Thursday, October 31, 2019

A study of War and Military History, 1867 to the Present Essay

A study of War and Military History, 1867 to the Present - Essay Example With its large expanse of land mass covering North America, right above the United States, proved to be of strategic importance for the British. Trade between Canada and the main British isle was usually undeterred by the vast Atlantic Ocean, and such supply routes were usually left undisturbed for the most part. On the social and political situation, the Canadians were mostly North American colonists who remained loyal to British imperial rule and also composed of colonists from the United States who maintained their allegiance with the British rule. This group of Canadians formed the majority of Canada’s society and usually held a strong voice with regards to the colonial affairs. On the other hand, there were also the French speaking Canadians who were mostly from the domain of Quebec and Montreal. The French Canadians were formerly French Empire colonists during the 16th and 17th century who were conquered by the British by the end of the French-Indian War. The fact that F rench Canadians were usually not treated with much respect as that of the English Canadians, French Canadians most of the time took the polar opposite with regards to political opinion. When the outbreak of the First World War happened in Europe, it was first thought that the British Empire would not be involved in the war which at first was thought to be merely involved between the Austria-Hungary against Serbia. But when Germany entered the war, in the side of Austria-Hungary, Great Britain decided to enter the war against what would later be known as the Central Powers, namely the German Empire and the Austro-Hungarian Empire, to prevent the German Empire from expanding its imperial influence. Canada was involved in this armed struggle across its borders since it had its obligations as a colony of the British Empire. Prior to all this, Canada had a large standing militia force, yet a small regular army and an even smaller navy. Sam Hughes, the Minister of Militia and Defense during that time, was tasked to raise enough soldiers for the war in Europe to complement the British forces around the Western Front. For this to be done, volunteers of men were needed to be implemented to enlist enough manpower to be of potential support for the war efforts. Many joined in the hundreds of thousands, becoming known as the Canadian Expeditionary Force. Canadians were known to serve well and with distinction. They were notable in their involvement in major battles such as the Battles of Ypres, Somme, Vimy Ridge, Passchendaele and the Hundred Days offensive. Canadian Corps were considered as fine soldiers, being highly motivated and dogged. But as the war dragged on and losses were mounting high on the British and its Commonwealth forces, it came to the point that conscription would be needed. After the Battle of Somme, in which casualties on both sides of the belligerents where high, there was a great demand to reinforce the forces in the Western Front. Because of the terrible amount of casualties as the battles raged on the trenches in the Western front with no clear or decisive victory in sight, the number of volunteers of Canadians drastically dropped . This eventually caused conscription to be seen as a necessary measure for the Canadian government to pass the act of conscription. By this period, the government Canada decided to pass the act of conscription. Opinions about conscription in Canada during the First World War were divided distinctly between the

Tuesday, October 29, 2019

Earnest Hemingway's "The Indian camp" Essay

Earnest Hemingway's "The Indian camp" - Essay Example Nick becomes his assistant in the operation. Not long after, the expectant womans husband is discovered dead having slit his throat during the operation. The Indian Camp story reveals the upcoming of Hemingways use of counterpoint and the understated style. He addresses several thematic concerns that affected the people at the time. These are the theme of racism, sexism, masculinity and life and death. The ‘Indian Camp’ remains an important story in the canon of Hemingway to date. Being an initiation camp, the Indian Camp is used in the story to explain the theme life and death. Dr Adams, Nick’s father, exposes his son at a young age to childbirth. In the process, he unintentionally exposes the boy to violent death. Having witnessed the birth and death at the same time, Nick equates birth to death (Dudley 17). Although Nick may not have wanted to watch his father perform the caesarean, his father insists that he should do. Symbolically, he wants to make his son tough and prepare him for initiation into the adult world that was not always smooth. The theme of life and death is a symbolic depiction of the conditions of the Native American camp. There are struggles for life in the camp in which death romped life from people. The coming to birth of a child signifies the continuity of life in the camp (Dudley 18). However, life is lost at the same time when the childs father kills himself by slitting his throat with a sharp blade during the operation. In his story, Hemingway explains the desperate state of a struggle for life and at the same time the irony in a persons depriving his life. It is ironical that an effort is made to make the baby live signifying the value attached to life at the camp while at the same time the father takes his life. Fear of death is implicated in Nick’s fear for the death when thoughts of death in the forest a night before the operation overwhelm him. The themes of racism and sexism in the story are depicted in the

Sunday, October 27, 2019

Demographic Analysis of Software Piracy Users

Demographic Analysis of Software Piracy Users Software Piracy: Most common factors that influence the intention to use among college students in Selangor, Malaysia Abstract Software piracy is one of the worst problems facing the software industry, and the piracy rate around the world is rising and in 2008 alone software industry lost more than US$ 5.3 billion due to software piracy, and in the same time frame Malaysian software industry lost around US$ 368 million. Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem. This research identified six variables that influence the intention of college students to use pirated software; they are Gender, Age, Value Consciousness, Attitude, Peer pressure and Novelty seeking. A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The study found out that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software. 1.0 Chapter 1: Introduction: Software piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating (Honick and Craig, 2005). Independent study sponsored by Business software Alliance (BSA) shows that software piracy is the worst problem that software industry faced, BSA defines software piracy as the unauthorized copying or distribution of softwares. When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright owner of the software. According to Microsoft there are 5 basic type of piracy, 1- End user copying: Here individuals or organizations copy and distribute unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits. 2- Hard disk loading: this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are not aware of the wrong doing 3- Counterfeiting: software and its packaging are illegally produced in a large scale. 4- Online: Online piracy occurs when the end user download the software from an online source without the permission of the copyright owner. 5- License misuse: software distributed with a discount rates for the high-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are not qualified for the software. 1.1 Background of the problem TA study conducted by BSA (200X), shows that piracy rates went up from 38% in 2007 to 41% in 2008 worldwide, however the encouraging news is that among the 110 countries the study was conducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008. Lowest piracy countries according to the BSA(200x), research were the United States Luxemburg, New Zealand and Japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%. Research conducted by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it will create more that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 more that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry. For every dollar of the software sold another 3 or 4 dollars are paid to the local IT farms, in other words software piracy means less jobs in Information Technology Industry, as per IDC (200x) study if piracy is reduced 10%, governments will generate more that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additional 15 dollars to every 100 dollars spent on software, meaning software add 15% to the price of legitimate software because of software piracy. Software piracy will also increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of peer-to-peer sites offering illegal software infect the computers with virus and other types of identity theft tools. Software piracy is somewhat out of controlled in the real world, Microsoft investigators found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated ( Carbon 1997). The population of Malaysia is estimated at 28 million and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007). 1.2 Problem statement In Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of financial losses, Malaysia lost over US $ 368 million compare to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007). This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently. 1.3 Objective of the study: Software piracy has become a worldwide dilemma due to the financial and economic losses the software industry and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear. For an issue that has gone out of control, like software piracy, its important to identify grass root problems. In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software; this will help the software industry to come up with better strategies in the fight against software piracy. TAs colleges and universities are identified as breeding grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students believe its ethical to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian context. 1.4 Purpose of the study: TA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy. Protecting the intellectual property is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is due to the casual attitude of the consumers towards intellectual property rights (SIIA KPMG 2001). Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court ruled that intellectual properties were protected (Lau, 2006). According to the Malaysian copy right act 1987, if an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison sentence of not exceeding five years, or both. Preventives and deterrents are the commonly used techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it difficult for software crackers to crack the software by increasing the security features. The idea behind the preventive concept is that, when it becomes difficult to crack, the software hackers will find cracking softwares are hard and eventually give up. Deterrent uses the laws and regulation to prevent software piracy. The truth is preventives and deterrents are not so effective, the higher security that is placed in the softwares are checked by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that deterrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected. This proves the need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy. 1.5 Justification of the study: There have been number of studies conducted in relation with software piracy among the college students, however a study focused on college students in Malaysia is not found, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software. Since most of the current studies are conducted outside Malaysia, there might be some significant difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia. T 1.6 Research questions This study aims to answer following questions. Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia? Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia? 1.7 Organization of the study: This study has five chapters; the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions. The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of software piracy are discussed. Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study. The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions. 2.0 Chapter 2: Literature Review First part of this chapter reviews different theories related to behavior and ethics, particularly the Theory of Reasoned Actions by Fishbein and Ajzen, Theory of planned behavior by Ajzen and theory of moral development by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software. Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to explain software piracy. 2.1 Theory of reasoned action Theory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein (1980) were used to explain why an individual behaves in a certain manner. The theory is based on the assumption that humans are rational and information available to them will be used systematically. TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior. The Theory of Reasoned Actions (TRA) identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms. Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998) Enker (1987) examined how attitude and normative belief is related to cheating and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual. The motive behind explaining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy. 2.2 Theory of planned behavior In 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed; he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen developed the Theory of Planned behavior (TPB), which was an extension of Theory of Reasoned Actions The new model proposed by Ajzen included the Perceived Behavior Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty level in performing a certain behavior (Ajzen and Madden, 1986). The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control. Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000) Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA. Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software. 2.3 Kohlbergs theory of moral development Kohlberg (1969) developed the theory of moral development, which consists of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually. Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole. Conventional is the second level of moral development, in this level individuals focus more on a group, this is the level where peer pressure begins to influence the decision of an individual. At the first stage of this level an individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner. Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision making. According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting. 2.4 Software piracy literature 2.4.1 Age Prior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006; Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users between the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy. 2.4.2 Gender Kini et al.., (2004), suggest that female students have a higher morality than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software. 2.4.3 Consequences of using pirated software Using pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994). However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon. 2.4.4 Income and economic conditions related to software piracy The study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the original softwares is related to his or her income. Countries with higher Gross National Income (GNI) such as United States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008). Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a country; however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy. 2.4.4.1 Top 10 high and low piracy rates Countries with high piracy rate % Countries with low piracy rate % Georgia 95 United States 20 Bangladesh 92 Japan 21 Armenia 92 Luxembourg 21 Zimbabwe 92 New Zealand 22 Sri Lanka 90 Austria 24 Azerbaijan 90 Belgium 25 Moldova 90 Denmark 25 Yemen 89 Sweden 25 Libya 87 Switzerland 25 Table 2.2: Top 10 High and Low piracy rate Source: BSA piracy report 2008 Moores (2008) in his study on â€Å"An Analysis of the impact of economic Wealth and National Culture on the rise and fall of software piracy rates† found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country. 2.4.5 Cost of original software At an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997). Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate. Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000; Traphagan Griffith, 1998; Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users believed that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999);Block et al.., (1993); Cheng et al.., (1997). 2.4.6 Software piracy in an ethical context Banerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions. Loch and Conger (1996) in their study found that attitude and social norms play an important role in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of software piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990) Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior. Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological[1]F and teleological[2]F consequences of behavior) study showed both were found to influence the decision to use pirated software. Peace et al.., (2003,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software. Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy. Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of the students to use pirated software (Simpson et al.., 1994; Taylor and Shim.., 1993). Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007). Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy. Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior. Researches concludes that use of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives. With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as â€Å"over belief in our ability to succeed in a specific situation†. Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software. Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view. 2.4.7 Problem of software piracy Softwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft. McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not stop people from using pirated software. 2.4.8 Software piracy from a different angle Researchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy. Givon et al, (1995), in their paper, â€Å"Software Piracy: Estimation of lost sales and impact on software diffusion† used a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software. However, Solomon and OBrien.., (1990,) had a different view; they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software; because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991; Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,) 2. 5 Models used in literatures of software piracy In this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below. 2.5.2 Tim Goles et al Model Tim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown below: The model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the persons intention Demographic Analysis of Software Piracy Users Demographic Analysis of Software Piracy Users Software Piracy: Most common factors that influence the intention to use among college students in Selangor, Malaysia Abstract Software piracy is one of the worst problems facing the software industry, and the piracy rate around the world is rising and in 2008 alone software industry lost more than US$ 5.3 billion due to software piracy, and in the same time frame Malaysian software industry lost around US$ 368 million. Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem. This research identified six variables that influence the intention of college students to use pirated software; they are Gender, Age, Value Consciousness, Attitude, Peer pressure and Novelty seeking. A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The study found out that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software. 1.0 Chapter 1: Introduction: Software piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating (Honick and Craig, 2005). Independent study sponsored by Business software Alliance (BSA) shows that software piracy is the worst problem that software industry faced, BSA defines software piracy as the unauthorized copying or distribution of softwares. When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright owner of the software. According to Microsoft there are 5 basic type of piracy, 1- End user copying: Here individuals or organizations copy and distribute unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits. 2- Hard disk loading: this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are not aware of the wrong doing 3- Counterfeiting: software and its packaging are illegally produced in a large scale. 4- Online: Online piracy occurs when the end user download the software from an online source without the permission of the copyright owner. 5- License misuse: software distributed with a discount rates for the high-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are not qualified for the software. 1.1 Background of the problem TA study conducted by BSA (200X), shows that piracy rates went up from 38% in 2007 to 41% in 2008 worldwide, however the encouraging news is that among the 110 countries the study was conducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008. Lowest piracy countries according to the BSA(200x), research were the United States Luxemburg, New Zealand and Japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%. Research conducted by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it will create more that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 more that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry. For every dollar of the software sold another 3 or 4 dollars are paid to the local IT farms, in other words software piracy means less jobs in Information Technology Industry, as per IDC (200x) study if piracy is reduced 10%, governments will generate more that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additional 15 dollars to every 100 dollars spent on software, meaning software add 15% to the price of legitimate software because of software piracy. Software piracy will also increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of peer-to-peer sites offering illegal software infect the computers with virus and other types of identity theft tools. Software piracy is somewhat out of controlled in the real world, Microsoft investigators found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated ( Carbon 1997). The population of Malaysia is estimated at 28 million and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007). 1.2 Problem statement In Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of financial losses, Malaysia lost over US $ 368 million compare to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007). This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently. 1.3 Objective of the study: Software piracy has become a worldwide dilemma due to the financial and economic losses the software industry and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear. For an issue that has gone out of control, like software piracy, its important to identify grass root problems. In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software; this will help the software industry to come up with better strategies in the fight against software piracy. TAs colleges and universities are identified as breeding grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students believe its ethical to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian context. 1.4 Purpose of the study: TA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy. Protecting the intellectual property is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is due to the casual attitude of the consumers towards intellectual property rights (SIIA KPMG 2001). Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court ruled that intellectual properties were protected (Lau, 2006). According to the Malaysian copy right act 1987, if an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison sentence of not exceeding five years, or both. Preventives and deterrents are the commonly used techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it difficult for software crackers to crack the software by increasing the security features. The idea behind the preventive concept is that, when it becomes difficult to crack, the software hackers will find cracking softwares are hard and eventually give up. Deterrent uses the laws and regulation to prevent software piracy. The truth is preventives and deterrents are not so effective, the higher security that is placed in the softwares are checked by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that deterrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected. This proves the need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy. 1.5 Justification of the study: There have been number of studies conducted in relation with software piracy among the college students, however a study focused on college students in Malaysia is not found, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software. Since most of the current studies are conducted outside Malaysia, there might be some significant difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia. T 1.6 Research questions This study aims to answer following questions. Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia? Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia? 1.7 Organization of the study: This study has five chapters; the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions. The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of software piracy are discussed. Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study. The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions. 2.0 Chapter 2: Literature Review First part of this chapter reviews different theories related to behavior and ethics, particularly the Theory of Reasoned Actions by Fishbein and Ajzen, Theory of planned behavior by Ajzen and theory of moral development by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software. Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to explain software piracy. 2.1 Theory of reasoned action Theory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein (1980) were used to explain why an individual behaves in a certain manner. The theory is based on the assumption that humans are rational and information available to them will be used systematically. TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior. The Theory of Reasoned Actions (TRA) identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms. Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998) Enker (1987) examined how attitude and normative belief is related to cheating and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual. The motive behind explaining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy. 2.2 Theory of planned behavior In 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed; he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen developed the Theory of Planned behavior (TPB), which was an extension of Theory of Reasoned Actions The new model proposed by Ajzen included the Perceived Behavior Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty level in performing a certain behavior (Ajzen and Madden, 1986). The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control. Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000) Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA. Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software. 2.3 Kohlbergs theory of moral development Kohlberg (1969) developed the theory of moral development, which consists of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually. Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole. Conventional is the second level of moral development, in this level individuals focus more on a group, this is the level where peer pressure begins to influence the decision of an individual. At the first stage of this level an individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner. Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision making. According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting. 2.4 Software piracy literature 2.4.1 Age Prior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006; Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users between the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy. 2.4.2 Gender Kini et al.., (2004), suggest that female students have a higher morality than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software. 2.4.3 Consequences of using pirated software Using pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994). However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon. 2.4.4 Income and economic conditions related to software piracy The study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the original softwares is related to his or her income. Countries with higher Gross National Income (GNI) such as United States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008). Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a country; however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy. 2.4.4.1 Top 10 high and low piracy rates Countries with high piracy rate % Countries with low piracy rate % Georgia 95 United States 20 Bangladesh 92 Japan 21 Armenia 92 Luxembourg 21 Zimbabwe 92 New Zealand 22 Sri Lanka 90 Austria 24 Azerbaijan 90 Belgium 25 Moldova 90 Denmark 25 Yemen 89 Sweden 25 Libya 87 Switzerland 25 Table 2.2: Top 10 High and Low piracy rate Source: BSA piracy report 2008 Moores (2008) in his study on â€Å"An Analysis of the impact of economic Wealth and National Culture on the rise and fall of software piracy rates† found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country. 2.4.5 Cost of original software At an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997). Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate. Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000; Traphagan Griffith, 1998; Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users believed that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999);Block et al.., (1993); Cheng et al.., (1997). 2.4.6 Software piracy in an ethical context Banerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions. Loch and Conger (1996) in their study found that attitude and social norms play an important role in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of software piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990) Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior. Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological[1]F and teleological[2]F consequences of behavior) study showed both were found to influence the decision to use pirated software. Peace et al.., (2003,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software. Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy. Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of the students to use pirated software (Simpson et al.., 1994; Taylor and Shim.., 1993). Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007). Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy. Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior. Researches concludes that use of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives. With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as â€Å"over belief in our ability to succeed in a specific situation†. Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software. Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view. 2.4.7 Problem of software piracy Softwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft. McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not stop people from using pirated software. 2.4.8 Software piracy from a different angle Researchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy. Givon et al, (1995), in their paper, â€Å"Software Piracy: Estimation of lost sales and impact on software diffusion† used a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software. However, Solomon and OBrien.., (1990,) had a different view; they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software; because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991; Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,) 2. 5 Models used in literatures of software piracy In this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below. 2.5.2 Tim Goles et al Model Tim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown below: The model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the persons intention

Friday, October 25, 2019

Buffalo Soldiers in the West Essay -- essays papers

Buffalo Soldiers in the West Throughout American history, African Americans haven’t had too much say in whether or not they belonged in the United States or not. Slavery without a doubt had a great impact upon their decisions. However, despite their troubles, African Americans have paid their dues and have made an impact on our armed forces since the Revolutionary War. African Americans have fought to preserve the rights for Americans, as well as having to fight the war within their very own country to gain the right to fight for their country and their individual freedom. Approximately sixteen months after the end of the Civil War, an Act of Congress entitled the Buffalo Soldiers â€Å"An Act to increase and fix the Military Peace Establishment of the United States†. Which authorized the formation of tow regiments of cavalry to be composed of colored men. This act was approved on July 28th, 1866. On September 21st, 1866, the 9th cavalry regiment was activated in Greenville, LA, along with the 10th cavalry regiment, which was activated at Fort Leavenworth, KS. Even though the African American soldiers clearly distinguished themselves as soldiers, they were by no means wanted in the army. Shortly after General Washington took command of the Army, the white colonists decided that not only should no black slaves or freemen be enlisted, but that those already serving in the Army should be dismissed. The colonists didn’t enjoy the black soldiers in the army because they felt that blacks weren’t smart enough and as well trained to handle themselves in battle. In turn, would only be taking up space and food for the other soldiers who they felt were more equipped to fight with the army in major battles. The colonists would probably have kept Blacks out of the military during the war if it were not for the proclamation by the Lord of Dunmore. His statement was, "I do hereby... declare all... Negroes... free, that are able and willing to bear arms, they joining his Majesty's troops, as soon as may be, for the more speedily reducing this colony to a proper dignity." This meant that any black soldiers willing to fight for the British would be declared legally free. Therefore, the Americans couldn't afford to deny Black Americans, free or not, from joining the army. Less than a month after Lord Dunmore’s proclamation, General George Washington officially revers... ...the Union army. Unfortunately, Abraham Lincoln was more concerned with political relations than the treatment of African American slaves. The federal government and the Union army only began to adopt a policy of allowing and even encouraging the recruitment of Blacks. Then, it became clear that the war would be a long and drawn out conflict in which it was necessary to mobilize all the resources possible and to weaken the enemy as much as possible. Even then Black troops weren't really used. In July of 1862, Congress authorized the use of black soldiers in the Civil War, but there was no follow-up of that order until January 1, 1863 when Abraham Lincoln put the Emancipation Proclamation into effect. It was never known for sure why the black soldiers were thought as Buffalo Soldiers, but some say that the Indians saw a resemblance between the black man’s hair and the mane of a buffalo. Others thought that when a buffalo was wounded or cornered, it fought ferociously displaying unusual stamina and courage. The Indians felt their fighting spirit in was equivalent to the buffalo, which to them is an animal held in high regard. Bibliography: www.yahoo.com www.google.com

Thursday, October 24, 2019

Turn of the Screw

Claire Carlson English 3H February 7, 2013 Period 1 Spring Essay: Turn of the Screw Page I: The Governess and Miles Page II: The Governess and Mrs. Grose Page III: Corruption of Innocence Henry James’s Turn of the Screw is the eerie tale of a governess sent to care for two mischievous young children, Flora and Miles. Many people mistake it for a ghost story, but the story actually focuses more on the governess’s relationship with the children. Her thirst for acceptance gradually grows as the story progresses, and she becomes especially fascinated with Miles.Women have always been viewed as slightly inferior to men; they are depicted as weak and fragile creatures, only serving as a companion for man. They are manipulative and often use charm and looks as methods of persuasion. In Turn of the Screw, the governess ‘s attitude while around Miles is flirtatious and almost inappropriate; and she uses him to fill the void of the children’s beloved uncle whom she l usts for. The above example of the governess’s craving for Miles’s attention can be easily compared to the behavior exhibited by much of the female population today.Note that the woman is always seeking to please the man, and strives to satisfy and serve him. The attitude of women in the modern world is becoming more and more submissive; almost voluntarily. Miles’s reaction to the behavior of the unnamed governess is merely compliant, and in some instances of the novel he somewhat encourages her inappropriate behavior. Mrs. Grose, the simpleminded and somewhat slow housekeeper at the estate, represents a middle ground between the mischievous children and whimsical governess. The reader can easily conclude that the governess abuses Mrs.Grose’s quite malleable opinion of the children. In several instances, the governess consults Mrs. Grose and uses her as an outlet for her frustrations with the children. As the governess shares her ghostly encounters with Q uint and Miss Jessel, she convinces Mrs. Grose that her hysteria is justified. Since Mrs. Grose is not significantly talkative, it is difficult to form a conclusion about her opinion of the children and the governess. The reader has to infer that Mrs. Grose has spent quite some time at the estate, and has much experience with the children’s behavior. Mrs.Grose doesn’t necessarily agree or disagree with the statements and assertions made by the governess, she is merely a cache, storing the governess’s thoughts and responding with uncomprehending feedback. The children’s relationship with Mrs. Grose is somewhat distant and peculiar. They only consult her for affirmation and approval. In conclusion, Mrs. Grose is mainly an unresponsive character and is not a major influence on the circumstances of the story. Since the governess seldom approaches the children directly, we can infer that she would rather keep her knowledge of Quint and Jessel to herself.She of ten consults Mrs. Grose in order to gather as much as she can about the two. The governess is afraid that the children know too much, and fears that their knowledge of Quint and Jessel’s sexual relationship will affect them negatively. The fact that she is more concerned about the children knowing too much rather than protecting them from the possible harm that the ghosts can inflict, shows the reader that the governess incorporates her own fears and desires into the situation. In conclusion, Turn of the Screw is a much more complex and confusing story than meets the eye.The reader must question the behavior of the governess and the children in order to gather valuable information about the ghosts, and it seems as though in certain instances that Quint and Jessel are living through Flora and Miles. The governess is indeed a much more questionable character than the book portrays her to be. From my experience with both the book and a movie interpretation of the book, I have co ncluded that the governess is actually the main source of the hysteria and trauma at Bly.

Wednesday, October 23, 2019

Basic Solutions for Bad Study Habit

†¢Balancing school and friends. This can be a challenge. Friendships are important but so is school. The best way to balance school and friends is to study together. Good friends will support your academic and future goals. You can also make friends with other people who are planning for college and taking the same classes as you. †¢Add interest to your reading assignments. To get through a long reading assignment, imagine yourself in the story. Get involved. Ask yourself, â€Å"What is important to remember about this section? † You should always take notes or underline key sections and discuss the material with others in your class.You can also create a study group and break the assignment into different sections. Each person can be responsible for closely studying one part of the text. The other parts you can skim or outline. Then get together as a group to share what you’ve learned. †¢Cramming before a test. Cramming before a test is always a bad idea . Start studying well in advance. Begin with an hour or two a day and then increase your study time as exams approach. †¢Don’t know where to start. Your challenge is to prioritize. With a big project, list all the things you have to do.Then split the project into small, manageable chunks. Ask, â€Å"Which part is due first? Which part of the assignment is worth more points? Which task will take the most time to complete? † Decide which tasks are most important and what order you’ll use to get things done. Then get started! The most important thing to remember is start early and work a little bit each day. You’ll be amazed at how much progress you make. †¢Staying up all night to study. Before a test, it is important to get enough sleep. Period. Make time to relax and unwind before each test.Be sure to eat well, sleep well and maybe get some exercise. You’re more likely to do better on the test if you take care of yourself. †¢Not enoug h time to study. The trick to solving this problem is getting organized. Bring out all of your notes and textbooks. Identify the most important information and the things you don’t understand. Focus your study time and energy on learning those things. If you need extra help, ask a teacher or tutor. If after school activities are the problem, keep a calendar with game days, meetings, assignments and practice times.Start assignments right when you get them, and use lunch hours and breaks to make extra progress. †¢Trouble remembering things. If you only have trouble sometimes, try connecting new information with your own examples and experiences. Use rhymes, poems or mental pictures to help remember important facts. Some people even make up songs to help them remember things. If you always have trouble remembering, no matter how long or hard you study, talk to your teacher or school counselor. They can talk with you about your specific problems and recommend strategies to h elp.

Tuesday, October 22, 2019

Conversion Under Tort Law Essays

Conversion Under Tort Law Essays Conversion Under Tort Law Essay Conversion Under Tort Law Essay 320 5/19/2012 Conversion under Tort Law The layman’s definition for conversion is basically considered theft; according to our text â€Å"whenever a person wrongfully possesses or uses the personal property of another without permission† is considered conversion†¦.. †deprives an owner of personal property or of the use of that property without that owner’s permission†. On March 28 of this year, my car was stolen from my employer’s parking lot and was recovered eight days later by the local police. There was surveillance video of the subject entering and driving away in my car, due to the distance a positive ID was unable to be made. Without the video, the act (Actus Reus) of conversion (theft) could have been arguable, being there was no burden of proof. In order for an individual to be charged, there is an information (a form) that is required to be filled out; in my case a police report by a Peace Officer, in order to make a claim that a specific type of theft has occurred. Within the report, certain facts (or beliefs) would be contained supporting that it occurred with specificity and particularity. Here in Illinois, detailed descriptions of vehicle theft laws are found in the Ilinois Vehicle Code, and not the Criminal Code, under 625 ILCS 5/4-103 through 103. 3. In most cases auto thefts are considered Class 2 felonies, punishable by up to seven years imprisonment. There are many different types of conversion, not all of them involving tangible personal property or may not be considered theft at all. An example of conversion using intangible personal property could be the use of computer software, domain names, stocks, and bonds, to name just a few. Another consideration could be the unknowing purchase of stolen items, where the original subject that committed the theft is for all intensive purposes absolved of any wrongdoing by default, when the third party became involved. The buyer of the stolen items is then required to either return the stolen items or monetarily compensate the rightful owner for full value. In order to make a conversion claim, the plaintiff has to establish four elements. 1) the plaintiff owns or the right to possess he property, 2) defendant intentionally interfered with the property, 3) the interference deprived the plantiff of possession or use of the property, and 4) the interference caused damages to the plaintiff and/or the property. There are many different defenses in a conversion case if it ends up in litigation. There is abandonment; the property was abandoned by the owner prior to being taken by the defendant. Consent or approbation; the plaintiff’s consent can be implied. Privilege; the finder of lost property may be entitled to use or ownership if the real owner cannot be identified. As a policy, the local Police do not investigate auto thefts unless there was a crime committed with the car. Given the fact the subject seen on video was not able to be identified, the case was closed. The interior of the car was vandalized to the point that my insurance carrier considered the car a total loss. Because all four of the elements listed earlier, I was unable to make a conversion claim. : Cross, F. B. , amp; Miller, R. L. (2012). The legal environment of business: Text and cases-ethical, regulatory, global, and corporate issues. (8th ed. ). Mason, OH: South-Western Cengage Learning.

Monday, October 21, 2019

Free Essays on From The French Revolution To WWI

â€Å"From the French Revolution to WWI† King Louis XVI helped his country in many ways to prosperity. He wanted France to be the most powerful and influential nation. He was known as the â€Å"sun king†, which it’s meaning was that everyone evolved around him. The one thing that eventually was his downfall was that he was extremely devoted to wars for territory. He developed a huge army, improved technology for guns. He increased taxation because of the money he spent on developing his military. He eventually bankrupted France for his lack of financial budgeting, so to speak. There is a rise of a Parlament in France. The French Parlament is made of a group of Lawyers, Civil Servants, and Beaurocrats. They do not wish to let Louis to collect taxes, which is a â€Å"right† to him. So Louis issues an executive order to collect taxes. The estate’s general meet to discuss this situation. They came up with the â€Å"Cahiers†, or a list of 5 things that need to address: personal liberties or civil liberties guarantees, laws should come from the legislative body that represents entire population so they can move away from representation of limited population, development of a jury system for peasants so they can have fair treatment, freedom of the press, and abolition of unfair taxation because peasants were paying ridiculous amounts of taxes that it was extremely difficult for them to live off what money they had. Taxes consumed 80 % of their income. At this time, there were rumors that the King Louis was in Versailles and has a mercenary waiting to storm the estate’s general meeting. Then a mob gets together to attack the mercenary but unfortunately Lafayette calms the crowd. But it doesn’t help for the mob has later decided to arm themselves. The mob soon finds arms after many failed attempts at locating some, and then the mob turns ugly, rioting out of control. July 14, 1789, the French Revolution begins. On August 17, ... Free Essays on From The French Revolution To WWI Free Essays on From The French Revolution To WWI â€Å"From the French Revolution to WWI† King Louis XVI helped his country in many ways to prosperity. He wanted France to be the most powerful and influential nation. He was known as the â€Å"sun king†, which it’s meaning was that everyone evolved around him. The one thing that eventually was his downfall was that he was extremely devoted to wars for territory. He developed a huge army, improved technology for guns. He increased taxation because of the money he spent on developing his military. He eventually bankrupted France for his lack of financial budgeting, so to speak. There is a rise of a Parlament in France. The French Parlament is made of a group of Lawyers, Civil Servants, and Beaurocrats. They do not wish to let Louis to collect taxes, which is a â€Å"right† to him. So Louis issues an executive order to collect taxes. The estate’s general meet to discuss this situation. They came up with the â€Å"Cahiers†, or a list of 5 things that need to address: personal liberties or civil liberties guarantees, laws should come from the legislative body that represents entire population so they can move away from representation of limited population, development of a jury system for peasants so they can have fair treatment, freedom of the press, and abolition of unfair taxation because peasants were paying ridiculous amounts of taxes that it was extremely difficult for them to live off what money they had. Taxes consumed 80 % of their income. At this time, there were rumors that the King Louis was in Versailles and has a mercenary waiting to storm the estate’s general meeting. Then a mob gets together to attack the mercenary but unfortunately Lafayette calms the crowd. But it doesn’t help for the mob has later decided to arm themselves. The mob soon finds arms after many failed attempts at locating some, and then the mob turns ugly, rioting out of control. July 14, 1789, the French Revolution begins. On August 17, ...

Sunday, October 20, 2019

Case 5 the Ken Griffey Jr. Negotiation Summary

Case Summary Ken Griffey Jr. was a professional baseball player for the United States. Griffey was known as one of the first professional baseball players in the two North American leagues who held the post as an outfielder and has proven to be an excellent hitter and outstanding fielder over several years. During negotiations, Griffey played for a Seattle Team called Seattle Mariners. His contract with Seattle was to end in the 2000 season. If Griffey stayed in Seattle for the 2000 season and allowed his contract to expire, he could have become a free agent who can possibly sell his services and talent to other baseball teams. However, if Seattle can trade him during the time of the case, they could get something for Griffey because he has supreme talent which can bring Seattle many great players in return. Seattle could have tried to sign Griffey into a new contract but knew that Griffey was very unhappy in Seattle for several reasons. Griffey expressed on numerous occasions a desire to live closer to his relatives. After the 1999 season, Griffey’s request was approved and he was traded to the Cincinnati Reds for a couple players which involved Brett Tomko, Mike Cameron, Jake Meyer, and Antonio Perez. Originally, the expectations looked bright for Griffey in Cincinnati because the Reds had just come within one game of a playoff. Cincinnati was the city where Griffey grew up and he was very pleased to be playing on his father’s previous team. Ken Griffey, Jr. was a featured star of the Mariners and a fan favorite in Seattle throughout is tenure. The case involves negotiations that consist of professional baseball athlete Ken Griffey, Jr. which occurred during the winter of 2000.

Friday, October 18, 2019

Political Comic Strip & Character Essay Example | Topics and Well Written Essays - 750 words

Political Comic Strip & Character - Essay Example The political comic strip was therefore effective in relaying an intended message using the rhetorical element of ethos, or character. As shown, the speaker in the comic strip was noted to be a president due to the visual image of the presidential seal on the podium. The readers could in fact have other characters of a president in mind, were in not for the comic strip to have been printed and published during the helm of President Obama’s term. As a president of the United States, definitely, the credibility, reliability and trustworthiness of the person had been firmly established being the topmost elected political figure. As such, the argument in the strip focused on relaying that being the president, the only dilemma of a serious economic situation, such as government spending, is the perceived reluctance of the people to spend. The message was clear, straightforward and humorous and provided the needed appeal to a wider range of audience. Webpage on Ellen DeGeneres The b iographical webpage selected was biography.com and the famous person chosen for the discussion is Ellen DeGeneres, one of the most viewed television talk show hosts in the United States in contemporary times. The objective of this portion is to evaluate how the webpage makes an argument about the subject?s character. First, after searching for the name of Ellen DeGeneres from biography.com, her profile is immediately accessed. Viewers could see her photo at the left side portion of the screen, and under the photo were quick facts such as name, occupation, birthdate, education, place of birth and even her zodiac sign. Following that rundown of short personal information, the label ‘BEST KNOWN FOR’ â€Å"Ellen DeGeneres is one of America’s most well-known comedians and talk show hosts, also serving as a prominent gay/lesbian role model† (Ellen DeGeneres.biography, 2013, p. 1) was disclosed. From this information alone, viewers who could have not known DeGene res could already be provided with an accurate overview of what she represents. The most important adjectives or words that establish the person include well-known comedian, talk show host, and gay/lesbian role model. In the middle portion of the page, the topmost portion was reserved for viewers who might opt to see a video of Ellen. Below this portion, the following headings and detailed discussions were presented in the following order: synopsis, early life, stand-up comedy, Ellen: the Sitcom, Ellen: the Talk Show, and personal life; of which the whole information are contained in two pages. From the information that are presented in this webpage, viewers are provided with enough contents that could effectively establish the character of a person. Although one has known Ellen DeGeneres from being a regular viewer of her television show, some information were new and assisted in confirming that Ellen was indeed funny, talented and has a kind and sincere heart. Her closing remarks in her Ellen: the Talk Show: ‘be kind to one another’ aptly embodies her character. Likewise, by disclosing that she was a lesbian, the brief historical information on her life and specifically at the time when she revealed this homosexuality in public could be perceived as challenging; yet, necessary to provide a more accurate image of her sexuality. Eventually, the revelation paid off since from then, her

Negotiation Analysis- Negotiation Essay Example | Topics and Well Written Essays - 1250 words

Negotiation Analysis- Negotiation - Essay Example he second part will zero in on my negotiation experience—selling a flat screen television—by highlighting on both the results and what I could have done differently. In an online report entitled The Art of Negotiation, negotiation is defined as a basic means of getting what one party wants from another party (Filipovich & Watercourse 1). It occurs when the two parties have conflicting and complementary interests. Principled negotiation, as posited in the same repot, involves the separation of people from the problem being tackled; the focusing on the two parties’ interests rather than each one’s position; the invention of options for mutual gain; and the use of objective criteria all throughout the activity (Filipovich & Watercourse 2). Separating people from the problem means using joint problem-solving techniques by establishing harmonious communication and being critical to each one’s emotions and perceptions on the topic of negotiation. Focusing on each party’s interests entails the drive to be objective. Inventing options for mutual gain means exploring other opportunities that could be tapped without veering too much from the goals set. Using objective criteria means having a legitimate standard that guides the negotiation process (usually backed up by credible information). Preparation is essential in negotiation as the party should not only decide on what issues to discuss during the negotiation, but the basic strategy that he will employ as well (accommodating, avoiding, competitive, or collaborative). My experience in selling my flat screen television will be divided according to the three clients that I have made a deal with: my sophomore friend named Luis, members of the web community portal in my apartment, and users of craiglist.com. As a background, I decided to sell this item for I deemed it cheaper than selling a brand new one—thus, helping me attract a wide range of buyers. I bought it three years ago in the local best buy for

Discussion bord 3 Assignment Example | Topics and Well Written Essays - 250 words

Discussion bord 3 - Assignment Example The process of determining the sample size that will produce valid and acceptable results with respect to the entire population involves a number of statistical calculations and inferences, popularly referred to as sample size calculator. The survey system developed a sample size calculator that plays a critical role in determining the effectiveness of the sample size to be used to generate a reliable information and characteristics about the population. In terming the sample size, the level of confidence and confidence interval are very important variables that must be considered (Snedecor, 2009). For instance, at 95% level of confidence with a confidence interval of 5, from a population of 100, a sample size of 80 would be appropriate in generating the desired characteristics about the entire population. Confidence interval is the measure of the marginal error that is acceptable. On the other hand, confidence level is the measure of accuracy and reliability of the results. At 95% confidence level, the certainty is the outcome is acceptable at 95% (Dattalo,

Thursday, October 17, 2019

Journal Essay Example | Topics and Well Written Essays - 500 words - 44

Journal - Essay Example Whats more that is accurate over all races. Discussing a standout amongst the most striking outcomes of the low marriage rate, the amount of unmarried women who are having kids. Exploration lets us know that in 1980, 18 percent of births were to unmarried ladies, while the number today is a little more than 40 percent. There are inescapable budgetary implications to such an emotional movement. For decades, marriage has been elevated as an approach to battle neediness, especially for ladies with youngsters. The reason why marriages are fizzling is precisely basing on the fact that defective individuals are hopping in for the wrong reasons." On the off chance that that was correct, we ought to be seeing galactically high marriage rates and a custom of marriage that remaining parts solid, coupled with cosmically high separate rates. Anyhow that is not what were seeing. Concerning the reasons behind why relational unions are fizzling appears as though something you only hauled out of flimsy air. "Imperfect individuals" – Everyone is defective in restricted or the other. Marriage, much the same as other social organizations, is still a build of people and is in this manner characterized by every individual desires, childhood, and conviction frameworks. As I would like to think, there are no widespread wrong motivations to get hitched on the grounds that marriage gives diverse profits to distinctive individuals. What one few sees as a wrong motivation to get hitched, an alternate may see as a flawless motivation to wed. Some wed for adoration. Some wed for gang. Some wed for convention. None of these reasons are generally not right. Relational unions are fizzling in light of the fact that an excess of individuals view matrimony the way Gretta Cohn does: as something that ought to be dealt with like a vocation contract; as something that "needs another model" rather than an old one that met

Irish organizations' strategic Diversity management plan Assignment

Irish organizations' strategic Diversity management plan - Assignment Example Irish music on the other hand has also attained fame worldwide as Irish tunes are recognized by various diverse societies making Irish music stand out. Hospitality is a key element that establishes and shapes perceptions of people. People coming from diverse backgrounds merge on different occasions owing to the effects of globalization today, and how one remembers one another depends on the hospitality of the person. Many people have opted for Irish citizenship as a result of their great hype of hospitality which is said to be learned by Irish people from their ancestors2. The director of the film â€Å"Braveheart† reported how easily he managed to get access to Irish land and performed his tasks without troubles owing to the nature and hospitality of Irish people. To promote their culture, beliefs, ideologies and to motivate and educate the younger generation with the philosophy of Irish culture, a festival is held in Irish known as the ICONS (Irish Connections) festival3; it is an optimistic way for new people from diverse localities to experience what the Irish have to offer. The world we reside in today is globally connected, we tend to relate and compare to societies all around the world4. In such an environment, â€Å"Managing Diversity† is becoming popular not just as a concept but as a theoretical course in many different universities across the globe. Different societies have different norms and values and judge actions accordingly. Diversity is beneficial as it ensures the best outcome and efficiency, however, it comes with a cost; a manager of an organization needs to be well aware of management tactics as to manage people from various cultures. This concept is vital for multi National organizations who employ thousands of people all around the world from different ethnicities. Since these people come from different places, they tend to think differently and often their opinions will differ with their counterparts, in such situations wi thin organizations, it may lead to chaos and worsening reputation. Thus, companies such as Unilever and P&G tend to employ the best graduates from top most business schools for management of their staff. Irish people themselves are said to be open minded and flexible, with great regard to hospitality. However, this hospitality may be pertaining to certain occasions; there are times when every human being exhausts on its capability and goes off the page. Thus, just by looking at the culture of Irish people one cannot conclude they will likely make good managers who will be fully capable of managing diverse cultures and issues. Managing diversity is not as easy as it sounds; people are properly trained to handle tough situations for both the environment and the organization. Generally, Irish people are famous for hospitality. The likelihood that Irish people will not indulge in conflicts with people from diverse culture is high, but within organizations at Ireland or let’s say events at Ireland where different people from diverse localities come together meet, they might not be from such a friendly culture as Irish and hence may end up indulging in conflicts. Irish managers have to take a lot into account for the organization or for the community as a whole. If one talks about an Irish organization’s strategic Diversity management plan, it is important to ask a few questions like5: Do we actually have diversity? What