Tuesday, December 24, 2019

Discrimination and Civil Rights in America Essay - 701 Words

â€Å" Civil rights is the term that refers to the right of every person to equal access to society’s opportunities and public facilities.† Civil rights is used to imply that the state has a positive role in ensuring all citizens equal protection under law and equal opportunity to exercise the privileges of citizenship and to participate fully in life regardless of race, sex, religion, or other characters unrelated to the value of the individual. According to Webster’s Dictionary, the definition of civil rights is â€Å"the right s to personal liberty and to legal, economic, and social equality establish by amendments to the U.S. Constitution and by certain Congressional acts.† (Merriam-Webster) Civil rights have to with whether individual†¦show more content†¦Inequality is built into almost every aspect of our society. Civil rights are any of the civil liberties guaranteed by the 13th, 14th, and 15th Amendments and the Civil Rights Acts of the Constitution. Civil rights are also protected under state constitutions and federal statutes that protect a person’s civil rights. For example, African Americans with a correctable heart problem are only half as likely to receive the necessary surgery as are whites with the same problem. Disadvantaged groups had to struggle for equal rights. African Americans, women, Native Americans, and others have all had to fight for their rights in order to come closer to equality with white males. Americans have attained substantial equality under the law. They have, in legal terms, equal protection of the laws, equal access to accommodations and housing, and equal right to vote. Legal equality for all Americans has not resulted in de facto equality. African Americans, women, Hispanic Americans, and other disadvantaged groups have a small share of America’s opportunities and benefits. The history of America shows that disadvantaged groups have rarely achieved greater measure of justice without a struggle. Legal equality has been rarely bestowed by the more powerful upon the less powerful. Their gains have rarely always occurred through intense and sustained political movements, such as the civil rights movement of theShow MoreRelatedGender Discrimination Against Bank Of America876 Words   |  4 Pagesthe Civil Rights Act, the American s with Disability Act, the Age Discrimination in Employment Act, and many state laws. Even with these laws, discrimination still occurs within the workplace. This paper will investigate a case of gender discrimination against Bank of America and what could have been done to prevent this from happening. Calibuso et al. v. Bank of America Corp. et al. In 2010, a group of female financial advisors filed a national class action lawsuit against Bank of America andRead MoreCivil Rights/Secret Life of Bees986 Words   |  4 PagesBridget Baker Mrs. McQuade Period 2 4/10/12 Racial Discrimination and Segregation In 1619 the very first African Americans arrived in America, coming over for the purpose of forced slavery. It’s been nearly four hundred years since then and African Americans are still not treated completely equal. But throughout the years major steps towards equality have been made and as a whole the United States is close to reaching this goal. The first key action taken was abolishing slavery in 1865, butRead MoreConsequences of the American Civil Rights Act of 19641192 Words   |  5 Pages Observing half a century of an equality stimulating law: an economic review on the consequences of the American Civil Right act of 1964 Introduction The Civil Rights Act of 1964 (Pub.L. 88-352, 78 Stat. 241, enacted on July 2nd, 1964) is a milestone in the law history of the United States of America, which prohibited major forms of discrimination based on race, color, religion, sex, or national origin in employment practices and public accommodations. In commemoration of the 50th anniversaryRead MorePersuasive Essay On The Kneeling Movement1437 Words   |  6 PagesSince March 3, 1931, the Star-Spangled Banner has been instilled in almost every citizen in America as the National Anthem. It is ingrained that every person should show respect to the flag and the nation. In almost every classroom, students are told to stand facing the American flag with a hand over their heart and recite the pledge, or during any sporting, event fans are asked to stand to face the flag as a guest performer sings the National Anthem. This is an American tradition that everyone isRead MoreAfrican Americans During The 20th Century1261 Words   |  6 Pagesinfluential time frame for African-Americans in the United States would be from 1940-1970. During this time in America, Blacks everywhere were fighting against segregation and discrimination of their race. Consequently, the timeline of events that occurred during this time uncovers the numerous battles that African-American people fought in order to gain their freedom, and their rights as Americans. While these battles seemed everlasting, African-Americans were more persistent than ever in theirRead MoreCultural Impacts of the Civil Rights Act1357 Words   |  6 Pagesthe Civil Rights Act† Abstract Cultural Impacts of the Civil Rights Act Until the eighteenth century Civil Rights and Liberty’s were taken advantage of as a American. Observation in our judicial system cited within the paper suggest that our civil rights in America has improved and continue to evolve to this day. Cultural Impacts of American Civil Rights laws In recent years, a great deal has gone into fair treatment of all. As history serves, there was a great civil rightsRead MoreDiscrimination At The Modern Civil Rights Era Essay1539 Words   |  7 Pagesdeal with discrimination anymore. Don’t get me wrong, our country has grown so much over the years when it comes to tackling discrimination in the workplace. It’s just unfortunate that it’s just not natural for organizations and companies to naturally be ethical and moral when it comes to their treatment of their potential applicants or current employees. There are still cases of discrimination currently in our society. It may not be as severe compared to before the modern civil rights era, but discriminationRead MoreV. Bank Of America Corp Essay935 Words   |  4 Pagesemployees in the United States must adhere to Title VII of the Civil Rights Act of 1964. This act prohibits discrimination in employment-related matters and is administered by the Equal Employme nt Opportunity Commission (EEOC) (Canas Sonkak, 2014). In Calibuso et al. v. Bank of America Corp. et al. Judy Calibuso filed a complaint against Bank of America with the EEOC in January 2007. Case Law Overview Calibuso et al. v. Bank of America Corp. et al. was a gender case that was filed in U.S. DistrictRead MoreEssay on Rhetorical Analysis of Jfk Civil Rights Address862 Words   |  4 PagesThe Civil Rights Address was one of the most influential speeches President John F. Kennedy has ever presented to the American people, and was one of many of his many accomplishments during his presidency. America was experiencing racial discrimination and racial inequality, and Americans needed a leader who would unite them. John F. Kennedy was a sincere, honest, inspirational individual whose duty was to influence equality to Americans. President John F. Kennedy’s address inspires and pulls onRead MoreThe Civil Rights Act And Voting Rights1665 Words   |  7 PagesGrowing up in America, children are taught by their grade school teachers to be proud of being American. They chant â€Å"Christopher Columbus sailed the ocean blue in 1492† and harmoniously sing patriotic songs such as Th e Star Spangled Banner while being utterly oblivious of America’s corrupt political system. It may not be until one is pursing their final years of high school, or perhaps even in college when they are aware of America’s history of possessing a highly restrictive political system. For

Monday, December 16, 2019

Air Cargo Article Critique Free Essays

China Airlines is facing a fine of up to $85,410 in US dollars for transporting 15 barrels of iridium 192, a class 7 radioactive material, without the proper permit.   In addition to the source cited here, this article can be found in a variety of publications and sources including Google Finance, since China Airlines (TPE:2610) is a publicly traded company. The barrels were kept in a warehouse from February 23rd to February 26th when the airline made application to and received approval to transport radioactive material from the Atomic Energy Council. We will write a custom essay sample on Air Cargo Article Critique or any similar topic only for you Order Now Employees at the Taiwan Taoyuan International Airport found relatively low radioactive levels of the iridium isotope which was being transported to Singapore from the United States.   The destination and intended use of the material is not known.   Iridium 193 is used to detect weaknesses in metal pipes, in radiotherapy, and in radiation treatment of certain cancers. This article underscores the importance of airline industry regulation of hazardous material transportation.   The article also underscores the importance of consistency in inspection and detection techniques in international airports. Since levels of radioactivity were low, perhaps employees in U.S. airports found no cause for concern.   It was probably assumed that the airline had the proper permit for handling and transporting the iridium. It is reasonable and correct for the Atomic Energy Council to levy a fine for not having the proper transportation permit.   However, the Council needs to work with cargo carriers, international agencies, and airports to develop uniform inspection and detection protocols. Inspection techniques should have examining transport licensing and permits as an objective.   Detection techniques should have determining acceptable radioactivity levels as an objective.   The techniques should have safe and timely transport of materials as a common goal. Reference CAL TO BE FINED FOR TRANSPORTING RADIOACTIVE MATERIAL WITHOUT PERMIT. (March 6, 2009). AsiaPulse News. Retrieved March 10, 2009, from General OneFile via Gale. Google Finance.   China Airlines Ltd.(Public, TPE:2610) Retrieved March 10.   2009, from http://www.google.com/finance?q=TPE:2610 How to cite Air Cargo Article Critique, Papers

Sunday, December 8, 2019

Standard of Lease IAS 17-Free-Samples for Students-Myassignment

Question: Criticise the extent to which the discussion on practical implications of new accounting for leases presented by Churyk, Reinstein and Lander (2015) considers two fundamental characteristics of financial information stated in the AASBs Framework for Preparation and Presentation of Financial Statements. Answer: Introduction: The present study is based on the current lease standard IAS 17 which has been surrounded by criticism for resulting in unfaithful accounting where the comparability amid the commercial firms is not clear. With the objective of overcoming the issue, the IASB and FASB have undertaken the decision of presenting the new lease standard. As stated in the exposure draft of the new standard, the most obvious modification is that the distinction amid the operating and finance lease will be removed which states that all the lease transactions would be represented in the balance sheet (Warren, 2016). Such proposal has been surrounded by criticism since it will be having consequences for companies. The objective of the current study is to understand the consequences and criticism facing the new lease standard that would have impact on the companies making the use of the IFRS and to understand if the companies have performed any preparations. Discussion: Leasing is internationally considered as the element of source of financing and hence, lease accounting standards of highest quality is required. Presently, all the listed companies are required to follow the rules of the accounting standards that is issued by the international accounting standard board. IASB is considered as an organization whose chief purpose is to create a solitary set of high excellence and internationally recognized reporting standard known as IFRS (Lim et al., 2014). When IASB and FASB together launched the project of convergence in 2002 a significant step was taken towards the global international harmonization of the accounting. IAS 17 categorizes the lease as the either operating of the finance. The alteration among the two leases is that the business lease results an asset and a liability on the balance sheet whereas the operating lease is solitary revealed as the expenditure in the footnotes. The finance lease might be equated to the debt financed purchased while the operating lease could be equated to the consistent rental contract (Cheng, 2015). The IAS 17 enables the companies to assess the lease transactions themselves to classify the contract of lease. IASB lay down the guidelines regarding the recognition of the finance lease. But the criteria is considered to be ambiguous and to achieve the precise organization they could be exploited. This is probable to incur with the present standard of lease as the businesses that have inducements to categorize lease agreements as the operating instead of finance in the exposure draft (Barone et al., 2014). Therefore, by classifying lease contracts as the operating, companies will be able to get assets while maintaining an unaffected structure of debt and hence make the organization seem financially sturdier. Though every companies makes the use of the leasing as the means of obtaining access to the assets, they kind and the amount of assets which they lease along with the terms and structure of these contracts vary considerably. For instance, a proficient services firm leases cars and business offices, utilities of the company etc. all have different characteristics terms, regulatory frameworks, risk and economies (Collier, 2015). As an outcome of this different implications might originate for different industries at the time of adopting new lease standard. The proposed changes that has been bought in the lease accounting states that financial users will be able to remain dependent on the entitys leasing transactions. However, the changes in the lease accounting is considered to be controversial topic since there are probable consequences for the companies implementing IFRS (Osei, 2017). On introducing the new lease standard, all the lease transactions particularly the short term leases will result in right to use asset and the liability as well. As a consequence of this, the balance sheet of the impacted companies will increase and will offset the changes on the vital financial ratios. Such kind of consequences have been investigated prior to the publication of the exposure draft. Commercial firms having substantial amount of operating leases might therefore be anticipated to have their balance sheets and the vital financial ratios to be impacted by the introduction of the new lease standard. In the recent study of Gimbar et al., (2016), a further evidence have been portrayed that a capitalization of the operating lease would result in essential impact on the vital financial ratios. Nevertheless, companies have noticed that the consequences would be highly restricted to the retailing industries. The reason behind this is that retailers generally lease large sum of property. Cheng, (2015), has investigated exposure draft and has reported that lower turnover ratio, lesser return on the capital and increase in the lower debt to equity ratio could create an impact on the abilities of the companies to receive a bank financing. In the comment letters issued to the IASB and FASB, impacted companies have stated their concern regarding the new lease standard. In less than the period of four months following the publications of the exposure draft a large number of comment letters were received. Overall, negative criticism were stated towards the change. The cost of leasing would ultimate lead to an increase and might outweigh the benefits (Riley Shortridge, 2013). Concerns were issued regarding the worsening financial ratios, that might decorate the rating of the company and would become harder for the companies to receive credits and undertake the investments. Indeed, the main criticism concerning the new lease standard have placed emphasis on the capitalization of the operating lease since this would increase the structure of debt and balance sheet of the companies. As stated by Grenier et al., (2015), it is expected to have an increase in the balance sheet by 100 per cent. This would represent that the companies might have to negotiate the current structure of debt covenants to exclude the contracts of lease. Additionally, organizations have stated their concerns regarding the new lease standard as it would make it harder to receive credits. There has been a discussion regarding inclusion of the representative in the lease agreements on the balance sheet. Criticism has also been pointed in the direction of the short-term lease. Some firms have believed that the existing bright lines in the classification amid the operating and finance will be replaced by the new one since firms will start curbing the terms of lease so that it can take advantage from the short term lease that corresponds to the present operating lease (Marshall, 2016). Auditors have criticised the fact that the lease-term must decide whether or not the asset is identified on the balance sheet. As an example the auditors have represented that absurd consequences of the short term lease would have consequences on the financial statement. Numerous companies have stated their concern that the new lease standard would change the behaviour of lease and some assets would instead be purchased (Lantto, 2014). Nevertheless, it was reported that organizations would continue their activities of leasing that is unaffected of the new standard of lease, this is because lease reasons comprise of the economic nature along with the optimization of the cash flows and flexibility. Furthermore, organizations have stated their criticism on the new standard of lease because this would lead to an increase in the administrative burden in a considerable manner. Efforts made in the educations of the new standard of lease, new system of IT, changes in process system and increase amount of expenditure in the consultant fees is considered to be the common examples. This is additionally supported by the Bohuov, (2015), that have criticised the new standard of lease for being very complicated. It has been arguably put forward that with large number of lease agreements, companies would have to invest large sum in the new system of IT. This would also result in increased amount of time management because more detailed estimations concerning the liability of lease and right to use the asset should be conducted in respect to IAS 17. Nevertheless, the standard of lease has also received comments of positive nature. According to the Hewlett-Packard (HP) have admitted that currently there prevails an issue with the IAS 17 and the classification of the lease contracts have been done in an unfaithful manner. As stated by HP, it is encouraged to alter the lease accounting but instead by improving the current standard. As stated by Grenier et al., (2015) in the leasing paper have bought forward the argument by stating that the changes in the lease accounting is motivated but also removes the subjective elements. However, in contrast to the HP, he agrees with the IASB that a completely new standard is needed. Conclusion: Replacing the present standard of lease, IAS 17 eliminates the likelihood for the firms to select among the operating leasing and finance leasing. In the forthcoming time, all the leases would be categorized as finance, that suggests that the lease would be identified as the asset and the liability on the balance sheet. The changes concerning the lease standard is essential to attain the better amount of comparability amid the businesses and lessen the misuse of the rubrics of accounting. Though, the procedure of setting standard has been characterised by the disagreement, criticism and postponements which makes that replacement of IAS 17 is considered to be debated subject. Reference list: Barone, E., Birt, J., Moya, S. (2014). Lease accounting: a review of recent literature.Accounting in Europe,11(1), 35-54. Bohuov, H. (2015). Is Capitalization of Operating Lease Way to Increase of Comparability of Financial Statements Prepared in Accordance with IFRS and US GAAP?.Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis,63(2), 507-514. Cheng, J. (2015). Small and Medium Sized Entities Managements Perspective on Principles-Based Accounting Standards on Lease Accounting.Technology and Investment,6(01), 71. Collier, P. M. (2015).Accounting for managers: Interpreting accounting information for decision making. John Wiley Sons. Gimbar, C., Hansen, B., Ozlanski, M. E. (2016). The effects of critical audit matter paragraphs and accounting standard precision on auditor liability.The Accounting Review,91(6), 1629-1646. Grenier, J. H., Pomeroy, B., Stern, M. T. (2015). The effects of accounting standard precision, auditor task expertise, and judgment frameworks on audit firm litigation exposure.Contemporary Accounting Research,32(1), 336-357. Lantto, A. M. (2014). Business involvement in accounting: A case study of international financial reporting standards adoption and the work of accountants.European Accounting Review,23(2), 335-356. Lim, S. C., Mann, S. C., Mihov, V. T. (2014). Market Recognition of the Accounting Disclosure and Economic Benefits of Operating Leases: Evidence from Borrowing Costs and Credit Ratings. Marshall, D. (2016).Accounting: What the numbers mean. McGraw-Hill Higher Education. Osei, E. (2017). THE FINANCIAL ACCOUNTING STANDARDS BOARD (FASB), AND THE INTERNATIONAL ACCOUNTING STANDARDS BOARD (IASB) SINGS SIMILAR TUNE: COMPARING THE ACCOUNTING TREATMENT OF NEW IFRS 16 WITH THE IAS 17, AND THE NEW FASB MODEL ON LEASES.Journal of Theoretical Accounting Research,13(1). Riley, M. E., Shortridge, R. T. (2013). Proposed Changes to Lease Accounting under FASB's Exposure Draft.The CPA Journal,83(6), 28. Warren, C. M. (2016). The impact of International Accounting Standards Board (IASB)/International Financial Reporting Standard 16 (IFRS 16).Property Management,34(3).

Saturday, November 30, 2019

Paradise or Hell Conflicting Images of the Post

The peculiarities of the post-colonial world have been discussed in many historians, sociologists, and political scientists. However, they can also be examined by looking at literary works that describe the experiences of colonizers and those who were colonized.Advertising We will write a custom essay sample on Paradise or Hell? Conflicting Images of the Post-Colonial World specifically for you for only $16.05 $11/page Learn More This paper will focus on the novel Things Fall Apart written by Chinua Achebe and Margaret Atwood’s poem Progressive Insanities of a Pioneer. These works show how colonial forces can impact community and how people can perceive the world that is new and probably hostile to them. Although these novels differ significantly in terms of genre and themes, they can both show us that post-colonial world combines the images of both paradise and hell. Overall, these authors show that these communities could have become a much bett er place to live if settlers and native people tried to understand the values and ideas of one another. This problem is still relevant to contemporary societies that try to overcome the legacies of colonialism. In the opening chapters of his novel, Chinua Achebe portrays a village that is not affected by Western culture and civilization. The action begins just before the arrival of European missionaries. For instance, this is how the author describe the nature, â€Å"he loved this season of the year, when the rains stopped and the sun rose every morning with dazzling beauty. And it was not hot either because the cold and dry harmattan wind was blowing down from the north† (Achebe 2).Advertising Looking for essay on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More Such a description can imply that it is an idyllic community that is not affected by any external forces. It may be an exaggeration to call it paradise, but such associations can arise. It reminds readers of such things as peace and freedom. However, at the same time, they can see that violence is imbedded into the culture of this community. For example, one can mention Ikemefuna, a boy, who was taken as a hostage and subsequently killed by Okonkwo for the alleged crime of his father. This boy became attached to Okonkwo, but the laws of this tribe obliged Okonkwo to kill this boy. To some degree, this hostility between the two villages mirrors contemporary ethnic conflict in Nigeria. As it has been noted by Rotimi Suberu, Nigerian population is comprised of many ethnic groups that may differ in terms of religion, language or income level (12). This is one of the reasons why ethnic conflicts occur in Nigeria. The main tragedy is that in many cases, innocent people such as Ikemefuna suffer from these hostilities. These examples show that Chinua Achebe gives a conflicting portrayal of the community in which his characters live, and it does combines the elements of paradise and hell. Furthermore, the problems that the author refers to in his novel may manifest themselves in contemporary Nigeria. In turn, Margaret Atwood focuses on the experiences of British colonizers in Canada. At first glance, it seems that the opening lines of her poem describe the sensation of freedom, happiness, and serenity.Advertising We will write a custom essay sample on Paradise or Hell? Conflicting Images of the Post-Colonial World specifically for you for only $16.05 $11/page Learn More This is how the author describes the feelings of this individual, â€Å"He stood, a point on a sheet of green paper proclaiming himself the centre with no wall, no borders†. (Atwood, 60) Yet, the readers can also notice that this person is by no means happy. The first thing that he says is â€Å"let me out† (Atwood, 60). Such an outcry is hardly compatible with the idea of paradise. One can see that the coloni zer desperately tried to protect the fruits of his labor and feared virtually everything. In fact, he believed that even nature was hostile to him.Advertising Looking for essay on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More Furthermore, Atwood intentionally uses the personal pronoun â€Å"he† in order to emphasize the idea that Canadian colonizers built a patriarchal society in which women were denied access to any positions of power. Apart from that, one can notice that native people are not present in this poem, and their voices are silenced. Overall, Margaret Atwood describes the complex and rather conflicting experiences of British settlers in Canada. These people were trying to establish a new society that could become a better place to live. However, at the same time, they felt rather insecure in these lands. Thus, to some degree, this poem may describe a promised land, but it is full of fear and anxiety. This is the main paradox of colonial experiences. These literary works have other details that refer to the images of paradise and hell. In his novel, Chinua Achebe describes people who adopt a very respectful attitude toward nature and animals. Igbo people tended to describe and explain various natural phenomena with the help of animal stories. Moreover, some of the animals were even revered such as the royal python (Achebe 138). It was inconceivable for Okonkwo that Europeans missionaries could dismiss this tradition. To a great extent, this cultural practice can conjure up such an image as the Garden of Eden in which people did not separate themselves from other animals and lived in harmony with one another. The main tragedy is that they did not show similar respect to the dignity and life of other people. Again, one can mention the innocent boy Ikemefuna who was killed only because he was a member of a different tribe. Thus, it is clear that this tribal society had many flaws even before the arrival of European settlers. However, colonization made the situation worse because it completely dehumanized local people. Chinua Achebe shows that Europeans did not attach much importance to this tradition, beliefs, and value system of the local people. In their opinion, such beliefs were typical of the so-called uncivilized nations. The problem is that the world described by the author is full of hostility and violence that are aimed against the outsiders. Everything that did not reach their standards of conventionality was rejected. Both Africans and European settlers did not even try to understand the values of one another. Certainly, one cannot argue that the culture of Igbo people was perfect, but it could not be dismissed entirely as it was done by European missionaries. This is one of the reasons why post-colonial world is still ridden with conflict. Margaret Atwood’s poem gives readers a different insight into this problem. The thing is that she does not even mention those people who lived in Canada before the arrival of British settlers. A person, whom she describes, believes that he is the centre of the world. It does not occur to him that there could be other people living in this land. It should be noted that this person lives in an environment that was utterly new to him. For instance, Mary Atwood writes, â€Å"Things refused to name themselves; refused to let him name them† (60). On the whole, this quote suggests that colonizers did not even try to talk to local people in order to learn more about this place. Settlers could believe that local were either too primitive or hostile to them. Thus, one can say that the newly created community was very segregated. More importantly, native people were practically excluded from this community, and their presence was disregarded. The problem is that nowadays Native Canadians are underrepresented in public life. So, despite the fact that Margaret Atwood focuses mostly on the life of colonial society, her poem points to the challenges faced by the post-colonial society. These authors also show how damaging the impact of colonialism can be. Okonkwo, the main character of Achebe’s novel resists changes that are brought by European settlers. He believes th at new customs, traditions, especially religion will deprive him of his social status and respect of other people. This is why he commits suicide when Igbo people refuse to support him in his struggle against European missionaries. The person described by Margaret Atwood feels extremely insecure and alienated. His attempts to create an orderly life eventually lead to insanity. Thus, one can say that in both cases, colonialism produced damaging effects on individuals. The legacies of these experiences are palpable nowadays. Certainly, colonial and post-colonial societies could not become an earthly paradise; however, many of their internal flaws could have been eliminated if Europeans and local people tried to accept the humanity and dignity of one another. Unfortunately, this was not done. Surely, one cannot say that post-colonial countries resemble hell, but conflict, injustice and inequality are almost inseparable from them. In part, these social problems are the legacies of colon ialism. Overall, these literary works can be related to the field of post-colonial studies and some of its theories. One of them was developed by Edward Said in his book Orientalism. In particular, this author argues that Western scholars, especially historians often overlook the experiences of those people who were colonized (Said 125). In his opinion, very little attention is paid to their values and perceptions. In fact, they were considered to be primitive and irrational. The popularity of Chinua Achebe’ novel can be partly explained by the fact that he was one of the first authors who gave voice African people. This novel enabled readers throughout the world to see how Igbo people viewed their colonial experiences and how they responded to them. Edward Said also believes that Western colonizers immediately labeled non-western communities as backward, wild and unenlightened (Said 12). As it has been noted before, the folklore of Igbo people included a great number of anim al stories and colonizers perceived it as a sign of backwardness. Additionally, European settlers could not accept the idea that other nations could have different political structures. For example, they believed that tribal communities were essentially primitive. People can long debate whether this argument is right or wrong; yet, the main issue is that Europeans immediately tried to impose their political structures on native people and in this way they disrupted local communities. Apart from that, according to Edward Said Westerners could not accept the way of thinking and lifestyles of the local people (Said 125). For instance, they could not understand people who attached very little attention to property rights and land ownership. In part, this idea is reflected in Margaret Atwood’s poem. British settlers could not imagine the world with â€Å"no walls† or â€Å"no borders† (Atwood 60). The life of aboriginal people was not acceptable for them. More import antly, they became convinced that these communities were primitive or at least underdeveloped. Later, these beliefs were advanced with the help of propaganda. Thus, these two works should the perceptions of aboriginal people and colonizers. Admittedly, these experiences differed immensely, but the main issue is that they did not even try to communicate with one another. The main problem is that such misunderstanding is typical not only of colonial world, but also of the post-colonial societies. The communities that are influenced by the legacies of colonialism still struggle to reconcile the interests and views of Western-European settlers and native people. Such works as Things Fall Apart and Progressive Insanities of a Pioneer can help both sides better understand this conflict. This discussion suggests that the world described by Chinua Achebe and Margaret Atwood may seem serene and peaceful at first glance. However, by taking a closer look at this world, one can see that it is f ull of hostilities, violence, and insecurity. The authors describe different cultures and countries, but in each case, people are alienated from one another. More importantly, they realize that their conventional lifestyle is threatened. Maybe, it is an exaggeration to call these experiences hell, but they have a very adverse influence on them. Okonkwo commits suicide because he is no longer a leader of the community, while the unknown settler described by Margaret Atwood is driven into insanity. The main problem is that native people and colonizers did not make any effort to understand one another. Unfortunately, this problem often manifests itself in the modern, post-colonial world. Works Cited Achebe, Chinua. Things Fall Apart, New York: Anchor, 1994. Print. Atwood, Margaret. Selected Poems, 1965-1975, Berkeley: Houghton Mifflin Harcourt, 1987. Print. Said, Edward. Orientalism, New York: Vintage Books, 1979. Print. Suberu, Rotimi. Federalism and Ethnic Conflict in Nigeria, New Yo rk: US Institute of Peace Press, 2001. Print. This essay on Paradise or Hell? Conflicting Images of the Post-Colonial World was written and submitted by user DamageC0ntr0l to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Svante August Arrhenius Essays - Panspermia, Svante Arrhenius

Svante August Arrhenius Essays - Panspermia, Svante Arrhenius Svante August Arrhenius Svante August Arrhenius was born at Uppalsa, Sweden, on February 19, 1859 His intelligence and creativity were apperent nt from an early agehe taught himself to read when he was three Although credi ted with many scientific innovations, he remains best known for his ionic theory of solutions, For which he was awarded the Nobel Prize in chemistry in 1903 Arrhenius henius died in Stockholm on October 2, 1927 Science is a human endeavor subject to human frailties and governed by personalities, politics, and prejudice ces. One of the best illustrations of the often bumpy path of the advancement of scientific knowledge is the story of Swedish chemist Svante Arrhenius. When Arrhenius henius began his doctorate at the University of Uppsala around 1880, he chose to study the passage of electricity through solutions. This was a problem that had baffled scientists for a century, The first experiments had been done in the 17 70s by Cavendish, who corn pared the conductivity of salt solutions with that of rain water, using his own physiological reaction to the electric shocks he rece ived! Arrhenius had an array of instruments to measure electric current, but the process of carefully weighing, meas uring, and recording data from a multitude of experiments was a tedious one. After his long series of experimerits were performed, Arrhenius quit his laboratory bench and returned to his country home to try to formulate a model that could account for his data, He wrote, "I got the idea in the night of the 17th of May in the year 1883, and I could not s leep that night until I had worked through the whole problem." His idea was that ions were responsible for conducting electricity through a solution. B ack at Uppsa]a, Arrhenius took his doctoral dissertation containing the new theo ry to his advisor, Professor Cleve, an eminent chemist and the discoverer of the elements holmlum and thulium. Cleve's unlnterested response was what Arrhenius had expected. It was in keeping with CIeve's resistance to new ideas he had not even accepted Mendeleev's periodic table, introduced ten years earlier. It is a long standing custom that before a doctoral degree is granted the disse rtation must be defended before a panel of professors. Although this procedure i s still followed at most universities today, the problems are usually worked out in private with the evaluating professors before the actual defense. However, w hen Arrhenius did it, the disserta tion defense was an open debate, which could be rancorous and humiliating. Knowing that it would be unwise to antagonize his professors, Arrhenius downplayed his convictions about his new theory as he de t ended his dissertation. His diplomacy paid off: he was awarded his degree, albei t reluctantly, as the prolessors still did not believe his model and considered him to be a marginal scientist, at best. Such a setback could have ende d his scientific career, but Arrhenius was a crusader; he was determined to see his theory triumph. Recognizing his low credibility in his home coun try, he sen t his dissertation first to Rudolf Clausius, a German seientist who had fimnulat ed the second law of thermodynamics, but Clausius wasn't interested. He next app roached Lothar Meyer, another German scientist who had gained prominence for his work on the periodicity of the clements, but Meyer was also unresponsive. Final ly, Arrhcnius found the right champion in Wilhelm Ostwald, a German profes sor o f chemistry at Riga. Ostwald, already known as a defender of revo lutionary chem ical causes, fully accepted the idea that reactions in solu tion often involve i ons. In 1885 Arrhenius began work ing in Ostwald's laboratory, continui ng his research on ions. Reading everything he could find on the sub jeer, he ca me across a research paper written by a Dutch scientist, Jacobus van't Heir, whi ch was particularly helpful in placing the ionic theory on firmer gnound. In 1887 Arrhenius went to Amsterdalm to nicer van'l Heft At 22 years of age, van't Help had postulated the existence of stereochemistry; that is, that atoms in molecules have definite relative positions in space. This theory was initially criticized harshly, and van't Heft, aided by Ostwald, had to fight to have it accepted. The ionic theory was yet another unaccepted theory for which both Ostwald and van't Heft' would extend their support. By the time Arrhenius returned from Amsterdam, Ostwald had moved to Leipzig, where he had be come professor of chemistry. It was there that Ostwald and Anhenius put together

Friday, November 22, 2019

Quotes From the Film Boondock Saints

Quotes From the Film 'Boondock Saints' Two Irish brothers, Murphy and Connor, feel that theyve been authorized by God to clean up the underworld. Predictably a lot of blood, gore, and swear words follow. Each Boondock Saints quote given below is representative of the colorful dialogue that abounds in the film. Connor Well, a penny saved is worth two in the bush, isnt it? Connor You look like Mush-mouth from Fat Albert. Il Duce The question is not how far. The question is, do you possess the constitution, the depth of faith, to go as far as is needed? Monsignor And I am reminded, on this holy day, of the sad story of Kitty Genovese. As you all may remember, a long time ago, almost thirty years ago, this poor soul cried out for help time and time again, but no person answered her calls. Though many saw, no one so much as called the police. They all just watched as Kitty was being stabbed to death in broad daylight. They watched as her assailant walked away. Now, we must all fear evil men. But there is another kind of evil which we must fear most, and that is the indifference of good men. Murphy Were sorta like 7-Eleven. Were not always doing business, but were always open. Murphy Do not kill. Do not rape. Do not steal. These are principles which every man of every faith can embrace. Murphy [to a Russian gangster] So youre Chekov, huh? Well, this heres McCoy. Find a Spock, we got us an away team. Paul Smecker First of all, Id like to thank whichever one of you donut-munching, barrel-assed, pud-pulling sissies leaked this to the press. Thats all we need now: some sensational story in the papers making these guys out to be superheroes, triumphing over evil. Paul Smecker So Duffy, have any theories to go with that tie? Paul Smecker You know, you Irish cops are perking up. Thats two sound theories in one day, neither of which deal with abnormally-sized men. Kind of makes me feel like Riverdancing. Rocco Ill catch you on the flip side. Yakavetta The 90s are killing me. I shouldnt have done that. Youre not supposed to tell a guy youre gonna kill him no more.

Thursday, November 21, 2019

Congenital Hypothyroidism Essay Example | Topics and Well Written Essays - 1000 words

Congenital Hypothyroidism - Essay Example Those causing the latter are the thyroid peroxidase and thyroglobulin genes. These genes were initially described, but, most recently PDS (Pendred syndrome), NIS (sodium iodide symporter), and THOX2 (thyroid oxidase 2) gene defects were also published. Figure2: Cartoon of the TSH receptor showing the positions of all the loss of function mutations reported to date. Missense mutations are shown in the circles, frameshift and deletion mutations are indicated by arrows, and splice site mutations aremarked. Chatterjee) Figure 3: A proposed algorithm for investigating the genetic basis of congenital hypothyroidism. AHO, Albright hereditary osteodystrophy; CH, congenital hypothyroidism; GNAS, stimulatory G protein a subunit gene; NIS, sodium-iodide symporter gene; PAX-8, human Pax-8 gene; PDS, Pendred syndrome gene; TFTs, thyroid function tests; TG, thyroglobulin gene; THOX2, thyroid oxidase 2; TIOD, total iodide organification defect; TITF-1, human TTF-1 gene; TITF-2, human TTF-2 gene; TPO, thyroid peroxidase gene; TSHR, TSH receptor gene; USS, ultrasound scan. (Chatterjee) Figure 4: The Hypothalamic -pituitary thyroid axis and known genetic defects associated with CHT. (Vono-Toniolo and Kopp) Figure5.Mitogenic pathways in the thyroid. Data from the thyroid cell systems are integrated into the present general scheme of cell proliferation cascades. (CONTROL OF GROWTH AND DIFFERENTIATION ) Figure 6: Overview of gene therapeutic approaches for thyroid cancer (Spitzweg and Morris) Table: 1 Phenotypes of TR knockout animals. (Brent) Bibliography Brent, Jung-Hsin Hsu and Gregory A. "Thyroid Hormone Receptor Gene Knockouts ." Trends in Endocrinology and Metabolism (1998): 103-111. Chatterjee, Park SM and VKK. "Genetcis of Congenital hypothyroidism." J.. Med Genetics (2005): 379-389. "CONTROL OF GROWTH AND DIFFERENTIATION ." Thyroid Manager. 06 04 2008 . Spitzweg, Christine and John C. Morris. "Gene Therapy for Thyroid Cancer: Current Status and Future Prospects." Thyroid (204): 434-434. Vono-Toniolo, Jussara and Peter Kopp. "Thyroglobulin gene mutations and other genetic defects associated with congenital hypothyr

Tuesday, November 19, 2019

Emotions In Film Essay Example | Topics and Well Written Essays - 750 words

Emotions In Film - Essay Example Orientalism, as it was known by Napoleon, was based on just such knowledge – that is knowledge about the Orient projected upon it by the Western world. This idea of the Orient, as it was expressed among the Western scholars – overrode the true Orient. Observers entering the true Orient were already convinced of what they knew regarding an unchanging and already defined system, locking everything labeled Orient into a passive, unresisting object for study. Comparable linguistics were the basis for many of these assumptions (Said, 1979). This had, and continues to have, a negative effect upon the Western world’s perception, understanding and appreciation of a multitude of cultures that were erroneously grouped into a single identity. Philosophers continue to argue that reality, as it is presented within films and on tv, is not reflective of our ‘everyday’ reality, yet their arguments are based on water as there is as yet no true definition or conceptio n of what actual reality might be. In his book â€Å"What is Philosophy?† (1960), Jose Ortega y Gasset discusses several key defining aspects of philosophy, including a discussion regarding a definition of the focus of philosophy as a science. While earlier philosophers tended to identify philosophy by the tagline ‘the study of knowledge,’ Ortega points out that nowhere in these texts do any of the philosophers who came before him work to define what the empirical concept of knowledge is and therefore reach an understanding of what is ‘everyday reality.’ Although Ortega does not necessarily phrase his point in this exact terminology, his discussions regarding the nature of knowledge, the nature of science, and the nature of reality perception as it exists within the very human context of time make it abundantly clear that Ortega at least does not feel we will ever completely understand the world around us. To begin with, Ortega brings into clarity the idea that time

Saturday, November 16, 2019

Technical Developments Essay Example for Free

Technical Developments Essay With the increase in the success of record sales came the need to introduce methods to diminish manufacturing costs in order to increase profit margins. Nowhere was this need more prevalent than with the independent record companies in the industry for they had the most to gain let alone survive. After the demise of Germany, German technology made its way across the Atlantic to America. One of these technical break through was the ability to store audio information on magnetic tape. Magnetic tape was a process where Iron Oxide embedded on plastic tape could be magnetized by amplified electrical impulses for the purpose of recording and playing back audio information. It offered editing of performances, portability, and better audio quality and was significally cheaper than the existing technologies. In the USA a company that made Scotch tape called 3M improved the abilities of magnetic tape, allowing recording speeds of 30 ips to be brought down to 15 ips and 71/2 ips with little quality loss but significantly longer recording times. In 1948 Bell laboratories introduced the Transistor to America. Transistor technology could do everything the Vacuum tube at a reduced cost. It required less power, was smaller in size and more durable. Soon the recording studio became portable and could easily be torn down and set-up if the need arisen. Most importantly, the AM radio was created and could be found in the private confines of a teenagers bedroom. It might be hard to believe, but parents would warn their kids about the evils of listening to new music all by oneself. This new advent in technical breakthroughs sparked interest with the major players in the industry like CBS and RCA. Over at CBS the laboratories invented High Fidelity, a new method of improving the record. The Long-Playing record was invented that increased the number of grooves for the playing speed was lowered from 78 rpm to 33 rpm. Because the speed was lowered and the grooves now smaller, the smaller diamond stylus replaced the larger sapphire stylus. The new stylus needed to use lesser pressure allowing the LPs to last a lot longer. Over at RCA, engineers were developing similar technology. They invented a smaller sized record that revolved at 45 rpm. The size of the 45 and the fact that they only played one song worked very well for the jukebox owners. The 33-rpm LP worked well for playing records that offered more than one song and could sell for more money. With the new technical advances, records emerged as a relatively inexpensive medium compared to the overall production costs of Radio, film and Television, With this new trend, smaller independent record companies could compete with the larger companies and naturally they grew in stature and power. Records soon became the mainstay of radio and by 1952 record sales surpassed sheet music sales as a source of revenue in the music business. No longer was the jukebox the main resource for record promotion, radio with its new personalities would make sure of that. The main broadcasting format was AM amplitude modulation, even though FM frequency modulation had been around for a while. FM was in conflict with the introduction of TV for it existed in the VHF bandwidth that TV also shared, and had to take a back seat to AM even though its broadcasting quality was better. It was obvious to the broadcasting companies that the future lied in TV and radio would always be secondary. A compromise was made with Fm broadcasters and TV when TV allowed FM to operate on channel 1 on the TV station dial. It was later shifted to a bandwidth between 88-108 megacycles (between channels 6 and 7 where in now lives today. This proved to be devastating for FM broadcasters for not too many people were interested in buying an FM radio. In 1946 there were almost 7 million AM radios and less than 75,000 FM radios, and it would be a long time until TV was thoroughly entrenched that FM would start to emerge as a broadcaster for classical radio. With the development of TV came the fatal blow to network radio, for the large advertisers were much more interested in sponsoring TV programming than radio. But radio managed to survive via the Independent broadcasters that could rely on local advertisers for revenues, what we call today Retail verses the Corporate advertising of the major broadcasters. It is amazing to acknowledge the efforts and the luck of the independents in their pursuit of good music.

Thursday, November 14, 2019

Anne Sexton: Poetry as Therapy Essay -- Anne Sexton Poet Poem Poetry E

Anne Sexton: Poetry as Therapy Many great literary and artistic geniuses have been troubled with deep depression and mental illness. Anne Sexton is an example of a poet with such problems who used her personal despair to inspire her poetic works. Not all of Sexton's work is based solely on her mental health; but a good portion of her work is influenced by her constant bouts with depression. As she struggled to deal with her own marital infidelity and the problems associated with being a female poet in a male dominated genre, she combined the theme of depression with one based on the roles of women in society. In turn, she gained a wider audience and received recognition for her work. But all the fame and fortune were not enough to compete with her lack of mental stability. Anne Sexton was born Anne Gray Harvey on November 9, 1928 in Newton, Massachusetts. She was the youngest of three daughters to Ralph and Mary Gray Staples Harvey. Life in the Harvey household was difficult for Anne. Her parents, especially her father, were very concerned with appearances and she failed them in these standards most of the time. As the Harvey children grew older, the household became much more tense. Anne's father was an alcoholic and her mother drank nearly as much as he did. Her mother's failed aspirations to become a famous writer increased the tension among the family members as Anne's mother began to resent her husband and children (Middlebrook 4-16). The ingredients for future depression were already in the works for Anne. There was a history of mental illness in the family with both Anne's great aunt and grandfather. As Anne grew older, she was pretty and popular with the boys. However, her performance in school was lacking in m... ...tudied today but the inspiration for her poetry, her constant depression, forced Sexton to take her own life. In her work, she expressed the inner torture she endured and explored the depths of her mind and society. Works Cited Kumin, Maxine. Foreword. The Complete Poems by Anne Sexton. New York: Houghton Mifflin, 1999. xix. Middlebrook, Diane Wood. Anne Sexton: A Biography. Boston: Houghton Mifflin, 1991. Parini, Jay. Editor. The Columbia Anthology of American Poetry. New York: Columba University Press, 1995. Sexton, Anne. "Her Kind." Kennedy, X.J. and Dana Gioia, eds. Literature: An Introduction to Fiction, Poetry, and Drama. 8th ed. New York: Longman, 2002. 770. Wagner-Martin, Linda. "Sexton, Anne Gray Harvey." 13 November 2001. <http://www.anb.org/articles/16/16-01490-print.html> Anne Sexton Reads Her Poetry. Audiocassette. Caedmon, 1999.

Monday, November 11, 2019

Learning by Doint Essay

Your state’s statute that defines what is considered to be a public record that must be made available to the public upon request. Public Records are documents, papers, letters, maps, books, tapes, photographs and computer-based or generated information. Access to public records is available to both local nonresidential individuals of Georgia. Residents of Georgia have the right to Public records under the Georgia Open Records Act. Nonresidents of Georgia have the right to public records under the instruction of the Attorney General. Under the Open Records Acts, Georgia mandated Every state department, agency, board, bureau, commission, public corporation, authority, county, municipal corporation, school district and other political subdivision, department, agency, board, bureau, commission, authority and similar body of each county, municipal corporation or other political subdivision of the state; city, county, regional or other authority established pursuant to state law; and non-profit organizations that receive more than one-third of their funds from a direct allocation of state funds from the governing authority of an agency. The archives Georgia state’s statue define a public record that should be made available to public upon request are Court Records, Criminal Records, Birth Records, Death Records, Marriage Records, Divorce Records, and Genealogy records. Government meetings, election results, crime statistics, home deeds, annual tax on homes and vehicles, and food service inspections are open to the public as well. (Baker, 2008) The pre-World War I opinion by the U. S. Supreme Court holding, on re-argument, that a federal income tax was unconstitutional. Prior to World War I the United Stated had few taxes. The government was supported by internal taxes. The U. S. Supreme Court decided that the income tax was unconstitutional because it was not apportioned among the states in conformity with the Constitution. Protesters were in favor of the decision. (Siegal) The federal statute authorizing the U. S. Secretary of Transportation to make payments to states for the value of materials stockpiled near federal highway construction projects in conformity with the project specifications. The federal governments provides the state with funding for projects such as highway reconstruction. No funding is given unless the secretary follows up with inspections. There are several administrations that aid in the department of transportation such as Federal Aviation Administration (FAA , Federal Highway Administration (FHWA), Federal Motor Carrier Safety, Administration (FMCSA), Federal Railroad Administration (FRA), Federal Transit Administration (FTA), Maritime Administration (MARAD), National Highway Traffic Safety, Administration (NHTSA), Office of Inspector General (OIG) , Office of the Secretary of Transportation (OST), Pipeline and Hazardous Materials Safety Administration (PHMSA), Research and Innovative Technology Administration (RITA), Saint Lawrence Seaway Development Corporation (SLSDC) and the Surface Transportation Board. The federal joint regulation of the U. S. Fish & Wildlife Service, Department of the Interior, National Oceanic and Atmospheric Administration, and Department of Commerce, identifying the factors for listing, delisting, or reclassifying endangered species. The federal joint regulation of the U. S.  Fish & Wildlife Service, Department of the Interior, National Oceanic and Atmospheric Administration, and Department of Commerce, identifying the factors for listing, delisting, or reclassifying endangered species provides a list of endangered species or are in danger or becoming endangered. Issues that are addressed are the present he present or threatened destruction, modification, or curtailment of its habitat or range, over utilization for commercial, recreational, scientific, or educational purposes, disease or predation, the inadequacy of existing regulatory mechanisms and other natural or manmade factors affecting its continued existence. Plans to protect natural resources are tackled. Recovery and protections plans are also addressed. The department of commerce promotes economic growth. The department focus on the creation of jobs and the enhancement of living standards. Your state’s administrative regulations specifying the licensure process for real estate agents. The Georgia real estate and commission boards determine the regulations for the licensure process for real estate agents. There job is to ensure the housing market is fair and honest. Background checks are performed and successful completion of education is required. There is also a real estate test to be taken before an individual can practice. Georgia also has real estates schools. The local ordinance in your municipality governing noise. There are several cities which have laws prohibiting noise above a certain level. In the state of Georgia, it unlawful for any person to make, continue or cause to be made or continued any loud or excessive noise which unreasonably interferes with the comfort, response, health and safety of others within the jurisdiction of the city. For example, the younger generation install systems in their vehicles which allows their vehicles to play music really loud. The music is so loud it causes other vehicles to feel the vibration. This excessive noise is a violation of the Georgia noise ordinance. The noise ordinance does not only pertain to music in a vehicle, it pertains to a television, pets that make noise, machinery, and emergency signaling devices. The most recent opinion of your state’s highest appeals court describing the extent to which the state constitution requires that the power of eminent domain be exercised only for a public use. Recently, Augusta, Georgia, did some reconstruction with the roads on Mike Padgent High way due to so many deaths. The deaths were caused by the accidents on the highway because there is no turning lane. The only solution was to widen the highways and make a turning lane. In order to do so, land must be purchase from the homeowners and used to extend the highway. The state was in favor of this opinion because is would save so many life on †Death Highway. † A recent federal trial court decision in your federal district describing the standard for summary judgment in federal court. Barnes vs. Zaccari is a very significant court case which lead to setting a standard for summary judgment is federal court. The Barnes VS. Zaccari case The president of Valdosta State University, Ronald Zaccari expelled Thomas Hayden Barnes for exemplifying a clear and present danger to other students on campus. Barnes sued Zaccari in the federal courts because he did not receive a warning before he was withdrawn from school. Barns won the his case against Zaccari. The case describe the violation of the due process clause which claims that Barnes was due notice on the charges against him. Ley, 2012) A law-review article published within the past five (5) years about libel law and political campaign advertisements. It never fails during campaign season, there are always political advertisement with candidates bashing their opponents. Political parties compete against their parties make statements about what their opponent stands for. The advertisements are used to expose individuals to the U. S. citizens in hopes to gain votes. There are certain statements that are on the verge of defamation. Defamation is providing false information that can be proven false on an individual that harms that person’s reputation. Opinions which express negativity on someone is also protected by the first amendment.

Saturday, November 9, 2019

Party Essay

Chapter 6 Revised Everybody loves to party. A meaningful party has a dramatic impact on people’s lives. It was the second day of my university life. I was invited to a new student welcome party. At the beginning of the party, I felt really embarrassed. I knew none of those people in the party. I did not know what to do. For another thing, I have trouble on communicating with other foreigner, especially native English speaker. However, my mind changed quite a bit during middle of the party, and I was glad that I made some new friends. Moreover, I felt this welcome party completely accepted me. This welcome party is going to be a turning point of my student life in Victoria. Body paragraph 1: At the beginning of the party, I felt really nervous. There were so many people in the lounge. I felt suffocated, and did not know how to solve this embarrassment. However, a simple game saved me. we wrote our name on the paper and tossed it to other people. People could find the right person base on other’s nametags. Through this game, I felt a bit more comfort. More over, we could ask questions with each other so we can find our common interests, and learnt more from each other. I felt more involve in this party, it did get better as the party goes on. Body paragraph 2: In the middle of the party, I changed my opinion about this party quite a bit. Then, I realized that I start to enjoy this party. Also, I made a couple of new friends that made me feel welcome. In the mea time, I could chat with them about their hometown, ask questions, and play games with them. It made me cozy. Furthermore, people got to show their talents on the party. For instance, there was a guy came from South Korea called John. John won championships of the Korean National dancing competition three times in a row. He decided to show his classic Hip Hop dancing tricks that was fabulous. And there was another African girl showed her beautiful voice through singing Halo from Beyonce. Continuously, she also presented us with traditional dancing that was awesome. Even though, I really wanted to show some talents as well, I did not. Anyway, it was really exciting to enjoy people’s performances. Finally, it came to the end.. Body paragraph 3: Nearly the end of this party, I am completely blended in and fully involved in this party and felt no more embarrassment. Additionally, this feeling gets stronger while chatting with my new friends. Especially, I talked with them about their personal issues. Therefore, I feel there was no gap between us and it actually felt great. Next, they served us with snacks, pizzas and cream cakes. We had foods and drinks together and it was quite pleasant. Finally, I think this would be my most memorable party at all time. Conclusion paragraph: My mind changed quite a bit through the entire party. Also, I am able to communicate with other people confidently and smoothly. This welcome party will be the new origin of my new life in Canada.

Thursday, November 7, 2019

Was the amerian revolution a social revolution essays

Was the amerian revolution a social revolution essays The American Revolution started in 1775, climaxed in 1776, and, at least partially ended in 1789 when the constitution was ratified. There have been numerous studies as to whether it really was a revolution and if it was, what kind and how significant it really was. What criteria must the new government posses to be considered a revolutionary regime? What kind of ideologies do the revolutionaries believe and how do these differ from the old regimes ideologies and form of rule? How violent must the revolution in question be? How much of a social impact should there be? These are just a few of the questions which need to be satisfied when deciding the parameters of this particular revolution. These questions can be answered differently depending on what constitutions the definition of a revolution. A summary of the theories of revolution points to the conclusion that the American Revolution was a real revolution. The fact that scholars discuss it as part of a more general overview of r evolutions is proof that they consider it to be a Revolution. Many people (both the educated and the uneducated) unquestioningly accept the fact that the American Revolution was a revolution. I have assumed that the American Revolution was a real revolution and will use this to conclude whether the revolution was a social one. In anarchist theory, social revolution means far more than just revolution. A true social revolution is far more than just change in the political make up, structure or form of a society. It must transform all aspects of a society including political, economic and social aspects. there are revolutions and revolutions. Some revolutions change only the governmental form by putting a new set of rulers in place of the old. These are political revolutions, and as such they are often met with little resistance. But a revolution that aims to abolish the entire system of wage slavery must also do away with th...

Tuesday, November 5, 2019

Common Chemicals and Where to Find Them

Common Chemicals and Where to Find Them This is a list of common chemicals and where you can find them or how you can make them. Key Takeaways: Locate Common Chemicals Many ordinary household products consist of relatively pure elements and compounds.If you have trouble locating a chemical, check for both its common name and its chemical name. For example, table salt is sodium chloride and saltpeter is potassium nitrate.Read labels to see whether additional compounds have been added. Impurities can have a significant effect on projects. acetic acid (CH3COOH H2O)Weak acetic acid (~5%) is sold in grocery stores as white vinegar. acetone (CH3COCH3)Acetone is found in some nail polish removers and some paint removers. It may sometimes be found labelled as pure acetone. aluminum (Al)Aluminum foil (grocery store) is pure aluminum. So is the aluminum wire and aluminum sheeting sold at a hardware store. aluminum potassium sulfate (KAl(SO4)212H2O)This is alum that is sold at a grocery store. ammonia (NH3)Weak ammonia (~10%) is sold as a household cleaner. ammonium carbonate [(NH4)2CO3]Smelling salts (drug store) are ammonium carbonate. ammonium hydroxide (NH4OH)Ammonium hydroxide may be prepared by mixing household ammonia (sold as a cleaner) and strong ammonia (sold in some pharmacies) with water. ascorbic acid (C6H8O6)Ascorbic acid is vitamin C. It is sold as vitamin C tablets in the pharmacy. borax or sodium tetraborate (Na2B4O7 * 10H2O)Borax is sold in solid form as a laundry booster, all-purpose cleaner and sometimes as an insecticide. boric acid (H3BO3)Boric acid is sold in pure form as a powder for use as a disinfectant (pharmacy section) or insecticide. butane (C4H10)Butane is sold as lighter fluid. calcium carbonate (CaCO3)Limestone and calcite are calcium carbonate. Eggshells and seashells are calcium carbonate. calcium chloride (CaCl2)Calcium chloride can be found as a laundry booster or as a road salt or de-icing agent. If you are using the road salt, be sure it is pure calcium chloride and not a mixture of various salts. Calcium chloride is also the active ingredient in the moisture absorbing product DampRid. calcium hydroxide (Ca(OH)2)Calcium hydroxide is sold with garden supplies as slaked lime or garden lime to reduce soil acidity. calcium oxide (CaO)Calcium oxide is sold as quicklime at builder supply stores. calcium sulfate (CaSO4 * H2O)Calcium sulfate is sold as plaster of Paris in craft stores and building supply stores. carbon (C)Carbon black (amorphous carbon) can be obtained by collecting soot from the complete burning of wood. Graphite is found as pencil lead. Diamonds are pure carbon. carbon dioxide (CO2)Dry ice is solid carbon dioxide, which sublimates into carbon dioxide gas. Several chemical reactions evolve carbon dioxide gas, such as the reaction between vinegar and baking soda to form sodium acetate. copper (Cu)Uncoated copper wire (from a hardware store or electronics supply store) is extremely pure elemental copper. copper(II) sulfate (CuSO4) and copper sulfate pentahydrateCopper sulfate may be found in certain algicides (Bluestoneâ„ ¢) at pool supply stores and sometimes in garden products (Root Eaterâ„ ¢). Be sure to check the product label, since many different chemicals may be used as algicides. helium (He)Pure helium is sold as a gas. If you only need a little, simply purchase a helium-filled balloon. Otherwise, gas supplies usually carry this element. iron (Fe)Iron skillets are made of elemental iron. You can also pick up iron filings by running a magnet through most soils. lead (Pb)Elemental lead metal is found in lead fishing weights. magnesium sulfate (MgSO4 * 7H2O)Epsom salts, usually sold at a pharmacy, are magnesium sulfate. mercury (Hg)Mercury is used in some thermometers. It is more difficult to find than in the past, but many home thermostats still use mercury. naphthalene (C10H8)Some mothballs are pure naphthalene, though check the ingredients since others are made using (para)dichlorobenzene. propane (C3H8)Propane as sold as a gas barbecue and blow torch fuel. silicon dioxide (SiO2)Silicon dioxide is found as clean sand, which is sold at garden and building supply stores. Broken glass is another source of silicon dioxide. potassium chloridePotassium chloride is found as ​lite salt. sodium bicarbonate (NaHCO3)Sodium bicarbonate is baking soda, which is sold in grocery stores. sodium chloride (NaCl)Sodium chloride is sold as table salt. Look for the uniodized variety of salt. sodium hydroxide (NaOH)Sodium hydroxide is a strong base that may sometimes be found in solid drain cleaner. The pure chemical is waxy white solid, so if you see other colors in the product, expect that it contains impurities. sodium tetraborate decahydate or borax (Na2B4O7 * 10H2O)Borax is sold in solid form as a laundry booster, all-purpose cleaner and sometimes as an insecticide. sucrose or saccharose (C12H22O11)Sucrose is ordinary table sugar. White granulated sugar is your best bet. There are additives in confectioners sugar. If the sugar is not clear or white then it contains impurities. sulfuric acid (H2SO4)Car battery acid is about 40% sulfuric acid. The acid can be concentrated by boiling it, though it may be heavily contaminated with lead, depending on the state of the batterys charge when the acid was collected. zinc (Zn)Zinc blocks may be sold by some electronics supply stores for use as anode. Zinc sheets may be sold as roof flashing at some building supply stores.

Saturday, November 2, 2019

Conscious (Mindful) Communication Day Essay Example | Topics and Well Written Essays - 250 words

Conscious (Mindful) Communication Day - Essay Example At times when I hang out with my friends, we find ourselves talking politics in our country. Definitely not all of my friends hold similar political ideologies as mine. So, we tend to differ in most cases and end up in unending argument, sometimes resulting even to insults. This happened one day when we were walking to the movie show. It later came to my conscience that I was doing the wrong thing; I changed the topic and ensured that I and my friends maintained the friendship. It felt good achieving my goal of maintaining unity though my friends never realized the reason behind the topic change. Some situations seem challenging and tricky to face especially when truth is unveiled. During my last holiday, I attended a wedding ceremony in which my uncle was the bridegroom. I had been advised by mom never to leave my younger sister Laura alone as mom too had to attend the occasion (Shafir, 2003). I became disobedient and left the 2 year old kid in our house. On coming back, I found almost all valuables were missing including mom’s laptop, television set and other households. I knew I would face the worst moment in my life. I had an idea to lie about gunpoint robbery of the house but conscience kept refraining me from telling lies. I told my mom what actually happened. Laura was well, she warned me never to disobey her to that extent. She felt disappointed, and praised my innocence in telling the truth. Another aspect of mindful communication derived from this context is never to speak with an aim of pleasing other people but say what you feel is truth and just, what you feel you can say

Thursday, October 31, 2019

A study of War and Military History, 1867 to the Present Essay

A study of War and Military History, 1867 to the Present - Essay Example With its large expanse of land mass covering North America, right above the United States, proved to be of strategic importance for the British. Trade between Canada and the main British isle was usually undeterred by the vast Atlantic Ocean, and such supply routes were usually left undisturbed for the most part. On the social and political situation, the Canadians were mostly North American colonists who remained loyal to British imperial rule and also composed of colonists from the United States who maintained their allegiance with the British rule. This group of Canadians formed the majority of Canada’s society and usually held a strong voice with regards to the colonial affairs. On the other hand, there were also the French speaking Canadians who were mostly from the domain of Quebec and Montreal. The French Canadians were formerly French Empire colonists during the 16th and 17th century who were conquered by the British by the end of the French-Indian War. The fact that F rench Canadians were usually not treated with much respect as that of the English Canadians, French Canadians most of the time took the polar opposite with regards to political opinion. When the outbreak of the First World War happened in Europe, it was first thought that the British Empire would not be involved in the war which at first was thought to be merely involved between the Austria-Hungary against Serbia. But when Germany entered the war, in the side of Austria-Hungary, Great Britain decided to enter the war against what would later be known as the Central Powers, namely the German Empire and the Austro-Hungarian Empire, to prevent the German Empire from expanding its imperial influence. Canada was involved in this armed struggle across its borders since it had its obligations as a colony of the British Empire. Prior to all this, Canada had a large standing militia force, yet a small regular army and an even smaller navy. Sam Hughes, the Minister of Militia and Defense during that time, was tasked to raise enough soldiers for the war in Europe to complement the British forces around the Western Front. For this to be done, volunteers of men were needed to be implemented to enlist enough manpower to be of potential support for the war efforts. Many joined in the hundreds of thousands, becoming known as the Canadian Expeditionary Force. Canadians were known to serve well and with distinction. They were notable in their involvement in major battles such as the Battles of Ypres, Somme, Vimy Ridge, Passchendaele and the Hundred Days offensive. Canadian Corps were considered as fine soldiers, being highly motivated and dogged. But as the war dragged on and losses were mounting high on the British and its Commonwealth forces, it came to the point that conscription would be needed. After the Battle of Somme, in which casualties on both sides of the belligerents where high, there was a great demand to reinforce the forces in the Western Front. Because of the terrible amount of casualties as the battles raged on the trenches in the Western front with no clear or decisive victory in sight, the number of volunteers of Canadians drastically dropped . This eventually caused conscription to be seen as a necessary measure for the Canadian government to pass the act of conscription. By this period, the government Canada decided to pass the act of conscription. Opinions about conscription in Canada during the First World War were divided distinctly between the

Tuesday, October 29, 2019

Earnest Hemingway&apos;s &quot;The Indian camp&quot; Essay

Earnest Hemingway's "The Indian camp" - Essay Example Nick becomes his assistant in the operation. Not long after, the expectant womans husband is discovered dead having slit his throat during the operation. The Indian Camp story reveals the upcoming of Hemingways use of counterpoint and the understated style. He addresses several thematic concerns that affected the people at the time. These are the theme of racism, sexism, masculinity and life and death. The ‘Indian Camp’ remains an important story in the canon of Hemingway to date. Being an initiation camp, the Indian Camp is used in the story to explain the theme life and death. Dr Adams, Nick’s father, exposes his son at a young age to childbirth. In the process, he unintentionally exposes the boy to violent death. Having witnessed the birth and death at the same time, Nick equates birth to death (Dudley 17). Although Nick may not have wanted to watch his father perform the caesarean, his father insists that he should do. Symbolically, he wants to make his son tough and prepare him for initiation into the adult world that was not always smooth. The theme of life and death is a symbolic depiction of the conditions of the Native American camp. There are struggles for life in the camp in which death romped life from people. The coming to birth of a child signifies the continuity of life in the camp (Dudley 18). However, life is lost at the same time when the childs father kills himself by slitting his throat with a sharp blade during the operation. In his story, Hemingway explains the desperate state of a struggle for life and at the same time the irony in a persons depriving his life. It is ironical that an effort is made to make the baby live signifying the value attached to life at the camp while at the same time the father takes his life. Fear of death is implicated in Nick’s fear for the death when thoughts of death in the forest a night before the operation overwhelm him. The themes of racism and sexism in the story are depicted in the

Sunday, October 27, 2019

Demographic Analysis of Software Piracy Users

Demographic Analysis of Software Piracy Users Software Piracy: Most common factors that influence the intention to use among college students in Selangor, Malaysia Abstract Software piracy is one of the worst problems facing the software industry, and the piracy rate around the world is rising and in 2008 alone software industry lost more than US$ 5.3 billion due to software piracy, and in the same time frame Malaysian software industry lost around US$ 368 million. Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem. This research identified six variables that influence the intention of college students to use pirated software; they are Gender, Age, Value Consciousness, Attitude, Peer pressure and Novelty seeking. A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The study found out that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software. 1.0 Chapter 1: Introduction: Software piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating (Honick and Craig, 2005). Independent study sponsored by Business software Alliance (BSA) shows that software piracy is the worst problem that software industry faced, BSA defines software piracy as the unauthorized copying or distribution of softwares. When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright owner of the software. According to Microsoft there are 5 basic type of piracy, 1- End user copying: Here individuals or organizations copy and distribute unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits. 2- Hard disk loading: this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are not aware of the wrong doing 3- Counterfeiting: software and its packaging are illegally produced in a large scale. 4- Online: Online piracy occurs when the end user download the software from an online source without the permission of the copyright owner. 5- License misuse: software distributed with a discount rates for the high-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are not qualified for the software. 1.1 Background of the problem TA study conducted by BSA (200X), shows that piracy rates went up from 38% in 2007 to 41% in 2008 worldwide, however the encouraging news is that among the 110 countries the study was conducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008. Lowest piracy countries according to the BSA(200x), research were the United States Luxemburg, New Zealand and Japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%. Research conducted by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it will create more that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 more that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry. For every dollar of the software sold another 3 or 4 dollars are paid to the local IT farms, in other words software piracy means less jobs in Information Technology Industry, as per IDC (200x) study if piracy is reduced 10%, governments will generate more that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additional 15 dollars to every 100 dollars spent on software, meaning software add 15% to the price of legitimate software because of software piracy. Software piracy will also increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of peer-to-peer sites offering illegal software infect the computers with virus and other types of identity theft tools. Software piracy is somewhat out of controlled in the real world, Microsoft investigators found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated ( Carbon 1997). The population of Malaysia is estimated at 28 million and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007). 1.2 Problem statement In Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of financial losses, Malaysia lost over US $ 368 million compare to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007). This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently. 1.3 Objective of the study: Software piracy has become a worldwide dilemma due to the financial and economic losses the software industry and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear. For an issue that has gone out of control, like software piracy, its important to identify grass root problems. In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software; this will help the software industry to come up with better strategies in the fight against software piracy. TAs colleges and universities are identified as breeding grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students believe its ethical to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian context. 1.4 Purpose of the study: TA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy. Protecting the intellectual property is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is due to the casual attitude of the consumers towards intellectual property rights (SIIA KPMG 2001). Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court ruled that intellectual properties were protected (Lau, 2006). According to the Malaysian copy right act 1987, if an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison sentence of not exceeding five years, or both. Preventives and deterrents are the commonly used techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it difficult for software crackers to crack the software by increasing the security features. The idea behind the preventive concept is that, when it becomes difficult to crack, the software hackers will find cracking softwares are hard and eventually give up. Deterrent uses the laws and regulation to prevent software piracy. The truth is preventives and deterrents are not so effective, the higher security that is placed in the softwares are checked by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that deterrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected. This proves the need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy. 1.5 Justification of the study: There have been number of studies conducted in relation with software piracy among the college students, however a study focused on college students in Malaysia is not found, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software. Since most of the current studies are conducted outside Malaysia, there might be some significant difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia. T 1.6 Research questions This study aims to answer following questions. Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia? Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia? 1.7 Organization of the study: This study has five chapters; the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions. The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of software piracy are discussed. Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study. The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions. 2.0 Chapter 2: Literature Review First part of this chapter reviews different theories related to behavior and ethics, particularly the Theory of Reasoned Actions by Fishbein and Ajzen, Theory of planned behavior by Ajzen and theory of moral development by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software. Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to explain software piracy. 2.1 Theory of reasoned action Theory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein (1980) were used to explain why an individual behaves in a certain manner. The theory is based on the assumption that humans are rational and information available to them will be used systematically. TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior. The Theory of Reasoned Actions (TRA) identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms. Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998) Enker (1987) examined how attitude and normative belief is related to cheating and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual. The motive behind explaining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy. 2.2 Theory of planned behavior In 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed; he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen developed the Theory of Planned behavior (TPB), which was an extension of Theory of Reasoned Actions The new model proposed by Ajzen included the Perceived Behavior Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty level in performing a certain behavior (Ajzen and Madden, 1986). The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control. Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000) Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA. Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software. 2.3 Kohlbergs theory of moral development Kohlberg (1969) developed the theory of moral development, which consists of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually. Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole. Conventional is the second level of moral development, in this level individuals focus more on a group, this is the level where peer pressure begins to influence the decision of an individual. At the first stage of this level an individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner. Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision making. According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting. 2.4 Software piracy literature 2.4.1 Age Prior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006; Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users between the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy. 2.4.2 Gender Kini et al.., (2004), suggest that female students have a higher morality than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software. 2.4.3 Consequences of using pirated software Using pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994). However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon. 2.4.4 Income and economic conditions related to software piracy The study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the original softwares is related to his or her income. Countries with higher Gross National Income (GNI) such as United States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008). Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a country; however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy. 2.4.4.1 Top 10 high and low piracy rates Countries with high piracy rate % Countries with low piracy rate % Georgia 95 United States 20 Bangladesh 92 Japan 21 Armenia 92 Luxembourg 21 Zimbabwe 92 New Zealand 22 Sri Lanka 90 Austria 24 Azerbaijan 90 Belgium 25 Moldova 90 Denmark 25 Yemen 89 Sweden 25 Libya 87 Switzerland 25 Table 2.2: Top 10 High and Low piracy rate Source: BSA piracy report 2008 Moores (2008) in his study on â€Å"An Analysis of the impact of economic Wealth and National Culture on the rise and fall of software piracy rates† found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country. 2.4.5 Cost of original software At an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997). Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate. Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000; Traphagan Griffith, 1998; Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users believed that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999);Block et al.., (1993); Cheng et al.., (1997). 2.4.6 Software piracy in an ethical context Banerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions. Loch and Conger (1996) in their study found that attitude and social norms play an important role in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of software piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990) Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior. Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological[1]F and teleological[2]F consequences of behavior) study showed both were found to influence the decision to use pirated software. Peace et al.., (2003,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software. Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy. Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of the students to use pirated software (Simpson et al.., 1994; Taylor and Shim.., 1993). Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007). Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy. Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior. Researches concludes that use of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives. With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as â€Å"over belief in our ability to succeed in a specific situation†. Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software. Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view. 2.4.7 Problem of software piracy Softwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft. McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not stop people from using pirated software. 2.4.8 Software piracy from a different angle Researchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy. Givon et al, (1995), in their paper, â€Å"Software Piracy: Estimation of lost sales and impact on software diffusion† used a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software. However, Solomon and OBrien.., (1990,) had a different view; they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software; because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991; Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,) 2. 5 Models used in literatures of software piracy In this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below. 2.5.2 Tim Goles et al Model Tim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown below: The model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the persons intention Demographic Analysis of Software Piracy Users Demographic Analysis of Software Piracy Users Software Piracy: Most common factors that influence the intention to use among college students in Selangor, Malaysia Abstract Software piracy is one of the worst problems facing the software industry, and the piracy rate around the world is rising and in 2008 alone software industry lost more than US$ 5.3 billion due to software piracy, and in the same time frame Malaysian software industry lost around US$ 368 million. Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem. This research identified six variables that influence the intention of college students to use pirated software; they are Gender, Age, Value Consciousness, Attitude, Peer pressure and Novelty seeking. A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The study found out that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software. 1.0 Chapter 1: Introduction: Software piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating (Honick and Craig, 2005). Independent study sponsored by Business software Alliance (BSA) shows that software piracy is the worst problem that software industry faced, BSA defines software piracy as the unauthorized copying or distribution of softwares. When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright owner of the software. According to Microsoft there are 5 basic type of piracy, 1- End user copying: Here individuals or organizations copy and distribute unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits. 2- Hard disk loading: this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are not aware of the wrong doing 3- Counterfeiting: software and its packaging are illegally produced in a large scale. 4- Online: Online piracy occurs when the end user download the software from an online source without the permission of the copyright owner. 5- License misuse: software distributed with a discount rates for the high-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are not qualified for the software. 1.1 Background of the problem TA study conducted by BSA (200X), shows that piracy rates went up from 38% in 2007 to 41% in 2008 worldwide, however the encouraging news is that among the 110 countries the study was conducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008. Lowest piracy countries according to the BSA(200x), research were the United States Luxemburg, New Zealand and Japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%. Research conducted by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it will create more that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 more that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry. For every dollar of the software sold another 3 or 4 dollars are paid to the local IT farms, in other words software piracy means less jobs in Information Technology Industry, as per IDC (200x) study if piracy is reduced 10%, governments will generate more that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additional 15 dollars to every 100 dollars spent on software, meaning software add 15% to the price of legitimate software because of software piracy. Software piracy will also increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of peer-to-peer sites offering illegal software infect the computers with virus and other types of identity theft tools. Software piracy is somewhat out of controlled in the real world, Microsoft investigators found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated ( Carbon 1997). The population of Malaysia is estimated at 28 million and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007). 1.2 Problem statement In Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of financial losses, Malaysia lost over US $ 368 million compare to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007). This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently. 1.3 Objective of the study: Software piracy has become a worldwide dilemma due to the financial and economic losses the software industry and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear. For an issue that has gone out of control, like software piracy, its important to identify grass root problems. In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software; this will help the software industry to come up with better strategies in the fight against software piracy. TAs colleges and universities are identified as breeding grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students believe its ethical to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian context. 1.4 Purpose of the study: TA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy. Protecting the intellectual property is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is due to the casual attitude of the consumers towards intellectual property rights (SIIA KPMG 2001). Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court ruled that intellectual properties were protected (Lau, 2006). According to the Malaysian copy right act 1987, if an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison sentence of not exceeding five years, or both. Preventives and deterrents are the commonly used techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it difficult for software crackers to crack the software by increasing the security features. The idea behind the preventive concept is that, when it becomes difficult to crack, the software hackers will find cracking softwares are hard and eventually give up. Deterrent uses the laws and regulation to prevent software piracy. The truth is preventives and deterrents are not so effective, the higher security that is placed in the softwares are checked by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that deterrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected. This proves the need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy. 1.5 Justification of the study: There have been number of studies conducted in relation with software piracy among the college students, however a study focused on college students in Malaysia is not found, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software. Since most of the current studies are conducted outside Malaysia, there might be some significant difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia. T 1.6 Research questions This study aims to answer following questions. Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia? Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia? 1.7 Organization of the study: This study has five chapters; the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions. The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of software piracy are discussed. Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study. The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions. 2.0 Chapter 2: Literature Review First part of this chapter reviews different theories related to behavior and ethics, particularly the Theory of Reasoned Actions by Fishbein and Ajzen, Theory of planned behavior by Ajzen and theory of moral development by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software. Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to explain software piracy. 2.1 Theory of reasoned action Theory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein (1980) were used to explain why an individual behaves in a certain manner. The theory is based on the assumption that humans are rational and information available to them will be used systematically. TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior. The Theory of Reasoned Actions (TRA) identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms. Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998) Enker (1987) examined how attitude and normative belief is related to cheating and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual. The motive behind explaining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy. 2.2 Theory of planned behavior In 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed; he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen developed the Theory of Planned behavior (TPB), which was an extension of Theory of Reasoned Actions The new model proposed by Ajzen included the Perceived Behavior Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty level in performing a certain behavior (Ajzen and Madden, 1986). The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control. Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000) Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA. Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software. 2.3 Kohlbergs theory of moral development Kohlberg (1969) developed the theory of moral development, which consists of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually. Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole. Conventional is the second level of moral development, in this level individuals focus more on a group, this is the level where peer pressure begins to influence the decision of an individual. At the first stage of this level an individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner. Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision making. According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting. 2.4 Software piracy literature 2.4.1 Age Prior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006; Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users between the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy. 2.4.2 Gender Kini et al.., (2004), suggest that female students have a higher morality than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software. 2.4.3 Consequences of using pirated software Using pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994). However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon. 2.4.4 Income and economic conditions related to software piracy The study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the original softwares is related to his or her income. Countries with higher Gross National Income (GNI) such as United States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008). Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a country; however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy. 2.4.4.1 Top 10 high and low piracy rates Countries with high piracy rate % Countries with low piracy rate % Georgia 95 United States 20 Bangladesh 92 Japan 21 Armenia 92 Luxembourg 21 Zimbabwe 92 New Zealand 22 Sri Lanka 90 Austria 24 Azerbaijan 90 Belgium 25 Moldova 90 Denmark 25 Yemen 89 Sweden 25 Libya 87 Switzerland 25 Table 2.2: Top 10 High and Low piracy rate Source: BSA piracy report 2008 Moores (2008) in his study on â€Å"An Analysis of the impact of economic Wealth and National Culture on the rise and fall of software piracy rates† found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country. 2.4.5 Cost of original software At an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997). Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate. Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000; Traphagan Griffith, 1998; Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users believed that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999);Block et al.., (1993); Cheng et al.., (1997). 2.4.6 Software piracy in an ethical context Banerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions. Loch and Conger (1996) in their study found that attitude and social norms play an important role in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of software piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990) Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior. Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological[1]F and teleological[2]F consequences of behavior) study showed both were found to influence the decision to use pirated software. Peace et al.., (2003,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software. Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy. Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of the students to use pirated software (Simpson et al.., 1994; Taylor and Shim.., 1993). Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007). Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy. Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior. Researches concludes that use of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives. With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as â€Å"over belief in our ability to succeed in a specific situation†. Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software. Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view. 2.4.7 Problem of software piracy Softwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft. McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not stop people from using pirated software. 2.4.8 Software piracy from a different angle Researchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy. Givon et al, (1995), in their paper, â€Å"Software Piracy: Estimation of lost sales and impact on software diffusion† used a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software. However, Solomon and OBrien.., (1990,) had a different view; they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software; because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991; Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,) 2. 5 Models used in literatures of software piracy In this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below. 2.5.2 Tim Goles et al Model Tim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown below: The model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the persons intention