focus ofKnowles coined the term andragogy to describe a core set of principles of adult learning to build a more effective learning process for adult s (p. 2). The six principles of andragogy areThe learners need to knowSelf-concept of the learnerPrior experience of the learner tact to learnOrientation to learning andMotivation to learn. (p. 3)Knowles stressed andragogy as a process model rather than the marrow model characteristic of pedagogy.The difference is not that one deals with content and the other does not the difference is that the content model is concerned with transmitting assertation and skills whereas the process model is concerned with providing procedures and resources for helping learners commence information and skills. (Knowles, Holton, Swanson, 2005, p. 115)Knowles maintained these principles, or assumptions, as foundational in designing meaningful learning experiences for adult learners (Merriam, Caffarella, Baumgartner, 2007).In addition to considering the characteristics of adult learners, Merriam, Caffarella, and Baumgartner (2005) emphasize the importance of recognizing learning in an adults life oc curs in structured and informal learning environments. This recognition allows educators of adults to take into consideration the vast experience and knowledge adult students bring to the learning environment. Prior knowledge then becomes foundational to the learning experience. Also, the recognition that learning occurs in multiple arenas of life enables educators to assist adult learners in understanding they are long learners. This may lessen the adults anxiety of entering a formal educational setting. The learning environment may be youthful, but the experience of learning impudent knowledge or skills is not. Lifelong learner is part of the adults life.Brookfield (1986) addressed the social aspect of adult learning. the acts of teaching and learning and the creation and alteration of our beliefs, values, actions, relationships, and social forms that expiration from this are ways in which we realize our humanity (p. 1). From this belief, Brookfield (1986) presented six prin ciples for facilitating learningParticipation in learning is voluntary adult engold age in learning as a result of their own volition.Effective practice is characterized by a respect among participants for each others self-worth.Facilitation is collaborative. Facilitators and learners are in a cooperative endeavor in which, at different times and for different purposes, leadership and facilitation roles will be assumed by different group members.Praxis is placed at the heart of effective facilitation. Learners and facilitators are involved in a perennial process of activity, reflection upon activity collaborative analysis of activity, new activity, further reflection, and collaborative analysis, and so on.Facilitation aims to foster in adults a spirit of critical reflection.The aim of facilitation is the nurturing of self=-directed, empowered adults.While Knowles advocated that adults learn differently than children, he understood the covering of andragogy assumptions were capab le on the learning situation. In all learning situations, the needs of the learner are paramount in designing an effective learning experience. Knowles (as cited in Knowles, Holton, Swanson, 2005) statedMy intention, therefore, was to present an alternative set of assumptions to those that had been traditionally made by teachers of children, so that others would brace another choice. I saw them as assumptions to be well-tried (not to be presumed), so that if a pedagogical assumption was the realistic condition given situation then pedagogical strategies would be appropriate. For example, if I were now, at age 66, to undertake to learn a body of totally strange content (for example, the higher mathematics of nuclear physics), I would be a totally dependent learner. I would have very little previous experience to build on, I probably would have a low degree of readiness to learn it, and I dont know what developmental task I would be preparing for. The assumptions of pedagogical ass umptions would be appropriate. (p. 146)However, with that said, in many learning situations adult learners do bring a readiness to learn, do have experiential background, and XXXXXXXXXXXXX. In this context, learning strategies appropriate to the adult learner should be considered.Institutional Reaction to Adult LearnersDespite the continual struggle of adult learners for voice and value in higher education (Sissel, Hansman, Kasworm, 2001), institutions appear to acknowledge the unique population of adult learners (Simpson, 2004). Institutions offer degree programs specifically addressing the need to provide alternative student services, multiple delivery modes (in-seat and online), and flexibility in scheduling (Durey, 2007). Matkin (2004) identifies two distinct markets in higher education the residential student (traditional students) and the nonresidential (nontraditional student). The members of the two markets have different reasons for seeking education, different backgrounds , different service needs, and different pathways through which they are attracted (recruited) to education (p. 62). While, some in higher education academy may still harbor distrust in these nontraditional programs for adult learners, Tweedell (2007) contends many programs that target the adult population have been more deliberate in planning and implementing quality than other education programs whose theories and practices are rooted only in tradition (p. 5). In addition to addressing opportunities for adult students to pursue higher education opportunities, educators must investigate and implement instructional strategies that address the needs of adult learners.Instructional StrategiesSeveral models of adult learning inform best practices in adult learning. Knowles (as cited in Brewer, 2005) provided guidelines for development and practice in adult learning programs. Central components of Knowles theory are self-directedness , a focus on experiential learning, learner reliance on past experiences, adult motivation to learn, and goal orientation associated with problem solving (p. 23). Effective instructional strategies for adult learnersIncorporates learners goals and objectivesProvides opportunities for content to build on past experiences and knowledgeFocus on problem oriented and practical strategiesRequire active learner participationProvides opportunities for application of new knowledge and skillsProvide opportunities for both independent and collaborative learningImplications for Faculty DevelopmentConclusion

Sunday, June 2, 2019

Comparing 1984 and Brave New World :: Compare Contrast Comparison Essays

Comparing Orwells 1984 and Huxleys digest New World In Orwells Nineteen Eighty-Four and Huxleys Brave New World, the authoritative figures strive for freedom, peace, and stableness for all, to develop a utopian society. The Utopian society strives for a perfect state of well-being for all persons in the community, and over-emphasizes this factor, where no person is exposed to the populace of the world. As each novel progresses we see that neither society possesses family values nor attempts to practice them. Neither are passionate nor germinal in factors such as love, language, history and literature. Our society today, in general, is unsure about the future The nightmare of total organization has emerged from the safe, remote future and is now awaiting us, just around the bordering corner. It follows inexorably from having so many people. This quotes represents Watts fear for the future George Orwell and Aldous Huxley both explore the future state of civilization in their novels. They both warn us of the dangers of a totalitarian society. Both books express a utopian nonpareil, examine characters that are forced into this state and are compelled to dealing with this society and all the rules involved. The impracticality of the utopian ideal is explored in Orwells Nineteen Eighty-Four and Huxleys Brave New World. Both authors suggest that a lack of familial bonds, the repression of human individuality, and the repression of artistic and creative endeavors in order to attain a stable environment renders the achievement of a perfect state unrealistic. The lack of familial bonds, in both novels, contributes to the increment of a dystopian society. This lack of familial bonds is evident through genetic engineering, the use of names, and a commonly used drug, soma. One of the first mentionings of family in Brave New World is when the main character, Bernard, asks the Controller, the ultimate leader, about the past and why their society does not believe in famili es. His response suggests that authoritative figures do not believe that there is need for a mother in society and therefore, the Controller responds, Mother, he repeated loudly rubbing in the science and, tipped back in his chair, these, he said gravely are unpleasant facts I know it. But then most historical facts are unpleasant. The give the axe for mothers as a valuable figure in life contributes to the lack of familial bonds. In Huxleys Brave New World, human life is conceived in a bottle the embryo no longer grows in the mothers womb, and therefore no bond is formed between the mother and the baby.

Saturday, June 1, 2019

Frogs :: essays research papers

FrogsFrog is the common name for a species of amphibian that also includestoads. A very common question is whats the difference between frogs and toads?, the answer none, except for the fact that toads lack the powerful legs thatfrogs have. Where heap frogs and toads be found?, one king ask. They live inall parts of the world, except for Antarctica, but are mostly found in tropicalareas. Frogs are small animals with smooth dampish skin, and big eyes that cansee in almost any direction. Most species have webbed feet and powerful legsmaking them good jumpers, and excellent swimmers. A frogs tongue is attached tothe front of its mouth instead of the rear, and most frogs are very vocal,especially the male frogs.As a frog grow, it goes through with(predicate) many changes. Starting out as a tadpole,and morphing into a frog. Most frogs lay their eggs in water. Others will laytheir eggs some where safe, therefore carry them to water where they hatch intotadpoles. At this stage they hav e gills, no legs, and a tail. As they mature,their gills and tail disappear, and they develop lungs and legs. This period oftadpole life can be divided into three stages. The first stage, called premetamorphosis, lasts about 50 days (Patent 54). The second stage, in whichthe hind legs grow, is called prometamorphosis, and lasts about 21 days. Whenthe legs are about as coherent as the body, the third stage, which is called metamorphic climax, and takes place very rapidly, begins. During this laststage, which lasts about a week, many great changes occur. They lungs completetheir development, and the gills disappear. The skin gets thicker, nostrilsform, and the tail is solely resorbed.Most frogs prefer moist regions, and many kinds live in the water.Because frogs absorb oxygen in water through their skin, they can stayunderwater for long periods of time. A frogs body temperature depends on itssurroundings, and during cold weather, frogs dig burrows in mud and hibernate.During hiberna tion, the frog needs little oxygen and no more forage than isalready in its tissues. During intense heat, a frog might estivate, or inother words, lie in a state of insensibility during the heat, after burying themselvesin sand and clay.Frogs are carnivores. They eat just about anything smaller than thenthat moves. A frog thinks like this If its smaller than itself and moves,eat it. If its the same size, mate, or attempt to mate (this gets some frogs