Thursday, October 31, 2019

Tourism in dubai Research Paper Example | Topics and Well Written Essays - 2250 words

Tourism in dubai - Research Paper Example 1.1 THESIS STATEMENT According to the present day context, tourism industry has been designated as second largest sectors after oil export in terms of revenue generation and prevalent employer within the United Arab Emirates (UAE) (Henderson, "Tourism in Dubai: Overcoming Barriers to Destination Development"). Keeping with the present spontaneous growth of the Dubai tourism industry, the study duly focus on critically discussing the inclusive tourism sector of Dubai through briefly demonstrating its historical journey towards becoming an emerging tourism destination for the global clients. Moreover, the discussion would also incorporate major attractions of Dubai along with its renowned events that enable the city to identify itself as one of the leading tourism destinations of the world. Additionally, the study would further reflect on the future initiatives of the Dubai government towards increasing the performance of its tourism sector. 2. BRIEF HISTORY OF DUBAI TOURISM INDUSTRY A ccording to the demographic measurements, Dubai is the most densely populated place as compare to the other emirates within the UAE. The place has been identified as one of the largest trade and business centers for the global marketers. In relation to the historical background of Dubai, the export of oil to overseas countries is the primary source for the place to gain economic growth. However, since the past few years, tourism has emerged as the major contributor to the economy of the city (Henderson, "Tourism in Dubai: Overcoming Barriers to Destination Development"). The establishment of Dubai Commerce and Tourism Promotion Board (DCTPB) in the year 1989 can be considered as the initial step of the government to modernize the Tourism Department of Dubai. However, DCTPB during the year 1997 was transformed and was later came to known as the Dubai Department of Tourism and Commerce Marketing (DTCM) which was primarily intended towards promoting tourism in the city. The continuous development and considerable investments in the tourism industry has been widely recognized to introduce Dubai as a popular tourism destination for the global clients (Dubai Department of Tourism & Commerce Marketing, â€Å"Dubai for Tourism†). The primary objectives of the DTCM boards have been oriented towards increasing awareness of Dubai as a favorable and appealing tourist destination through continuous development of its tourism sector, with the intention to increase inward investment within the emirates. Moreover, the board is also identified to empower with adequate responsibility of conducting marketing and promotional activities of Dubai’s tourism sector. With this notion, the tourism industry of Dubai has fueled and obtained adequate capability of attracting global audiences towards its exceptional tourism and hospitality services (Dubai Department of Tourism & Commerce Marketing, â€Å"Dubai for Tourism†). 3. ATTRACTIONS In relation to the present to urism infrastructure, Dubai can be regarded as one of the unique and most dynamic tourism and business locations for the global audience. The tourism

Tuesday, October 29, 2019

United Steel Workers of America and Kaiser Aluminum Essay Example for Free

United Steel Workers of America and Kaiser Aluminum Essay The issue of discrimination has pervaded many aspects of social life. Women, minorities, and unwanted individuals usually suffered from either institutional or bigot discrimination. Because discrimination rests on the twin principles of racial superiority (or its equivalent, the so-called ‘white man’s burden’) and conservatism, it usually transcends beyond what is perceived and indicated. Discrimination, therefore, is sometimes not evident and consequential. Discrimination is the direct manifestation of behavior and psychological outlook of individuals, groups, and even institutions. Thus, discrimination can virtually be found in all aspects of social life – in the family, in the workplace, and in government – so long as the society in general promotes discrimination both on the individual and institutional levels. Case Summary In 1998, the Kaiser Aluminum and Chemical Corporation and the United Steelworkers of America engaged in bargaining which led to prolonged and almost intractable labor dispute. On September 18, 2000, the two-year strike ended, after a binding arbitration. About 3000 workers were involved in the strike. Five plants were affected. The major issues which lead to the dispute are as follows: 1) the company decided to allow budgetary cuts in bargaining unit jobs; 2) there was substantial elimination of supplemental and local agreements; and 3) there was a proposal which reserved 50% of the available jobs in the company to African-Americans. Kaiser argued that it needed to institute several productivity improvements because it was a medium-sized aluminum producer facing tight competitive issues. However what enraged the union is the proposal which reserved 50% of the available jobs in the company to minorities, especially African-Americans. The proposal was generally beneficial to the company because it could theoretically replace union-affiliated employees with employees of minority background. The union saw the move as a general alibi for budgetary cuts in bargaining job units. The Ethical Issue From a moral point of view, the proposal is justified. The proposal not only dispenses distributive justice (this is justice based on opportunity) but also allows affirmative action on the part of the employees. It can therefore be argued that the proposal is an extension of the equal opportunity clause of economic liberalism. By reserving 50% of available jobs to African-Americans, the proposal is essentially increasing the marginal opportunity of such group with respect to other groups. The counterargument which states that ‘the proposal induces discrimination on the part of whites (reverse discrimination)’ is wholly inaccurate. The proposal only decreases the opportunities available to whites; it does not impinge on the right of the whites to equal employment. Perhaps, it may be helpful to employ a historical point of view in analyzing the validity and soundness of the counter argument. For almost three centuries, the minorities (especially the African-Americans) suffered from economic inequities. Many of them were underemployed, underpaid, and to some extent overworked. It may be argued that the proposal is a good-to-fit move to decrease such economic marginality. It may be viewed as a move in improving both economic (opportunities) and social justice (overall standing in society). Deontological Point of View From a Kantian point of view, the proposal has moral universal standing. A proposal which dispenses distributive justice is a general universal ethos. Categorically speaking, the proposal does not in any way put groups into the same categorical ethos. Rather, the proposal is a general tool for evaluating justice of any type – it promotes justice which ought to be directed to particularities – groups, individuals, and institutions. Hence, from Kant’s view, the proposal is simply a manifestation of a universal value.

Sunday, October 27, 2019

Impact of Spyware on Computers and Mobile Devices

Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may Impact of Spyware on Computers and Mobile Devices Impact of Spyware on Computers and Mobile Devices 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the impact of spyware on computers and mobile devices† which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn increases its level of impact on computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the impact of spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development This chapter discus the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet. (EarthLink 2005) Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users themselves often have a choice whether they want to install these programs. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio 2004). Our goals in this study are to understand the factors and users decision making process in installing spyware. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model.† (Shanmuga 2005) Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study â€Å"is the hypothesized factors influence and positive affect the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact. (Norbert 2007) Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, even do these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. While other users install it with other programs without knowing. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. Nonetheless, only very few studies focus specifically on the level of spyware impact on computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing spyware growth among users? What are the theoretical models used and extended in previous studies of spyware? What are the significant factors influencing the research? What are the users reactions towards spyware? How will the research result affect impact of spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing spyware growth among users. To study and discuss the theoretical models used and extended in previous studies of spyware. To examine the hypotheses and experimental validating the research model. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the impact of spyware in both mobile devices and computers, and the he generates some questionnaires which he will use to gather information from the general public and organisations. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors that will influence spyware growth and its level of impact. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires and interview conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the impact of spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections.† (CDT 2004) The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware. (UpickReviews 2007) 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets. (TopTenReviews 2003) Domestic spyware is one of the most common spyware used using mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads. (Spam-site 2006) 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers. ( Abrams 2009) 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution. (Pareto 2009) 2.3.1.2.3 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy. (Pareto 2009) 2.3.1.2.4 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution. (Pareto 2009) 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable if, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious. (Shanmuga 2005) 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are of the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware. (Shanmuga 2005) 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it. (Shanmuga 2005) 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them. (Shanmuga 2005) 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader. (Shanmuga 2005) 2.6 TARGET VICTIMS OF SPYWARE Spyware generally has no specific target victims, but in some cases it has specific victims. It attacks any and every one that falls into its trap. It usually hides in other programs or in some websites like porn website. Spyware is divided into two, domestic and commercial spyware. The victims of domestic spyware are specific, because domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. Others purchase this spyware to install in their partners mobile phone so as to monitor the call and SMS that they are making. Large companies and businesses are also among the most popular spyware targets. This often happen due to competition in the business or personal enmity, while sometimes is just for fun. In this kind of situation, malwares are often used. This is because malware is specifically design to damage the machine. The most popular victims of spyware are the general public. This is because spyware infects and still information about the general public and sends them to a third party who sells the information to advertising companies. More than 80% of general public that are using the internet have/had been affected by spyware one way or another. This shows that both mobile device users and computer users can be affected by spyware. 2.6.1 Mobile devices Not all mobile device users can be affected by spyware. There are categories of mobile devices that can be affected. This includes a blackberry, palmtop, iphone, and any other mobile device that has Bluetooth or can connect to the internet. This is because spyware has to be downloaded, transferred or installed from a source. 2.6.2 Computers All type of computers can be affected with spyware if they are online. Sometimes, the computer is not infected through the internet, but spyware needs the internet so as to establish connection with the third party. 2.7 IMPLICATIONS OF SPYWARE Spyware may

Friday, October 25, 2019

OManjos Last Waltz Essay -- Creative Writing Narrative Essays

O'Manjo's Last Waltz It was another long week, and I was looking forward to the usual summer rituals of mowing lawns and hammering a few nails into any place they seemed to fit. I usually closed the auto parts store at 5:30 and stayed doing paperwork for another hour or so, but not on Fridays. Fridays were the finish line of a usually marathon week of complaining customers and dissatisfied employees. At 5:31, the place would be empty, dark, and eager for an echo. The old man knew this ritual, and when he came on Fridays, he usually blew in the door around 5:15. He had been coming in every week for about a year. We didn't know Joe's last name, we only knew him as "Old Man Joe." We call him "O'Mango," and he didn't seem to know the difference. His hearing was the least of his problems. He peppered his weekly visits over different weekdays, but it was always Fridays that he waited until 5:15. He makes the usual remarks every time he sits his old, marshmallow behind down at the counter. "Well, boy?" He'd ask. "What the hell are you looking at?" "I'm looking at the ugliest, most disgusting, onriest son-of-a-bitch I've ever seen!" Was my usual reply. "That's right, and don't forget it!" He would hold his dry, cracked hands in fists and shake them at me. "Keep it up, boy, and I'll whoop your scrawny little but right here and now." At some time in O'Mango's life, he was a prizefighter. His nose looked like it had taken more than its share of beatings, so I tended to believe the story. All the talk was, of course, our way of greeting each other. If he did intend to come after me, I'd most likely have him pushed out the door before he could get his oxygen tank over his shoulder. O'Manjo didn't really need ... ...opened. The neighbors didn't want money for them; they were just trying to sort things through, and knew Joe well enough to guess at our credit arrangement. They said Joe died peacefully in his sleep, without pain. I wondered if he just laid in bed listening to that tape over and over like it was some kind of drug and he was a junky. This didn't seem wrong to me. At least I'd know that he died happy. I imagined him waking up in heaven wearing his best dance shoes, and bouncing across the ballroom floor. There will always be another customer to fill Joe's stool and fire remarks at us, but none will replace Joe. When I think about it, I kind of feel guilty that he paid me ten dollars a month to be his friend. It was not a difficult job, but was merely human interaction that somehow becomes precious when it's lost. I just pray O'Manjo got his money's worth.

Thursday, October 24, 2019

Quotations Describing Ralph from “Lord of the Flies” Essay

â€Å"And another thing. We can’t have everybody talking at once. We’ll have to have ‘Hands up’ like at school†¦Then I’ll give them the conch†¦He can hold it when he’s speaking†¦And he won’t be interrupted. Except by me.† (pg. 31) – This quotation proves a lot about Ralph and his character. It proves that Ralph demands a lot from everybody trapped on the island, the demands order and respect for other people. It shows his democratic view upon handling many situations or problems that occur on the island. Ralph is willing to listen to suggestions, ideas, or opinions from everybody trapped on the island as long as they have the conch, Ralph will listen to everyone and respect them as long as they are holding the conch because everyone should respect the fact that the person has the conch which means nobody should be speaking while the conch is not in their hand. This way everyone’s message gets across and Ralph can make a final decision knowing everyone’s input. This makes him fair because he wants to give everyone a chance to speak and is also proves that he is a great leader because everyone listens to him because they respect them. â€Å"This is our island. It’s a good island. Until the grown-ups come to fetch us we’ll have fun.† (pg. 33) – This quotation proves that Ralph is an optimistic leader. Even though it is obvious that everyone trapped on the island is in a difficult situation that might possibly never be solved Ralph still finds a way to stay optimistic. Ralph knows that the situation he faces is tremendously difficult but being pessimistic will not solve anything or improve their chance of being saved, being optimistic definitely improves their chances of being rescued, and optimistic is the only option for Ralph. Being optimistic drastically improves the morale and attitude of the group because everybody listens to Ralph so they will also be optimistic and sooner or later they will be rescued. They just got to make the most of the situation they are being faced with until they are rescued. Ralph feels good about their chances of being rescued off the island and he will never change his mind. â€Å"Ralph, looking with more understanding at Piggy, saw that he was hurt and  crushed. He hovered between the two courses of apology or further insult. ‘Better Piggy than Fatty.'† (pg. 21) – This quotation proves that Ralph is a great person, he is sincere and considerate for other people, and knows when a joke has gone too far. He has realized that Piggy is not appreciating the way the group is treating him so Ralph decides to get involved by telling everyone that they should call Piggy by his name and not by Fatty because that is not the right thing to do. Ralph realizes that he would not like people making fun of him for his appearance so therefore nobody in his group should have to put up with being made fun of. Ralph is a leader that wants to be respected but in order to gain respect you have to give respect and after making this stand he is gaining respect from Piggy and also the rest of the group. Ralph is considerate of everyone and realizes that he has made a mistake and he should be apologizing to Piggy for his dreadful mistake. This proves that Ralph is a unique and understanding leader because if he was an arrogant leader like most of them are he would just do whatever he wants not caring about other peoples feelings, but Ralph obviously is the complete opposite of that. â€Å"He was old enough, twelve years and a few months, to have lost the prominent tummy of childhood; and not yet old enough for adolescence to have made him awkward. You could see now that he might make a boxer, as far as width and heaviness of the shoulders went, but there was a mildness about his mouth and eyes that proclaimed no devil.† (pg. 5) – This quotation reveals a lot about Ralph’s physical characteristics. The quotation proves that Ralph is twelve years and a few months old, he is not an adolescent meaning he still has not hit the awkward stage of his life. He has an athletic built with wide and heavy shoulders but his gentle mouth and eyes give him the nice guy appearance even though he is extremely large. This quotation proves that Ralph seems to be a nice guy who really understands people, he also appears to be a leader who can inflict rules and regulations with no discussion because everybody is probably terrified of him at first sight because he is so well proportioned and this  characteristic allows him to get rules out to everyone and everyone obeys them. â€Å"I agree with Ralph. We’ve got to have rules and obey them. After all, we’re not savages.† (pg. 42) – This quotation proves a lot about Ralph and his leadership abilities. In this situation, Jack is agreeing with Ralph. It is suggested in this quotation that Ralph wants to inflict rules and regulations for the whole group so that the order on the island can be maintained and life on the island can be easier. This obviously shows that Ralph is drastically focused on keeping order on the island because he thinks that this is the first priority in his leadership responsibilities. Jack is agreeing with Ralph proving that other people on the island appreciate what Ralph is doing and his decisions. This is because Ralph listens to everyone’s suggestions and opinions first and than makes the best decision possible for the group and this keeps everyone satisfied. No matter what Ralph decides the group will always support his decisions because all his decisions are always fair and understanding.

Wednesday, October 23, 2019

How Can We Become a Good Citizens? & Ways to Be a Good Citizens

A good citizen is one who properly fulfills his or her role as a citizen. There are many opinions as to what constitutes a good citizen. Theodore Roosevelt said, â€Å"The first requisite of a good citizen in this Republic of ours is that he shall be able and willing to pull his weight. † Education is sometimes viewed as a prerequisite to good citizenship, in that it helps citizens make good decisions and deal with demagogues who would delude them. Roger Soder writes that in a democracy, where the demands of good citizenship are placed upon all, â€Å"only the common schools can provide to all the education that all need. † Science literacy is also frequently touted as a key to good citizenship. Good citizenship is sometimes viewed as requiring both intellectual skills (such ascritical thinking) and participatory skills (such as deliberating civilly, monitoring the government, building coalitions, managing conflict peacefully and fairly, and petitioning, speaking or testifying before public bodies). Henry David Thoreau wrote that men who serve the state making â€Å"no free exercise whatever of the judgment or of the moral sense†¦ are commonly esteemed good citizens. † Orit Ichilov notes that children â€Å"tend to perceive the government in the image of an ideal father that is benevolent and protective. At this stage, the good citizen is characterized as one who, through his behavior, proves himself one worthy of the love and protection of the government rather than one possessing certain political obligations and rights. Through their early school years, children usually continue to think in apolitical terms of their citizenship, expressing loyalty by their desire to remain in their country due to an attachment to its beauty, wildlife, and good people. By age twelve or thirteen, they begin referring more to political qualities, such as the nature and values of the regime. High school seniors define the good citizen primarily in political terms. Some students defin e good citizenship in terms of standing up for what one believes in. Joel Westheimer identifies the personally responsible citizen (who acts responsibly in his community, e. g. by donating blood), the participatory citizen (who is an active member of community organizations and/or improvement efforts) and the justice-oriented citizen (who critically assesses social, political, and economic structures to see beyond surface causes) as three different types of â€Å"good citizen. † Sometimes incentives prevail over desires to be a good citizen. For example, many people will avoid coming forth as witnesses in court cases because they do not want to deal with the inconvenience and red tape. Aristotle makes a distinction between the good citizen and the good man, writing, â€Å"†¦ there cannot be a single absolute excellence of the good citizen. But the good man is so called in virtue of a single absolute excellence. It is thus clear that it is possible to be a good citizen without possessing the excellence which is the quality of a good man. † Specifically, in his view, the good citizen is measured in relation to ruling and being ruled, the good man only in ruling. Some of the ambiguity is likely due to more than one Greek word being translated â€Å"good. Many organizations attempt to promote â€Å"good citizenship. † For example, the Boy Scouts of America published Scouting for Boys: A Handbook for Instruction in Good Citizenship, and theOntario Medal for Good Citizenship is given to those who are deemed to have made outstanding contributions to the well being of their communities without expectation of remuneration or reward. Another non profit or ganization, Good Citizen, has a mission to teach Americans how to be effective citizens and focuses on 100 citizen actions. Ways to be a good citizens. We can probably be a good citizen if we follow the given instructions 1. We must obey rules and regulations. 2. We must respect all nationalities. 3. Stand for the right of others. 4. We must be helpful and considerate, willing to put others first. 5. We must listens to the views of others and thinks about what they have to say. 6. We should helps people who are not in a position to help themselves. 7. A responsible citizen always respects the environment and does not damage it in anyway. 8. We must work hard as well as willing to learn new things. 9. We must be well mannered and pleasant.

Tuesday, October 22, 2019

Best Part-Time Jobs for Moms in 2018

Best Part-Time Jobs for Moms in 2018 If you’re a parent, you already know you’ve got one of the best jobs around, with highly demanding (but adorable) bosses. But if you’re also in the market for a paying gig that balances with your mom life, there are lots of great options out there for you that don’t involve a cubicle and a 9-to-5 weekday grind. Flexible and part-time jobs are great because they give you more power over your own schedule, and can really help balance your home needs with your professional ones. We’ve compiled a ton of resources for you to explore as you start down the path of finding a part-time job that lets you work and earn money while still leaving time to concentrate much of your week on parenting.First, Prepare YourselfOnce you’ve zeroed in on the job(s) you want, make sure you have your job application package in order. You’re ready to take the plunge into the part-time working world- make sure your toolbox is stacked with all you need to conquer the job application process.6 Part-Time Job Interview Strategies You Must KnowThe Ultimate 6 Step Guide to Resume WritingThen, once you’re all set to apply and get that part-time gig, it’s time to start exploring your options.Jobs Where You Might Not Have to Leave the HouseAs you look for your part-time gig, it’s also important to consider how you want to be working. Are you able to spend some hours away from home? Would you prefer to work at home? If you ideally want to aim for a gig you can do from a home office (or a home laptop on your bed!), there’ are a lot of opportunities out there- you just have to be smart about knowing what’s out there.The good news here is that with so many telecommuting tools online, many jobs can be done from virtually anywhere- especially digital-focused jobs.  It is absolutely possible to sneak in a few hours of work during naptimes or drop-off playdates.Here is some inspiration to get you started.Top 10 Work From Home JobsWhat Are Some Part Time Jobs You Can Do From Home?10 Jobs Where You Can Telecommute and Make a Great SalaryHow to Get a Career Doing Data EntryJump Start Your Career as an Administrative FreelancerWhat Are Some Part-Time Jobs You Can Do From Home?Jobs Where You Can Earn a Lot by the HourParenting is a time-consuming and difficult job. If you’re looking to  supplement your mom gig with another paid job, you ideally want to make the most of your precious time- and that means finding a job where you’re paid well for your work. Take a look at the following, which offer options for jobs that are both part-time  and come with a high rate. The best of both worlds is definitely possible- you just have to know where to look!9 Part-Time Jobs That Pay Very Well10 Highest Paying Part-Time Jobs21 Part-Time Jobs That Pay More Than $20 Per HourShow Me The Money: 8 Good-Paying Part-Time JobsJobs That Let You Enjoy Your Non-Work LifeParenting is lovely and amazing, but we know it’s hard enough as it is (and it’s already an all-consuming full-time gig). Adding an outside job on top of that has the possibility of making you feel overwhelmed and unable to focus on your family, your hobbies, your relaxation, and yourself. Check out some jobs that offer the promise of a nice balance of work, family, and life outside of your many obligations.Top 5 Jobs for Work-Life Balance11 Flexible Jobs for Working ParentsTop 12 High Paying Part-Time Jobs With Good Work-Life BalanceAnd on top of finding a part-time job that leaves time for you to enjoy your life, you also might want to be on the lookout for one that comes with perks. You don’t need to have a full-time, salaried gig in order to enjoy the benefits of the working world. Check out some of the following companies, who are known to reward all employees handsomely.10 Companies With Amazing Benefits for Part-Time EmployeesJobs That Use Your Parenting SkillsAnd don’t be afraid to thi nk outside the box a little. For example, nannying/daycare might seem like a little too much parenting, but it would allow you to spend time with your own children while also earning money. After all, as a parent, you likely already have the kid-wrangling skills that would make you an awesome caregiver for other children as well.How to Become a NannyHow to Write a Perfect Caregiver ResumeJobs Where You Work For YourselfIt might also be time to think about whether you want to start your own business, as a side hustle to your primary priorities. Talk about working on your own terms- these jobs let you design your own schedule and hours. They likely require a lot more energy upfront and all the accountability falls on you, but you are the boss here and you call the shots.Side Hustle: How to Make Money on the Side7 Strategies for Your Side HustleThe Job of Your DreamsFinally, if you’re trying to live the dream (and have a job that will not only be the envy of your peers, but also your kids), there really are jobs that allow you to watch Netflix for a living. Seriously.These Netflix Jobs Will Pay You to Watch MoviesGood luck!

Sunday, October 20, 2019

The 10 Worst Natural Disasters in World History

The 10 Worst Natural Disasters in World History All of the worst disasters in recorded history have been natural disasters - earthquakes, tsunamis, cyclones, and floods. Natural Hazard vs. Natural Disaster A natural hazard is a naturally-occurring event that poses a threat to human life or property. A natural hazard becomes a natural disaster when it actually takes place, causing significant loss of life and property. The potential impact of a natural disaster depends on the size and location of the event. If the disaster takes place in a heavily populated area, it immediately causes more damage to both life and property. There have been numerous natural disasters in recent history, ranging from the very recent January 2010 earthquake that struck Haiti, final death toll still unknown, to Cyclone Aila, which hit Bangladesh and India in May of 2009, killing approximately 330 people and affecting upwards of 1 million. Top Ten Worst Disasters in the World There is debate as to what the deadliest disasters of all time actually are, due to discrepancies in death tolls, especially with disasters that occurred outside of the last century. Following is a list of ten of the deadliest disasters in recorded history, from lowest to highest estimated death toll. 10. Aleppo Earthquake (Syria 1138) - 230,000 dead 9. Indian Ocean Earthquake/Tsunami (Indian Ocean 2004) - 230,000 dead 8. Haiyun Earthquake (China 1920) - 240,000 dead 7. Tangshan Earthquake (China 1976) - 242,000 dead 6. Antioch Earthquake (Syria and Turkey 526) - 250,000 dead 5. India Cyclone (India 1839) - 300,000 dead 4. Shaanxi Earthquake (China 1556) - 830,000 dead 3. Bhola Cyclone (Bangladesh 1970) - 500,000-1,000,000 dead 2. Yellow River Flood (China 1887) - 900,000-2,000,000 dead 1. Yellow River Flood (China 1931) - 1,000,000-4,000,000 dead Current State of World Disasters Every day, geologic processes are taking place that can disrupt the current equilibrium and produce natural disasters. These events are generally only catastrophic, however, if they take place in an area where they affect human populations. Advances have been made in predicting such events; however, there are very few instances of well-documented prediction. There is often a relationship between past events and future events and some areas are more prone to natural disasters (​floodplains, on fault lines, or in areas previously destroyed), but the fact remains that we cannot predict or control natural events, therefore, we remain vulnerable to the threat of natural hazards and the impacts of natural disasters.

Saturday, October 19, 2019

Basic Computer skills for your career

Basic Computer skills for your career The computer age is continuously improving as the days go by. If you do not keep up with that pace, you may be less competitive and may not get the promotion you have been eyeing for so long. Of course, job security will back you up and you may stay in your position for as long as you like. If you however, would like to move forward, you need the backing of computer knowledge. How do you get computer savvy? Start from the basic. Get basic computer training and from there improve yourself keeping pace with the new software for business. If you are already working, I know that you already have an understanding of some computer basics but if you are a new entrant into the business world, you may need some basic computer training to ensure you will keep your job. If the company you work for do not sponsor computer trainings, it is for you to take in on your own. Why do you need the basic computer training? This is to ensure that you are prepared to receive additional computer trainings. Why is it so? This is because without the basic computer knowledge, whatever computer program your company will sponsor for you will be useless because you do not know how and what the basics are. Let me give you some very basic computer knowledge that you may need and from there, you may move on to taking the basic computer training at your own. Learning this will give you the advantages you need to excel in your field. Basic computer knowledge What is a CPU? The CPU or the Central Processing Unit is the brain of the computer; it holds the Drives. What are the Drives? Drive A is the floppy disk insert drive. Drive C is the hard drive where most of the programs are found. Drive D or E, these are the CD ROM drives. Input Devices: Keyboard, it is the device where you will find the letters used to input words in the system. Mouse, this is used to scroll and navigate the window. Output Device: Monitor, this is the screen where you see what you will input from the keyboard. Printer, this is where you will send the letters you input in the computer and have them printed on paper. Now, that you know what the computer devices are, you will need to learn how to open the computer. Find the power on in the CPU and the power on in the Monitor. When the Monitor shows you images, you already have opened your computer. The next step, of course is to learn how to use the computer using software. This is where you need basic computer training from reputation institutions or find an online computer course. Choose from basic to advanced computer training and you are well on your way to becoming computer savvy. Take, even the basic computer training at heart and your will surely succeed in the computer age and modern business environment. Basic computer training is the start of a lucrative career.

Friday, October 18, 2019

Hip-hop in Colombia Essay Example | Topics and Well Written Essays - 1250 words

Hip-hop in Colombia - Essay Example What began as a music practice common among the economically underprivileged groups like the Latinos and the African-Americans transcended into an art form, without national boundaries in a very short time. Hip-hop in Columbia is not only viewed as a simple music form but as a media to express powerful feelings by the youth. The hip-hop music has international reach and the Columbian artists are using it efficiently to underline their plight to the world community through rapping. Hip-Hop appeared in Columbia by late 1980s shortly after the art form had established itself as a distinguished sub-culture in the US. Los Generales R&R, an Afro-Columbian group is reported to be one of the first groups to entertain Columbian music lovers already mesmerized by MC Hammer and NWA. Los Generales broke up shortly after releasing their first CD. But, they were followed by groups like Gotas de Rap and La Etina in the early 1990s paving way for steady growth of Columbian hip-hop. Both the groups were known for expressing their social concerns through their lyrics, and adapting a very independent style which served as an inspiration for the development of later Columbian hip-hop style. Their experimentation was followed by Asilo 38 band which released famous albums like La Hoguera and La Descarga, by experimenting with new controversial sound. This gave way to Puerto Rican Reggaeton style music in Columbia for a short period. Hip-Hop revived its former glory again from 2006 through the contribution of groups like ChocQuibTown. Though there are several famous hip-groups, this paper will explore about five famous groups, Ghettos Clan, Flaco Flow y Melanina, Choc Quib Town, Carbono and Voodo SoulJhas. Hip-Hop in Columbia is not just a regurgitation of US subculture. Columbian hip-hop has distinct African sounds, usage of local anecdotes, and several autochthonous music forms. Folklore based lyrics mixed with ethnic

Business Cannot Afford to Stand Still Essay Example | Topics and Well Written Essays - 1500 words

Business Cannot Afford to Stand Still - Essay Example The businesses around the world are witnessing changes in the demographic situations and thus are bound to modify their business marketing strategies around the changing character of the populations. Page (2010) contends that there exist a great variety of factors that influence the way the organizations operate. It is evident that factors like unemployment, old age, economic downturns have made the people change their buying patterns. Thus the businesses around the world need to adapt to such changes and prepare themselves to serve the people better.It is within the last two decades that the social and cultural perspectives have changed drastically. The perspectives relate to the aspects like concerns over environment and a healthy lifestyle. This led to changes in environment policies of the companies. For example, the plastic bags could not used as freely as earlier. This gave birth to the recyclable packing material in the form of bio degradable bags manufacturing (Page 2010).Pri or to creation of business plans, it becomes important to study the external environment of the forces. The investigation of the social, legal, economic and political environments exercise influence over the businesses. These environment scan is also important to know the competitors plans. The forces behind the changes are themselves continually monitored and thus are found to be in a state of change. The social factors are associated with behavioral patterns and thus change the character of the fashions and lifestyles.

Creation of a Teaching environment Essay Example | Topics and Well Written Essays - 2750 words

Creation of a Teaching environment - Essay Example Each learning experience is unique and necessitates different needs, and so they may need a different rubric to address these unique needs of the student. The designing of a rubric can be cumbersome task but at the same time a rewarding and useful experience to nurse educators. Nowadays, health care environment is becoming more complex and diverse. There are an increasing number of patients from at-risk populations as well as an increase in the number of chronic diseases that need to be managed in a community setting. This complex and diverse scenario makes it mandatory on the part of the nurse educators to ensure that their graduates have the skills necessary to be leaders in this healthcare environment (American Association of Colleges of Nursing, 2008). The utilization of innovative strategies will assist the nurse educators to apply various teaching methods to facilitate learning to ensure core competencies attainment amongst the students, as well as during teaching and mentoring newer nurses. (Billings & Halstead, 2009). This paper will examine the core competencies needed by graduates of today’s nursing programs and how nurse educators can facilitate learning and attainment of these competencies needed for safe evidence-based practice. The American Association of Colleges of Nursing (AACN) has formulated nine essentials competencies that graduates should posses by the end of their various nursing program. These competencies are stated in a different manner by the National League for Nursing Accrediting Commission (NLNAC) as well as various other stakeholders of nursing education, but they fully support it. (Billings & Halsted, 2009; The National League for Nursing, 2005). This paper will discuss the core competencies of scholarship for evidence based practice, inter-professional communication/collaboration skills, the use

Thursday, October 17, 2019

Coke and Pepsi in India Essay Example | Topics and Well Written Essays - 1500 words - 1

Coke and Pepsi in India - Essay Example As the paper highlights Indian customers had a little choice of products or brands and sometimes they were forced to purchase products regardless of quality and reliability. In addition, Indian government mandated that the companies Pepsi and Coca Cola must be promoted in India under the names ‘Lehar Pepsi’ and ‘Coca-Cola India’. Boycotts of American goods and water contamination issues were some other aspects of Indian political spectrum, which influenced operations of both Pepsi and Coca-Cola in the country. The company management could have anticipated some of the Indian market issues particularly corruption within the Indian governmental settings. By forecasting this, the Coca-Cola could have avoided its hardships in the past. However, it was not possible for the company to anticipate the ongoing water contamination issues. In other words, each company could have handled the unexpected developments in Indian political arena better, if its management had been flexible enough to adapt to the developments emerged. From this paper it is clear that Pepsi entered the Indian market early in 1986. During that time, the Pepsi had not to compete with other multinational companies once it was the initial stage of Indian soft drink market. Therefore, the early entry assisted the company to attain a significant foothold in the market while it was still working with its product positioning operations. In addition, the Pepsi acquired 26% market share by 1993 as a result of its early market entry. At the same time, the early entry forced the company to change its name to Lehar Pepsi and additionally Pepsi had to struggle with other local issues. The Indian government restricted Pepsi’s soft drink sales to less than 25% of total sales. Likewise, the late entry of Coca-Cola in Indian market in 1993 aided it buying four bottling plants from the industry leader Parle.