Wednesday, July 31, 2019

How the family changed over time Essay

How the family has changed over time? The institution of the family has changed dramatically over last 50 years and the main sociological perspectives, functionalism, Marxism, feminism and interactionism have described this changes in terms of family structure, divorce rates, marriage rate and gender roles. Defining family in Britain is problematic as until 1960’s few sociologists questioned the importance of the benefits of the family. Family is a group of people living together related by blood or marriage who support themselves economically and emotionally. It was assumed that the family was evolving with the change in Britain. From the 1960’s , with increasing divorce rates, living together before marriage, single parent families, one person households , separation and migration, family traditionally seen as nuclear (based on two adults and children) became harder to define. Sociologists have concluded that the family has become harder to define in the more traditional sense. A family can now consist of any group of people living together and/or bringing up children. This could separate due to divorce and another family created through remarriage or cohabitation, with the introduction of step children or children born to the new parentage resulting in another family unit although the first one still technically exists. There are two basic types of family structure: extended and nuclear. Functionalists say industrialization changed the function of the family. In pre-industrial society the extended family was most prevalent. Families lived and collaborated in engendering goods and crops to live from, taking the surplus to market. In industrial society, the nuclear family becomes ascendant. Status for an individual in pre-industrial society was ascribed. Talcott Parsons (1956) presumed that in industrial society an individual’s status is achieved by their prosperity. The nuclear family is the best way to achieve prosperity as individuals. Family structure adapts to the changing circumstances. Changes in economic, political, and moral approach led to the transformation of the family structure. Postmodern times in which we live in a time of tolerance, emancipation of women, legalization and acceptance of homosexual relationships. All these changes meant that more and more people moved away from the traditional model of the family, universal fifty years ago. Statistics indicate an increasing number of households about 9. 2 million since 1961 but that is due to the increase amount of the divorce, migration, remarried people, single people and increase in length of life. At the same time the increase amount of households decreased their size and the average number of children due to widespread access to the contraception, abortion, aging population and costs associated with children’s maintenance. More women are also delaying having children because they focusing on work and education seeing role of the mother as a barrier. It is related to ‘child centric’ model of the family, which learn society to treat children’s as the most ‘precious’ , whom one must completely conform their lives to them . Most mothers deciding to give a birth at age 30-34. Although, life style changes have also caused decrease in married couples amount which is also related to religious approach, because from 1981, when only 49% of all marriages were civil marriages, at 2010, already 68,2 % of all marriages where civil marriages. However, married couple are still the most common type of the family. The functionalist view of the role of the family in society is that it maintains social order for benefits of all. The family is a tool for primary socialization and a key social institution in sustaining the value consensus (Harambolos 2008).Murdock (1949) claimed that family was universal. It is defined as a social group characterised by common residence, economic co-operation and reproduction. A family lives in the same home, has economic co-operation usually through the division of labour where the man will take on the instrumental role and provide for the family while the woman will adopt the expressive role and take care of the home and family members. Unfortunately, that’s the most common image of division of labour for as much, men, are more likely to help at housework or child care presently, it still seen as a responsibility of women. Marxists would contest this viewpoint, arguing that the division of labour is capitalist dogma used to control the labour force and stop them from developing class consciousness. Marxism looks at the methods of control of the ruling class (bourgeoisie) in determining the way society is organised. The family is seen as part of the structure of society and is one of a number of social institutions which helps maintain the capitalists system. Marxists state that it is the requirements of the system that has come to shape the family in modern societies. From this perspective view, society revolves around the infrastructure and social superstructure. The family helps to maintain this system. Friedrich Engels (1884) provides a basis for the Marxist view of the family were strongly linked to the evolution of the capitalist system. He also explored the concept of monogamy and argued that the monogamous nuclear family developed with the emergence of private ownership of the ‘means of production’. Engels stated that this system is maintained by the socialisation of capitalist social norms and values. Marxists do not see this as benefitting the family at all, only the system, and therefore this helps support their theory that family exists as a largely negative institution. Both of these sociological perspective see the role of the family in the opposite way, but in the meantime both of them describing family as a unit of socialization. On the other hand functionalists assume that the family is a positive and beneficial institution in which family members receive nurturing, care and unconditional love which helps keep society functioning well. However, this is not always the case, when it comes to domestic violence, divorce and child abuse. All couples and families who were nuclear families or had potential to be were being ruined each day, providing that the functionalist’s view of a beneficial family was much overestimated. In comparison, Marxists state that family helps to maintain class differences in society as the rich can afford to give their children a better start in life than the poor, such as. pay for a better education, and get them a good job either in their own business or their friends business. Marxists believe the family socializes the working class to accept that it is fair that the classes are unequal. A different view on the family, presented by Feminists, focuses also on socialization but sees its effects in division of labour and gender role stereotyping. They states that family is bad for women. Girls and boys learn their different gender roles within the family through socialization. Girls copy their mothers, doing housework, whilst boys copy their fathers, doing DIY. They then learn that this is how male and female roles should be. Feminists believe that the family is male dominated- the term for this is patriarchal. Their theory is still relevant nowadays, because although more women are having careers it’s still expected from them to take care of children’s and home. Perceptions of roles is so deeply rooted in society that, despising the false image of a woman liberated, having range of capabilities which can freely pursue her dreams when in the end ,is still required from her to perform, in the meantime, the role of housewife. In contrast, interactionist state that the family assists in the construction of the identity for the social individual and looks at the society at a micro scale. In this perspective the family, through interaction helps the social individual to understand ‘self’ when feminists could argue that vision of how one should look like and behave originates from socialization. They also believe that family helps the social individual identify her/his social role without considering how institutions, class conflict and gender stereotyping influence on creation of those roles. In Great Britain the family is built on the concept of marriage with children had a very well-established position but during last century divorce rates increased 200%. Which is also reflected in the number of separations reported annually by 150,000 to 200,000 pairs per year. Some researchers place the cause of increased divorce on higher expectations (Fletcher, 1966). And given the rates of remarriage it is not the institution of marriage, or the ideology picturing lifelong happiness that is rejected, but an insufficient partner. (Denny1984) regards western style marriages based on romantic love as fragile because they are only held together by emotional ties. Another reason why divorce rates increased is that now considerably less social stigma and blame is attached to divorce. One of the main reasons for this phenomenon are changes in divorce law making it much easier to divorce now then for example 50 years ago. Statistics show that the number of children in divorcing couples declined from 153,000 to 104,000. However, this data does not take into account cohabitating couples whose separation is not recorded. The amount of cohabiting couples has increased significantly in recent years. In the majority of relationships still the most important are children’s. The average time spent with children nowadays by mothers is 2h 32 minutes and by fathers 2h 16 minutes when 50 years ago that that was only 25 minutes per day for both parent. Currently fathers are more involved in bringing up children, and the belief in the society that children are an extension of us and their success is our success modernized power image of the families. Is widely spread on the increasing number of single fathers to 178,000 from  60,000 from 1670. This shows how evolved the role of the father in the family. Increasingly, we find also reconstituted families where the connection partners cohabitation or marriage jointly raise children from a previous relationship. That happens because of the increased amounts of divorce and remarriage trends. Humans as far didn’t create any more successful structure t han family. But is nowadays family a well-functioning institution ? Very big influence on how present family looks like has mass media which are creating image how does family should look like which society is fallowing. Traditional family model become a consumption unit which glorifies children and parents are responsibility to make them happy and fulfill their all desires. All values and norms changed dramatically over time and people lost respect to institution like marriage. In conclusion family is still a basic part of the society but it evolved creating new forms of it. References: Haramolos, M & Holborn, M (2008) 7th Ed. Sociology, themes and perspectives, Harper Collins: London Scott,J. & Marshall, G (2009) Oxford dictionary of sociology , Oxford University Press: Oxford

Tuesday, July 30, 2019

Reflection of Baraka Film

Prior to watching Baraka, I had a firm belief that the world is truly a beautiful place to live. This film all the more strengthened my conception. The title of the film in itself proves this – the world is a blessing, and we are all privileged to call this world our home. Besides, where else would we live? Science can only take us so far. However, no one is blind to the horrors and tragedies of this world. Maybe ignorant, maybe selfish, but not blind. Poverty is prevalent everywhere in both developed and under-developed countries alike. Countries are stricken by thousands that are living in the slums such as the favelas in Brazil. Many are thriving well below the poverty line. Even people in Calcutta depend on the landfills as their prime resource. Many result to exposing themselves to the drug market and prostitution as in South Africa for this is their only source of income. Horrific holocausts have wreaked havoc in various places of the world; the concentration camps in Auschwitz, Poland, the S21 torture chambers and killing fields in Cambodia, and even attempts to wipe out certain races such as that in Darfur, Sudan. Undoubtedly, such events are overwhelming and discouraging, for these things are only a portion of the ongoing issues of the human race. As absurd as it may seem, the good in humanity still prevails. The tribulations of humans have taught us to be ever more perseverant and resilient. This results in the victorious overcoming of these problems and the glorious defeat of the enemy. Nations have come together to put an end to humanity. Despite how diverse the ethnicities, opinions, cultures, and religions may be, we still have the ability to unite and fight for the greater good. It is that same diversity of lifestyles that makes the world so beautiful. Ancient empires and tribes have created such alluring temples and dwelling places such as the Durbar Square in Nepal, the Angkor Wat in Cambodia, and the magnificent advancements of the Terrace Fields in Indonesia. Such places put us in a deep awe, even today in a technologically advanced era. People take great pride in their religions and build such sacred and radiant places of worship, whether it is the Catholic churches in Vatican City, the Grand Mosque in Mecca, and the glorious Mausoleum of the Shah-e-Cheragh in Shiraz, Iran. People are passionate about their practices such as the Whirling Dervishes in Turkey, and the Kecak Dance of the Balinese. No matter how different our ethnicities, cultures, religions, and socioeconomic statuses may be, we are all bound by the beauty of simply existing. We, as humans, are able to find happiness even in the presence of poverty and economic difficulties. The world is not exactly one’s perception of a utopia, but somehow, there is beauty in the midst of all its destruction.

Monday, July 29, 2019

Agreement may not be necessary

Agreement may not be necessary Disclaimer: This work has been submitted by a student. This is not an example of the work produced by our Law Essay Writing Service . You can view samples of our professional work here . Agreement may not be necessary Every contract is an agreement but agreement may not necessary to be considered as contracts if the agreement does not made in lawful way. A binding contract consists of these four essentials which consist, an offer s.2(a) CA1950, an acceptance s.2(b) CA 1950, consideration s.2(d) CA1950, as well as intention to create legal relations (Adams 2010). On the other hand, (Ayus, 2009,page 197) defined an offer as â€Å"an ‘intimation’, by words or conduct, of a willingness to enter into a legally binding contract, and which in its terms expressly or impliedly indicates that it is to become binding on the offeror as soon as it has been accepted by an act, forbearance or return promise on the person to whom it is addressed†. However, based on the opinion given by Duxbury (1991), an acceptance may be defined as an unconditional assent, which communicated by the offeree to the offeror, to all terms of the offer, made with the intention of ac cepting. It should be noted here that a contract will not be binding unless the parties have expressed themselves with reasonable certainty. 1.0 Issue The issue of this question is about a sale of car for RM30, 000 that advertised in the local newspaper by Ah Chong, whether or not he has a contract with any of the three parties. This question is regarding offer and acceptance whereby offeror signifies his willingness to do something or not to do, with a view to obtaining the consent given from the offeree. 2.0 Law S.2(a) CA1950 defined offeror/proposal as stated in appendix. In unilateral contracts, the party who offers something to offeree/acceptor may not necessary to be an offeror, but an offeree which is stated in s.2(b) CA1950. A contract binds between offeror and offeree by completing communication of proposal, acceptance, and revocation that stated in s.4(1), s.4(2), and s.4(3) of CA1950 respectively. According to s.4(1) CA1950, it stated that: â€Å"the communication of a p roposal is complete when it comes to the knowledge of offeree†. In other word, proposal is effective upon its communication has been communicated to the offeree. When offeree reply his/her acceptance (by email, by post, by hand) to the offeror, there is an official contract exists between the both parties – s.4(2)(b) CA1950. In postal rule, the moment offeree posted his/her acceptance letter into postbox, the contract binds offeror provided that the letter has been placed into the hand of the relevant postal authorities – s.4(2)(a) CA1950. Acceptance must be made within a reasonable time embodied in s.6(b) CA1950. On the other hand, in situation whereby offeree posted an acceptance, it must be certain and fixed based on the condition given by the offeror since the offer contained the element of consideration [s.2(d) CA1950] by offeror and shall not be in the midst of negotiating or bargaining s.7(a) CA1950. Hence, a purported acceptance that is different from the stipulated in the offer would not be an acceptance in law and may end up to a counter-offer. (Nabi Baksh & Arujunan 2005)

Insurance Essay Example | Topics and Well Written Essays - 500 words

Insurance - Essay Example To avoid paying these damages, the medical professional can buy an insurance policy, for purposes of transferring the risks associated with his or her work (Mason, Leavitt and Chaffee, 2012). On most occasions, insurance companies will accept the risk under consideration, in exchange for receiving the payment of premiums. An employee would also need to join an individual professional insurance program, even if they are covered by their employer. An employer would register to this program if the insurance policy initiated by an employer does not meet the following requirements (Nurses Service Organization, 2014), Some of these insurance programs only cover some partial problems, it would therefore be necessary for the health care practitioner to register for an insurance program that covers all possible liabilities that they are liable of (Nurses Service Organization, 2014). An employer’s policy also covers an employee only when he or she is working for him, or at work. On the other hand, enrolling for a professional liability insurance program will cover an employee when he or she is at work, or providing volunteer services to another health organization (Nurses Service Organization, 2014). The insurance policy initiated by the employer is aimed at protecting the interests of the employer first, before protecting the interests of his employees (Nurses Service Organization, 2014). This is because he is the one responsible for paying premiums, and on most occasions, they partially insure their employees. This is an indication that the policy aimed at protecting the interests of the employer first, before protecting the interests of employees. Enrolling for a professional liability program does not mean that an individual has a deep pocket. It is only a measure of safeguarding a health practitioner from liability in cases of negligence

Sunday, July 28, 2019

Not yet Case Study Example | Topics and Well Written Essays - 750 words

Not yet - Case Study Example It has also helped the company to maintain its sustainability. The company also has a wide product line. This is a subsection of the product mix. The Coca-Cola Company has a lot of products that have similar features which helps to attract the buyers. Providing consumers with a variety of products to choose from, and will therefore not require one to look for something from a different brand. This has made it a very popular company (Dost, 2006). The Coca-Cola Company has a wide product width; this means the different categories of products that the company has. The coca cola products have been put into many different categories; this makes it easy to please customers and to entice the prospective buyers. The product length of a company is the types of products within a company which complement each other. The company has been able to expand its width considerably, as it has many more beverages that are related to each other, even if they are not sold together. The company also boasts of a product depth where a product has different categories. For example, the coca cola company has coke light, coke classic, and coke diet (Coca-Cola, 2015). This makes it a very convenient product because one never runs out of alternatives to choose from (Ferrell & Hartline, 2007). The brand of a company is its unique identification name and symbol. This helps it to be easily distinguished from other companies. For the Coca-Cola classic, its brand name is quite popular all around the world. This has helped the company to flourish because it is outstanding, and a customer will not have any doubts that the product he or she is purchasing is the very one that they wanted. The coca cola company has many different brands. This makes it easier for buyers to choose the product they want. It has also helped to expand the company because of the brand loyalty that it has acquired over the years. It is a huge brand; therefore any product that is associated

Saturday, July 27, 2019

Philosophy 101 Essay Example | Topics and Well Written Essays - 250 words

Philosophy 101 - Essay Example Based on this argument, existentialism holds that there is no general essence among individual selves. It asserts that one’s identity and purpose is fashioned by the individual subject alone. In this light, philosophy enables the individual subject to reflect on one’s purpose in life, which in turn defines one’s authenticity. An authentic lifestyle entails the affirmation of individual responsibility. It contends that humans must become highly reflective of the possible outcomes of their desired course of action. Such an act of cognition shall facilitate both prudent and moral conduct that contributes to the emancipation of the individual self. This shows how philosophy encourages us to become resolute in our own beliefs and convictions regardless of what traditional society or religion dictates. By this, we shall find value in life, in our pursuit of knowledge and meaning in the world, for such can lead to the acquisition of a deeper and holistic understanding o f life. Herein is the value of philosophy. For through it, we are able to exercise human freedom, and take hold of our own lives, based on our own choices and actions. It enables us reflect on the meaning of the most important and simple things in life, and most importantly, exalt individualism. Works Cited Kelly, Eugene. The Basics of Western Philosophy. Westport: Greenwood Press, 2004. Print. Sartre, Jean Paul.

Friday, July 26, 2019

Rise of Capitalism Essay Example | Topics and Well Written Essays - 1500 words

Rise of Capitalism - Essay Example In a capitalist society there is competition in the market. Friedrich (1995) states that competition in the capitalist system is based on the assumptions that there are many buyers and sellers in the market, This assumption means that the existence of many buyers and sellers means that the prices and conditions in the market cannot be controlled by one buyer or seller. The other assumption is that there are zero barriers to entry and exit into an industry by firms, this means that the market supply and demand depends ion the nature of market where if only some firms controlled the market than competition will be limited and prices determined by the firm in the industry. The other assumption is that consumers have knowledge regarding prices in the market. This means that a consumer has information regarding the quality and price of a product and therefore firms will compete in the market to meet consumer price and quality requirements. Therefore the capitalist society is characterised by competition and this competition leads to the proper allocation of resources of production, the other systems have limited competition where in the socialist society no competition is evident because this system is based on equality philosophy. Motivation:The capitalist society through its competitive nature helps in promoting increased production and innovative ideas. The nature of the capitalist society motivates individuals to involve themselves in production activities unlike other forms.... Therefore this system is different from the socialist and feudal systems in that there is private ownership of property. Competition: In a capitalist society there is competition in the market. Friedrich (1995) states that competition in the capitalist system is based on the assumptions that there are many buyers and sellers in the market, This assumption means that the existence of many buyers and sellers means that the prices and conditions in the market cannot be controlled by one buyer or seller. The other assumption is that there are zero barriers to entry and exit into an industry by firms, this means that the market supply and demand depends ion the nature of market where if only some firms controlled the market than competition will be limited and prices determined by the firm in the industry. The other assumption is that consumers have knowledge regarding prices in the market. This means that a consumer has information regarding the quality and price of a product and therefore firms will compete in the market to meet consumer price and quality requirements. Therefore the capitalist society is characterised by competition and this competition leads to the proper allocation of resources of production, the other systems have limited competition where in the socialist society no competition is evident because this system is based on equality philosophy. Motivation: The capitalist society through its competitive nature helps in promoting increased production and innovative ideas. The nature of the capitalist society motivates individuals to involve themselves in production activities unlike other forms of economic organisation. Given that production resources are scarce the individuals in the economy will compete

Thursday, July 25, 2019

Little Big Man Movie Review Example | Topics and Well Written Essays - 750 words

Little Big Man - Movie Review Example The movie contains some uncertainty. The character, Younger Bear’s search for success goes to the extent of making him a warrior who is contrary. The Younger Bear is a warrior who does everything in reverse except when he is battling. The contrary warrior dries his body with water after washing himself with dirt. He also rides his horse rearwards. The portrayal of the warrior as a contrarian depicts the need for people to be unique from the rest of the population. This contrarianism depicts the Younger Bear as one of the most fundamental component of the community. This duty makes the warrior perform every action in a different way than what is inevitable. In my opinion, the contrary warrior wishes to be different from other people. The different behavior and the way of acting by the contrast warrior defy the norms in the society. This contradiction makes an observer feel like the Younger Bear’s society traditions are imprudent. Nonetheless, the contrary warrior has a responsibility of teaching others. He depicts the wrongs involved in doing things in a manner that is usual. Additionally, he illustrates how to do ordinary things in a way that is wrong. The contrary warrior also dresses in a different way from other people in the community. This is, time and again, improper or unusually extreme to dressing that is ordinary. For an individual to comprehend the community’s characteristics, he or she has to understand the essential role played by the contrary warrior. The two spirit man, who contains the spirit of a man and a woman, is highly respected by the members of the tribe. The indigenous people have an enlightened view of the two spirit man. The portrayal of the two spirit man depicts him as containing two spirits that occupy his sole body. The two spirit man’s way of dressing that contains a mixture of male and female elements depict the active task he has in the community. In my

Wednesday, July 24, 2019

Taxation and you must use Ireland taxation to do this essay

Taxation and you must use Ireland taxation to do this - Essay Example Failure to retain it, it will expose Sonya to parents original CGT that was evaded by Retirement Relief and any CGT liability on their own disposal. This implies that there will be no capital gains tax liability when Tom transfers the business to Sonya. Disposal of shares in family trading company to Sonya will require standard qualifying conditions, control voting rights requirement and working directorship for 10 year and 5 year periods. Sonya must also own 25% or more of the voting rights in the company or own 10% or more of the voting rights in the company. In addition, the family must own 75% or more which includes the individual’s own 10% throughout the 10 year qualifying period. ii) The transfer of the business to the local businessman is also qualifying since Sonya is above 55 years and it involves the transfer of shares in the family trading company. Disposal to others are exempt from CGT if the gross sales proceeds from qualifying assets during the individual’s lifetime from the age of 55 onwards does not exceed â‚ ¬750,000. In the case of sale to the local businessman, the amount of 850,000 exceeds the set limit of 750,000. The capital gains tax liability will be calculated as follows b) If Tom transfers his business to his daughter, there will be no capital gains tax liability, but when he sells the business to the local businessman there is a capital gains tax liability of 50,000. This can be analyzed in the sense that an increase in the capital gains tax liability minimizes tax liabilities. Therefore, Tom should consider selling the business to the local businessman so that he can minimise the tax liabilities. It will also help to minimise the requirements of directorship and control of voting rights. There is no consideration if Sonya agrees with Tom to take over the business now since it is within the family and she has worked for 5 years plus the current year. However, if Sonya

Tuesday, July 23, 2019

The most importnt issues or problems in Humn Resources in the United Essay

The most importnt issues or problems in Humn Resources in the United rb Emirtes t the present time - Essay Example ccording to n estimte by the l-Iktissd Wl-ml (1997) mgzine, no less thn 95 per cent of the new jobs in the 1995-2000 period were in the privte sector. There re four interrelted resons for the privte sector's resistnce to Emirtistion. The first fctor is lbour cost. The influx of chep foreign lbour during the pst three decdes led to the development of lbour-intensive privte sector, whose continued profitbility hinges on being given free hnd in the utilistion of foreign workers. lthough, since the mid-1990s, United rb Emirtes hs incresed the cost of the ltter by introducing compulsory helth cre for foreign workers, locl workers still re very much more expensive to hire (Fshoyin, 2000). It hs further been lleged tht locls will demnd bout six times the slry skilled foreign worker would be prepred to ccept nd 'will not work s hrd' (Fshoyin, 2000). Foreign workers from developing countries ccept reltively low slries becuse they cn still ern more thn they could ern in their home countries. Furthermore, the mjority of foreign workers re young mle bchelors nd therefore do not hve fmily to support. For locl workers, however, the high cost of living in United rb Emirtes mkes the level of wges offered by the privte sector in cpble of providing n cceptble living stndrd for locl workers (tiyyh, 2003). Second, socil nd culturl perceptions towrds... In United rb Emirtes, the type of work, sector of employment nd socil interctions t work determine the socil sttus of the worker nd his fmily (Mellhi, 2000). Hence, workers plce gret del of importnce on the effect of their work on their socil recognition. For instnce, most of the jobs in the privte sector re mnul jobs which rb Emirtes society holds in low esteem. Even before the influx of foreign workers, these jobs were llocted to people with low socil sttus nd socil interctions with them were severely restricted. tiyyh (2003) reported tht in rb Emirtes: For youngsters leving school the brriers ginst desirble creer pths re lmost mythicl. They will not ccept jobs s slesmen becuse this does not befit their socil sttus; they will not tke workshop jobs where there is thret of physicl dnger. Low slries re n insultthe rb Emirtesyouth hs too much pride to swllow.The third fctor is discipline nd control. Reserch on the mngement of foreign workers in United rb Emirtes supports the view tht foreign workers re esier to control nd more disciplined thn locl workers (tiyyh, 2003). This could be result of the fct tht work permits in United rb Emirtes re often vlid for one yer nd foreign workers do not qulify for permnent residency or nturlistion, regrdless of the length of their sty, therefore employers hve few obligtions towrds foreign workers who cn be lid off nd sent home t short notice. In ddition, foreign workers hold work permits for specific occuption with specific employer nd therefore they cnnot move freely between employers or sponsor wit hout the consent of their employer or sponsor-Kfeel. Hence, lbour turnover nd job-hopping mong foreign workers do not exist. Tble 1: Comprison between HRM prctices for United rb Emirtes HR nd

Study Guide Essay Example for Free

Study Guide Essay Why is Fort Sumner signi? cant in relation to the Civil War? 2. List advantages held by the Confederates at the beginning of the Civil War? 3. List advantages held by the Union at the beginning of the Civil War? 4. Identify a copperhead. 5. Identify writ of habeas corpus. Why did President Lincoln suspend this during the war? 6. What were the three parts to the Union military strategy known as the anaconda plan? 7. Why was the confederate General Stonewall Jackson successful at the ? rst Battle of Bull Run? 8. Identify Union General, George McClellan 9. What was the purpose of the Emancipation Proclamation? 0. Describe the Economy of the north during the Civil War. 11. List hardships experienced by soldiers during the Civil War? 12. What is Andersonville? 13. Who did President Lincoln name as commandeer of union troops from 1864 to the end of the war? 14. Why did General William Sherman burn the city of Atlanta in 1864? 15. Identify Sherman’s March to the Sea. 16. Describe â€Å"total war† 17. What did the Democratic platform consist of during the presidential election of 1864? 18. Why is Appomattox Courthouse signi? cant during the Civil War? 19. Who was the President of the United States during the Civil War? 20. How did John Wilkes Booth impact the history of the United States? 21. Identify the Battle of Shiloh. 22. Identify the Battle of Atlanta. 23. Identify the Battle of Antietam. 24. Identify the Battle of Gettysburg. 25. Identify the Battle of Vicksburg. 26. List characteristics of the Civil War. 27. What was the purpose for the Gettysburg Address? 28. Who was the President of the Confederate States of America? 29. List characteristics of the Union. 30. What was the signi? cance of the 54th Massachusetts during the Civil War? 31. List characteristics for Abraham Lincoln. 32. Know general facts about the Civil War.

Monday, July 22, 2019

The Future of the Middle East Essay Example for Free

The Future of the Middle East Essay The repercussions in the wider Middle East should have spurred more emphasis on the other nations. When the United States decided to invade Iraq in 2003, the whole of the Middle East underwent numerous changes. Some of the more secured regimes were actually discredited with quite important examples of the inability of these countries in their abilities to cope with the crisis. The entire region was thrown into an atmosphere of anti-Americanism. Robin Wright’s â€Å"Dreams and Shadows† captures the future of the Middle East, veering away from the more controversial war in Iraq and its consequences. It is able to describe the struggles of the people in Iran including other countries such as Morocco. She airs what others are not able to say, giving her an edge as she naturally has an access to the inner chambers of the experiences and journeys, with her journalistic experience to her credit. Vicariously, readers were able to glean her many experiences such as when she was present when the ruins of the United States Embassy in Beirut stood before her, knowing that there were 60 Americans who had been killed then by a suicide bomber. She ponders that at that time, she felt that the Islamic fundamentalists had the upper hand and who dominated the future of the region. Today, she speaks her heart all too willingly as she says that Islamic extremism is no longer the most important, interesting and dominant force in the Middle East. This book speaks of the different stories that relate to the brave reformers in terms of their human rights. She knows that there is a culture of change that is represented by the different upright persons who cause a change in the system. Those who have tried to achieve some changes are, sadly, just the religious movements such as the Hamas in Gaza and the Hezbollah in Lebanon. The recent events have convinced leaders that these suicide bombers are part of the dangerous trend of events. The author examines the reasons why the moderate reformers have been unsuccessful in the way they have acted in the Middle East. Wright gives a tug to the heart in her book as she narrates the heroes and heroines who publicly denounce inhumanity. She suggests how these autocratic regimes in the Middle East have been quite corrupt in the way they have run their governments. She looks at the different ethical dilemmas that arise at all levels. Individuals are often faced with ethical questions. More often than not, the answers to these questions are difficult because it involves weighing of values. Conflicting values in a given situation are not capable of compromise. One has to choose one over another. Sometimes, the ethically correct course of action is clear, and hopefully individuals act accordingly. But the answers are often not simple. The availability of weapons of mass destructions from rogue states is an alarming reality today, which maybe used against countries that adopt democracy as a way of life. This makes terrorism not only a threat to democracy, but also to the stability of the world as a whole, and most importantly, the preservation of human race. After the bombings, the border restrictions and protections in different nations were questioned. How did it come to be that the suspected hijackers managed to obtain visas easily and to use them freely? Thus, the U. S. –Mexico border was rigorously restricted but, quite confusingly, fewer restrictions were placed upon European, Asian and Middle-Eastern countries, resulting in hundreds of non-immigrants passing through the country where the government had no actual control. They were allowed to engage in activities in violation of their visas. Over and above that, a major aspect seriously affected by the actions taken by the government against terrorism was the civil liberty. What is to be noted is the different target areas that need to be address. She sees the potential for a meeting of the minds between the Hamas and the Fatah so that there will be democracy in Palestine. After the 9/11 bombings, the nation was swept with investigations and questionings. Many, mostly from the Middle-East communities were arrested and detained. There were people who were secretly indicted just because of several false statements in their Social Security card application; statements they made because they needed to work. A great number of the detained suspects of the 9/11 bombings, including the suspected terrorist group members and supporters of terrorist groups, cannot be charged with any crimes because of lack of evidence or the prosecutors could not really indict them with anything based on the 1996 Anti-Terrorism and Effective Death Penalty Act. Still, they were â€Å"jailed for â€Å"questioning† or as material witness, detained on â€Å"immigration holds. † Because they have not been charged with any crimes, the victims of the Government’s post-September 11 nation-wide dragnet have few constitutional protections, and for the most part are unable to defend themselves because there are no known charges to defend against. The Government refused to release the names of the detained, the reasons for the arrests and where they were being detained. It was obvious the detainees had no access to representation. A new rule was issued by the Department of Justice giving INS the power to decide whether to release the immigrant detained on a reasonable bail or not. The stay of release was affected until the Attorney General reviews the case and determines appropriate action, which could happen in months, even years Indeed, Wright brings to question the array of ideas that make the region possess a rich past. What is to be noted is the different target areas that need to be address. She sees the potential for a meeting of the minds between the Hamas and the Fatah so that there will be democracy in Palestine. REFERENCES The New York Times. Retrieved Jan. 20, 2009 at: http://www. nytimes. com/2008/03/02/books/review/Cockburn-t. html? _r=1 Wright, Robin. Dreams and Shadows: The Future of the Middle East. Penguin Press HC, The (February 26, 2008)

Sunday, July 21, 2019

Packet Sniffing Software Is A Controversial Subject Information Technology Essay

Packet Sniffing Software Is A Controversial Subject Information Technology Essay Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to sniff out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave Busters, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. Definitions A packet sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when an attacker monitors network packets, modifies them, and inserts them back to the network (Whitman, et al., 2008). For example, a MITM attack could occur when two employees are communicating by email. An attacker could intercept and alter the email correspondence between each employee, without either knowing that the emails had been changed. MITM attacks have the potential to be a considerable threat to any individual or organization since such an attack compromises the integrity of data while in transmission. Packet sniffing programs work by capturing binary data that is passing through the network, and then the program decodes the data into a human-readable form.   A following step called protocol analysis makes it even easier for the data to be read.   The degree of these analyses varies by individual packet sniffing program. Simple programs may only break down the information in the packet, while more complicated ones can provide more detailed information and analysis, for example, by highlighting certain types of data such as passwords that pass through the network (Packet Sniffing, Surasoft.com, 2011). As for todays networks, switch technology is commonly used in network design. This technology makes it increasingly easy to set up sniffing programs on servers and routers, through which much traffic flows. In addition, there are already built-in sniffing modules being used in todays networks. For example, most hubs support a standard called Remote Network Monitoring (RMON). This kind of standard allows hackers to sniff remotely with the SNMP (Simple Network Management Protocol), used in most network devices, and only requires weak authentication. Network associates Distributed Sniffer Servers are used by many corporations. These servers are set up with passwords that are quite easy to guess or crack. In addition, computers with Windows NT system usually come with Network monitoring agent, which also allows remote sniffing (Packet Sniffing, ISS.net, 2011). Essentially, these sniffing programs are set up for the use of network administrators. However, the threat exists that hackers ca n gain access to the network and view the program logs. Packet sniffers capture all of the packets that travel through the point where the sniffer is located.   For example, if the program was installed next to the server of an organization, the user could have access to all the data being transferred across the company through that server.   Typical types of packets intercepted by attackers include the following: SMTP (email): The attacker can intercept unencrypted emails (Packet Sniffing, ISS.net, 2011). HTTP (web): Web traffic information and history can be easily captured (Packet Sniffing, ISS.net, 2011). Telnet Authentication: Login information to a Telnet account can be intercepted (Packet Sniffing, ISS.net, 2011). FTP traffic: Access to an FTP account can be sniffed in cleartext (Packet Sniffing, ISS.net, 2011). SQL database: Information from web databases is also vulnerable (Packet Sniffing, ISS.net, 2011). Functionality and Possible Uses of Packet Sniffers Good and Bad Uses Like any tool, a packet sniffer is a double-edged sword because it can be used for good or bad purposes (Orebaugh, Ramirez, and Beale, 2007). It can be used by security professionals to investigate and diagnose network problems and monitor network activity (Orebaugh, et al., 2007). Conversely, it can be used to eavesdrop on network traffic by hackers, criminals, and the like, who can use the data gathered for harmful purposes (Orebaugh, et al., 2007). Professionals such as system administrators, network engineers, security engineers, system operators, and programmers use packet sniffers for a variety of uses, including troubleshooting network problems, figuring out system configuration issues, analyzing network performance (including usage and bottlenecks), debugging during the development stages of network programming, analyzing operations and diagnosing problems with applications, and ensuring compliance with company computer usage policies (Orebaugh, et al., 2007). Good: Troubleshoot Network Problems When an error occurs on a network or within an application, it can be very difficult for administrators to determine what exactly went wrong and how to correct the error. Many consider the packet sniffer to be the best tool for figuring out what is wrong with programs on a network (Neville-Neil, 2010). Examining packets as a starting point for solving problems is useful because a packet is the most basic piece of data and holds information, including the protocol being used and source and destination address (Banerjee, Vashishtha, and Saxena, 2010). Basically, at the packet level of analysis, nothing is hidden when all layers are visible (Neville-Neil, 2010). Understanding the timing of what happened is another important factor in debugging network problems (Neville-Neil, 2010). This information can be easily attained by using a packet sniffing program. Essentially, packet sniffers allow you to find out the who, what, and when of a situation, all of which are vital to understanding how to fix a problem (Neville-Neil, 2010). Once these things are known, the administrator can determine what is causing the problem and how to go about fixing it. As soon as a problem occurs, the first recommended step is for the network administrator to use a packet sniffing program to record all network traffic and wait for the bug to occur again (Neville-Neil, 2010). If the administrator already had a packet sniffing program with logging in place, then he or she could go back and examine the log records. Assuming the administrator did not have a log previously set up, the next step would be to only record as much information as necessary to repair the problem (Neville-Neil, 2010). It would not be a good idea to record every single packet of data because if too much data is collected, finding the error will be like finding a needle in a haystack although the administrator has likely never seen a haystack that big (Neville-Neil, 2010). For example, recording only one hour of Ethernet traffic on a LAN will capture a few hundred million packets, which will be too large to sort through (Neville-Neil, 2010). It goes without saying that the admini strator should not record the data on a network file system because the packet sniffer will capture itself (Neville-Neil, 2010). Once the data is recorded, the administrator can examine the packets to analyze and understand what occurred to solve the problem. Good: Network Optimization In addition to solving network communication problems, packet sniffers can help administrators plan network capacity and perform network optimization (Shimonski, 2002). A packet sniffer allows users to view data that travels over a network packet by packet (Shimonski, 2002). However, rather than having to examine each packet, the appropriate sniffer program will perform the analysis for the administrator. The tools are especially useful because depending on the packet sniffing program used, the packet data will appear in an easy-to-understand format. Packet sniffers can often generate and display statistics and analyze patterns of network activity (Shimonski, 2002). Data can appear in graphs and charts that make analysis and comprehension easy. Additionally, the network administrator can filter by selected criteria to capture only the relevant traffic rather than having to sort through irrelevant data (Shimonski, 2002). Knowing what programs and which users use the most bandwidth can help administrators manage resources efficiently and avoid bandwidth bottlenecks. Good: Detect Network Misuse Packet sniffers can be used to monitor application traffic and user behavior (Dubie, 2008). This can be used to detect misuse by company employees or by intruders. To use a packet sniffer to monitor employees legally, a network administrator must do three things. First, he must be on a network owned by the organization, second, he must be directly authorized by the networks owners, and finally, he must receive permission of those who created the content (Whitman, et al., 2008). Permission by content creators is needed because packet sniffing is a method of employee monitoring (Whitman, et al., 2008). Typically, an employee will sign a release form when first employed that allows the employer to monitor the employees computer usage. By using a packet sniffer, employers can find out exactly how each employee has been spending his or her time. Packet sniffers can be used to see all activity and administrators can monitor for behaviors such as viewing inappropriate websites, spending time on the job on personal matters, or abusing company resources. For example, a packet sniffer program could show that a particular employee was downloading music at work, both violating organizational policies and using a large amount of network bandwidth (Dubie, 2008). Packet sniffers are also used to detect network intrusion, log traffic for forensics and evidence, discover the source of attacks such as viruses or denial of service attacks, detect spyware, and detect compromised computers (Orebaugh, et al., 2007). A packet sniffer and logger that can detect malicious entries in a network is a form of an intrusion detection system (IDS) (Banerjee, et al., 2010). The packet sniffer IDS consists of a database of known attack signatures. It will then compare the signatures in the database to the logged information to see if a close match between the signature and recent behavior has occurred. If it has, then the IDS can send out an alert to the network administrator (Banerjee, et al., 2010). Despite this use of packet sniffers to detect intrusion, hackers have methods of making themselves very hard to detect and can use packet sniffers for their own advantages. Bad: Gain Information for Intrusion Intruders maliciously and illegally use sniffers on networks for an innumerable number of things. Some of the most common are to capture cleartext usernames and passwords, discover usage patterns of users, compromise confidential or proprietary information, capture voice over IP (VoIP) telephone conversations, map out a networks layout, and fingerprint an operating system (Orebaugh, et al., 2007). The previously listed uses are illegal unless the user is a penetration tester hired to detect such types of weaknesses (Orebaugh, et al., 2007). An intruder must first gain entry to the communication cable in order to begin sniffing (Orebaugh, et al., 2006). This means that he must be on the same shared network segment or tap into a cable along the path of communication (Orebaugh, et al., 2007). This can be done in many ways. Firstly, the intruder can be physically on-site at the target system or communications access point (Orebaugh, et al., 2007). If this is not the case, the intruder can access the system in a variety of ways. These include breaking into a certain computer and installing sniffing software that will be controlled remotely, breaking into an access point such as an Internet Service Provider (ISP) and installing sniffing software there, using sniffing software that is already installed on a system at the ISP, using social engineering to gain physical access to install the software, working with an inside accomplice to gain access, and redirecting or copying communications to take a path that the intruders comp uter is on (Orebaugh, et al., 2007). Intruders can use sniffing programs designed to detect certain things such as passwords and then use other programs to have this data automatically sent to themselves (Orebaugh, et al., 2007). Protocols that are especially vulnerable to such intrusion include Telnet, File Transfer Protocol (FTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP), Simple Mail Transfer Program (SMTP), Hypertext Transfer Protocol (HTTP), Remote Login (rlogin), and Simple Network Management Protocol (SNMP) (Orebaugh, et al., 2007). Once the intruder has access to the network, he can collect data and use it as he likes. Common examples of stolen data include credit card numbers and proprietary organizational secrets, but include anything the hacker desires. Although organizations may use a primarily switched network, they are not protected from sniffer attacks because many programs exist that allow packet sniffing in a switched network (Whitman, et al., 2008). Because intruders who use packet sniffers do not directly interface or connect to other systems on the network, they are considered to be a passive-type of attack (Orebaugh, et al., 2007). It is this passive nature that makes sniffers so difficult to detect (Orebaugh, et al., 2007). In addition to this, hackers use normally use rootkits to cover their tracks so that their intrusion will not be detected (Orebaugh, et al., 2007). A rootkit is a collection of Trojan programs hackers use to replace the legitimate programs on a system so that their intrusion will not be detected (Orebaugh, et al., 2007). Rootkits replace commands and utilities that the hacker inputs and clears log entries so that there will be no record of his entry (Orebaugh, et al., 2007). Though it is difficult, there are some ways to detect rootkits. Methods of detection include using an alternate, trusted operating system, analyzing normal behaviors, scanning signatures, and analyzing memory dumps (Rootkit, Wikipedia , 2011). Removing rootkits can be very complicated and difficult and if the rootkit is in the central operating system, reinstalling the operating system may be the only option (Rootkit, Wikipedia, 2011). The threat of eavesdropping by intruders is large and challenging. However, there are some defenses that can be taken to prevent hackers from using packet sniffers against an organization. Protecting Against Packet-Sniffers and Man-in-the-Middle Attacks Packet sniffing and man-in-the-middle attacks compromise the integrity and confidentiality of data while in transmission.   Fortunately, there are several techniques that can be used by organizations and individuals to protect against these threats and reduce risk.   Specifically, technology, policy, and education are typically used to cover all aspects of security.    Technology Encryption is the best form of protection against any kind of packet interception (Orebaugh, et al., 2007).   The reason behind this is that even if the data is captured by the packet sniffer, the information is completely unreadable by the attacker (Orebaugh, et al., 2007). By using this technique, messages are encrypted once the data leaves the senders computer.   Both sender and receiver hold a key that decrypts the message being transferred.   Most popular websites apply a level encryption by using the HTTP Secure (HTTPS) protocol.   With this technology, the connection between the web server and the users computer is encrypted; making the information intercepted by a third party useless.   Currently, most popular websites such as Google, Facebook, Yahoo, and Twitter use the https technology.   However, some sites (such as Amazon.com) use https only at the login page and fail to provide a secure connection afterwards.   In order to assure complete security, it is im portant to apply the https protocol throughout the users browsing experience.   The main disadvantage of this feature is that it slightly slows down the users connection.    Email can also be protected from packet sniffers by using encryption.   Email extensions such as Pretty Good Protection (PGP) can be easily implemented using standard email platforms like Microsoft Outlook (Orebaugh, et al., 2007).   Once sender and receiver start using the encryption techniques, intercepted email messages cannot be interpreted by an attacker (Orebaugh, et al., 2007). Another way to protect against sniffers is by using One Time Passwords (OTP). With this method, a different password is sent every time the authentication is requested to the user (Orebaugh, et al., 2007).   Similarly to the case of encryption, if a third party intercepts someones password, this information will be useless since these can only be used once (Orebaugh, et al., 2007).   This technology can be extremely useful to ensure security; however, remembering new passwords for each login can be very challenging and frustrating for most users. A new security technique called quantum encryption is also provides good protection against sniffing attacks.   This technique consists of making each bit of data as small as a photon (McDougall, 2006).   The data is then transferred across fiber-optic lines.   Ã‚  If the information is picked up and intercepted by any kind of packet sniffer, the entire photon message is disrupted, ending up the entire transmission (McDougall, 2006).   A technology like this would make it impossible to intercept information since the communication will be cut in the case of interception.   However, it requires fiber-optic Internet connections, which many service providers do not own and its installation can be expensive. Policy Information security professionals can help secure employees connections by requiring the use of any of the technologies explained before.   For example, if certain employees need to access websites that are outside of the organizations network, they should be allowed to use only websites that use the https protocol such as Google and Yahoo.   Policies requiring Access Control Lists (ACL) can also help prevent sniffer attacks.   All secured networks and assets should be supported by an ACL to prevent unauthorized access.   Additionally, physical security policies should be implemented to efficiently protect the computer and server rooms in the organization.   Unauthorized access to these locations could cause the installation of sniffer programs and equipment. Education Every security initiative should have a training program supporting it.   Basic but regular training sessions given to employees about the dangers of packet sniffing can prove to be very valuable when protecting a network.   Security facts such as not allowing strangers to computer rooms should be explained to all employees. Example and Demonstration of a Packer-Sniffer Program: Wireshark Originally named Ethereal, Wireshark is a free and open-source packet analyzer (sniffer) typically used by network and security professionals for troubleshooting and analysis (Orebaugh, et al., 2007).   However, many potential attackers also use it to perform man-in-the middle attacks and gain information for password cracking.   Wireshark is available for most operating systems (including OS X, Windows, and Linux) and allows users to see all the traffic that goes through a specific network (Orebaugh, et al., 2007). Wireshark differs from other packet-sniffer programs mainly because of its easy-to-understand format and simple Graphical User Interface (GUI) (Orebaugh, et al., 2007).   Wireshark can be easily set up to capture packets from a specific channel.   Once the program is running, all the network packets are shown in the screen.   The top panel (summary panel) shows a summary of the entire packet, including source, destination, and protocol information (Orebaugh, et al., 2007).   Since one quick web browse can provide a large amount of packets, Wireshark solves packet browsing issues by categorizing each packet according to its type and showing each category with a specific color in the GUI.   Additionally, the user has the option of applying filters to see only one type of packets.   For example, only packets dealing with http functions may be shown.   The middle panel in the GUI is called the protocol-tree window. It provides decoded information of the packet (Orebaugh, et al., 2007). Finally, the bottom panel (data view window) shows the raw data of the packet selected in the Summary panel (Orebaugh, et al., 2007).   Figure 1 shows a screenshot of Wireshark while running and graphically shows the three main panels of the GUI. Figure 1 Screenshot of Wireshark while running and the three main panels. To troubleshoot network problems, Information Systems professionals use Wireshark by installing the sniffer program in various locations in the network and seeing which protocols are being run in each location (Orebaugh, et al., 2007).   Additionally, if the sniffer is placed in a location where it can capture all data flowing to the main server, Wireshark can detect network misuse by providing the source and destination of all packets.   For example, if an employee in a company uses his computer to access inappropriate websites, Wireshark will show the employees and the websites IP addresses in the source and destination columns with detailed information about the website in the info column and the protocol tree panel. It is easy to see how useful Wireshark is for network troubleshooting and identifying misuse; however, the program can also be used with malicious intent.   For example, the program can be used to find out passwords on unencrypted websites.   To demonstrate this case, the username john_doe_user and password 123mypasswrd were used to log in to the unencrypted and unsecured www.bit.ly website.   At the same time, Wireshark was set up to capture all packets in the computer.   After the packets were captured by the sniffer, the data can easily be filtered by the http category.   In the info column, a packet labeled POST means that someone has entered text to a website.   After clicking on this specific packet, all the username and password information can be seen in the center section of Wireshark (as shown in figure 2).   Unencrypted and unsecured websites are very vulnerable to these types of attacks.   On the other hand, websites using the https security feature prove to be safer for users.   For example, the same situation as before was applied to the encrypted website www.facebook.com by trying to log in, but Wireshark was unable to capture any packets with login information. Figure 2 Wireshark screenshot showing username and password. Other types of malicious attacks can also be performed with Wireshark.   For example, some toolkit add-ins to Wireshark such as Dsniff and Ettercap can be used to perform man-in-the-middle attacks and password cracking (Orebaugh, et al., 2007).   Even if the incoming data is encrypted, these tools can crack some passwords by using dictionary brute force attacks (Orebaugh, et al., 2007). Case Study: A costly attack at Dave Busters In 2007, the popular restaurant chain Dave Busters experienced the power of malicious packet-sniffing software attacks.   A multinational group of hackers was able to penetrate the companys corporate network and install basic packet-sniffing software at 11 of the chains restaurant locations (Thibodeau, 2008).   During a four-month period, the attackers were able to intercept customer credit card data going from Dave Busters restaurant locations to the corporate headquarters network in Dallas (McMillan. 2008).   Extremely sensitive information such as credit card numbers and security codes were sold to criminals, who used this data to perform fraudulent transactions to online merchants (McMillan, 2008).   The attack proved to be very profitable for the hackers.   For example, from information coming from only one restaurant location, the criminals were able to gain over $600,000 in profits (McMillan, 2008).   It was estimated that approximately 130,000 credit or debit ca rds were compromised by this attack (Westermeier, 2010). To access Dave Busters network, the attackers simply drove around a restaurant location with a laptop computer and took advantage of vulnerable wireless signals to access the computer networks (Westermeier, 2010).   Malicious sniffing software was then installed in the network to intercept credit and debit card information (Westermeier, 2010).   The packet-sniffing software was written by one of the groups hackers and consisted of SQL injection attacks (Thibodeau, 2008).   However, many organizations have stated that the code was not very impressive.   For example, the CERT Coordination Center described the programs source code as a college-level piece of technology (Thibodeau, 2008).   Additionally, the malicious code had one weakness: it would shut down every time the computer that was monitoring rebooted (McMillan, 2008).   Therefore, the criminals had to go back to the restaurant location, gain access, and re-start the packet-sniffer every time this happened. The fac t that this costly program was developed by someone with just basic programming skills and how they consistently gained access to the network highlights the lack of protection of Dave Busters security systems.    According to the Federal Trade Commission (FTC), Dave Busters information security systems and policies did not provide the necessary security features to protect customers information (Westermeier, 2010).   The attackers were able to access the network not just once, but repeatedly over a time frame of four months (Westermeier, 2010).   The fact that the company was oblivious to these multiple intrusions during a long time period proves that they were vulnerable to attacks and that Dave Busters did not apply any Intrusion Detection Systems (IDS) to their networks, nor did they monitor outbound traffic (Westermeier, 2010).   Additionally, sensitive customer information was not given special protection.   Credit card data was transferred across simple unprotected and unencrypted networks (Westermeier, 2010).    What could Dave Busters have done? First of all, private networks should have been protected in a better way.   It was just too easy for hackers to gain access and install malware.   By allowing only a specific group of IP addresses, or granting only temporary access, the firm could have been safe from unauthorized access by strangers.   But even in the case of hacker access, tools such as IDS can help monitor the network during an attack.   If the company had implemented an IDS in their network, the unauthorized intruders would have been detected in time to prevent losses. Additionally, by treating sensitive data differently than regular communications, the company could have considerably reduced the threat.   Dave Busters could have simply used readily available firewall systems to the networks that held customer data (Westermeier, 2010). Encryption devices could have also proven to be useful.   If link encryptors had been used, the intercepted data would have been completely useless for the hackers.   Data isolation could have also been useful.   The firm could have separated the payment card systems from the rest of the corporate network (Westermeier, 2010). Sensitive information did not necessarily require connection to the Internet; so the company should have separated these transmissions from the network. Finally, a general company-wide policy requiring access restriction, IDS installation, firewall usage, and sensitive data isolation throughout all restaurant locations could have been extremely useful.   A uniform and thorough information security policy along with a comprehensive training program given to specific employees would help enforce the security features.   Considering that Dave Busters had not implemented any of the security features explained in this section, it is obvious that their story would have been different if these techniques had been used. Conclusion Packet sniffing is a sophisticated subject that wears two hats. It can be used for either good or evil depending on the intentions of the person using the program. It can help with analyzing network problems and detect misuses in the network for good purposes. Meanwhile, it can also help hackers and other cyber-criminals steal data from insecure networks and commit crimes, as in the case of Dave Busters. The best way to protect data from being sniffed is to encrypt it. Necessary policies and training also help with the protection. As technology evolves, there will be more and more ways to commit cyber crime. Extremely sensitive data like credit card information and health care data should be well protected, from the perspectives of both the business and personal. In order to protect this information, organizations and individuals must be aware of the threat of packet sniffers.

Saturday, July 20, 2019

Community Service Essay -- Volunteering Volunteerism Essays

Community Service I have always been involved in groups that perform community service projects. In fact, I was recently elected to as VP of Public Relations of the Student MOVE group. We are a group of 12 individuals that are the advisory committee for all of the community service organizations on campus, but we organize many alternative activities and events. I even did a service learning project for my Spanish class last semester with Cynthia Wells. I attended the Spanish mass every Sunday, and I was a greeter. I learned their culture and rituals while still attending the usual Catholic Mass. Upon learning that I had to do a service learning project for Ethics class, I immediately began brainstorming ideas. I decided I was going to work on a website for the Esprit De Corp group since they could not find anyone to do it. However, I ended up getting paid for so that did not work out. So I had two back-up plans. My first idea is that I was going on an AWOL trip for Spring Break. AWOL stands for Alternative Weekend of Offsite Learning. We spent a week in Denver doing various community service projects. Now, that was a week of community service, but it wasn’t done in Iowa. So I took the initiative of doing some service in Storm Lake. One day after mass at St. Mary’s Catholic Church, Fr. Klein approached me. He asked me if I wanted to help out by leading a confirmation retreat for 90 Storm Lake juniors that would be confirmed in a couple of weeks. I figured it would be a perfect opportunity to help out the community and maybe even help myself spiritual ly. AWOL Trip to Denver I was one of twelve kind-hearted individuals that went on an AWOL trip to Denver, Colorado. We worked at various places includ... ...Denver. It’s a priceless moment that money cannot buy. Working at the confirmation retreat at St. Mary’s taught me how to help carry on my faith as a Catholic. The church is a non-profit group just like any other non-profit group here in Storm Lake. I must say that helping people my own age is much different than helping children. I did not get the smiles like I did working with the children. However, I received a ton of self-satisfaction giving the speech on confirmation. I also understood more about motivation. I am pretty intrinsically motivated. I do not need money, bribes, or incentives to do work. I get can motivate myself to help others with self-satisfaction. I really enjoyed the service learning projects I participated in. I wish more professors made their students extend their learning beyond the classroom and move it out to the community.

LL Bean :: essays research papers

LL Bean: A Strategy For The Future Leon Leonwood Bean, known as L.L., was born in the small township of Greenwood, Maine, in 1872. He was raised on a set of simple yet powerful principles†¦ Nature was something to be revered. Family ties were a priority. Being neighborly was a matter of course. And "do unto others" was more than just a saying; it was a way of life. When L.L. launched his company with the first Maine Hunting Shoe in 1912, he believed so strongly in the Golden Rule that he made it the foundation of his business. This rule "Sell good merchandise at a reasonable profit, treat your customers like human beings, and they will always come back for more" became the foundation of the company. For the next fifty years, Bean forged a business, selling clothing and related gear tailored specifically for people who enjoyed the outdoors. Products including boots, clothing, canoes, fly reels, tents and camping gear became the cornerstone of the company. Bean stated, †I attribute our success to the fact that, to the best of my judgment, every article we offer for sale is practical for the purpose for which we recommend it.† (1)The company sold products through both the store in Maine, and through a growing store catalog. Bean retained active control over his company until he died in 1967 at the age of 94. Leon Gorman took over the business after Bean’s passing in 1967. Although he sited his grandfather as being happy with the size of the company, Gorman was ready for growth. He accomplished this by incorporating technology wherever he could, and expanding product lines, introducing new catalogs for specific markets, and entering foreign markets. Even with this extensive growth, Gorman remained true to the founders values of high quality products, superior customer service, and the company guarantee to replace or refund on any purchase that a customer found unsatisfactory. Gorman realized that building on the L.L. Bean brand would be critical to the success to the company. The company’s goal was to associate the brand name with the image of â€Å"Maine’s natural beauty†, along with the legend of the company’s founder. These efforts led the company thirty years of 20% annual growth. Most impressive is the fact that the company was able to finance this growth internally, ad remain privately held by family members. When Gorman took the position of Chairman in 2001, Chris McCormick became the first non-family member to run the company, taking over the role of President and CEO.

Friday, July 19, 2019

Proposal for a Sustainable Forestry Management Policy Essay -- Proposa

Proposal for a Sustainable Forestry Management Policy Forests are an invaluable natural resource with multiple conflicting uses. When left to stand, forests help conserve biodiversity, stabilize the environment and control erosion; when logged, they provide building materials, fuel and agricultural land for human use. The challenge is to find an equilibrium between these uses: in other words, to make the transition toward sustainable forestry management. Unfortunately, poverty has driven people in developing countries to clear-cut large tracts of land, while instability and corruption have rendered developing country governments powerless to stop illegal logging and trade in illegal forest products. The results have been staggering. The World Resources Institute recently reported that tropical regions have been deforested at an alarming rate of 1% annually since 1985; in some countries, the rate has spiraled to over 7% per year (1). Much of this deforestation is linked to the illegal trade in forest products. Greenpeace estimates that up to 80% of all logs cut in the Brazilian Amazon are extracted illegally; the estimate is 70% for Indonesia (2). In order to fight the problem of illegal logging and trade, I propose the following package of policy actions. First, to change US government procurement policy to prefer timber from sustainably managed forests; second, to provide technical assistance to help developing countries with forestry management; and third, to promote a national eco-certification system for sustainably managed forestry products. FIRST, the US government shall adapt its timber procurement policy to give preferential treatment to forest products certified to meet sustainable management criteria. In t... ...rg (6) ISO 14001, 14061: http://www.iso.ch (7) "ISF Smartwood Certification," http://www.isf-sw.org/cert.htm (8) Environmental Protection Agency, Climate Protection Division. "The Power to Make a Difference." 1999 Annual Report on EnergyStar. http://www.epa.gov/appdstar/pdf/cpd99brief.pdf (9) American Forest and Paper Association. "U.S. Forest Products Industry Competitive Challenges in a Global Marketplace." http://www.afandpa.org/legislation/legislation.html (10) Rotherham, Tom. "Selling Sustainable Development: Environmental Labeling and Certification Programs." In "Environmentally Sound Trade Expansion in the Americas," University of Miami, 2000. (11) WTO Agreement on Technical Barriers to Trade (12) Dawkins, Kristen. "Eco-Labelling: Consumers' Right to Know or Restrictive Business Practice?" Institute for Agriculture and Trade Policy, 1996.

Thursday, July 18, 2019

Dow’s Bid for Rohm and Haas Essay

Dow started as a manufacturer of commercial bleach in 1897, and was founded by Herbert Dow. He merged his company in 1900 with Midland Chemical, which lead to diversification of his portfolio to agricultural and food products. In 1912, Dow started to pay dividends every quarter without any reductions or interruptions. By doing so, they were the only Fortune 200 firm that established these figures. Dow became a major player in the M&a field, since they acquired between 1983 and 2007 95 business, took stakes in 58 firms and divested 166 businesses. In 2006, Dow’s CEO Andrew Liveris announced the ‘Dow of Tomorrow’ strategy, which consisted of two pillars. One was pursuing an asset light approach to its commodity business. In order to do so, he signed a JV agreement with a subsidiary of the Kuwait Petroleum Company, named Petroleum Industries Company. Dow and PIC signed a Memorandum of Understanding, which generated Dow a $7.2 billion after tax revenues. Second, Mr. Liveris wanted to build a high-growth and high-value added performance business. In order to achieve this objective, Dow agreed to purchase Rohm and Haas. This acquisition had the purpose for Dow to become a producer of high-value chemicals and advanced materials. Why does Dow want to buy Rohm and Haas? As mentioned in the introduction, CEO Andrew Liveris announced the ‘Dow of Tomorrow’ strategy. This included becoming a high growth and high-value added producer of specialty chemicals, with less cyclicality. Rohm and Haas fitted the picture perfectly, since they were an advanced material and specialty chemicals company, operating in 27 countries. Besides the interesting company profile description, there were several other reasons  why Dow was interested in the Rohm and Haas company. Most important reason was that the acquisition would make Dow reduce its cyclicality and increase its growth prospects. Expanded product portfolios, increased geographic market, improved market channels and innovative technologies will obtain the expected growth and cost synergies. Forecasts predict additional growth synergies values between $2.0 and $2.6 billion and $0.8 billion costs synergies, including shared services and governance, manufacturing, supply chain and work process improvements. Besides the above-mentioned advantages, Dow and Rohm could be a global leader in specialty chemicals and advanced materials if they combined forces. Also by combining their R&D, the development of new products and innovations could be stimulated. So overall, Rohm and Haas fitted the picture projected by Andrew Liveris perfectly. Rohm and Haas supported Dow’s commitment to maintain their highest standards in pursuing and selecting growth opportunities to satisfy their long-term shareholder values. Was $78 per share a reasonable bid? In order to draw a conclusion of the reasonability of the bid, we need to valuate Rohm and Haas as a firm with and without the synergies created by the acquisition. If this total value exceeds the $78 share price, Dow will pay the price, since it will be beneficial for them. The benefits of the synergies can be calculated by dividing it between the two firms on a multiple or 50/50 basis. The excel file attached to the assignment contained a WACC of 8,5% based on a tax rate of 35%. In our analysis, we also calculated a WACC with a tax rate of 26%, since this was the average tax rate. This leads to a WACC of 8,7%. As a basis, we took 2% growth. Rohm and Haas had at time of the acquisition 195,200,000 shares outstanding. From the balance sheet of Rohm and Haas 2008H1, we took the values of cash and debt (long and short term debt). Both inputs were needed in order to calculate the share price. Below, you can find how we calculated the share price for the situations with and without synergies. The synergies involved consist of two different types, namely growth and cost synergies. Growth synergies include expanded product portfolios, increased geographic reach, improved market channels and innovative technologies. These synergies are expected to create between 2 and 2.6 billion dollars, which gives an average of 2.3 billion. Second, potential cost synergies consist of purchasing synergies, shared services and governance, manufacturing & supply chain improvements and work process optimization. These synergies are expected to generate 0.8 billion dollar. The values of these synergies combined totals a 3.1 billion dollar gross benefit, which is a netted by deducting the 1.3 billion cost of implementation, leaving a value of 1.8 billion dollars. In order to make the most suitable valuation and draw the best conclusion for the reasonability of the share price of $78, we take the original and revised forecast into account. Both cases are also used for the sensitivity analysis to be as specific as possible. Below are the sensitivity analyses of Rohm and Haas for the original forecasts. Based on our assumptions, share price of Rohm and Haas is $55.79 without synergies and $65.01 with synergies. These values differ a little from the share price we found in our valuation analysis, however this is due to rounding and number of decimals difference in WACC and growth percentages. Lowest value without synergies is $47.10 with a growth of 1% and a WACC of 9% and a highest share price of $95.58 with a growth of 3% and a WACC of 7%. If we now look at the original forecast with synergies, we see an increased share price, which is logical, since value is created by the synergy. The share price of Rohm and Haas is $65.01 based on the growth rate of 2% and a WACC of 8.7%. The share price differ between lowest value of $56.32 and highest value of $104.80, based on the same input as with the analysis with no synergies. In both cases, the share price is below $78 so if Dow offers this price in both situations, the will not profit from this acquisition. However, we will still perform the 50/50 and multiples valuation in order to see which is the best in the situation if Dow is obliged to acquire Rohm and Haas. Looking at  case were synergies are created and using the 50/50 method, we get a share price of $55.79 + ($65.01 – $55.79)/2 = $60.4. As we already mentioned, this price does not match the $78. Now using the gross profit of Rohm and Haas as a percentage of the gross profit of both companies combined, we get a multiple of 26.11%. Using this 0,2611 multiple, the appropriate share price is $55.79 + (0,2611 * (65.01 – $55.79)) = $58.20 Again, this is below the share price of $78, which makes the outcomes of both methods unfavorable for Dow. Now let us look at the revised forecast. Since this is a post-crisis forecast, predictions were lowered, which lead to a lower overall value. Hence, this will be reflected in our sensitivity analysis by lower share prices. Below are our findings. As already predicted, share prices are lower in the revised forecast due to the crisis adjustments. For the sake of the case, we will also perform a 50/50 and multiples calculation. If we look at the 50/50 share price, we get a share price of $41.38 + ($50.60 – $41.38)/2 = $45.99. The multiples basis will give us a share price of $41.38 + (0,2661 * ($50.60 – $41.38)) = $43.79. Reviewing both forecasts and within these forecasts both with and without synergy, we can conclude that a share price of $78 is not reasonable. This conclusion holds in the case of 50/50 and multiples calculations. Major deals risks and allocation We will pay special attention to Exhibit 4 when examining the major risks and their respective allocations. The first risk comes from the item 1.01 describing the financing of the deal. Dow will issue a fixed amount of $4 billion in convertible preferred stocks to Berkshire, Hathaway and Kuwait Investment Authority. This amount is independent of the current stock price of Dow, meaning that a drop in Dow’s share price would need more shares to pay for the deal, decreasing the relative voting rights of current shareholders. To be even more precise, in paragraph 2.1a it states that no matter what happens Dow has to pay $78 dollar per share at the time of the merger, transferring all the financial  risk to Dow. Furthermore, a large part of the deal is financed with a $13 billion loan, issued by a consortium of 19 banks lead by Citigroup, Merrill Lynch and Morgan Stanley, increasing their leverage ratio and overall risk of the company. These high debt values come with high interest payments, leaving fewer cash to meet its dividend obligations. In a possible economic downturn this problem becomes larger, increasing the probability of not meeting their dividend payments which have not been changed for over 97 years. A further interesting statement is the ticking fee to ensure the deal would close. When the deal is not closed before January 10, 2009, the payment per share will increase with 8% annually, translating to a higher deal price of approximately $3 million more per day until the deal is closed. In addition if the deal is not closed before October 10, 2009, Dow has to pay $750 million termination fee. This will, again, transfer all the risk to Dow if the deal cannot be closed before October 10, 2009. In paragraph 3.1 the Material Adverse Effect clause states that Dow is allowed to withdraw from the transaction if the business, operations or financial conditions of Rohm is hit by a material adverse effect. This seems fair but there is a large set of exceptions made in the clause for which Dow cannot withdraw from the transaction, including the following events: any event which affects the chemical industry, macro economy as a whole, the financial, debt, credit or security market, any decline in Rohm’s stock price or any failure to meet internal or published projections. So, in case of an economic downturn mainly Dow is affected and not Rohm. Roam and Haas are even protected from a decline in their share price. Thus, these statements will, again, transfer almost all the risk to Dow Furthermore, Dow takes on another risk by relying on the joint venture with Kuwait’s PIC to finance $7 billion of the deal. They do not take into account the possibility that this joint venture could fail due to i.e. a downturn in the overall economy. If it fails it leaves a gap of $7 billion in their financing plan, exposing Dow to even more risk. Finally, the overall high price and ticking clauses make it a risky deal when compared to the expected synergies. The probability of achieving all expected synergies is a magnitude smaller than the probability of high costs, which is certain. It leaves Dow exposed to a possibly large loss when the expected synergies are not met in the future. The only risk that Rohm and Haas face is the possible termination of the deal from their side if the deal is i.e. taking too long. They have to pay a $600 million termination fee if the decide to do so. Other than that, considering the mentioned risk allocations from above, the total risk of this deal is mainly resting on the shoulders of Dow Chemical. CEO recommendations To give a complete view of the options that both CEOs had at the time we will first describe the situation they were in.   Shortly after the deal announcement the financial crisis started, causing an overall recession including in the chemical industry. Dow was hit on many fronts: overall share prices dropped with over 50%, a fourth quarter loss of $1.6 billion, quarterly sales decline of 23% and a drop in operating rate to 44% in 2008. Forcing Dow to close off 20 facilities and firing over 5000 employees. Furthermore, after the joint venture deal was closed with KPC’s PIC, the failing oil prices and overall recession caused KPC to terminate the contract by paying a termination fee of $2.5 billion to Dow. This caused a gap in the financial plan for the merger for Dow, decreasing their stock price even further and degrading their rating to BBB. As mentioned before, Dow was not the only one affected by the economic recession. Rohm was facing a poor performance as well, forcing it to fire over 900 employees, freeze spending and a 20% decline in sales. Considering the above, Dow refused to close the deal with Rohm and Haas after approval from the European Commission and U.S. Federal Trade Commission. Arguing that the recent macro-economic developments are material adverse effects, enabling them to terminate the deal. Options and recommendation for Dow’s CEO, Andrew Liveris Considering the situation as described above, Liveris had three different options: continue with the termination of the deal, close the deal for $78 per share or renegotiate with Rohm and Haas to agree on different terms. If Dow continues to terminate the deal it will go to court for the approval by the judge. It needs to win in court otherwise Dow is forced to commit to the deal. Given the statements enclosed in the material adverse effect clause, the chances for Dow to win are pretty slim. If Liveris opts to close the deal for $78 per share he will need a lot of additional cash. Considering the economic situation, and the fact that the joint venture failed, acquiring this amount of additional cash will be very hard. The possibility to acquire more debt through the already existing bridge bank loan from 19 different banks is pretty small considering the low credit rating of BBB. If he does succeed in acquiring more debt he will probably not be able to meet the net-debt-to-total-capitalization restriction in the covenant. This is, according to the first loan of $13 billion, required to be lower than 65% which they will not be able to meet, thus not creating incentives for the banks to lend more money. Considering the above, terminating the deal will not be possible and closing the deal for $78 per share lacks financing. The best option Andrew Liveris thus has is to renegotiate the merger deal and buy some time. He will then be able to look for other sources of financing or renegotiate the already existing bank loan. One possible option could be to sue KPC for terminating the joint venture and claiming the $2.5 billion, which in turn could finance the termination fee. Considering that this will destroy the relationship between these two companies this would not be recommended. Options and recommendation for the CEO of Rohm and Haas, Raj Gupta The situation for Raj Gupta is a bit simpler: either sue Dow for not completing the deal or renegotiate with Dow to postpone the deal. Both having different advantages and disadvantages. The first option is to go to court and continue the case that Dow has to complete the deal or otherwise pay the termination fee. Considering the  exceptions stated in the material adverse effect clause that macro-economic effects and effect on the chemical industry in general are excluded from this clause, Gupta will have a strong case and is likely to prevail in court. Committing Dow to the deal or otherwise paying the termination fee of $750 million. The second option is to renegotiate the deal with Dow. The most important disadvantage considering this option is that it would almost certainly come to a deal which is less favorable for Rohm and Haas when compared to the original deal. Which term should be reconsidered? For example, a lower price per share would decrease the expected value for the shareholders. Shareholders will not vote for such a deal, especially the Haas family who owns 30% of the company and is waiting to exit for $78 a share. The only option, although shareholders will not be amused in the least, is to delay the due date of the deal, preserving the harmony between the companies. Even if Gupta will win in court, the possibility that the deal will go through considering the financing problems of Dow is still small. Rohm and Haas will in this case only receive the termination fee of $750 million. Gupta obviously wants the deal to go through and so do the shareholders of Rohm and Haas, enabling them to exit the company and receiving a high premium while doing so. Terminating the deal will negatively affect both companies and their shareholders. Therefore it would be better for Gupta to facilitate any possibility that the deal will go through, even implying a possible decrease in price per share. Our recommendation thus is to renegotiate the deal, making sure that it succeeds. The premium for the shareholders might be lower but both companies can benefit from the acquired synergies and shareholders can still opt to exit. Resolving the legal dispute Considering the above, it would have been in the best interest of both companies to renegotiate the deal. However, Rohm and Haas decided to continue their trail against Dow Chemicals. The judge will therefore make a decision based upon the facts presented to him. Based on the facts alone, the most likely option for me, William B. Chandler  the Third, Chancellor in the Delaware Court of Chancery, is to enforce the merger contract between the two parties. In particular, the specifics of the Material Adverse Effect clause in paragraph 3.1 state that the MAE clause does not include the following events: â€Å"any event which affects the chemical industry, macro economy as a whole, the financial, debt, credit or security market, any decline in Rohm’s stock price or any failure to meet internal or published projections.† To be more specific; the argument according to Dow that the recent material developments have created unacceptable uncertainties on the funding and economics of the combined enterprise, justifying the termination of the deal, is overruled by the ‘specific performance’ clause in paragraph 3.1. Therefore, the ‘specific performance’ clause, as requested by Rohm and agreed upon by Dow, is binding and hereby enforced. The merger will be executed as planned. Dow will have several different options to solve the financing issue, cutting dividends, renegotiating debt and other means to generate cash could be used. If the deal is not closed before January 10, 2009, as stated in the contract, Dow will pay a ticking fee of 8% per annum. Dow should have been more careful drawing up the contract as it is signed and before me today. Since the possibility of an economic downfall is especially stated in the deal clause, I will make no exception and hereby conclude that the Dow will meet all deal requirements as stated in the contract. Every penny has to sides, if you risk it, you could lose it. Thank you. *slams the hammer*

Wednesday, July 17, 2019

Analyzing “Little Red Riding Hood”

Analyzing teentsy bolshy go oaf Tammy J. Cooper ENG 125 instructor Adenekan 3 March 2013 Analyzing Little departure Riding exhaust hood In life, at one time or a nonher(prenominal) we get hold of had a moment that we contribute so innocently put ourselves in the path of harm or danger, skillful as the newborn woman in the rook point Little ruby Riding Hood (Perrault, 1697). We all drive to bew atomic number 18 of our surrounding, to be actually watchful about public lecture to strangers. For danger, violence, and withal stopping point can come wrapped in familiar things as the theme in Little ruby Riding Hood suggests.There are several literary elements that pass on to the theme of the written report of Little Red Riding Hood. I testament analyze these elements as I have interpreted them. Perrault uses omniscient point of figure to tell this invoice. This is observed in the premiere sentence of the first paragraph, Once upon a time there lived in a certain village a small country girlfriend, the prettiest cr eraseure who was ever count onn (as cited in Clugston, 2010, divide 4. 1, para. 1).Omniscient point of view hardly means that the reader is privy to both characters inner thoughts and feelings in addition it allows the reader to go in and out of severally character thoughts through with(prediceat)out the story. In this short story the reader gets the thoughts and feelings of both Little Red and the wolf. The tone of Little Red Riding Hood is a means to teach the danger in public lecture to or rely strangers. For numerous strangers can non and should not be trusted. That ugly does exist and it has many faces, even familiar faces.The setting of this story is a medieval village on the edge of a large tenebrious forest. Which straightaway could be a lovable suburb on the edge of a huge unfriendly dark city? This story has five characters in it however, the story focuses on the teenaged woman habiliment a red-hoode d cape, the wolf, and their encounter, As she was going through the wood, she met with a wolf, who had a in truth immense mind to eat her up, but he dared not, because of some woodcutters working nearby in the forest. He asked her where she was going. The poor child, who did ot know that it was insecure to stay and talk to a wolf, express to him, I am going to see my grandmother and carry her a coat and a little pot of cover from my mother (as cited in Clugston, 2010, section 4. 1, para. 4). In reading Little Red Riding Hood, my interpretation of the symbolism is establish on things in the 21st century. In my mind, I see Red not as a little girl but as a young woman just coming of age. She is very beautiful and quite desirable. The wolf is not a four-legged animal but a two-legged man with bad morals and evil thoughts.There are various kinds of wolves. There are those who are charming, quiet, polite, unassuming, complacent, and sweet who pursue young woman at home and in the st reet. And unfortunately, it is these gentle wolves who are the most risky ones of all. Whereas, Red still thinks with a pure, loving, and trusting heart and mind as do many young females do today? In addition, where it say the wolf take Red, And, saying these words, this wicked wolf unrelenting upon Little Red Riding Hood, and ate her all up (as cited in Clugston, 2010, section 4. 1, para. 27).The wolf does not actually eat Red but rapes and violates her stealing her white from her forever. The plot of the story contributes to the theme of the story by telling us of the dangers of talking to strangers. We all need to beware of our surroundings and to be so very mensurable in speaking to strangers, for danger, violence, loss of innocence, and even death can come disguised in things and people that are very familiar to us. References Clugston, R. W. , (2010). Journey into Literature. Retrieved from http//content. ashford. edu/books/AUENG125. 10. 2? sections=sec4. 1