Thursday, October 31, 2019

Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 words

Quantum Cryptography - Essay Example Both properties form a third strength of quantum cryptography in terms of security. This strong point occurs from every new QKD term code being free of all formerly used codes as this independence lowers the number of methods a criminal can infiltrate the system (Cobourne and Cid, 2011, p. 5). A fourth strength is the future proofing of security offered by QKD. Even when a malefactor breaks through a cryptographic system at any indefinite period in the future, former messages conveyed through it stay secure (Cobourne and Cid, 2011, p. 5). Mathematics has demonstrated the absolute security of QKD networks. Even when dealing with a rival that has endless supplies of time and energy, security of QKD networks are unbreakable. One weakness of quantum cryptography is that quantum mediums are only functional over limited space (Rothke, 2007, p. 1055). This is a technical weakness as it occurs when one evaluates the realities of QKD application. Today, quantum mediums cannot convey data quick enough to offer sufficient levels of service, which forms a second technical weakness. Thirdly, quantum optic gear is susceptible to attacks. Quantum cryptography requires costly setups for upholding quantum processing, which serves as a weakness for mathematics, computer, and physics researchers who cannot afford such infrastructure (Cobourne and Cid, 2011, p. 6). Another weakness is the possibility of quantum cryptography â€Å"killing† mathematical progressions at any period in the future irrespective of quantum computing advancements (Rothke, 2007, p. 1055). Commercially, the promise of ideal security may not be a significant enough imperative for businesses to permit the cost of customized gear and infrastructure (Nano 2014). Since conventional cryptography offers more than sufficient security, businesses will consider the uncertain advantages of quantum cryptography an unworthy risk and weakness (Lydersen et

Tuesday, October 29, 2019

English 11 Article Example | Topics and Well Written Essays - 1250 words

English 11 - Article Example Together with the portability of these devices, the computational capability of smartphones have made the devices increasingly become popular with 42% of all mobile subscribers in the US using smartphones, where 37% and 60% of adults and teens respectively acknowledge their addiction to the devices (Sarwar and Soomro 218). In fact, Boulos, Wheeler, and Jones observe that the devices have offered immense competition to personal computers in their market and have impacted â€Å"not only on the manner in which we communicate, but also on our sense of culture, community, identity and relationships† (2). Thus, this paper articulates the positive and negative effects of smartphone technology with regard to how it has transformed people’s way of communication, conducting and transacting in business and entertainment. Smartphone technology has changed the way people communicate, making it even more convenient. Other than its portability, a smartphone offers Internet connectivit y capabilities which open up the device to various ways through which communication, whether formal or informal could be undertaken. One of the weaknesses that e-mail communication had before the advent of smartphones according to Derks and Bakker was accessibility. E-mails would only be accessed in the presence of a computer. But smartphones offer wireless Internet connectivity such that users receive and respond to e-mail communications whenever, wherever. This makes people available whenever needed, hence more appreciation of e-mails as communication tools. Other than instant communication, smartphones provide various options through which people communicate. The devices have transformed people from using the traditional modes of communication, particularly e-mails and phone calls, to other modes such as WhatsApp, an application that allows for instant messaging. Such applications have transformed group communications such that people no longer have to meet physically to communic ate. Rather, through group communication platforms, such as applications like WhatsApp and social media platforms, groups interact conveniently. If need be, these people could see each other as they communicate through the web cameras on the devices which bridges the distance (Boulos, Wheeler, and Jones 4). This has greatly reduced on the time that was initially spent to make decisions, thus people not only enjoy the convenience of the technology but also the promptness with which it allows for decisions to be made. The portability and greater functionality of smartphone technology have transformed the way entrepreneurs conduct businesses and execute their transactions, hence giving business greater capabilities, which in turn generate more business opportunities. In a study conducted in Malaysia, Osam et al. (274) acknowledge the advancement in computing power and connectivity of smartphones compared to contemporary mobile phones. Businesspeople appreciate this capacity and use sma rtphones to conveniently and promptly access the required information, be it on stocks, market prices of commodities or foreign exchange rates among others. This enables them to make prompt and informed business decisions whenever needed, regardless of their location. Moreover, marketing being an important component of business has greatly transformed with the introduction of smartphones to the market. Marketers use the various communication

Sunday, October 27, 2019

6lowpan Neighbor Discovery Protocol Computer Science Essay

6lowpan Neighbor Discovery Protocol Computer Science Essay The IPv6 over IEEE 802.15.4 has specified way how to carry IPv6 packets over IEEE 802.15.4 standardized devices and similar networks with the introduction of an adaptation header which comes before the IP header and just after MAC layer, a link in such a 6LoWPAN is characterized as lossy, with minimum power consumption, minimum data rate, small range, with many nodes saving energy with hibernating or deep sleep schedules. IEEE standards are based on low memory devices which has a limited MTU size keeping this under consideration we have to see how we can fit IPv6 address in that limited space we have and even UDP packets also which are used in our transmission. IPv6 already posses a big memory but in use of 6LoWPAN all the headers are compressed with special compression algorithm so that they can be fit in the limited space of IEEE standardized MTU. Compressing algorithm are bit different according to the use or according to the network topology, as 6LoWPAN support both ad hoc and st ar technically used as Mesh Under and Route Over. | Application Layer | | Transport Layer (TCP/UDP) | +-+ | Network ++ | | Layer | Routing | | | (IPv6) ++ | +-+ | 6LoWPAN Adaptation Layer | +-+ | IEEE 802.15.4 (MAC) | +-+ | IEEE 802.15.4 (PHY) | +-+ Figure X: New adaption layer introduces IEEE 802.15.4 has some several types of frames like beacon frames, MAC command frames, acknowledge frames and off course data frames also, IEEE standardize addressing mode also which are further described in this documents these are 2 basic i.e. 16-bit short addresses or a unique identifier and 64-bit unique addresses. A particular LoWPAN header will be like this after compressed field containing all the field like IEEE header Mesh header or if Route over is used depending on the network topology used then fragment header and in the end IPv6 compressed header. Figure X: Typical LoWPAN Header Stack Several compression methods are used or developed to keep the header compressed and fitted in limited amount of space and should be working according to the desired need, compression algorithm like gzip, deflate, ROHC but normally and best fit for this scenarios are the HC1 or HC2 compression header formats. They are predefined formats having their own formatting to represent data and data types [9]. This can best describe us how the header look like after all there field filled and necessary information saved for transmitting the packet from node to other may be in the LoWPAN or may be on other LoWPAN, this is only the structure defined and use by the LoWPAN nodes. Now we can consider a node which wanted to join a network and what necessary things will be needed and what processes it has to go through to final get his IPv6 address, as IPv6 has some standard predefined for normal Ethernet use like multicast as used in classic IPv6 Neighbor Discovery is not useable and desirable in such a wireless low-power, lossy network. Network discovery is just a simple procedure as defined in classical IPv6 to get the fresh node bind with the network. 6LoWPAN Neighbor Discovery (6LoWPAN-ND) is specially designed for LoWPAN networks which provides some basic operations of bootstrapping and other simple network operation, even they some advanced features includes claim and defends address generation and Extended LoWPAN over backbone links, while avoiding the flooding from multicast; this solution supports the use of both link-layer and LoWPAN-level Mesh Under and Route Over solutions. 6LoWPAN-ND design introduces a registration method over the radio edge of the network and proxy operation over the federating backhaul, this registration mechanism provides a examination similar to the Multicast Address Resolution Server (MARS) for a restricted purpose, and in a much simpler and generic way for those link scope multicasts is unavoidable, such as for Router Advertisements, optimizations may be used to optimize the distribution of the information in the LoWPAN. The new concept behind LoWPAN Whiteboard located at Edge Routers (ERs) is introduced which works as the cache to maintain he entries from the registration of nodes, which allows for Duplicate Address Detection for the entire LoWPAN. A new registration/confirmation message sequence is specified so that nodes can register themselves with their IPv6 addresses with an Edge Router. These white boards are the cache of edge routers contain all the information regarding the nodes which are registered with the LoWPAN wit h their unique IPv6 address and network prefixes. The Whiteboard uses soft bindings of nodes meaning the entries will be expires until particular time if not getting updates from nodes before the life time of registration of the nodes expires, thus nodes can send periodic registration messages in order to update their bindings with the edge routers and to keep the cache record updated which node was last updated and registered to which LoWPAN router range, changes in network topology and mobility between ERs and LoWPAN are supported and sometimes unreachability of routers can be detected in this way. This research also put an eye on the combination of an Extended LoWPAN with more than one edge router working in same LoWPAN sharing same backbone link (e.g. Ethernet) getting advantage of having a single IPv6 subnet. This allows nodes to keep the same IPv6 address throughout a large network if they move from the domain of one edge router to other and registers them with a new edge router which allows for easy communications and even ro uting among the same LoWPAN is easy with nodes over the backbone link and with other IPv6 hosts. Edge Routers backed by Ethernet link working on an edge of LoWPAN networks in this particular scenario one edge router will be maintaining or working as DHCPv6 server and other routers in his domain will be working as relaying router. A LoWPAN network typically uses two types of Layer 2 addresses à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ for example 16-bit short addresses or a unique identifier and 64-bit unique addresses. Additionally, the available Layer 2 payload size with respect to payload we might need to use header compression as explained earlier and use a minimum payload on the order of less than 100 bytes. These network is lossy and battery-powered, and it does not support multicast capability at the link-layer, thus pretending multicast actions by both using broadcast or sending a number of unicast messages which are costly for the battery powered network and the low-processing capable nodes. Often these battery-powered nodes save energy by using sleep schedules and keeping themselves in sleep mode to save battery power; waking them up just to receive IPv6 signaling messages so that they can only be updated in our oneà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s domain only is not useful on this case what nodes usually programmed as they will get themselves updated and the registration has a life time and if the node did not update himself before that the entry in the white board will be discarded, these nodes do schedule there sleep time but keeping the timer of registration a little longer then there sleeping time so usually they wake up before the cache entry expires, also they are not competent of processing RA for their neighbors efficiently. Sometimes due to the strong radio signal from a neighbor router or its own strength, a node may often move from one network to other network from one router to another without physically moving. Considering the above characteristics in a LoWPAN, and the IPv6 Neighbor Discovery basic requirement of his protocol, it was finalized that class ic ND protocol of IPv6 is not good to be used in LoWPAN so a little different protocol for LoWPAN has been designed as 6LoWPAN-specific ND. 4.1 6LoWPAN Neighbor Discovery Protocol Overview 6LoWPAN Neighbor Discovery optimizes with a mechanism which is on its own least yet very important for LoWPAN IPv6 operation. 6LoWPAN-ND defines a registration process which optimizing the node-router interface, this mechanism do not work on flooding which reduces link-local multicast frequency. 6LoWPAN-ND can work with non-transitive links also, the use of mesh-under and route-over techniques and makes no hypothesis about node synchronization. 6LoWPAN-ND is compatible so that they will be used with the link-layer mesh techniques, which improve the if not non-transitive characteristic nature of wireless links if they are used throughout the LoWPAN, this normally called Mesh Under topology which make the whole link IP layer as having a link-local scope making all the 6LoWPAN interfaces in the LoWPAN. This kind of LoWPAN is consisting of hosts and Edge Routers, this link still lossy, slow data rate, irregular behavior along with sleep mode. The non-transitive nature of the link can be overcome simply by using routing based on IP with in single domain of a LoWPAN, also called a Route over topology. Routing between all nodes in the LoWPAN is done by LoWPAN Routers in the LoWPAN. Mesh Under and Route Over techniques are not limited. 4.1.1 Bootstrapping A Host performs independent address auto configuration of its link-local unique and single t address for each LoWPAN interface from its EUI-64. The process of joining a LoWPAN is done either by listening of RA or either by sending a broadcast message of Router Solicitation (RS) and in return it will receive RA an acknowledgement message responses from local routers, there may be more than one router it a particular range. It mainly depending if a true prefix is advertised in the RA, the host will also form a positive global unique address with auto configuration, this is the point the node can choose more than onr router if its available to get himself registered its only if it have signals from more than one LoWPAN. After selecting the desired router the node will make some effort to first perform node registration and get itself bind with a router, registration is performed with a link-local Edge Router or LoWPAN Router by sending a unicast Node Registration (NR) message to it from host to router. It is more good to get yourself registered directly with an Edge Router, although all other routers with in a LoWPAN has capability to work as a relaying agent on the LoWPAN have the capability to relay NR/NC messages on behalf of a node. The NR contains the addresses of the node who wants to register. A node may also request a short address of 16 bit to be generated on its behalf when the Edge Router get a request of NR its replies either directly with a Node Confirmation (NC) message to the host or through the help of relaying router which is in between node and edge router, relaying routers only exist in Route Over configurations or network topology and in pure Mesh Under network topology and scena rio, configurations nodes are within link-local scope or range of an Edge Router. This NC message includes the set of unique addresses which will be updated and also made an entry in the Whiteboard and address will be bound to the ER the Host is now registered and can use the LoWPAN. 4.1.2 Basic operation The node is now ready to use and may send packets to any IPv6 address inside or outside the LoWPAN or over the internet every request for Next-hop will be sent to the predefined default router but only local address which will redirected to as they are present in local domain. The white board entries and binding table of LoWPAN Router must be renewed on every pre defined intervals as per advertised interval and the lifetime of the binding, the white board entry will be valid in till it expires and then the current entry will deleted from the routers cache. This is achieved by occasionally sending a new NR message when ever host changes his location from original LoWPAN to another LoWPAN or may be some change in network topology occurs or may be some certain router is no longer in reach then host have to get them registered again with the nearest available route. Host then starts the registration process with another router if the LoWPAN does not change for host its IPv6 addresses rem ain the same. Addresses bound or the entry in the Whiteboard must be remembered by the host and updated in order to keep the address. If the host moves to a different LoWPAN, the bootstrapping process is initiated again the host may be moved while he is sleeping mode. LoWPAN Routers at times send RAs to their neighbors in order to keep themselves and their neighbors updated. The Edge Router triggered the first RAs, and information from these RAs is included in the RAs of each further router where this RA travel, causing the information to be spread throughout the LoWPAN and to every router on it. 4.2 Address collision detection and resolution The address collision process can be carried out within the Edge Router if the Edge Router already has an entry in his cache for registration of a given address in his white board or over the Backbone Link using Duplicate Address Detection mechanism designed to clear the mess if more than one router are keeping the same entry of a node in there white board. For this case, a new ND option is introduced in the NS/NA messages from routers to carry additional information to resolve the conflicts in all over domain range if any duplicate identity is present; the Owner Interface Identifier Option is used in NS/NA messages to carry the added information necessary for the resolution of conflicts: Transaction ID, Owner Interface Identifier, and Owner Nonce. In any case generally, the Edge Router of LoWPAN is in charge of the resolution which is the same Edge Router that handles all the registration processes of the LoWPAN nodes. A conflict only occurs when a Node already registered and router again receives registration request making it a duplicated address over the same network for that node and an IPv6 address that is already registered with a different OII at the same or another Edge Router. The address collision is only occurred while one node may be in sleeping node or normally moves from one LoWPAN to another, when it receives new LoWPAN it will try to get himself registered to that new edge router or may be contact the relaying router to get himself registered. At that very moment it will be checked which router has the registration entry of this node or its new node for this LoWPAN. Mobility of the nodes with in a same subnet or within a single domain of a LoWPAN router subnet is supported it has least effects on entries on white board, as the node is with on domain of a router no extra registration is necessary making no duplication of addresses in an Extended LoWPAN, a LoWPAN Node may move around from one Edge router to a new Edge Router visibly and at any time. The protocol for this mobility detection is designed to differentiate the mobility and clear out the registration states or any duplication among routers white board. The node registration triggered by an Edge Router that processes usually takes over an existing registration present among his domain or maintained by a defendant Edge Router this decision to transfer the registration from an Edge Router to another edge router is made by the Edge Router that is processing a Node Registration message depending on its states for that particular registration and ND exchanges over the Backbone Link if we talk about extend LoWPAN. If the node is already registered on a backbone link or to any other router with in a LoWPAN the chances of getting conflicts occurs when getting the registration of the same node start by, the resolution of such conflict is overcome by using classic Duplicate Address Detection mechanism; ità ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s quite simple who claim and have proof of the nodes ownership will succeed. Once a node registration message received to an edge router, the Edge Router checks for the existing registration for that IPv6 address in its LoWPAN whiteboard. If the entry does not exist then the Edge Router concerns the address over the Backbone Link using duplicate address detection mechanism. The edge router who is defending the address when gets the DAD message will reply back to this message with an acknowledgment and with owner identifier otherwise if the message is timed out then the edge router who advertised the DAD message will accept the registration of this node. It will create an entry on its white board and update the node with a positive confirmation message. If some router claims the ownership of the replies with his owner identifier and when the edge router get this message it will check the owner identifier interface in the message and matches it with the entries in his white board. If its present then the address is duplicate and already present on the network, taking this on account the request for registration is discarded and duplicate address detection is successful completed his task. If there are by any chance two routers claims to be the owner then checking the owner identifiers and matching them with the OII present in NA message will be checked and who has the Transaction ID will be claimed as owner and other request will be discarded. The router who a loss the registration has to keep the entry in his white board till the time period of this registration is expires.

Friday, October 25, 2019

The Like Minds of Emerson and Douglass Essay -- Biography Biographies

The Like Minds of Emerson and Douglass      Ã‚   Few, if any, writers of the American Renaissance period had as great an influence on contemporaries as did Ralph Waldo Emerson. He was insistent that America put its mark on the literary world with its own, genuine American literature, and he launched the movement with his own works (Bode 574). Frederick Douglass was a slave of the American south when Emerson was starting out and moving up in his profession. Eventually, Douglass became Emersonà ¢s fellow writer and lecturer. Douglass was present and was asked to speak for the Womenà ¢s Anti-Slavery Society in August 1844, in Concord, where Emerson was the keynote speaker. The two men shared common ideas, as we shall see as the literary works and lives of the two men are examined. To some extent Emerson had an influence on Douglassà ¢s expressed views, but on the other hand, some of Douglassà ¢s views were a product of his own natural inclination.    Emerson believed that the human spirit could be relied on to lift man up to overcome any tribulation that might be encountered (Bode 574). Douglass inadvertantly proved Emerson right when he lifted himself out of the dehumanizing bondage of slavery through his sheer will of human spirit. Douglass went on to become a hero of the slave movement after he gained his freedom.    Emerson "believed in a reality and a knowledge that transcended the everyday reality ·" He also felt strongly that individuals should trust fully in the integrity of self (Bode 573). There is a correspondence between this "self-made" man of Emersonà ¢s and Frederick Douglass. During the course of Douglassà ¢s career, his actions and words epitomized Emersonian ideas.    The issue of abolishment of slavery d... ...ce, exemplary character, and social inspiration" (Martin 263).    Works Cited    Belasco, Susan. Harriet Martineauà ¢s Black Hero and the American Antislavery Movement. Nineteenth-Century Literature, Vol II. University of California Press, 2000. 1-23. Bode, Carl. Emerson. McGraw-Hill Encyclopedia of World Biography Vol III. New York: McGraw-Hill Inc., 1973. 572-574. Frederick Douglass 1818-1895. The Heath Anthology of American Literature. Ed. Paul Lauter. Boston: Houghton, 1998. 1578-1690. Martin, Waldo E., Jr. The Mind of Frederick Douglass. Chapel Hill: University of North Carolina Press, 1985. Ralph Waldo Emerson 1803-1882. The Heath Anthology of American Literature. Ed. Paul Lauter. Boston: Houghton, 1998. 1578-1690. Rowe, John Carlos. At Emersonà ¢s Tomb: The Politics of Classic American Literature. New York: Columbia UP, 1997.   

Thursday, October 24, 2019

My Ideal Career

My ideal career goal is to successfully complete all necessary training to become a proficient source of protection to our nation. My first desires are becoming a part of the U. S. Marshal forces or joining a Crime Scene Investigating team. I am open to various fields throughout the Criminal Justice system as long as I’m making a difference in the everyday lives of others. I chose this path because of my eight year military background involving tours with the Marine Corps and the Army National Guard.I served fifteen months overseas in Iraq with the Army National Guard where every day was a challenge to restore order. I fed off of the motivation of my fellow troops and my own motivation to make an impact on the lives of the people in Iraq. The careers that have my interest have many similarities that I have been trained on over the years. I chose this profession because I hold a passion for law enforcement and the military close to my heart. In this type of work, a bond forms b etween co-workers that lasts a lifetime. I am not only motivated to make a difference in the communities, but also motivated to join the ranks of a new family.Every day should be adventurous and my motivation for this type of work will allow me to push above and beyond the call of duty. Receiving my college education will boost my level of skills and support my military background to help me find work in various specialized fields. Currently my military background would allow me to have a job under Law Enforcement, but having a degree will allow me to move further along in my career to higher positions and more responsibility, which in return leads to making more money. My education in Criminal Justice plus my military background will both be the backbone to a new beginning.

Wednesday, October 23, 2019

Practical Labour Law Assignment Essay

The common law contract of employment would require that the two parties involved i. e. employer and employee conclude an agreement equitable to or at least meeting the needs of (locatio conductio operarum/employment proper). Considering the nature of the relationship between Mrs. James and the school, it is difficult to define who the employee and employer is, as the initial agreement for the services offered by Mrs. James was made between her and the parents. The school ultimately becomes responsible for paying her salary based on a request she made. No formal agreement is mentioned with regards to this arrangement for instance, is the school charging her an administration/handling fee or is she subjected to statutory deductions like UIF as the other teachers. Mrs. James was provided with the tools (i. e. two classrooms) to run her services by the school and they stipulated conditions of her using the schools facilities (provided she supplied the children with equipment etc). Thus it would seem as though a (location conduction operis ) or â€Å"provision of work† contract exists between the school and Mrs. James. This contract unfortunately does not provide her with job security or recourse when facing acts of negligence or wrong doing by the other party to the contract. The control test indicates that Mrs. James ran her own after care centre without reporting to any of the staff members, in fact if ever there was a reporting structure it would probably be to the parents of the children she looked after. The governing body had no control over how she ran her classes either than the fact that they stipulated that toys and equipment be provided to the children and of course that the classrooms be well maintained. The governing body can stipulate the code of conduct for the other teachers but surely Mrs. James would not be subjected to this. In terms of the Organizational test, Mrs. James has been a part of the school for 15 years receiving a cheque from the school governing body like any other member of the organization and hence feeling somewhat involved with the school. However should the teachers for instance be involved in industrial action over salaries would Mrs. James as â€Å"part of the teachers’ organization† get involved or benefit from salary increases? There was no formal contract between the two but the school does provide the classroom (capital asset) and pay her via cheque signed by the governing body. To some degree they can terminate her services but not necessarily through disciplinary procedures as would be the case with their employees. If the school can no longer provide or choose to offer their facilities to someone else, surely the contract involved between Mrs. James and the school, would be more a tenant/landlord agreement rather than an employer/employee agreement. Who profits from the provision of these services? The fees paid by the parents are wholly received by Mrs. James which makes it seem as though she’s the only one profiting from the services rendered but arguably the school indirectly benefits from this arrangement. For instance parents of prospective school children may consider the provision of after care facilities as an added bonus when trying to decide which school their little one should attend. Furthermore Mrs. James has the added benefit of receiving her collated fees on time with no risk of theft etc. in a convenient manner at no extra charge to her. Teachers employed by the school earning a salary in exchange for the services carried out at the business of their employer are entitled to certain benefits. If the school was her employer then Mrs. James would’ve had to obey reasonable instructions from the school regarding her work but it seems she ran her business independently. The court should thus not rule in her favour as she wasn’t an employee of the school and hence cannot be retrenched. Question 2Word Count: 402 Skills development Act 97 ?Key purpose of the SDA and SDLA: The Skills Development Act (SDA) 97 came into effect in 1998, it is centered at improving the South African workforce by providing skills and opportunities to South African citizens. It aims to improve the quality of a workers life and grant opportunities and flexibility of employment as well as increased competition in the workplace as workers become more productive and efficient in their work. Entrepreneurship or self employment is encouraged through this act. The workplace becomes an institution of active learning as employees are encouraged to study or continue to train further and acquire new skills. Issues such as high unemployment or unskilled labour force can be addressed as employers are encouraged to employ unskilled workers for instance graduates or scholars with no working experience. Job prospects of historically disadvantaged individuals are improved through training initiatives. Provision and regulation of employment services Improved return on investment in the labour market due to increase in the levels of investment in training and education. In order to facilitate and finance SDA, the skills development levy Act (SDLA) was created. It is a levy imposed on employers to ensure funds are generated towards financing skills development. ?Key provisions of the SDA that apply to our company: The National Skills authority ; National skills fund; labour centres ; SETA’s; Skills Development Planning unit and of course the Skills Development levy grant scheme where established to provide for SDA. SETA’s or Sector Education and Training Authorities through which learnerships are provided mean that we as an employer must-: 1. Employ a learner for a period specified in an the agreement 2. Provide the learner with specified practical work experience 3. Afford the learner time to attend the education and training specified in the agreement ? Key procedures to be followed or set up to ensure compliance with SDA and SDLA : We have to apply to the commissioner of the South African Revenue Services to be registered to pay SDLA. The company also has to register with a relevant SETA. Payment of the levy must be made no later than seven (7) days after the end of each month. Every employer is subject to pay a skills development levy which is collected by SARS. This levy must be paid at a rate of 1% of an employee’s total remuneration excluding pension or retirement allowances. Question 3Word count: 468 a) All South African employees working more than 24 hours a month and who are not receiving a monthly pension, nor employed under the skills and development act are entitled to a statutory benefit called UIF which stands for Unemployment Insurance Fund. In the event that you fall ill, pregnant or are dismissed from work and even if your contract of employment should expire and you are involuntarily out of work, you will then be able to claim benefits against UIF and will be paid out a certain amount over a certain period of time by the labour department. Officers and some specified employees of national and provincial spheres of government may not claim UIF so too are foreigners entering the country for specified learnerships or contracts of service and employees earning commission only. Since you are of legal employment age and earn below the annual level determined by the minister of labour, you may apply for UIF should you involuntarily be unemployed subject to you having employment but not necessarily making contributions towards UIF for at least 13 weeks during the year before having to claim UIF. The company will deduct contributions from your salary every month and pay both our contribution as well as yours towards UIF fund. We will both be subject to paying an equal amount of 1% of your earnings towards the fund. In your current position as trainee data capturer you will be earning R7500 which is below the current income ceiling of R8099 per month. In the event that you claim for UIF you will then be entitled to a percentage of R7500 multiplied by 12 months divided by 365 days as a benefit paid out to you. Once a year the company pays out a bonus (guaranteed 13th cheque) to which a contribution for UIF will also be deducted however as your service with us progresses and you are possibly promoted into another role which may have the added benefit of a performance bonus, please note this will not be subject to UIF contributions. We will also make no UIF deductions on overtime paid to you or any other special allowances that don’t form part of the contract of employment you’ve just signed. As a contributor to the fund, you may one day claim for illness; maternity/adoption benefits and of course in the event that you are for instance retrenched, dismissed or your contract is terminated and you are left unemployed, you may also claim for this. In the event that you should pass away, your dependants may also claim from the fund provided they do so six months of your death however under special circumstance the commissioner may accept applications older than six months.

Tuesday, October 22, 2019

7 Types of Misspellings

7 Types of Misspellings 7 Types of Misspellings 7 Types of Misspellings By Mark Nichol Most misspellings can be categorized in one of seven groups. Here are some examples for each of those types. 1. Incorrectly Repeated Consonants In some words, consonants are awarded extraneous twins, such as a doubling of the first t in commitment or of the r in harass (the latter perhaps from confusion with embarrass, in which r is doubled. Other common erroneous doublings including the n in inoculate (perhaps because of innovation and other words in which n is doubled), the s in occasion (many words, like expression, do have a double s), and the c in recommend. Note that in many of these words, there’s already a twin double consonant, which may also confuse writers. (One word that does have two twin consonant pairs, accommodate, is often misspelled with only one m.) 2. Wrong Vowel Using an incorrect vowel is a common problem, leading to such misspellings as definately (or the bizarre variant definatly), dependant, privelege, rediculous (a heretofore virtually unknown mistake, prompted by emphatic pronunciation of the first syllable, that has gone viral as more people are exposed to it online), and seperate. The correct spellings are definitely, dependent, privilege, ridiculous, and separate. 3. Wrong Consonant This type of error is less common than those of the vowel variety, but two of the most commonly misspelled words in this category are consensus (in which the first s is replaced with a c) and supersede (in which the second s is replaced with a c). 4. Reversed Order of Double Vowels Many words with two consecutive vowels, especially those with a pairing of e and i, look odd no matter which order the vowels appear in, so for many writers, it’s a toss-up as to which is correct. These words are all spelled correctly: gauge, niece, pharaoh, receive, weird. 5. Extra Letters One word that is often given an extra vowel is mischievous, perhaps because it is often mispronounced as if it were spelled mischievious. Some words ending in -ly, such as publicly, are often erroneously given an -ally ending. Judgment and acknowledgment, spelled in British English (and, well into the twentieth century in the United States) with an e after the g, omit the e in American English. 6. Missing Letters Coolly and woolly are often misspelled with only one l. Incidentally and other words with the -ally ending, in a reversal of the problem commonly seen with misspelling of publicly and the like, are frequently mistakenly spelled with -ly endings. Liaison often lacks its second i, prerogative is sometimes seen without the first r, and rhythm may lack the first h. 7. Confusion with a Similar Word The most common type of misspelling, perhaps, is that in which the wrong word in a homophonic duo or trio is employed, such as forward in place of foreword or site (or, rarely, sight) instead of cite. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Spelling category, check our popular posts, or choose a related post below:Grammar Test 1One Sheep, Two Sheep, One Fish, Two Fish . . .Honorary vs. Honourary

Monday, October 21, 2019

Political Analysis essays

Political Analysis essays It would seem obvious to most that large tobacco growing states like South Carolina would be the main voters against stricter legislation. In actuality large tobacco companies like Philip Morris are some of the largest donators to the politicians in the non tobacco states. As said in this article, "As long as Washington lawmakers are hooked on donations from Big Tobacco, the industry has enough friends to ward off strong federal oversight." This statement is very true. For years now many bills and acts have been presented to congress such as the Healthy Kids' Act which would allow the Food and Drug Administration to regulate tobacco, create a major anti-smoking ad campaign, provide no immunity for lawsuits against tobacco firms, and curb youth smoking. These bills typically get voted against by politicians that have taken or need the donations and support of the tobacco industry. For example, Rep. Vic Fazio, D-Calif., who received $62,500 since 1991 the ninth highest amount in c ontributions from tobacco companies among House members and the highest among lawmakers from states that don't grow tobacco voted against the Healthy Kid's Act aswell as two tobacco bills introduced last year, one to increase Food and Drug Administration funding and another to prohibit government funds from being used to pay for tobacco crop insurance. The consumer advocacy group Public Citizen conducted a survey in 1999 that found that members who voted in favor of tobacco legislation received considerably more money than those who didn't. Senators voting in favor of tobacco industry positions received as much as 15 times more money from tobacco company contributions in 1997 than their counterparts who didn't. House members received nine times more money. What politicians might be avoiding passing in Washington, local governments are passing in their small and large counties. One thousand five hundred and fifteen counties in the nation have banned smo...

Sunday, October 20, 2019

8 Classic Storm Poems

8 Classic Storm Poems Poets love stormy weather. The powers of the natural world revealed in a tempest can be shocking, terrifying and destructive, but they are also awe-inspiring, exhilarating, and metaphorically rich- a perfect source of poetic inspiration. Here we’ve selected a few classic poems describing or inspired by storms. Attune yourself to the natural havoc outdoors by reading them while you’re safely sheltering inside from a storm, perhaps, or declaim them to the sky outside after the storm has passed. William Shakespeare, Storm speech on the heath from King Lear (1623)William Cullen Bryant, â€Å"The Hurricane† (1854)Walt Whitman, â€Å"Proud Music of the Storm† (from Leaves of Grass, 1900 edition)Algernon Charles Swinburne, â€Å"A Channel Passage† (1904)Amy Lowell, â€Å"Storm-Racked† (1914)Robert Frost, â€Å"A Line-Storm Song† (1915)Siegfried Sassoon, â€Å"Storm and Sunlight† (1918)Jean Toomer, â€Å"Storm Ending† (1922)

Saturday, October 19, 2019

Write a para and explain what makes an advertisement effective Essay

Write a para and explain what makes an advertisement effective - Essay Example The advert should not be complicated. The target audience usually relate to adverts that are memorable and very easy to recall. The advert should then provide information succinctly and quickly (Krugman, 2013). This ensure the attention of the audience is not distorted. Moreover, the advert should not contain information that creates suspense or requires inquiries on additional information (Krugman, 2013). This may confuse the viewer thus limited effectiveness. An advert should then be able to call the viewer to action. The advert should be able to convince the viewer that they need to access the goods or services being advertised. For print adverts, four elements are required. The images used should be provocative and attractive to the viewer. The headline accompanying the images should be strong and easy to comprehend. A maximum of two paragraphs that are well written and printed are required. Lastly, the advert should consist of a logo and contact information (Krugman, 2013). From the information presented, it is accurate to assert that the most significant factor in making an advertisement effective is its ability to attract and appeal to the

Friday, October 18, 2019

INTB3000 Essay Example | Topics and Well Written Essays - 500 words - 1

INTB3000 - Essay Example This causes prices to fluctuate. Exports raise money for the exporting country but the amount of money the government makes is low. There are also environmental and cultural issues that cause negativity. Pollution and a loss of cultural identity impose a threat to many developing countries. However, my very biased view was quite challenged when I read about Koffi Annan’s UN program for the 21st century. I was enlightened by the fact that globalization can be used as a tool in alleviating poverty in a poor country. The power of technology can be harnessed to improve agriculture and like the Anglo American corporation, many firms can be socially responsible to employees who are not exactly their fellow citizens. In fact, globalization can make MNE’s help a state or government to provide services indirectly to constituents. A2. As of now, Colorado is also experiencing recession. Many firms have closed due to bankruptcy. Nevertheless, there are still measures that can be done to make globalization work for the said State. Below are my suggestions for the governor. However an in-depth study is required behind each suggestion. A. Economic – Focus on industries that can compete globally. These industries must be innovative, dynamic and must be able to provide good manpower to other companies that need outsourcing. Industry trends must be analyzed carefully so that academe can prepare or train anticipated workforce of the future. ( long-term priority) D. Education – There should be a close collaboration between the industry and the schools. Colorado must be able to match the graduates with the upcoming industry brought about by global companies that may invest in the State. ( long-tem priority) A3 . Indeed, the United States has begun to keep a low-profile in international events. However, it doesn’t mean that it is carrying a big stick. It is just being

Macroeconomics Problem Set Speech or Presentation

Macroeconomics Problem Set - Speech or Presentation Example From (b), it is evident that that velocity of money is equal to the nominal interest rate. Velocity will, therefore, grow if interest rate also grows. Hence, if interest rate is a constant velocity is also constant. Velocity will, therefore, grow if interest rate also grows. Money neutrality means that money supply does not affect real variables but only affects the nominal variables. An increase in the money supply will hence have an effect on all prices but not on the real GDP or real prices. Structural unemployment results from structural changes in the economy that makes employees obsolete. It is a lack of the required type of workers; there is a difference between the skills employers are looking for and the available employee’s skills. 3. Researchers at Purdue have collected data on the number of undergraduate Purdue students either involved in a relationship or uninvolved. Among involved students, 10% experience a breakup of their relationship each month. Among uninvolved students, 5% enter into a relationship every month. Illustrate the flow of students between the two states (involved and uninvolved) using a diagram. What is the steady-state fraction of residents who are

Group Essay Example | Topics and Well Written Essays - 1000 words

Group - Essay Example (Group Dynamics, n.d.) Informal groups on the other hand are formed on their own. They do not have a time frame and are generally not formed by the organizations. Anybody can become a part of the informal group. Friendship groups, reference groups and interest groups are all informal groups. Even though the informal groups are not formed to achieve organizational goals they can have a strong positive or negative influence on the working of an organization. For example, they can either talk about how to develop a production method or how to create shortcuts that would eventually endanger quality. (Group Dynamics, n.d.) It has been observed that groups are most productive when an assignment entails the requirement of multiple skills, experiences and decision making abilities. They are able to assemble quickly, take decisions and if the need arises then they can disperse and move on to another task. Compared to individuals, groups have a lot of enthusiasm to complete the job. Groups are responsible for completing most of the work in an organization. Thus it would not be incorrect to say that the success of an organization depends largely on the effectiveness of its groups. (Group Dynamics, n.d.) Answer (02): Various factors are responsible for a team to be effective. A team can be effective only if the socialization of all the members of the team are at par with each other. Socialization is nothing but a process of learning. It is regardless of the surroundings or age of the individual. In every group the members of the group have to learn the rules, regulations and expectations of that group for the group to be effective. (Socialization, 2006) In order to understand all the factors responsible for the team to be effective one has to understand the group dynamics. Group dynamics not only tries to understand why the group is formed but also how it is formed. Bruce Tuckman in the 1960's provided a framework to study the reasons of group formation. According to Tuckman, when a group is initially formed it is not very effective. The group has to undergo various stages of development before it becomes productive and efficient. Most of the groups go through similar developmental stages with comparable conflicts and resolutions. (Group Dynamics, n.d.) According to Tuckman's theory there are five stages of group development. The five stages are forming, storming, norming, performing, and adjourning. It is during these stages that the members of the group have to deal with several issues or problems and depending upon how these are dealt with determines whether or not the group will be successful in attaining its goals. Question (03): Review the main findings on the nature of behavior in groups. Answer (03): Group work helps to explore and express varied ideas and suggestions of the group members in a cooperative way. Working in groups involves mutual support. A group can be successful only if all the members believe in the culture of shared commitment. Group work is not about competing with the peers. It involves using the range of resources available in the group to deepen their understanding and extending their knowledge to their collective advantage. (Working in groups,n.d.) Good team behavior requires development and supervising. It is imperative

Thursday, October 17, 2019

Harry Potter Essay Example | Topics and Well Written Essays - 4250 words

Harry Potter - Essay Example The present concept of psychology states that nature and nurture combine to influence our actions, thoughts, and feelings (p.316). In other words, if someone has the blood or the genes for such a personality to develop, he must be brought up or nurtured for that kind of personality, so there can be a combination of nature and nurture for the personality to effectively come out. According to the book, Harry Potter has roots in the Wizarding world that is composed of wizards and witches, both good and evil. This world also thinks that Harry will be a wizard someday. Or, to put it clearly, because of this blood that he inherited from his parents and from generations before, he is already a wizard (nature). But when the time comes, or when he's ripe of age, he has to be trained how to handle the traits to be a wizard (nurture), just like an ordinary human being, where one has to be trained and nurtured into what he or she wants to be. He has to be accustomed to the different techniques in the art of wizardry, learn magic and brew potions, etc. There have been mixed reviews on the Harry Potter fantasy series with respect to the main character of the boy Harry who has grown to be a young lad with a great following. He is a victim of circumstances, but in this situation he becomes a part of a whole plot to destroy evil. He inherited from his parents power - in the form of magic and wizardry - and prestige. How he is built up and how he uses this, are the subject for this paper. Introduction What forces cause Harry Potter to change as he passes through life What factors determine whether he grows up to be a wizard: nature or nurture The personality of Harry is clear in the minds of his millions of fans. But to a few skeptics and reviewers, Harry's personality is quite hidden and questionable. Harry Potter may be hiding behind a closet, as what is shown in the early part of the story - he was kept by his uncle in a closet under the stairs. Could this be the thing the author JK Rowling have in mind regarding the boy's sexuality Is Harry Potter a hero or heroine A sexual deviant or a bisexual Or is he just a normal boy who fought through the hard times and here becomes a hero seeking revenge against the evil that killed his parents These things have to be asked in the light of how Harry is being brought up in such a difficult and sacrificing environment. The situations that Harry is in are not ordinary situations. Day in and day out, he is in constant danger. The family that pretends to be a family is not supportive, and continues to push him to the limit. This essay will give an analysis on the many aspects surrounding the Harry Potter character, on how he became to be who he is in the story. Since this is a fictional character, we'll try to picture him as real or living - and not imaginary - as what the millions of Harry Potter fans regard of him. "The Harry Potter books are one of the only things I have not grown out of because they have grown with me, they have seen me through my different stages, my ups and downs and it is with a heavy heart that I am now forced to leave them behind," says Mimi Newman, 17, an avid Harry Potter fan (Telegraph.co.uk). Since he is supposed to be real in this essay, we'll try to delve on the

Wednesday, October 16, 2019

Quality Management in Business Assignment Example | Topics and Well Written Essays - 3250 words

Quality Management in Business - Assignment Example What is most important is the way in which a business puts arisen issues to bed such that there will not be a repetition of the same issues. The first part of this paper seeks to identify as well as apply strategies to come up with appropriate solutions. Continuously, well performing companies have come up with ways to be much better in their business. Some companies do believe that waste, scrap as well as defects are a mere cost of running a business. To some extent, they are right because this is a cost. However, this cost can and should be avoided give the reason that it is the cost of poor quality. It adds up once and repeatedly in the form of different currencies; Euros, dollars, pounds, and affects the ability of a company to remain profitable as well as the ability to remain in business. It is always advisable to remember that lack of cash happens to be what kills businesses most eventually. Problem solving art is referred as jidoka by the Japanese. The term simply means plain and simply a method that sports a problem as it arises in business, stopping it as well as analyzing the problem and finally spending time in resolving it such that it will not come up again. The thing involves a continuous culture improvement, which ta kes a great leadership and time. Failure to use effective strategies for solving problems for identification, containing as well as elimination of root causes of the problems has a detrimental and massive impact on business stability and performance. It seriously jeopardizes the competitiveness of the business and its existence as well. Errors are usually made in businesses; issues arise. Too many problems may exist, so how does one know the issue to deal with within the many? The best strategy must be put in place to help in diagnosing and eliminating the causes within the myriad of these issues. To start with, one needs to look for the issue carrying the biggest impact. The method

Harry Potter Essay Example | Topics and Well Written Essays - 4250 words

Harry Potter - Essay Example The present concept of psychology states that nature and nurture combine to influence our actions, thoughts, and feelings (p.316). In other words, if someone has the blood or the genes for such a personality to develop, he must be brought up or nurtured for that kind of personality, so there can be a combination of nature and nurture for the personality to effectively come out. According to the book, Harry Potter has roots in the Wizarding world that is composed of wizards and witches, both good and evil. This world also thinks that Harry will be a wizard someday. Or, to put it clearly, because of this blood that he inherited from his parents and from generations before, he is already a wizard (nature). But when the time comes, or when he's ripe of age, he has to be trained how to handle the traits to be a wizard (nurture), just like an ordinary human being, where one has to be trained and nurtured into what he or she wants to be. He has to be accustomed to the different techniques in the art of wizardry, learn magic and brew potions, etc. There have been mixed reviews on the Harry Potter fantasy series with respect to the main character of the boy Harry who has grown to be a young lad with a great following. He is a victim of circumstances, but in this situation he becomes a part of a whole plot to destroy evil. He inherited from his parents power - in the form of magic and wizardry - and prestige. How he is built up and how he uses this, are the subject for this paper. Introduction What forces cause Harry Potter to change as he passes through life What factors determine whether he grows up to be a wizard: nature or nurture The personality of Harry is clear in the minds of his millions of fans. But to a few skeptics and reviewers, Harry's personality is quite hidden and questionable. Harry Potter may be hiding behind a closet, as what is shown in the early part of the story - he was kept by his uncle in a closet under the stairs. Could this be the thing the author JK Rowling have in mind regarding the boy's sexuality Is Harry Potter a hero or heroine A sexual deviant or a bisexual Or is he just a normal boy who fought through the hard times and here becomes a hero seeking revenge against the evil that killed his parents These things have to be asked in the light of how Harry is being brought up in such a difficult and sacrificing environment. The situations that Harry is in are not ordinary situations. Day in and day out, he is in constant danger. The family that pretends to be a family is not supportive, and continues to push him to the limit. This essay will give an analysis on the many aspects surrounding the Harry Potter character, on how he became to be who he is in the story. Since this is a fictional character, we'll try to picture him as real or living - and not imaginary - as what the millions of Harry Potter fans regard of him. "The Harry Potter books are one of the only things I have not grown out of because they have grown with me, they have seen me through my different stages, my ups and downs and it is with a heavy heart that I am now forced to leave them behind," says Mimi Newman, 17, an avid Harry Potter fan (Telegraph.co.uk). Since he is supposed to be real in this essay, we'll try to delve on the

Tuesday, October 15, 2019

Mergers And Joint Ventures Essay Example for Free

Mergers And Joint Ventures Essay A company does not plan on merging with another company and although some mergers are voluntary other mergers are not. When a company is struggling, having financial difficulties and has used up all of its resources sometime it is in the best interest to merge. It is important for companies to understand the different mergers and to pick the best solution. Below team D will discuss the differences between a horizontal, vertical, and conglomerate merger and how those mergers differ from joint ventures. Horizontal Mergers Horizontal mergers are the combining of two or more companies in the same industry that are competitors. An example would be Sirius Satellite and XM radio. The benefit of this merger is a decrease in competition for all the companies involved. The disadvantages of this merger is that a horizontal merger is considered hostile due to a larger company â€Å"taking over† the smaller company and it feeling more like an acquisition than a merger (wiseGEEK, 2014). Another drawback is the companies not requiring to disclose or share all trade secrets resulting in jealousy and/or resentment. Vertical Mergers Vertical mergers are more common and the companies involved in this merger do not compete directly in the same market. A vertical merger is a combination of two companies that produce different products or services and come together to produce one specific product. One of the merging companies would be the buyer of products and the other company would be the supplier (Colander, 2013). An advantage of this merger is lower costs due to the  company not having to pay for the materials from the supplier. A disadvantage of this merger is forcing suppliers out of business and anti-trust issues. Conglomerate Merger Unlike horizontal and vertical mergers, a conglomerate merger is less personal and merges two companies in different markets that are unrelated to each other to grow financially and to increase their market share. An advantage of this merger is the advantage to reach a bigger audience. When two companies merge together they have access to the other companies’ market base. The size of the companies can be an advantage or disadvantage. The size can be a disadvantage because of structure changes, i.e. an increase of employees as well as core values being lost due to the merge. Joint Venture Joint venture occurs when commercial enterprise is undertaken jointly by two or more parties and at the same time still maintaining their individual identities. Joint ventures seem a bit more beneficial when compared to mergers. One pro of joint venture is that the companies continue to exist as their own, whereas with mergers the two firms are one and no longer independent (Chron, 2014). An example of a joint venture is a cable and a phone company coming together offering both of their services like a bundle that offers special discounts. Conclusion The three different types of merges team d learned about are horizontal, vertical and conglomerate. We also learned the difference of the three and the advantages and disadvantages of the different mergers and how joint ventures differ from mergers. It is important for firms to knowledgeable about mergers and joint ventures so that they may make the best decisions for their firm. References Chron. (2014) Retrieved from http://smallbusiness.chron.com/difference-between-mergers-joint-ventures-18578.html Colander, D. C. (2013). Microeconomics (9th Ed.). New York, NY:

Monday, October 14, 2019

Mobile commerce | An introduction

Mobile commerce | An introduction CHAPTER 1: INTRODUCTION Mobile Commerce (m-commerce) can be widely defined as â€Å"any transaction, involving the transfer of ownership or rights to use goods and services, which is initiated and/or completed by using mobile access to computer-mediated networks with the help of an electronic device†. (R. Tiwari, and S. Buse. 2007)Business-to-consumer (B2C) mobile commerce (m-commerce) refers to consumers sharing information and purchasing products and services from sellers with their mobile devices (Balasubramanian et al. 2002). With the continuous development of telecommunication technology, mobile services ranges from email receiving and sending, shopping for goods and services, playing online interactive games, trading stocks and shares, reserve tickets, conduct banking and monetary transactions and even link to social networking sites to connect with friends.Mobile commerce constitutes payment for such goods, services and information. Users access a website or wireless access protocol (WAP) by entering the web address (URL) of the particular products required via the mobile phone browser. Text messaging (SMS) is another way users can ‘communicate with third party service provider. Depending on the tangibility of the product, the delivery of the product can be in the form of physical collection or downloaded digitally into the mobile devices. 1.1 Evolution of Mobile Commerce Finland is the ‘birthplace of Mobile Commerce. In 1997, the first SMS-activated Coca Cola vending machines was installed in Helsinki. Same year, mobile-based finance and banking service were also launched. Finland is also the place where the first sales of digital content, ring tones were downloaded to mobile phones, were made. In 1999, Philippines and Japan commenced a national commercial platform for mobile commerce, known as SMART and i-Mode respectively. Subsequently, mobile commerce associated services begun to sprout rapidly in other markets, from mobile parking in Norway, to sales of train tickets via mobile phones in Austria to the purchase of airline tickets in Japan. From 2002, public transportation commuters in Helsinki are able to purchase tram and undergrounds train tickets via mobile phones. The cost of the tickets is the same as those bought from a machine but without the queue. In Colorado, it is one of the first few places whereby one can order movie tickets and pay via mobile phone. A dedicated counter is arranged for the pick-up. Mobile vouchers or coupons are visible in many countries from Finland, Spain, Germany, and United States to Japan. The promotional items offered on discounts ranges from laptops to McDonalds. Ring tone and wallpaper downloading have been one of the first widely used mobile commerce services. Some mobile services providers offer mobile news services, such as headlines, sports, weather, sports to mobile subscriber, sometimes free when sponsored by mobile advertiser or at a monthly subscription cost to the user. Small-scaled mobile commerce doesexist in most markets, from SMS voting in reality shows like ‘American Idol to participate in promotion lucky draws to downloading mobile ringtones. External environmental factors do play a part in promoting the mobile commerce growth. Worldwide expansion of digitalisation and automation of sales proceduresin the e-business and e-commerce on the Internet allow easier transference to the mobile commerce environment. 1.2 Technology Mobile commerce is actualised by a series of interlinked technologies such as networking, embedded systems, databases and security. (Siau et al, 2003). Mobile devices, wireless systems and softwares enable a faster transmission of data, along with reliability and security. Global System for Mobile Communication (GSM) is the second generation (2G) after the analogue cellular era. It is the basic circuit-switched system whereby users need to dial in to maintain connection. The 2.5G technologies consist of the General Packet Radio Service (GPRS) and Enhanced Data GSM Environment where they make used of existing infrastructure but faster in terms of sending speed. This generation of mobile technology is meant for transference of multimedia and broadband applications. The third generation (3G) uses the Universal Mobile Telecommunication System (UMTS), which strives to provide higher bandwidth, faster transmission of voice, text, video, and multimedia for data-concentrated applications. UMTS allows users to be constantly connected to the Internet and its services worldwide, regardless of the devices (mobile or computers) used. As such, the mobile device can be integrated with functions of other equipment such as television, newspaper, organiser, computer and even credit card. In order to access web information to the mobile devices, the Wireless Application Protocol (WAP) was designed. As an open and global standardisation for mobile applications, WAP aimed to connect and communicate mobile devices with other devices over wireless network on an interactive and real-time interface. Global Positioning System (GPS) uses a satellites system orbiting around the earth and is particularly useful location technology. It is essential to location based mobile commerce based applications, as it offers relevant information dependent on location. 1.3 Role of channel provider The roles of the 3G operators are more obvious than the voice-centric 2G. In fact, how these operators facilitate their roles will determine the adoption of mobile commerce. The carrier or Internet Service Provider (ISP) is the entity that delivers the data to and from the user. The initial stage of 3G-standardisation process started with dual layer model, the pure carrier and service and/or connection provider. It is viewed that this model will continue with carriers bring the main subscription provider. The gateway or portal is the entity centred to the services range. It is still unclear whether carrier will control it wholly. Regardless, it is definite that the number of content provider will increase. The role of banks in mobile commerce is considered critical since ease of payment is one of the determinant factors in adoption of mobile commerce. Certification authority is the entity that guarantees the transactions between the origin and destination. In addition to the above mentioned infrastructure requirements, a smartcard called UMTS Subscriber Identity Card (USIM) is compulsory in every device n order to make phone calls. The basic functions for USIM are security via shared secret key, personal information manager, and SIM toolkit applications. USIM is also a platform for applications or features such as public key security content copyright control, specification and cookies, data or application cache, authentication of users and plastic roaming. 1.4 Development of Mobile Commerce The extensive availability of Internet-accessible mobile phones is slowly creating a community of mobile commerce users. It is expected that this community might exceed the PC community. (Ahonen, 2002) With technology such as WAP or 3G, it is believed that electronic commerce information and/or interactive content will be adapted to the mobile commerce environment. While the majority of mobile commerce opportunities and purchases are business-to-consumer (B2C), the possibility of business-to-business (B2B) still stands. It is predicted that business users and their requirements will be fulfilled by the 3G services. A report by Accenture in 2001 â€Å"Future of Wireless†, has suggested that most business activities are easily accommodated for mobile commerce. With the rapid spread of mobile commerce, mobile phone manufacturers such as Nokia, Sony Ericsson, Samsung, Motorola and LG had began to develop WAP-enabled smart phones to exploit on the market potential. Interestingly, it was the introduction of Apples iPhone mobile commerce based systems like FanGo that the platform started to move into actual applications instead of SMS systems. The key advantage of mobile commerce services is the mobility of conveniences. Mobile commerce allows users the ability to execute transactions regardless of the location and time. With such uniqueness, mobile commerce has experienced relatively greater success in markets like Japan in regards to individual adoption rate. In comparison, this novelty technology has yet to achieve widespread popularity in other markets like the USA, Australia and Singapore. Mobile commerce actualise the possibility of accessing information at anywhere and anytime. It provides users the chance to access the Internet regardless of location (subject to the network coverage of mobile internet operators), the ability to identify a single mobile devices location (Global Positioning System) and to retrieve and/or update information whenever needed. The features of mobile commerce can be categorised into the following: Ubiquity. The most distinct advantage of mobile commerce is its ubiquity. With internet-enabled mobile devices, users can obtain any information required. Also, the emerging mobile commerce applications allow users to engage in activities such as instant messaging, linking to social networking websites, conducting financial transactions or looking up for weather news. Dissemination: The wireless infrastructure that support instantaneous delivery of data to mobile devices allows an efficient distribution of information to a population. Personalisation. With the massive amount of information available on the Internet, it is important that the content users receive is relevant. Mobile commerce companies can create applications that allow customizable information and services applicable to users. Localisation. Another significant feature will be the ability to identify users physical location with prompted the creation of location-based applications. The Sekai Camera created by Tonchidot is one example of how far such applications can go. (Figure) Source: http://popupcity.net/2009/01/tag-the-world-share-spaces/ CHAPTER 2: BACKGROUND 2.1 Mobile Commerce in Singapore Mobile commerce innovations were also introduced. June 2001, Coca-Cola partnered with SingTel on a Dial-a-Drink scheme to enable consumers to buy drinks from the vending machines via SMS, cost of the drinks will be credited to their phone bills. M1 has a similar development with Yeo Hiap Seng too. The largest taxi fleet company, ComfortDelgro, started a free SMS taxi booking service. This service, aimed to better match demand and supply, offers commuters an alternative channel to book a taxi apart from the â€Å"call-a-cab† scheme. Another interested application of mobile commerce will be the audience polling. When television station and/or web-based TV reality contests was newly introduced into the local media scene, audience support through SMS voting was a common trend. Although the hype is fading, SMS voting is still an alternative for media contests on top of online voting. It is evident in the Singapore Blog Awards 2009 where Rednano Mobile, the mobile platform of rednano.sg, powers SMS voting. Increasingly, real-time SMS service like messageLIVE provided by SingTel are used at events where audience can participate in lucky draws, comment, etc via SMS and it will be instantaneously reflected on screen. SMS transaction has been seen in local television charity shows such as the President Star Charity Show. It is observed that mobile payment method plays an important part to the success of mobile commerce. There had been several mobile payment initiatives launched in Singapore. Local banks have started rolling out mobile banking services way back in 2001. TELEMONEY by [emailprotected] Pte Ltd has also implemented mobile payment systems for retail and parking charges at Suntec City. NETS, too, phase in YW8 whereby moviegoers can reserve and purchase Eng Wah cinema tickets. However, the demand for these services was so low that some services ceased to exist. One of the main reasons for the unpopularity then was the complex usage procedure for mobile payments. Users first have to register and remember a sixteen-digit personal identification number. After which, users will be required to either send Short Message Service (SMS) or dial a specific number to confirm any purchase. Such inconveniences make mobile payment schemes difficult to gain prevalence. Nonetheless, there have been ongoing efforts to improve the telecommunication technology such as Near Field Communications (NFC) and mobile scan technology to facilitate mobile commerce. NFC allows users to make payment by tapping their mobile devices against a reader. Mobile scan technology involves the using of camera in mobile phone as barcode reader. Mobile barcodes are commonly used for information or service request or content from a website. It can be promotion details, discount voucher or code via SMS or MMS, or ring tone, MP3, or game download or activation, or click to buy human agent, or purchase concert or travel ticket. The set up costs is usually the responsibility of the products company while partnering with a mobile payment service provider. While Mobile commerce now remains at infant stage, there are a myriad of companies looking into SMS-based applications and WAP. The InfoComm development Authority of Singapore (IDA) has on-going research to identify the current local mobile commerce industry status and thereafter implemented several initiatives to encourage and support companies on mobile applications and/or platform development. At the official opening of imbX 2009, it was announced by Minster Lui Tuck Yew that the government intend to allocate $1.73 billion for new infocomm projects. Part of these projects will include the deployment of contactless point-of-sale terminals via NFC to promote electronic payment adoption and developing of applications on mobile commerce platform, location-based services and novel original mobile services. It is observed that service provider in the mobile commerce value chain, such as the wireless application providers, mobile operators, and other players, have been swift to introduce applications to the mass-market. However, the rate of adoption has been somewhat pale. 2.2 Statistics As of June 2009, Singapore has a mobile penetration rate of 130.6%. It is very common to for consumers to own more than one mobile device each. The mobile penetration rate has been on a steadily increase since 1997. 2009 also indicate an uprising trend lest for the stark drop of 3.2% in June 2009. While the mobile subscriptions averaged around 64000, the number of 3G subscriptions has increased over the past six months. Despite the positive increment, the market share of mobile commerce has yet to pick up similar pattern. Singapore pales comparison to Japan wheremobile commerce is a huge success, attributing more than $400 million in revenues yearly. NTT DoCoMos popular i-mode service allows users to buy soft drinks from vending machine, pay for food at fast food restaurants, and shop at online shops like Amazon.com, and buy most of goods via DoCoMos billing system. Companies like Visa also offer m-commerce services in Japan. Chart 2.1: Mobile Penetration Rate of Singapore, Q1-Q2 2009 Source: Statistics on Telecom Services for 2009 (Jan Jun), IDA Singapore. http://www.ida.gov.sg/Publications/20090304182010.aspx Chart 2.2: Singapore Mobile Market Source: Statistics on Telecom Services for 2009 (Jan Jun), IDA Singapore. http://www.ida.gov.sg/Publications/20090304182010.aspx Chart 2.3: Mobile Penetration Rate of Singapore, Annual, 1997-2008 Source: Statistics on Telecom Services for 2009 (Jan Jun), IDA Singapore. http://www.ida.gov.sg/Publications/20090304182010.aspx CHAPTER 3: LITERATURE REVIEW 3.1 Mobile Commerce Process Mobile commerce consists of users participation in transactions via mobile terminals. From a users point of view, retrieving and sending information and purchasing products are regarded as the basic steps to mobile commerce. Most mobile commerce studies focused mainly on the purchasing stage but customers are involved in receiving and transferring information at the pre-purchase stage. Receiving information consists of conveying of information from seller to users mobile device. As it is important for customers to know about the products, make comparison between products and then make buying decision. Transferring information represent the directing of information from user to sellers. The information can be used to describe product and services requirements, registering, providing feedback and offering payment and/or delivery details. Purchasing is the act of buying products and services via mobile devices in return of monetary returns. The act of placing orders can be done through Wireless Application Protocol (WAP) properties of mobile device. It does not include making order by calling the seller from mobile phone. 3.2 Mobile Commerce Adoption Activators and Inhibitors There are a significant number of studies carried out to identify and predict the upcoming activators and inhibitors of mass-market mobile commerce adoption. As seen in the review here, different authors have highlighted different factors as key activators/inhibitors to the adoption of mobile commerce. Gillick and Vanderhoof (2000) suggest five broad-natured inhibitors, namely the technology, standardization of industry, the business case, expectations of consumers, security and reliability. The last factor is one of the most commonly quoted. Most authors have quoted the lack of security and privacy could be the main obstacle to the growth of mobile commerce. E-Mori conducted a multi-market study for Nokia Networks and it was found that the lack of perceived need (Signorini, 2001), conservatism, and perceptions relating to the reliability and security of the technology are the main hurdles to adoption of mobile commerce; while convenience and control are found to be the key determina nts of demand. Buellingen and Woerter (2002) emphasize four vital success factors for the use of mobile services transmission rate, personalisation, data security, and user friendliness. Based on a survey by Strong and Old (2000) propose that ease of having ubiquitous Internet access will be the most essential for customers to engage in mobile Internet applications. The authors noticed substantial obstacles to rapid adoption to mobile Internet in the future are lack of awareness in content and application, high operating costs and the unfavourable comparison towards mobile Internet in terms of small screen size, awkward input, poor search functions, unstable or expensive connections, etc. On the other hand, many studies disputed on the fact that mobile commerce may encounter considerable growth with non-Internet adopters because of the lower costs and ease of usage with mobile devices involved. (MÃÆ' ¼ller-Versee, 1999; Vittet- Philippe and Navarro, 2000; Ropers, 2001) Vittet- Philippe and Navarro (2000) and Green (2000) believe that ‘user-friendly is the main point for mobile commerce adoption. As such, the limitations like small screen size, low bandwidth and the basic functions of mobile devices influence the design of mobile commerce applications interface. Likewise, the survey conducted by Carlsson and Walden (2002) noted that slowness in speed of service and small screen size of mobile phones attributed to the hindrance in mobile commerce adoption. On the other hand, Langendoerfer (2002) assumes that technological matters such as technical environment and mobile devices will not be the main reason for the slowness in widespread usage of mobile commerce. Rather, the concerns of users such as privacy and security have a larger influence on the slow take off. Shuster (2001) hypothesize that pricing will definitely have an influence on mobile commerce adoption. â€Å"Improved mobile devices, user-friendly shopping interfaces, effective applications and services, reduced prices, secure transactions, high bandwidth and network coverage† are the list of key success factors for escalating mobile commerce adoption from the online survey by Vrechopoulos et al (2002) It is also highlighted from a consumer survey (Anckar, 2002b) that mobile commerce adoption is driven by â€Å"convenience and flexibility to daily routines rather than excitement and entertainment†. It is also found out that consumers regard the function to fulfill instantaneous and time-sensitive needs as important adoption drivers of mobile commerce. Prior research has somewhat indicated that the main factors influencing the decision to adopt mobile commerce related to the services or device features has gone beyond the traditional function of a mobile phone, i.e. one-to-one voice communication. In line with this theory, consumer will be encouraged towards mobile commerce based on the fact that mobile device in transforming into a personal device, via which various transactions and activities can be carried out. 3.3 Traditional models Several studies have been carried out using conventional adoption theories and models like the Technology Acceptance Model (TAM) and Theory of Planned Behaviour (TBP). However, the main conclusion drawn by many authors was that traditional models are lacking to derive significant deduction on the determinants of individual adoption or rejection of mobile commerce. According to the Theory of Planned Behaviour (Ajzen, 1991), the behaviour prior to any act (behavioural intentions) is established by variables like Attitude, Subjective Norm and Perceived Behavioural Control (PBC). A users attitude linking to using mobile device to obtain, transmit information and purchase is believed to influence the users intention to carry out the three behaviours. Subjective norm is believed to have the same effects on users too. PBC is a factor of intended users behaviour via increasing insight of control, assurance and ease of performing act. Based on the research by Pavlou et al, (2007), the model of m-commerce adoption emphasize largely on â€Å"technology adoption (perceived usefulness and ease of use), technological characteristics (mobile device display features, mobile device portability, and mobile site navigability and download delay), information characteristics (mobile site informativeness, information protection, and personalization), and consumer characteristics (mobile users skills)†. TAM has influence many information system based findings (such as Lee et al., 2002; OCass and Fenech, 2003) pertaining to information technology adoption in set or mobile environment. Although many studies are in favor of TAM as a model to explain the decision of acceptance, it is still uncertain if the model is entirely appropriate with regards to different channels. The decisions to adopt mobile commerce are very different from the decision to adopt technology for carrying reasons. Firstly, users adopt mobile commerce as a new channel of commerce rather than as technology per se. Second, mobile commerce may consist of transactional and non- transactional element. This means that adopters intent to engage in mobile commerce should be viewed holistically. (Pavlou, 2002) As such, we need differentiate between the various levels of mobile commerce adoption as we study consumer adoption decision. Third, Eikebrokk and Sorebo (1998) pointed out that TAM is generally applied to singular target situation, based on the assumption that potential users are only faced with one specific technology. It is therefore argued that to acquire valid forecasts and justifications of technology acceptance with TAM since users are presented with situation whereby they can choose among alternative channels. Fourth, it is argued that TAM itself is imperfect as it does no t considered the influence of social factors in the adoption and usage of new technology or system. This shortcoming has to be taken into consideration when examining the adoption factors. Last, TAM assumes that usage is free and voluntary, that there are no obstacles to prevent user from adopting any technology as long as wanting to do so. This has lead to criticism from several researchers (Mathieson et al, 2001) and prompted some authors to supplement TAM with theories that hypothesize perceived risks as a pre-condition to the mobile commerce adoption. Pavlou (2002) emphasizes that the proliferation of the Internet has brought uncertainty and risk in the adoption of system. It therefore require the integration of variables that capture concepts in current technology adoption models by reflecting that trust and perceived risk are directly linked to the intent to transact via mobile devices. One reason for the inadequacy of traditional models is that the relationship between users and mobile commerce has not been clearly defined. Past methods only analysed the interaction between the users and the technology or between people in a network connections. On the contrary, mobile commerce users interrelate in three directions, in technological aspect, as members of networks and as consumers. These three roles need to be incorporated in order to achieve a greater understanding of mobile commerce adoption. The adoption of mobile commerce the interaction of consumers and sellers via mobile transactions is different from the usual electronics commerce due to the nature of location-independence, instantaneous real-time exchanges, the distinctive interface of mobile devices, and the unique aspect of mobile devices like small screen size and low bandwidth. Therefore, mobile adoption is not merely an issue of usability of system or acceptance of technology. It should include several consumer pre-purchase actions such as researching for information, providing details and act of purchasing using mobile devices. This paper will re-examine present literature of voluntary adoption of m-commerce services by individuals to emphasize the need to approach the three aspects of mobile commerce together in order to attain a holistic comprehension. The current mobile commerce industry of Singapore will be evaluated based in this research. It will enable stakeholders of the mobile commerce industry to gain informative insight on the acceptance of mobile services. Hence, this will result in wiser decision-making in terms of business strategies and provision of the product and services. CHAPTER 4: METHODOLOGY 4.1 Survey The self-administered survey was hosted online on speedsurvey.com, under the domain http://mobilecommercesingapore.speedsurvey.com/. The reason for having such an unsupervised survey technique was that the 16 questions were simple to understand and followed a direct logic. The respondents are made up of 12 females and 24 males and all the respondents own a mobile phone. They survey instrument covered 16 questions pertaining to the users insight and purpose associated to mobile commerce and also their experience with the mobile commerce and mobile Internet. In this paper, there is a section in the questionnaire where the respondents were requested to specify to what extent does they agree or disagree with the statement related to the considered significance of different proposed benefits and obstacles to mobile commerce. The data collected were used to identify the activators and inhibitors that cover critical or non-critical factors that impact consumers decision in adoption or not adopting mobile commerce. 4.2 Results and Discussion Over 41% of the respondent have a bachelor degree and about 50% of them holds a master or doctorate degree. All the respondents own a mobile phone and about 75% have Apple iPhone. This will mean that their service provider is SingTel since the Telecommunication Company has a monopoly on the distribution of the Apple iPhone until 2010 when the other 2 Telecommunication Company will also have the distributor rights. Incidentally, it is reflected from the data collection that the most common item purchase via mobile is the phone applications. Also known as widgets, these applications can be downloaded on the iApps or iTunesstore via the phone Internet browser. In terms of frequency, it is has the most recent item purchase. More then 40% of the respondent has purchase widgets for the past 1 week. Out of the 36 respondents, 34 of them has purchased (buy/order/reserve/download) item at least once for the past 12 months. None of them has bought items off the vending machine via the mobile p hone. The purchase of other items such as requesting for information and buying multimedia content by SMSto a specific 5-digit number are rather sporadic. Over 40% of the respondents agree that using mobile commerce saves them time, with the other 30% strongly agreeing. There are about 70% of them who see that using mobile commerce is fashionable and trendy. With regards to the mobile commerce being an invasion of privacy, there are equal responses from those who agree, strong agree and disagree. However, about 80% of the respondents think that it is safe to make purchases using mobile commerce. The majority of the respondents agree that they have the necessary means and resources to use mobile commerce. Same, the respondents also agree that they will seek information about the new product or services. Among those that had never performed a mobile transaction before, the reasons mainly evolved around unawareness. Mostly, they are do not possess enough information to get started or use it, or no idea how much it will cost. It is much preferred to use other devices such as computer or payment kiosks such as SAM or AXS to perform the transaction. It is commonly believe that mobile commerce is expensive and will cost too much. However, it is indicated that they are willing to try to mobile commerce mainly if it was easier to obtain information from the Internet via mobile phone. This will also comprise of ease of access to rich media on mobile devices and user-friendly navigation on their mobile devices. 4.3 Limitations of the survey The data collected from the survey is highly non conclusive for several reason. Firstly, the size of respondents is less than 50; therefore the results are not substantial. Secondly, the profile of the respondents is too skewed towards certain segments; mainly male that has Apple iPhone. Hence, the data is not representative enough. Thirdly, the structure of the survey was not well organised. The lack of logic and guided instructions, which is critical in self-administered survey, may somewhat confused respondent. 4.4 Suggestions for future research It is seen that Apple iPhone may be a boosting factor for the future mobile commerce phenomenon. The intuitive design and ease of navigation of the iPhone may propel more and more users to perform mobile commerce transaction. Also, with the fact that all three Telecommunication Companies are offering iPhone from 2010, it is believe that the market share of iPhone will expand rapidly. It is therefore suggest that an iPhone focus study may be undertaken in the future to better understand the effect of iPhone, iPhone applications, iApps, and iTunes store on mobile com Qualitative and Quantitative Research on Fear of Crime: Rape Qualitative and Quantitative Research on Fear of Crime: Rape Research Portfolio Introduction The beginning of this portfolio will be introduced by two main types of crime data. They come in the form of qualitative and quantitative. They both show and represent crime in different way, and it also gives a clear idea of how crime has a big impact. They both have their strengths and weaknesses, but this portfolio will examine their differences along with their similarities. They both have something to offer researchers and can also be mutually exclusive. Following this, the portfolio will include a personal observational experience that explores the process of effective data collecting. The method of observation has many strengths yet many flaws, and obtain qualitative data. This final part of the portfolio will also examine the sexual violence in relation to gender, with research to support it. It will use statistics to weight up and support the argument. Portfolio Part 1: The Difference Between Qualitative and Quantitate Research. There are two types of data when it comes to research; Qualitative and Quantitate. Quantitative data is the process of managing the natural world through a mathematical formula, especially statistics. Crowther (2007, p.72) suggests that ‘Quantification is, inescapably, about counting the number of cases. There is a belief that the number of cases provides a reliable measure of a particular aspect of the social world’. Quantitate data is fact and cannot be questioned; in contrast to this qualitative data is more difficult to define as it focuses on getting quality rich data that gives great understanding. One major debate of Qualitative research is whether statistics and numbers can tell us anything of important or substantial about social life. Crowther (2007, p.76) proposed that ‘Quantitative data does not capture the complexity of human experience. It is not possible to deal with human emotions and subjectivity. Statistics are not facts that exist independently o f human interpretation: they can only be made meaningful as part of an interpretive process.’ Quantitate research tends to be on a relatively large scale, having large amounts of numerical data and using statistical procedures to analyse the data and reach conclusions; it tries to find ‘representative samples and generalizable finding’. In contrast to this qualitative research tends to have much smaller samples, and therefore is on a much smaller scale (Newburn, 2007, pp.898-899).Qualitative data is ‘large, unwieldy database of transcripts, fieldnotes and/or documents and the aim of this discussion is to explain how these data can be managed and analysed. However, unlike quantitative data, there can be no clear-cut and widely accepted ‘rules’ or procedures for qualitative analysis’ (Crowe and Semmens, 2006, p.176). A Quantitative research method is surveys. They are extremely large scale and can be sent out to almost anyone, most people have participated in a survey in their lifetime. Surveys obtain data through a standardised questionnaire and although they are primarily used for large amounts of quantitative data, they can also have a qualitative element (Newburn, 2007, p.899). One of the most common form of survey is postal survey, they are extremely easy, cheap and simple. Postal surveys are self-completed, which may explain why the response rates are very low; even if someone may be interested in completing the survey they may just forget, as it is not a top priority. In contrast face-to-face interviews have a much greater compliance and also they can sort out any misunderstandings the participant may have about the questionnaire (Newburn, 2007, p.900). Telephone surveys are in the middle postal and interview surveys, as they are more personal than postal but less expensive than face to fa ce. This method has practical issues, such as how will the researcher obtain the numbers to have generalised data? Even after overcoming this obstacle there is still the issue of mobile phones being turned off and going through to voicemail. The last type of survey of internet based surveys, they are also cheap and easy but like telephone surveys if depends on whether the researcher has the appropriate contact information like emails; internet based surveys also compare to postal surveys as the response rate is very low (Newburn, 2007, p.901). Surveys are known for being easy but Crowe and Semmens (2006, p.131) suggest that ‘this apparent simplicity can, however, be deceptive since your chosen means of administration is not guaranteed to produce reliable results, or a high response rate’. There are three types of interviews; structured, semi-structured, and unstructured. Structures falls into the quantitate category whereas semi-structured and unstructured fall into the qualitative category. Structured interviews are planned out with set questions without deviation and are ‘good at finding number of time an individual has been a victim of crime over the past 12 months. But cannot tell the subjective experience of victimisation’ (Crowther, 2007, p.100). Unstructured research allows the investigator an understanding of depth and detail and how participants perceive matters. Each question is open ended with no structure and the interview is very much like a conversation, but with the interviewer steering the interview with a topic guide (Newburn, 2007, p.904). Semi-structured falls in-between structured and unstructured, as t is fairly formal with a basis of questions, but can deviate and explore in further detail; the interviewer does not feel bound and lea ves room for the respondent to talk. Both semi-structured and unstructured ‘give more room to express own values and attitudes’ (Crowther, 2007, p.101). These methods are extremely time consuming and tend to have small samples, making it hard to generalise the findings. Portfolio Part 2: A Reflection on the Experience of Conducting an Observation Crowe and Semmens (2006, p.101) suggested that ‘knowledge of natural world is gathered through systematic objective and repeated observations of naturally occurring phenomena’. This form of data collecting is largely a product of qualitative data. We place ourselves in an environment and simply watch the behaviours of others; taking into consideration the context we detect how an individual in behaving and why they are behaving like that. This gives us incredibly rich and vivid information that simply cannot be oppressed into stats and figures. Kawulich (2005) states that ‘observations enable the researcher to describe existing situations using the five senses, providing a â€Å"Written photograph† of the situation under study’. The observation was conducted in a bus station over a one hour period on the Saturday 2nd May 2015. The main topic of the observation was to examine what behaviours people were doing and scrutinise why. In terms of weather, the afternoon of the 2nd was cold and raining, as a result of this the majority of people were wearing larger winter coats with hoods; a lot of people were carrying umbrellas and had damp clothing and hair. As the bus station is in the centre of Leeds we can assume that the majority of people there did not live in the centre and were possibly having a Saturday shopping day or a ‘day out’; and were travelling home. The bus station was very busy and full with constant movement, and what was interesting was that it seemed quiet from what you would expect of a heavily crowded room. Upon observing the room it was noticed that the atmosphere of the bus station was calm and patient. Many of the individuals were seated quietly waiting for their bus or checkin g the times and showed no elevated emotions, they gave off a sense of cool and composed. There seemed to be a social expectation of behaviour when others entered and exist the bus; Individuals in the bus station waited for those to exit the bus, but always formed a line at the door in a ‘first come first serve’ mentality; it appeared that everyone followed the ‘rules’. Upon arriving at the bus stop it was noticeable that the room was very large and long, so deciding a place to conduct the observation proved to be difficult. In order to try and get a full experience and be in equal distance to everything, the observation was carried out in the centre of the bus station, seated as if waiting for a bus; and as the observation was open and unstructured there was no behaviours that were expected. In the observation it was conducted as the investigator was a participant-as-observer; this included sitting waiting for the bus, but not participating with the behaviour of everyone surrounding, such as getting on an off the bus (Crowe and Semmens, 2006, p.101). Data was collected in the form of note taking, balancing observation and writing equally. To make the note-taking for efficient, abbreviations were used; and only words that were contained necessary information and words that were necessary for the sentence to make sense were used. Because the bus stat ion was so busy it made it impossible to see and record every event and behaviour that happened. Because the room was in constant movement, it was difficult to record certain patterns of behaviour (Crowe and Semmens, 2006, p.110). In terms of success, the method of note-taking proved to be well organised and easy to refer back to, but one thing that could have been improved was how much information could have potentially been recorded. If the observation was to be repeated a possible improvement could be move around the bus station after certain time lapses, to ensure the full bus station was covered and recorded in comparison to sitting in the centre doing a 360 ° surveillance. Another possibility would be to bring an assistant observer(s) that recorded an area designated to them; this method may cover a much larger range of qualitative data. Observation as a data collecting method can be very time consuming, having it been said that to have a valid observational research study, it should have a minimum of a year of research, but meanwhile it does generate rich qualitative data. This method arises certain ethical issues, recording and using information of their behaviour can be seen as an invasion of their privacy; as researches, in an open observation, do not ask for consent. It can be argued that if an individual knows they are being recorded, then they will change their behaviour to what they think is ‘right’ and ‘acceptable’, wanting to please the researcher. This concludes that the data gathered is unreliable and unusable as it is not genuine (Crowe and Semmens, 2006, p.114). Portfolio Part 3: Analysing Crime Statistics Describe Sexual Violence in relation to gender. Newburn (2007, p.818) suggested that men have a much greater risk of being a victim of violent crimes than women do. A survey study in 2004 recorded that ‘women had a 6.3% chance of becoming a victim whereas men had a 14.6% chance’. Although these studies suggest men are more likely to become the victim of all violent crime, it has been found that women have a much greater risk to ‘intimate violence’ (Newburn, 2007, p.819). According to the Office for National Statistics (2013) a CSEW Survey, similarly found that ‘young women were much more likely to be victims of sexual assault in the last year’. The British Crime Survey found 6% of women reported non-sexual partner abuse, 3% reported sexual assault and 9% reported stalking; And in 1991 a survey discovered that one in four women had experienced rape-attempted rape in their lifetime (Newburn, 2007, pp.819-820). The Guardian (2013) states that between ‘2009/10 and 2011/12 there were an esti mated 78,000 victims of rape per year in England and Wales – 69,000 females and 9,000 males’. In the last 30 years there has been a significant increase in the awareness of rape. Studies that were conducted in the 70’s have shown that women who reported rape were seen more as complainants than an individual making a serious claim; Officials were highly unsympathetic. Women were given a list of things not to do, such as ‘don’t go out alone at night’, ‘Don’t use public transport at night’, ‘Don’t take shortcuts’, ‘Don’t cross commons or parks on your way or use alley’, and finally ‘don’t walk down badly lit streets’ (Newburn, 2007, p.822). This advice has been highly criticised with many stating it takes away the woman’s independence and implies that women are the ones at fault if they do not follow the ‘rules’. These rules, although are a precaution, make women feel that if they do any of these things, then they will surely be a victim on sexual assaul t. This can be seen in the SPSS graph below as in both columns ‘very worried’ and ‘fairly worried’, it is significantly higher than in the men’s column; presenting that there is a distress in women that they have been subjected to. In correlation with this theory Russell Pond (1999, p.82) states that victim surveys have opened up a whole new line of enquiry, leading to the fear of crime debate. This concept has become a serious tool of social control, and has become more of a problem than crime itself. One major aspect of the fear of crime is the assumption that men are less likely to admit fear. Maguire et al (2007, pp.387-389) suggested that in terms of society men have a pressure telling then to be ‘masculine’ to be strong and brave and have little fear. This is carried onto the crime world, men are expected to be dominant and reject abuse. This idea can be seen in the SPSS Graph below; the vast majority of males are either not very worried or not worried at all. This can imply that men feel they will be judged if they admit to fear so they chose their answer based on what is expected of them. The Level of Worry That Males and Females Have on Being Raped. One issue with the fear of crime debate is defining fear, how do we measure fear? Fear usually correlated with risk and danger which can be seen with men going out and consuming alcohol; this is a risk, but men will admit to little fear (Pond, 1999, p.82). Men are more likely to act in risk-seeking behaviours than women. Walklate (1995) suggests that fear is a ‘gendered phenomenon’. She states that the fear of crime is ‘†¦rooted in a male defined rationality based risk management view of fear which cannot tap the kinds of experiences that underpin women’s responses’. Pond (1999, p.83) also refers to Farrel et al who suggested that crime was significantly misinterpreted in the way it is recorded. He said ‘Their suggestion is that quantitative methods based on surveys give a greater incidence of fear than qualitative methods based on interview’. In an extremely controversial argument made in Patterns in Criminal Homicide (1958) by Wolfgang, he defined victim-precipitated offences as those ‘in which the victim is a direct positive precipitator in crime’. Amir suggested that one fifth of rapes were victim precipitates where: ‘the victim agreed to have sexual relations but retracted; or did not resists strong enough; or entered vulnerable situations sexually charged’ (Pond, 1995, p.78). At the time was a new emerging feminist movement, of which was highly critical of this approach. Conclusion In conclusion we can see the clear differences between qualitative and quantitative. Quantitative focuses on numeric data and with what is countable, whereas qualitative tends to focus on words and meaning. These two types of data are very different but the measures and methods we use to obtain them can occasionally go hand in hand, complimenting each other. The data obtaining method of observation was very educational as it displayed a personal experience of what went right and also how improvements could have been made, for example moving around and creating a large radius of observation would have improved and made diverse data. The final chapter it was found that women have a much greater chance of rape and sexual violence happening to them. But it also showcases that women are more worried about it; as more pressure and attention is placed upon them to avoid it, creating a slight sense of paranoia. Bibliography Crowe, I. and Semmens, N. (2006) Researching Criminology. Berkshire: McGraw-Hill. Crowther, C. (2007) An Introduction to Criminology and Criminal Justice. Hampshire: Palgrave Macmillian. Kawulich, B. (2005) Participant Observation as a Data Collection Method. Forum: Qualitative Social Research [Online], Vol 6 (2) May, Chapter 2. Available from: http://www.qualitative-research.net/index.php/fqs/article/view/466/996> [Accessed 6 May 2015]. Maguire, M. Morgan, R. Reiner, R. (2007) The Oxford Handbook of Criminology. 4th ed. Oxford: Oxford University Press. Newburn, T. (2007) Criminology. Devon: Willan Publishing. Office for National Statistics (2013) Focus on: Violent Crime and Sexual Offences, 2011/12 [Online]. London. [Available from: http://www.ons.gov.uk/ons/rel/crime-stats/crime-statistics/focus-on-violent-crime/stb-focus-onviolent-crime-and-sexual-offences-2011-12.html#tab-Introduction-and-sources> [Accessed 7th May 2015]. Pond, R. (1999) Introduction to Criminology. Winchester: Waterside Press. The Guardian (2013) Rape: crime and punishment [Online]. [Available from: http://www.theguardian.com/news/datablog/2013/jan/11/male-female-rape-statistics-graphic> [Accessed 7 May 2015]. Walklate, S. (1995) Gender and Crime. Hemel Hempstead: Prentice Hall.