Saturday, December 28, 2019

Film Stagecoach Analysis Essay - 726 Words

Stagecoach: The Revolutionary Western John Ford built a standard that many future directors would follow with his classic 1939 film â€Å"Stagecoach†. Although there were a plethora of western films made before 1939, the film â€Å"Stagecoach† revolutionized the western genre by elevating the genre from a â€Å"B† film into a more serious genre. The film challenged not only western stereotypes but also class divisions in society. Utilizing specific aspects of mise-en-scà ¨ne and cinematography, John Ford displays his views of society. The film consists of many clichà © western characters. There is a banker, an outlaw, a prostitute, a doctor, a gambler, and a pregnant woman. These characters are categorized by social class. The banker, the pregnant†¦show more content†¦Doc Boone is not taken seriously and considered a fool because he is always drunk. Dallas is always forgotten and all the attention is given to Mallory. In a scene where the stagecoach is headed towards Apache Wells in the c old, Hatfield’s facial expressions show that he is worried and concerned whenever he looks at Lucy Mallory. Hatfield, being a gentleman, offers Lucy Mallory water and serves water to her in a fancy silver cup but does not bother to ask Dallas. However, Ringo Kid makes sure Dallas also gets a drink of water. This demonstrates that even though Hatfield is considered a gentleman, he does not show any concern for Dallas because she has a lower social status. Once the stagecoach arrives in Lordsburg, Lucy Mallory is carried out on a stretcher. At first, the camera shot is wide-angled and the street is crowded with soldiers and civilians. Then there is a close-up shot of Mallory on the stretcher as she speaks to Dallas. The shot reveals Mallory’s facial expression of remorse. Mallory looks apologetic and offers any help to Dallas. This is one of the final scenes in the film and illustrates how Mallory’s view of Dallas completely changed by the resolution of the film. Throughout the film, Mallory felt uncomfortable being around Dallas. Once Dallas helped take care of Mallory’s baby, Mallory realized that her judgment of Dallas was completely wrong. John Ford challenges society’s views of peopleShow MoreRelatedStagecoach Movie Film Analysis1106 Words   |  5 PagesThe western movie I pick is John Ford’s movie Stagecoach (1939). The movie is about a group of people traveling together by stagecoach from the town Tonto to Lordsburg. The people traveling together are a diverse group of people. All of them have the specific motivation for going, but they all share the same goal reaching to Lordsburg. The characters are Dallas who’s a prostitute, Mrs. Lucy Mallory who is the wife of the Army Cavalry officer, Ellsworth Henry Gatewood who is a banker, Hatfield whoRead MoreAnalysis of Classic Hollywood Cinema: Stagecoach 792 Words   |  4 PagesThe characteristics, features and conventions of Stagecoach (John Ford, 1939) allow this film to fit directly under the title of Classical Hollywood cinema. The film uses a few main characters that the audience members get to know well and create their own feelings for. In Stagecoach, there are nine main characters that the audience gets to know well, Dallas, Ringo Kid, Buck, Hatfield, Doc Boone, Lucy Mallory, Curley, Gatewood and the lieutenant. These characters are consistent throughout the storyRead MoreMidterm Answer. Chen Xuanhong. Cine 121 - 01. . 1-Escapist1815 Words   |  8 PagesWhile Stagecoach (John Ford, 1939) is representative of Classical Hollywood cinema providing its audience with escapist entertainment, it also develops an â€Å"acute social observation† of life during America’s westward expansion and it challenges elements of the myth constructed around this history (Bernstein 316). a) What makes Stagecoach an example of Classical Hollywood cinema? Identify and explain the main characteristics, features, and conventions of this cinema that are present in the film. b) WhatRead MoreAnalysis of the Unforgiven2900 Words   |  12 PagesAnalysis of Unforgiven Brenda J. Thompson ENG 225: Introduction to Film Nathaniel Millard October 5, 2009 Summary While the movie Unforgiven (1992) directed and starring Clint Eastwood, as William Munny, is in the genre of a western in the late 1800’s. It has a basic theme that we are still making movies about today, justice and what is acceptable and what is not acceptable in our search for it. It is a story of a journey that one man has to make in order for him to care for his childrenRead MoreThe Wild West: an Analysis of Post-Civil War Tension in John Ford’s â€Å"My Darling Clementine†1546 Words   |  7 PagesDoc Holliday and Granville Thorndyke (the Shakespearean actor) in â€Å"My Darling Clementine.† What is Ford trying to say about the relation to the civilized East to the unsettled West. (Clementine vs. Chihuahua is relevant here.) The Wild West: An Analysis of Post-Civil War Tension in John Ford’s â€Å"My Darling Clementine† Following the end of the United States’ Civil War, new territories had becomes states, notably what is now known as the West. The West, iconized by its Cowboys, gunfights, andRead MoreNeoclassical Pricing Model : Central Objective Of Short Term Profit Maximisation2230 Words   |  9 Pagescustomer’s expectations and perceptions when compared with similar products on the market in terms of quality and price. An example of the STP process in action is Stagecoach, one of the largest bus operators in the UK. Company Head of Customer Insight, Elaine Rosscraig (Baines et al 2008, p. 215), highlights that through primary research, Stagecoach identify three key market segments; ‘users’, ‘lapsed user’ and ‘non-user’. She explains that their most important target market is the ‘non-users’ given thatRead MoreThe Studio System Essay14396 Words   |  58 Pagesthe business. The Hollywood Studio System: A History is the first book to describe and analyse the complete development, classic operation, and reinvention of the global corporate entities which produce and distribute most of the films we watch. Starting in 1920, Adolph Zukor, head of Paramount Pictures, over the decade of the 1920s helped to fashion Hollywood into a vertically integrated system, a set of economic innovations which was firmly in place by 1930. ForRead MoreStrategic Marketing Management337596 Words   |  1351 PagesStrategic and marketing analysis 2 Marketing auditing and the analysis of capability 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Learning objectives Introduction Reviewing marketing effectiveness The role of SWOT analysis Competitive advantage and the value chain Conducting effective audits Summary 3 Segmental, productivity and ratio analysis 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 Learning objectives Introduction The clarification of cost categories Marketing cost analysis: aims and methods An illustrationRead MoreBrand Building Blocks96400 Words   |  386 Pagesor Tide or Heinz. However, it will always be an important, measurable brand characteristic. Perceived quality will directly influence purchase decisions and brand loyalty, especially when a buyer is not motivated or able to conduct a detailed analysis. It can also support a premium price, which, in turn can create gross margin that can be reinvested in brand equity. Further, perceived quality can be the basis for a brand extension. If a brand is well-regarded in one context, the assumption willRead MoreEdexcel Igcse Economics Answer49663 Words   |  199 Pagesin the diagram. The numbers of digital cameras purchased would fall from q1 to q3. (ii) A fall in the price of digital cameras would result in a decrease in demand for conventional film cameras. This is because conventional film cameras are a substitute for digital cameras. The demand curve for conventional film cameras would shift to the left from D1 to D2. The quantity of conventional cameras bought would fall from q1 to q2. (c) C is the correct answer. Digital cameras are not inferior

Friday, December 20, 2019

Criminal Profiling, A Powerful Tool Essay - 1200 Words

Criminal profiling can be a rather useful tool for criminal investigators of all kinds. Many departments use profiling to catch terrorists, gangs, cyber-crimes, counter intelligence, white collar crimes, and most of all serial killers. How criminal profiling works is by looking at the behavior of the criminal to gain insight into his or her personality. A doctor does the same thing when looking at symptoms to diagnose a certain disease. Being able to understand this person’s personality leads you one step closer to catching him or her. The history of profiling starts as early as the 1800s. Criminal profiling is what it is today because of the contributions of those investigators of that time. The first documented case that profiling†¦show more content†¦There were no clear signs of forced entry which means the suspect had been in the house before and knew his way around. The time that the kidnappers said they would call came and went, which should have been a big c lue that something was wrong. The house was then completely searched and in the basement the body of JonBenet was found. JonBenet’s body was found with her hands over her head with a cord, along with a cord around her neck. She was covered up with a white blanket with duct tape on her mouth. The fact that she was covered means that the suspect felt some kind of remorse for what they did. It could have been someone that JonBenet knew. Now the autopsy confirmed how she was murdered. It was confirmed that she died by strangulation along with blunt force trauma to the head and some trauma to the vaginal tissue. Drawing from the information on the autopsy we may conclude that someone brought JonBenet down to the basement to sexually assault her and took it too far. The suspect may have gotten angry with her which is why there was bruising on her face and neck. Once she was dead the suspect may have freaked out and decided to make a ransom note and hide the body to cover up the cr ime. Now there was a lot of other evidence that was gathered at the scene of the crime along with examples of both parents handwriting to compare to the ransom note. Then we look at the victim’s life. JonBenet was homeschooled but did participate in pageants which putShow MoreRelatedCriminal Intelligence and Violent Crime Essay1094 Words   |  5 PagesUniversity Introduction Criminal intelligence analysis is useful in many areas to law enforcement. It is especially useful in apprehending violent criminals and preventing violent crimes. Violent crimes in the United States have been on a moderate decline over the past decade. This decline has been attributed to the crime analysis intelligence used by law enforcement. Prevention of violent crime and apprehension of violent criminals requires cooperation and strategy from all departmentsRead MoreEssay on Forensic Psychology Deals with Both Law and Psychology625 Words   |  3 PagesForensic (criminal) psychology is a job field that deals with both psychology and law. The field has experienced dramatic growth in recent years due to the role of popular movies, television programs and books popularizing the field. Often these individuals are depicted as vivid components in solving vicious crimes or timing out a criminal’s next home. While these depictions of certainly entertaining, yet these portrayals are not necessarily precise. Forensic psychologists play an instrumental roleRead MoreBehavioral Analysis Unit1076 Words   |  5 Pagesis what makes a criminal suceptible to committing that particular crime; or why was that person targeted as a victim. This question has sparked many debates within the criminal justice field, which is the reason the Behavioral Science Unit was created by the Federal Bereau of Investigation. In certain cases, knowing how a criminals mind operates, will help lead an investigation in the right direction in order to successfully arrest the correct perperatrator. Analyzing a criminals mind, is learningRead MoreDna Profiling And The Criminal Justice System1372 Words   |  6 Pageskiller struck again murdering 15 year old Dawn Ashworth, once again leaving behind semen, but this time the police were able to use DNA profiling to match the semen to a suspect. Colin Pitchfork became the first person to be caught based on mass DNA screening, and the first t o be convicted based on DNA profiling. The use of Deoxyribonucleic Acid (DNA) in the criminal justice system has greatly tipped the scales in favor of law enforcement, and changed the world that we live in. Court cases that in theRead MoreMarxist And Conflict Theories Of Deviance Essay1580 Words   |  7 Pagesconflict over same-sex marriage could benefit capitalism by diverting attention away from issues those in power do not want to discuss and by dividing the working class on a social issue that makes it harder for them to come together to fight the powerful when the need arises (Inderbitzin, 2013:377). Marx argues that the fundamental basis of society was class conflict, which is the tension that exists in society due to rival socioeconomic interests and desires between people of different classes.Read MoreStop And Frisk Has Been A Very Controversial Topic For829 Words   |  4 Pagesconcern for a multitude of individuals due to the increased fear in the minority communities, who have been declared more likely to be stopped and frisked, or ‘suspect worthy,’ which points in the direction of the unconstitutional use of racial profiling. In addition, the data — as explained in class — implies that the increase in stops and frisks during the time stop and frisks were implemented, which was during the era of Mayor Bloomberg, show virtually no decrease in crime in correlation to itsRead MoreEssay about DNA, The New Crime Investigator1358 Words   |  6 Pagesmolecules entwine to form the double helix. Now that the definition has been stated, let’s now define what DNA means to a crime scene or case investigator. In the law enforcement business DNA has been introduce as a revolutionary and efficient accurate tool to solve and crack modern and cold cases. It also has played major roles in courtrooms through out the nation on either proven guilt, or revealing the truth behind the innocence on the wrongly accused and convicted by our own court system. DNA hasRead MoreA Research On Forensic Science1203 Words   |  5 PagesForensic science is the application of scientific analysis to tangible objects related to criminal activity. As science expands in its research, it is applied to the forensics field. Among the most prevalent is biotechnology. Biotechnology was developed by the manipulation of biological elements and remains closely tied to society and it needs. Although many of the advances and discoveries are used to produce goods as foods, and medications many of the innovations benefit forensic science as wellRead MoreCrime Is Despicable And That Criminals Are Dangerous People1280 Words   |  6 PagesSome of us, as young children, may have been taught that crime is abhorrent and that criminals are dangerous people, neglecting to explain why people commit crimes. Those same children may have learned that the criminal justice system -- comprised of law enforcement, the court system, and so on -- were impartial solutions to keep citizens safe and law-abiding. But the truth is, crime isn’t so simple and the criminal justice system may not be as grandiose and good as we were taught. In the final decadesRead MoreEnhancing the Power of DNA as an Investigative Tool Essay2104 Words   |  9 Pagesmatch. The use of DNA â€Å"fingerprint† is highly specific; therefore a better test for accuracy and confirmation. DNA technology continued to become even more impressive with its new testing methods. After the discovery of the DNA â€Å"fingerprint†, DNA profiling was being used all over the world. DNA typing was improved with the introduction of the polymerase chain reaction (PCR) together with the discovery of different repeating sequences called microsatellites. DNA amplification by PCR promotes increased

Thursday, December 12, 2019

Censorship in Huck Finn free essay sample

Many people claim that the novel is racist due to the frequent use of racial slurs and the disrespect and mistreatment of the character Jim who is a runaway slave. Mark Twains famous novel is not a racist text because it is a historical account of the south during the 1840s, when racism was commonplace. The books purpose was to emphasize real life and mock the faults in human nature. In The Adventures of Huckleberry Finn, a young boy named Huckleberry Finn runs away from his life and travels down the Mississippi River with his friend Jim, a runaway slave. The story follows Hucks moral growth and maturity throughout his many adventures and experiences. The major turning point of the book is when Huck realizes that Jim cares about him, and that he cares about Jim in return. As a child, Huck is taught that Jim isnt a person because of his skin color and that he does not deserve respect, but Huck discovers that Jim is a person and deserves more respect than most people Huckleberry met on his journeys. He comes to this decision because Jim cares for him and treats Huck better than his own father. Huck says â€Å"All right, then, Ill go to hell. when he decides to go against the racist teachings of his childhood and help Jim get his freedom (Twain 216-217). The book was written to show what life was like in the 1840s and successfully revealed the way people viewed each other and people of other races. In the beginning of the story, Huck treats Jim poorly because he is taught that Jim isnt a real person and he could get away with it. One of the many tricks Huckleberry plays on Jim was hiding a snake in the cave they were living in, but the snake bites Jim and Huck realizes how cruel his trick was and begins to feel sorry for how he treats Jim (Twain 55). Events like this are the reason people believe that Mark Twains book is racist, but without these examples the books purpose is muddled and the historical reliability is gone. The book The Adventures of Huckleberry Finn is considered a controversial text because it contains derogatory language and examples of disrespectful behavior towards people of color. Speech and actions like the ones in the book were common in the setting of the book (Knab 1). People want to ban or edit the original text of The Adventures of Huckleberry Finn, because of these elements, but they still allow these remarks in other literary works. Fredric Douglass used the same language in his narrative that was published in 1845, forty years before Twain published The Adventures of Huckleberry Finn, but people dont challenge his work because he was a slave and his story is a historical account of a slaves life (Bowker). The two stories are based in the same time, are about the same topic, and both aim to be realistic portrayals of everyday life in the 1840s, yet one is constantly challenged while the other is allowed to be as it is. People today are concerned with being â€Å"politically correct† and â€Å"non-offensive†, but they have reached the point where they are willing to change history to protect the feelings of certain people (Kay). If these â€Å"racist† remarks and actions were removed from The Adventures of Huckleberry Finn, the message of the book would not be evident, its historical accuracy destroyed, and the book would just be a meaningless childrens story. Censorship is useful to an extent, it allows people to keep mature information from children, but when it is used on history it takes away from the importance of knowing about and learning from the past. The reason racism is so important to avoid now is because of the negative effects it had in the past. If people dont learn about these effects, then they can not understand the importance of equality now. When books are censored, their historical accuracy is lost and they are unable to educate people on the importance of the past to modern-day (Kay). Without learning about the good, bad, and ugly of the past, people wont be able to comprehend why the world is the way it is and how they can avoid the mistakes of the past. If the offensive content of The Adventures of Huckleberry Finn is removed, then people will not be able to see the severity of racism during the 1840s (Bosman). If the book is censored, then the point where Pap starts ranting about the â€Å"injustice† of a well educated black man being able to vote will not have the impact it should, representing the opinion of the average white male in the south (Twain 28). The novel The Adventures of Huckleberry Finn is seen as a masterpiece (Mark Twains Adventures of Huckleberry Finn) and a classic (Robert OMeally) due to the original riting and arrangement. Without these elements, that people want to change, the book would not be as renowned or highly regarded. Although The Adventures of Huckleberry Finn may have some content that offends some people and they believe that it would be better to remove the offensive content, it would take away from the plot and meaning of the story. If the novel really offends someone, then they do not have to read it again or even finish reading it, but they do not have the right to change the words of someone else to suit their own ideals. The words of The Adventures of Huckleberry Finn were all carefully picked by Mark Twain to carry the message of his story and editing them would be defacing his hard work. Twain often complained about his proofreaders and editors changing his work (Kurutz). The book was written by Mark Twain and if he saw the need to add these controversial elements, then we should not interfere with his decision or his historical accuracy (Kay). Then novel The Adventures of Huckleberry Finn is not a racist text, nor is Mark Twain a racist himself. Mark Twains novel was written as a historical account of life in the 1840s and as a result, any content that could be considered offensive to some is all added to make the literary work more realistic and a more accurate portrayal of life in the setting. Without these elements, the story of Huckleberrys moral growth would not be as developed and the message of the book will not be as prominent. The Adventures of Huckleberry Finn should not be censored because the way the book is written provides an accurate account of life in the 1840s and without the writing staying as it is, the whole integrity of the work will be diminished. The Adventures of Huckleberry Finn is considered a classic because of how it was written. Changing the text changes the whole book and since the book is so highly regarded as it is, it should remain the same. When people claim that a book is racist, they make this assumption based on the content of the book. What people need to note is when the book is set, its publication date, and the purpose of the offensive content. With The Adventures of Huckleberry Finn, the story takes place in the 1840s when racism was very common. It also was published in 1885 when people in the United States were struggling with racism after the Civil War. The offensive content of the book is used to portray what life was like in the 1840s and to mock the behavior of the people of that time. When the book was written, language like that used in the text was still common and not seen as offensive as it does now. Mark Twains novel The Adventures of Huckleberry Finn is not racist, it just contains racist content, and this content makes the story what it is and develops its meaning. To take away this major element of the literary work to protect the feelings of some individuals would ruin the story and would hurt more people than it would help. To censor The Adventures of Huckleberry Finn would take away a valuable source of historical knowledge that allows us to see the importance of how our society has changed and developed. Without this knowledge, people will forget the importance of the progress humankind has made and will not be able to avoid the mistakes we have already made as a whole in the past. Because of these reasons, changing the great literary work of Mark Twain Is unnecessary because The Adventures of Huckleberry Finn is not a racist text and exposure to the harsh realities in the story will help the people of today to truly understand our past as a whole and improve our future. Works Cited Page Bosman, Julie. â€Å"Publisher Tinkers with Twain. † National Post. 4 Jan 2011. Print. Bowker, Gene. â€Å"Mark Twain, racism and Huckleberry Finn. † Examiner. com. Web. 9 Feb 2013 lt;http://www. examiner. om/article/mark-twain-racism-and-huckleberry-finngt; Kay, Barbara. â€Å"We Shouldnt Censor History. † National Post. 10 Jan 2011. Print. Knab, Jakob. Racism in The Adventures of Huckleberry Finn. 2011. Print. Kurutz,, Steven. â€Å"A Twain Scholar Reacts to the New, Censored Version ‘Huckleberry Finn’. † National Post. 9 Jan 2011. Print. PBS. â€Å"Mark Twains Adventures of Huckleberry Finn. † Web. 9 Feb 2013 lt;http://www. pbs . org/wgbh/cultureshock/flashpoints/literature/huck. htmlgt; Twain, Mark. The Adventures of Huckleberry Finn. New York: Barnes and Noble, 2003. Print.

Wednesday, December 4, 2019

Untitled Essay Research Paper The Morality of free essay sample

Untitled Essay, Research Paper The Morality of Abortion On the inquiry of abortion being moral, the reply is clearly that ending a foetus # 8217 ; life under certain fortunes is non merely moral, but it is besides our duty to end it if the quality of life is in inquiry for the foetus. A 2nd major ground is that to declare abortion immoral would intend that we would hold to see the factor of how the construct came approximately. This can non and should non be done. Quality is a major factor in the inquiry of the morality of abortion. When parents decide to maintain or non maintain a babe the issue of acceptance does non play into this. The ground for this is that one time the babe is born that the parents may alter their head if they want to maintain it. Parents must make up ones mind at the oncoming of the gestation to make up ones mind if they can in good scruples conveying a kid into the universe, if the reply is yes, so people should continue with the gestation and so find whether they want to give the child up for acceptance. It is a parent # 8217 ; s moral duty to do certain that the environments which the kid will be brought into will be healthy and supportive. It is a far greater offense to handle a kid ill for 18 old ages so it is to end a foetus that can non believe, experience or is cognizant of its being. On the 2nd point of doing the manner that construct occurred a non-factor I am non stating that holding the babes of rapers or in instances of incest is O.K. . Still, for the statement that abortion is immoral, you must reason that the action is immoral, non the kid. The kid can non be either at this point. If we are so speaking about the act of abortion so who is to find right and incorrect. A tribunal of jurisprudence should have no topographic point in this determination. The primary involvements in this gestation should do the determination themselves. This would usually be the parents of the foetus. The action in the instance of colza is rebelliously immoral, but the foetus is non. To state that the abortion is moral because the gestation arose from a offense is to put a value opinion on a kid before it is born. A foetus is merely the merchandise of sperm and an egg, an inadvertent meeting that resulted in a gestation. If the foetus is non at mistake but can be terminated, why should a different set of criterions be in consequence because two immature people experimenting with sex made a error and the terminal consequence was the same as in the instance of colza. I offer you the account that the fortunes environing the gestation can be deemed moral or immoral, but the foetus and hence the abortion can non. The result was an inadvertent meeting of a sperm and an egg in both cases. The minute of construct does non piece a human the blink of an eye that the egg hits the sperm, it takes a full nine months. During this gestation period parts develop easy, non all at one time. Science has determined when the cut off is that a foetus can believe and experience etc # 8230 ; If it were impossible for us to cognize when a foetus could experience and believe than the obvious reply would be that it is immoral, but we can state and therefore it is non. I think that it is of import to retrieve that ethical motives can be established for a society in peculiar, such as abortion in immoral, but can non be changed by the context of how the gestation occurred. Either the expiration of life is moral or it isn # 8217 ; t. By this line of concluding you can follow me to the logical decision of this paragraph. If it is logical and ethical to end the life of a foetus because of a peculiar circumstance, so it is moral to make so under any circumstance. A believable expostulation to my chief place is that abortion is incorrect except in the instance of colza or incest. One good ground for this is that immature parents of a foetus that made a error and got pregnant made that initial determination to hold sex, while the colza or incest victims did non. A 2nd ground is that we as a society should non force a female parent to live over her offense every twenty-four hours for nine months and perchance longer if she maintain the babe. These two statements do non even come near to sabotaging my place. My primary job with the above statement is that the individual on that side is seting a value on human life. The fact that the gestation occurred illicitly makes that human being worth less than the 1 that was conceived by accident. The statement above hits a brick wall if you pursue it further. A individual can non come up with a justifiable ground why the foetus is deserving less as a human because of the nature of the construct. At which point the individual on the side of the statement must acknowledge that values are the same and that entire value is zero as a human being because it isn # 8217 ; t one yet. As to the 2nd ground, why should we remind a 17 twelvemonth old miss every twenty-four hours for nine months and perchance longer because in a minute of hastiness they forgot to utilize a rubber. An expostulation to my first statement about the quality of life could be argued that after the gestation is over the babe could be given up for acceptance. Along this line of concluding the quality of life does non play into the factor. This statement is filled with holes. When a individual is 18 old ages old and loses a leg in a auto accident the leg is gone, neer to be seen once more. The instance is much the same for a immature miss, she has carried this thing about for the better portion of a twelvemonth. A new female parents natural response to giving the foetus up would be the same if after the accident the physicians asked the victim if they wanted to maintain their leg. Of class the reply would be yes. Therefore holding an abortion take this job out of the equation and lets a female parent make an informed determination whether or non to hold a kid and whether or non to give it for acceptance. A 2nd job is the cost of a birth. What if there is no insurance, and there is no 1 to pay the huge cost of a infirmary stay. Why should the same immature miss travel into fiscal debt for something that she is non traveling to maintain, and she has no manner of cognizing if that babies life will be any better than what she could hold provided for. To reason this paper is a hard undertaking. I have tried to sketch why abortion is moral by steering the reader through a series of stairss sketching thought toward the foetus and we should see it. The manner that we should see it is as a exanimate thing until it can experience or believe, whichever comes foremost. This is non to that abortions should be common, inexpensive, or as easy to acquire as a physical is. Fortunes involved around the construct including the how and why should non be regarded. One abortion can non be moral while anither is non. I would think that I am taking an absolutists point of position on this topic. I besides tried to province that societal context must be taken into history, and that abortion is either one manner or the other, indepedent of fortunes environing how the gestation occured. I have besides tried to demo how quality of life must be added into the determination of whether or non to hold a kid. I will in conclusion near with the statement that while the work forces of the universe attempt to hash this contention out, it is of import to retrieve who physically has the kid. And that it is ultimatly the adult females determination whether or non to hold a kid. If abortion is declared immoral than it will eentually take to Torahs doing it illegal every bit good. When this happens we will see the pattern go underground and have a batch of deceases among adult females trying to hold this done in an dirty environment.

Sunday, November 24, 2019

Free Essays on The Word “Gender“

According to the Oxford English Dictionary, the word gender has a variety of meanings, including the difference between males and females. The word gender in today’s society has a negative connotation, in that gender’s meaning is controversial pertaining to gender roles, gender gap, and gender stereotypes. For instance, gender roles can be used to describe the typical tasks that are associated with being either male or female. As time progresses the gender gap will continue to merge and gender will no longer have a negative connotation. Saying that women and men are traditionally supposed to perform certain tasks places many restrictions on the word gender. Gender role stereotypes refer to the oversimplified expectations of what it means to be a woman or a man. It would be stereotypical to believe that a woman's place is in the kitchen, and at the same time to assume that a man's job is to financially support the family. Most women today are strong willed and perfectly able to take care of themselves. Just the same, today's man is not only concerned about his muscles, but also if his belt matches his shoes. When looking at a job application the word gender appears as one of the questions. Should we ask ourselves why the employer needs to know such details when all that should matter is experience and work ethic? In today's day and age we are coming closer to breaking gender roles. Women are majoring in building construction, while men pursue careers in nursing. This is evidence that people are beginning to view the term gender with a positive outlook. In the future, the attitudes and behaviors of both men and women will come together.... Free Essays on The Word â€Å"Genderâ€Å" Free Essays on The Word â€Å"Genderâ€Å" According to the Oxford English Dictionary, the word gender has a variety of meanings, including the difference between males and females. The word gender in today’s society has a negative connotation, in that gender’s meaning is controversial pertaining to gender roles, gender gap, and gender stereotypes. For instance, gender roles can be used to describe the typical tasks that are associated with being either male or female. As time progresses the gender gap will continue to merge and gender will no longer have a negative connotation. Saying that women and men are traditionally supposed to perform certain tasks places many restrictions on the word gender. Gender role stereotypes refer to the oversimplified expectations of what it means to be a woman or a man. It would be stereotypical to believe that a woman's place is in the kitchen, and at the same time to assume that a man's job is to financially support the family. Most women today are strong willed and perfectly able to take care of themselves. Just the same, today's man is not only concerned about his muscles, but also if his belt matches his shoes. When looking at a job application the word gender appears as one of the questions. Should we ask ourselves why the employer needs to know such details when all that should matter is experience and work ethic? In today's day and age we are coming closer to breaking gender roles. Women are majoring in building construction, while men pursue careers in nursing. This is evidence that people are beginning to view the term gender with a positive outlook. In the future, the attitudes and behaviors of both men and women will come together....

Thursday, November 21, 2019

What did evolution do to our muscles Essay Example | Topics and Well Written Essays - 1500 words - 1

What did evolution do to our muscles - Essay Example However, humans do not come close to comparing to chimps’ strength and the percentage points that humans and chimps differ are extreme due significant anatomical and physiological differences. The way in which muscles are attached to bones is different in chimps compared to human, which enables chimps to have enhanced mechanical advantage in both arms and strength. The paper explores why chimps enjoy powerful strength relative to humans. Evolution changes manifest on the genetic levels passed from one generation to another. The changes manifest at the genetic level overtime as the organisms’ genes mutate and/or recombine within diverse ways during reproduction and are passed to future generations. Scientific evidence demonstrates that the physical and behavioral traits shared by humans emanated from apelike ancestors and evolved overtime. Bipedalism remains one of the most prominent human traits highlighting how humans have evolved. Other traits include development of a large and complex brain, capacity for language, and capability to make and utilize tools. Muscle contractions form the basis of movement within a majority of the species (Muehlenbein 137). Chimps are stronger that humans centers on the fact that they do not have closely as many fine control over their muscles. Humans enjoy the capability to d precise things such as operating complex machinery, which necessitates choice of minute sizes of muscle fibers. Hence, humans sacrifice strength over precise control of their muscles. The nervous system exercises significant control over the muscles relative to the chimp muscles. Studies have revealed that chimps have relatively reduced grey matter within their spinal cord compared to humans. Spinal grey matter features a significant amount of nerve cells that link to muscle fibers and control muscle movement. This details the process that allows finer control of the muscles. As a result,

Wednesday, November 20, 2019

Business Health Check for the Brighton Beach Hotel Essay

Business Health Check for the Brighton Beach Hotel - Essay Example This report starts with a study of the environment in which the business operates. It considers the main management processes used by the organization, and compares the functioning of its major departments. The analysis considers how the resources and assets deployed in the business can be more productively deployed, and the quality of the company’s strategy, in view of its strengths and the threats it faces as well. The report attempts to take a long-term perspective, considering the future values and relevance of today’s practices. PEST Analysis is a term integral to this report, which deserves a special description. This method considers the political, social, economic, and technological factors that have significant impacts on the fortunes of the company. The results of this analysis are appended to this report, after the list of references. This report also refers to the concept of a Mission Statement. The latter is an expression of the main purpose of an organizat ion. It serves to unite efforts throughout an organization.

Monday, November 18, 2019

Anova Assignment Example | Topics and Well Written Essays - 250 words

Anova - Assignment Example It has been alleged that younger members of the society, especially from both developed and developing countries do not have time to engage in eating healthy. Due to their tight schedules as students or young professionals, they tend to consume fast food to save on time and to socialize. From this idea, the independent variable would be the respondents age. This can be explained by the fact that ones age should dictate on fast food consumptions. Similarly, the dependent variable will be the frequency of fast food consumption. After running the analysis, I expect to find out that there is a significant difference in the mean number of times respondents consume fast food at the different level of age, (F=4. 962, P=0. 000). Similarly, I expect that the Tukey post hoc test will show that younger individuals probably less than 25 years old will have a significantly higher mean number of times they eat fast food (Mean=10.66) when compared to older respondents over 30 years

Friday, November 15, 2019

Impact of Spyware on Computers and Mobile Devices

Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may Impact of Spyware on Computers and Mobile Devices Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may