Saturday, August 31, 2019

Catholic form of Christianity Essay

The Eastern Orthodox form of Christianity and the Roman Catholic form of Christianity as said to differ on many fundamental issues. Most individuals, in attempting to distinguish between Orthodoxy and Roman Catholicism, immediately just cite that the differences are in the Pope or Purgatory or even sometimes the filioque. Historically, however, the differences are far more numerous and quite profound. The first fundamental difference between these two religions is on the issue of the fall of man. Roman Catholicism teaches that all humanity is liable for their â€Å"original sin† and that all men are born with â€Å"original sin†. The implications of Adam and Eve’s banishment from the Garden of Eden in the Roman Catholic Faith are that man is born with original sin and nothing more, unlike the beliefs of the Eastern Orthodox, who believe that when Adam sinned against God, he introduced death into the world. The fall of Adam or the fall of man in the view of the Eastern Orthodox form of Christianity signifies the mortality of man and that death highlights the passions in man such as anger, hate, lust and greed which are borne out of the realization of death. Roman Catholicism ignores the Orthodox conception of man as slave to death and instead believes that man’s passions are manipulated by the devil. Another fundamental difference between Eastern Orthodox and Roman Catholicism is on the issue regarding the interpretations of canons. In the Roman Catholic faith, canons are rules or guides for governing The Roman Catholic Church. The Roman Catholic Church also continually evolves these canons by introducing new ones or revising them to suit the needs of the changing times and cultures. The Eastern Orthodox does not regard these canons as laws, which regulate human relationships or secure human rights. The Orthodoxy views canons as the means of forging the â€Å"new man† or â€Å"new creature† through obedience. Canons are trainings in virtue that are meant to produce holiness. While the Roman Catholic Church, as previously mentioned, currently updates the canons and discards the old ones, the Eastern Orthodox Church Orthodoxy never discards the old ones because of their belief that those cannons were also inspired by the Holy Spirit. Arguably, the most important fundamental difference between the Eastern Orthodox and the Roman Catholic forms of Christianity is in the manner of knowing the existence of God. The Eastern Orthodox faith believes that man’s knowledge of God is intrinsic in his nature. Man is born with the knowledge of God because it is inherent in human nature and that is how man knows that God truly exists. This belief also holds that man’s knowledge of God is fixed in nature and man cannot know anything more about the truths of God unless God chooses to reveal this to man. This belief is contrary to the Roman Catholic belief that God’s existence is constantly known, felt and verified by an examination of the other things that God has created in this world. Human reason, as the Roman Catholic Church believes, is capable of knowing and proving the existence of God. Man is capable of beholding the essence of God with his intellect and with the assistance of grace. The Eastern Orthodox Church therefore believes that God’s existence is already known to man by his nature while the Roman Catholic Church establishes the existence of God through man’s use of reason. These Three (3) fundamental differences, fall of man, canons and proof of God’s existence, differentiate what seem to be similar if not identical branches of Christianity. But as many have said, it really does not matter how you worship and revere God in so much as you follow the truths in life such as charity, love, peace and respect for all of mankind.

Friday, August 30, 2019

Kevin Carey: Why Do You Think They Are Called For-Profit Colleges

Dr. Keel English 1301 10 September 2012 Journal-Carey 1. Kevin Carey researches higher education matters for a group called Education Sector. Carey has done many publications for big time newspapers such as The Washington Post, and the Los Angeles Times. He was the Indiana State budget director, and currently teaches education policy at Johns Hopkins University. 2. Carey discusses the crunching debt for-profit schools bring to their students and their practically worthless degrees in his article, â€Å"Why Do You Think They’re Called for-Profit Colleges†.Carey starts off by practically taking away the educational integrity of these for-profit â€Å"higher† education organizations. He basically describes them as get rich quick sales pitches to investors, with profit mainly relying on student government funding (Carey 217). Carey is relentless on exposing the fraud for-profits carry with them. He says† Without over-sight, the combination of government subsidies and financially unsophisticated consumers guarantees outright fraud† (Carey 217). Also, Carey states that these for-profit colleges offer virtually illegitimate degrees due to low standard.He says, â€Å"there’s no doubt that the worst for-profits are ruthlessly exploiting the commodified college degree† (Carey 220). With these statements C arey presents a very clear opposition against for-profit schools, he is very clear in illustrating his argument against them.3. Kevin Carey’s purpose in his article is to clearly expose the illegitimacy of for-profit colleges.4. This article has added to the disliking I have had for for-profit colleges such as University of Phoenix, and DeVry. Personally Carey’s evidence has reinforced my assumptions that these organizations are fraudulent and do not offer decent door-openers for careers.5. This can be applied to the business world because it is a perfect example of how greed from investing can take away the integrity of things. For-profit higher education should not be a publicly traded entity while they rip off students with illegitimate programs, while only about worrying profits for investors.1. The main problem with for profit is their ridiculously high prices and debt they cause. A positive aspect of for-profits is the way they deliver their course work to studen ts utilizing technology.This article illustrates a negative view on for-profit colleges and it does a fine job in supporting its reasoning.2. Carey focuses on the individual Michael Clifford, as a firsthand example to show how a get rich quick investment â€Å"entrepreneurial† attitude can dilute the integrity and benefits of a true college education.5. In today’s economy a higher education is clearly worth the price, if the student can afford it. There are millions of employees with decades of experience being told to go back to school, and get a degree.The economy has surpassed the industry standard for experience, replacing it with possession of a degree. I am currently attending a community college, and plan on transferring to a university next year, where I will study Accounting. Everything I am doing in my higher education will benefit me firsthand when I enter the workforce. In my opinion college life is much more accommodating than public high school education. College offers a new level of independence, it provides students with an environment to help nurture self improvement, while preparing them for America’s workforce.

Thursday, August 29, 2019

Violence in a Rose for Emily Essay Example | Topics and Well Written Essays - 750 words

Violence in a Rose for Emily - Essay Example Therefore, it is not an easy task even for law enforcers to be involved in certain violent acts that could be potentially considered criminal as in the case of such portrayal in William Faulkner’s short story A Rose for Emily. Marvin Eugene Wolfgang, the most influential criminologist in the English speaking world had his interest in the subcultures of violence where he theorizes the origins of violence (Silverman). One of the theories as observed from the high rates of crime in Southern America is based on the values and norms which either support violence or does not prohibit such (Lee & Bartkowski). From this perspective, it could be fairly said that some of the elements of the aforementioned short story are accurate. For instance, when Emily bought arsenic from the druggist, the townspeople were quick to suspect that she would kill herself and yet did not do anything to prevent the woman from doing so, rather were quite agreeable of the idea. Such a reaction seemed to give a thumb up to suicide and encourage a person that killing one’s self would be best when all is not going well. ... ther angle, in the murder of Homer Barron, the neighbors and law enforcers of the town have been quite lenient with an investigation regarding the foul smell that came from Emily’s house. They knew that the woman bought some arsenic just a few days before the foul smell filled the neighborhood air and that they even suspected she would kill herself. When they still found evidences of her being alive when her place got smelly, they should have suspected about the smell and spent more serious time considering what might have happened. The absence of Barron after he was last seen entering Emily’s house was totally scratched from the picture which shows how her people could easily think highly of a noblesse oblige, that she could not possibly kill a northerner who they supposed was married to her. This, and the aforementioned prospect of Emily killing herself brings about the picture of the people in her town where they take separately murder in different levels that is, Em ily can possibly kill herself and that is fine with them and Emily cannot possibly kill Barron which is revealed in the end was what happened in the story (Kennedy). Looking at the effects of the values and norms of the people in A Rose for Emily, a crime was performed and was never found out until the perpetrator died. The words of Judge Stevens, â€Å"Dammit, sir, will you accuse a lady to her face of smelling bad?† seemed to be more of an attempt to protect Emily than to show respect to her. It is true that circumstantial evidences might have been known for suspicion and there is also the consideration of the limitations of the law and enforcers however, there was also no evidence of some extended effort to know about the foul smell that was affecting the neighbors because they seemed to be afraid

Wednesday, August 28, 2019

Brahmanism as an Early Stage of Hinduism Research Paper

Brahmanism as an Early Stage of Hinduism - Research Paper Example Brahmanism, which is also known as â€Å"Vedic Hinduism† dates back 4000 years and developed many of the beliefs and foundations for Hinduism. Although Hinduism did is clearly an extension of Brahmanism, many of the Hindu beliefs and practices were not established in Brahmanism tradition. The beliefs of Brahmanism were based on the sacred texts of the Vedas, hence the name â€Å"Vedic Hinduism.† Hinduism considers the Vedas a primary text of their religion but they do not limit themselves to the Vedas. In this way, Hinduism has taken its roots from Brahmanism and evolved into the third largest religion in the world. Brahmanism is responsible for developing a stable and enduring foundation for the Hindu religion. One system deeply rooted Brahmanism that has been carried over into Hinduism is the existence of a caste system. There were four different casts in this system including Brahmins, Kshatriyas, Vaisyas and Sudras. Of these cases, the Brahmins were the highest as p riests and scholars (Brahmanism, 1). Hinduism recognizes and maintains these four hereditary caste systems but over the millenniums, has added many additional castes (Hinduism-Brahmanism, 1). Both Brahmanism and Hinduism also have established a belief in four stages of life. The four stages of life are Brahmacharya, Grihastha, Vanaprastha and Sanyasa. The functions and objectives of these four stages of life have remained virtually identical in present-day Hinduism (Hinduism, 1). In Hinduism, within these four stages in life are four objectives of life (Kama, Artha, Dharma and Moksha) (Hinduism, 1).

Tuesday, August 27, 2019

Compare and Contrast the film Almos' a Man to the story A Man Who Was Essay

Compare and Contrast the film Almos' a Man to the story A Man Who Was Almost a Man by Richard Wright - Essay Example The setting of the film and story is a vital aspect to consider when going through the various aspects they bring forth. In both of the works, the setting or rather the conditions that the two live are very deplorable and are why they go through the suffering that they do. The setting in the story depicts poor conditions people were subjected too and the same is seen in the film, where Dave had to work and struggles to have an identity as he was treated like a child. In earlier days, people did not have any compassion and treated people that they thought were of ancient decent poorly (Brignano). Dave in the film and in the story by Richard Wright seems to have a common decent provided they were white. The only issue that made them different is the fact that they did not live in as appropriate conditions as their employers. Character is another important factor to incorporate in the analysis aiming at understanding the concept that the film and story bear. In the story and in the film, Dave has an attitude problem. This is depicted in both the film and story where Dave thinks that owning a gun will get him respect from people. In the film and story, Dave struggles with finding his purpose in the world and this can be explained further by the social differences that existed in society where whites were deemed superior and he felt that he had to have a purpose in the world. Symbolism in the story is that of poverty. Both the story and the film depict how Dave and others like him used to work for rich families in the fields so that they could have a place to live and support themselves. That was the time that slavery was at its peak. Many of the people that used to work at that time were very poor and did not have a place to live. This led to them getting work from the rich so that they could get enough money to go by. These rich families were very influential and rude to workers and thus the reason many of

Monday, August 26, 2019

Film review about Infernal Affairs Essay Example | Topics and Well Written Essays - 1750 words

Film review about Infernal Affairs - Essay Example Before its official release, this film generated a lot of interest among the prospective audience because of the difference in concept to the other films that had recently come from Hong Kong. It can be said that the concept, upon which the film is based, is unique and extraordinarily few films have been created using the same concept. This film employs a vibrating abruptness that is usually found in the work of the writer and director Michael Mann. The theme of this film uses the techniques, which Mann used in the film Heat, and this theme can be seen almost to the last detail. It has the same cold bloodedness that was displayed in the latter film and this, indeed, makes it one of a kind. When the film was released, it did not disappoint those who had expected it to have the qualities that were unique, fun, and at the same time made the film a serious picture to watch. It looks at the relationship between the police and the criminal underworld in a new perspective that many would co nsider impossible. It set a new record, which many Hong Kong films of the same genre from that time on have been trying to reach. This film is, therefore, worthy of the adoration that many of its fans have had, and continue to have, for it. The film gives the viewer a glance into the criminal underworld that is dominated by the Triad, where criminal mastermind Hon Sam believes that he can make his gang live outside the law. To achieve this feat, he sends a group of young men to join the police academy so that when they become police officers, they will be able to keep any attention from his activities from the police (Marchetti 95). The main aim is to keep ahead of the police, by getting to know what moves the police are planning against him before those plans can be executed. In this way, he will be able to run his operations safely without any fear of being caught. Unknown to Hon, the police are planning almost the exact thing against him. They want to place a mole within his orga nization so that the mole can tell them the moves that Hon makes, hence ensuring that he is caught red-handed. Under the supervision of Superintendent Wong, Chan is chosen to become the mole in Hon’s triad organization, and to achieve this, there is a public demonstration where Chan is kicked out of the Academy despite being the best student. This leads him to enter the criminal underworld as an undercover cop, with only two people in the police department knowing his identity. The duty, which has been assigned to Chan, is a perilous one indeed, because he is tasked to remain with the triads until such a time as they are brought down, no matter how long it takes. Within the same academy as Chan is one Lau, who is a Triad mole tasked with keeping Hon up to date about the police movement against him. The entire movie is based on the parallel lives, which Lau and Chan live as moles in each other’s organizations and how these lives come to profoundly affect them personally (Bradshaw). There is a sense, around the main characters of the film, of being disconnected and alienated and this helps to increase the excitement that one feels when watching it. This feeling keeps one wondering what is going to happen next, ensuring that one fully concentrates on the film, so the latter scenes are not missed out. These two characters are, unknowingly, brought together at the beginning of the film, each not having a hint

Sunday, August 25, 2019

You choose a subject Essay Example | Topics and Well Written Essays - 1250 words

You choose a subject - Essay Example She however got tired of him too because he repressed her independence and treated her more like a trophy than a person. Although she submits to him, deep down she resents her life and feels being married to him was just like being a servant. After 20 years of marriage, he dies and she marries Tea Cake, a poor but fun loving and adventurers’ man in whom she finds all the love she had been looking for. They move to the everglades where they work as laborers, this relationship is however brutally ended when during the Hurricane Tea Cake is bitten by a rabid dog (â€Å"From their Eyes†¦Ã¢â‚¬  7). Two weeks later she is forced to kill him to defend herself from his psychotic delusional self. After being acquitted for his murder, she finally goes home and the book begins and ends as she retells her story, an act that finally puts her at peace with herself and her late husband. The book touches on several themes that are or relevance to the lives of women of color and the black community in general in the backdrop of recently ended slavery. One of the dominant themes is, Love vs. independence, since the quest for both is the content of most of Janie’s life; she leaves home to search for love but evidently fails to find it in her first husband. She leaves him believing she has found true love in Stark and although in the start it looked like the perfect romance she soon realizes his ambition is far greater than his love for her. It is only with Tea Cake that she finally gets both love and independence since he treats her tenderly and respects her individuality unlike the former husband who repressed her. The theme of gender roles is also explored in the book through the events that shape Janie’s life. He grandmother holds that men are providers and women should be taken care of by them and so married Janie off to an older man. Stark, on the other hand, assumes that being the man in a relationship gives him rights over the woman whom he treasures more

Saturday, August 24, 2019

Green Supply Chain Essay Example | Topics and Well Written Essays - 1500 words

Green Supply Chain - Essay Example Monsoon Company uses strategies that are environmental friendly in manufacturing their chemicals. They do not dump waste materials but they recycle their waste products to avoid pollution. They have an accounting program that monitors activities that may led to degradation of the environment. Amazon Company is also environment sensitive since they replace trees that they have used in manufacturing their books. This is by planting more trees than they have cut for manufacturing of paper. Sustainability Stagecoach Company controls the effect that carbon dioxide may cause to the environment by replacing old vehicles. The company improves the efficiency of their vehicles thus offering their customers excellent services and as well reducing impacts on the environment (Basu & Wright, 2007). They have implemented new technology in their vehicles that do not guzzle appreciable quantities fuel and thus reducing carbon dioxide emission. These vehicles have achieved a high emission standard in Europe. The company has set targets on carbon emission strategies as the centre of their green program. This is possible, as they have introduced an accounting and control system of carbon emissions. This program is integrated with their business agenda to ensure transparency to their customers and ensure they have managed carbon emissions by their vehicles. The company has used alternative technologies that are environmental friendly, which reduce carbon dioxide emissions. They have more than 1000 vehicles with alternative drive train, which are modified to ensure efficiency to their customers (Basu & Wright, 2007). The modifications include aerodynamics technology that has proven to be efficient and electronic adaptations that reduce carbon dioxide emissions. Drivers are made aware of the importance of environment conservation. Drivers are trained on better driving techniques where they drive efficiently, thus saving fuel. There are many campaigns on awareness of efficient driving that will assist in saving fuel. They should use vehicles that do not depend on fuel for energy because of its rising cost and fines they pay from carbon emissions Monsoon Company has to come up with other alternatives for dealing with raising fuel cost and regulations that govern carbon dioxide emissions. This will interfere with most of their supply chain strategies for delivering services to customers. These companies pay a huge amount of taxes that interfere with their outcomes and profits. It is therefore, the role of these companies to come up with alternative technology that will be used in manufacturing their chemicals. This technology should be environmental sensitive by reducing the rate of carbon emissions (Emmete, & Sood, 2010). The company should use raw materials are not toxic and might have impact on the environment. This helps in reductions of carbon dioxide emissions, thus conserving the environment. It is the role of the company to connect their businesses with gr een supply for the purpose of transparency. Customer’s needs are fulfilled by companies that connect their business to green supply resulting to high output of the company. Connecting green supply goals with business goals Companies like Amazon must align their businesses with green supply chains to realize their objectives. Amazon should ensure that green supply chain is connected

The Role of a Nurse and Best Practice Preventing Pressure Ulcer In an Essay

The Role of a Nurse and Best Practice Preventing Pressure Ulcer In an Acute Medical Receiving Environment - Essay Example This report stresses that nurses are required to act at the best of their interests in order to save the lives of people. However, the poor working conditions in many hospitals nowadays and healthcare policies impact the performance level of nurses. For instance, the healthcare policy reform is seen as a hindrance to the effective healthcare delivery services by registered nurses. Nurses offer real life issues especially on the needs of patients in order to reduce mortality and morbidity issues. The healthcare policy can create issues especially where patients are required to pay and where those who are insured are not supposed to pay. This is one of the issues that had been noticed with the healthcare insurance; thus creating conflicting issue between insured patients and the caregivers. The healthcare costs and other aspects are all issues of political agendas; thus, they tend to impact the role played by nurses in the hospital settings. This essay makes a conlcusion that nurses are aware that the current healthcare system has varied problems; thus, a need for creating changes in acute medical receiving environment. Abood argues that the current healthcare environment face varied problems because of numerous healthcare policies, laws and regulations imposed upon the healthcare sector by the government agencies. These create challenges to both nurses and patients who are always stuck amidst of cost constraints and access to effective quality care

Friday, August 23, 2019

Fianal paper paragraph Thesis Example | Topics and Well Written Essays - 500 words - 1

Fianal paper paragraph - Thesis Example The film reveals how the Japanese people remained unemotional and focused to build their nation. The film is not political and gruesome. This study intends to dig deep into the cultural and social background of the Japanese people and how the pattern aid in fostering unity and harmony especially during and after a crisis. The second film Osaka Elegy is a representation of the real picture of Japanese aspects of responsibility and irresponsibility. This paper intends to examine the aspect of responsibility as well as the aftermath of irresponsibility as it is depicted in the film Osaka Elegy. The director Kenji Mizoguchi reveals how the young woman Asai tries to refuse the advances made by her boss at the pharmaceutical company. It emerges that the young woman represents the responsible Japanese women, who believes in moral actions. Asai’s father‘s drinking habits, which has put the family in a deplorable financial situations represents irresponsibility. It is notable that, the irresponsibility has compelled Asai to work and sustain her brother in school. In addition, Asai has tried to settle many of her father’s debts. However, Asai’s weakness and irresponsibility is indicated when she joins prostitution to sustain the family needs. She is finally arrested and

Thursday, August 22, 2019

Sales Promotion Essay Example for Free

Sales Promotion Essay It typically cannot reverse a genuine declining sales trend. Marketers cannot reasonable expect sales promotion to convert refection of an inferior product into acceptance. Sales promotion may even weaken the brand image. Sales promotion has also been blamed for encouraging competitive retaliation. Short-term volume gain at the sacrifice of profits. Forward Buying: People buy more than they need at the deal price. Pay-for-Performance Trade Promotions: Retailers are rewarded for making sales to consumers rather than making purchases from manufacturers. Ethical and Legal Issues in Sales Promotion Deceptive Sales Promotion Fraud: The Fake Storefront Stuffing the Ballot Box Playing the Middleman The Redemption Scam Diverting (or Arbitraging): Secretly purchasing a product where it is less expensive, usually as a result of a trade promotion, and reselling in areas where prices Final considerations Don’t promote if the product is not good Promotions rarely stop a declining sales curve It is very easy to lose the promotional gains made if your promotion has not been effective in retaining new customers. So the product has to speak for itself. The objective of the promotion is to wean away users from competition and create new users. Excessive promotions lead to diminishing returns and may devalue the brand Promotions may be used in conjunction with advertising and other marketing communication tools It should be novel and attractive Ensure supply lines are good and adequate stock is available right through the promotion Cater for contingencies. Have escape routes built into the plan Trade has to be handled tactfully Reimburse incentives/ rewards/ gifts promptly Must be within the legal boundaries

Wednesday, August 21, 2019

Current Education System Impact on Creativity

Current Education System Impact on Creativity Abstract This paper discusses how the current system education in Latin America kills creativity. The paper explains that standard test need to be reorganized and how the system would improve. Then it will show how free time is important for each student to have better knowledge. Finally, you will find how is the methodology of the system to reflect on the path we are following. Also along the paper there are some comments to solve the problem because that problem is affecting childhood. Keywords: Current educational system, creativity, students , methodology, childhood. The current education system kills creativity Does every person have the same opportunities in the current education system? The answer is clear No. Nowadays the current education system is based on a few important subjects such as maths, science and language but it does not focus on people who like to dance or sing. In the article The case for disruption in Latin Americans classrooms (Segan, 2016), Susan says that many schools in Latin America continue to use antiquated models for education. For many years education system in those developing countries has not had a great change, even though humans are developing every moment; our cars improved, our computers improved, and our engines improved. However, in the article Inteligencias Mà ºltiples: La teorà ­a en la prà ¡ctica. (Howard), Gardner suggest that we have been used this education system since industrial revolution. In those days this system worked because the world necessities only consisted on memorizing or following instructions. This education system uses those old techniques such as memorization but in todays world skills such as creativity, imagination, and innovation are needed. Gardner also suggests that there is more than only one intelligence so why does education system only focus on some of them? We have different ways to learn, create, and innovate so we cannot keep on using this system. Each person is different and unique so the system cannot judge us equal. Also, the world has changed since the industrial revolution and our necessities have changed too. Now we have many people without work because the system does not prepare them for new labour requirements because the world need more people who can solve problems. On top of that the current educational system believes that some subjects are more important than others such as math and dance but nothing farther than the truth because a dancer can create and innovate with his/her body. However we sometimes think that a mathematic or a logic person only has theoretical knowledge and c annot apply that kind of knowledge in real life, but that is not true in all cases. However the current system education guides us to think in a unique way. For those reasons by me there are 3 issues with the current system education that kills creativity. Standard test are not suitable for all students First of all, standardized tests are one of the biggest problems in the education system. In the article Inteligencias Mà ºltiples: La teorà ­a en la prà ¡ctica. (Howard) , the author says that there are several different intelligent. Based on this information in my view standard test is not a good way to evaluate a students progress. Standardized test are based on questions to benefit certain people with specific skills. For example, in Ecuador there is an exam called ENES which benefit people who have logical and linguistic intelligence. However, people who do not have those skills cannot pass this exam so they believe that they are not able to study anything. Those exams are created to benefit specific skills such as the ability to calculate math problems or create and solve equations. However, in the article The case for disruption in Latin Americans classrooms (20 May 2016), Susan Segal says that the way students learn and what they need to learn is rapidly changing so the ma in problem is Can a unique exam apply to everyone? According to Gardner there are different intelligent, skills and necessities so those kinds of exams do not work because each person has different skills and necessities. By the contrast this kind of test judges everyone as equals. Another issue is that a test takes a lot of time to be answered and is exhausting for students. People who control educational system should change test methodology and try to make them less stressful. With this in mind if tests were more practical, students would increase their knowledge faster and they would develop new important abilities. For example, with a test is difficult to value the real awareness. By the contrast by creating projects would be better to evaluate each student. By creating projects students develop skills such as to resolve real problems, create new ideas or improve leadership. In science, we dont begin by knowing the answer-we value the process ¨ (Ossola, 2014). That shows us that sometimes we need to move our hands to learn better. If we do not make the process we will have knowledge but we would not be able to apply that knowledge in the real world. One solution for this problem would be to decrease the number of tests and increase the number of pro jects but tests could be more practical because now there are a lot of tests that only exploit our ability to memorize. At the present time our world is more competitive and big ideas are required to improve our world. In this way test should be related to take advantage of those skills and guide us to use them to resolve real problems. Time should be better spent Secondly, the lack of free time for students is another problem in the current education system. Time is important for every one because we can use it on different things such as relaxing, doing homework, playing or whatever we like. However, what happens if we spend too much time in classes? We do not take advantage of the hundred percentage of our time because we have exhausting classes with a long schedule. In some cases each subject is token 2 hours per day, so teachers cannot stay those schedules and neither do students. Thus students get stressed easily and cannot pay attention very well. Also students who do not like some subjects spend their time in other activities such as playing on their cell phones, chatting or joking. Hence time is not taken advantage of in classes, so schedule should benefit students and teachers. Each one works better if they are relaxed. A good example to take advantage of time is in the article, A Young Tinkerer Builds a Windmill, electrifying a nati on. (2007). Where Sarah Childress says that while William Kamkwanba quietly plowed through homework, his classmates were busy gossiping and checking their Facebook profiles. He took advantage of his time while his partners did not spend time in a good way. Also William Kamkwanba created a new project without any pressure. He was relaxed and he worked better. Also he did not spend his time in classes because he was forced to work with his hands so he worked better if he was moving his hands. Also William Kamkwanba had done his work without any teacher; he is a great example of self-preparation. A great example of this is when he built a wind will only with a book. This shows that the only limit is our imagination. He worked every minute in his project so his project could be done. Based on that the scholar system should change the schedule and exploit each ones abilities taken advantage of every minute in classes and give more free time to decrease stress. Also the system should cons ider different ways to exploit time. As we can see in Willians example creating projects is one of the best solutions because with projects we are able to think outside the box and not waste time. Time is too important because we cannot recover lost time. The current methodology no longer works Finally, the current methodology based on memorization is an impediment to learn because creative people are wasting their time. Nowadays memorization is an important base in our education system. However not all students are able to learn in this way also this way of teaching does not teach critical thinking skills. If we think on memorization, scientist comes up our mind because some people believe that they are like robots and they only memorize their books. However , in the article Scientists Are More Creative than You Might Imagine (Nov 12, 2014). Ossola Alexandra believes that scientists are like artists as well. Scientists are able to create because they need new ideas. Also projects are based on new ideas and a scientist always does projects. If a scientist only has the ability of memorize, he would fail in the science world. However the education system, which I described before, is not useful for different skills based on creativity, it focuses in creating head knowledge. S chools only teach what they need to learn they only teach facts, but sometimes they do not teach how they can apply that knowledge and students are like machines, empty machines. A student can follow instructions but the real question is, can that student think by himself. Curiosity, initiative, leadership are not used in classes and they are abilities that can help a student not only in his studies also in his life. Innovative solutions and new technologies are emerging around the world (Segal Susan, 2016). That means that there are a lot of people with good ideas. However in Latin America those techniques such as creativity, collaboration, problem-solving and others are not taken of advantage because those skills are killed in schools or high schools. The system only teaches us to follow one way. Nevertheless kids are living a different reality so they need different skills. Memorization is an antiquate technique that should be changed by techniques like leadership or adaptability initiative. To sum up In conclusion if the current education system in Latin America based on memorization and head knowledge are not useful in the world today, we should find a solution to help people with fresh ideas, innovation or creativity. Today we are judge a fish by its ability to climb that shows us that we are not creating people who can solve real problems because the education system is focused head knowledge. However, the world need more than knowledge as developing countries we should be able to pick the best of other education systems from countries with better development. Also education system is too important for each one because kids are formed in this system and they will be the future of our society. Nevertheless we are killing their abilities and we are formed robots that only have linear thinking. Is true that there are problems so we need to identify which are they and try to find a solution. Childress, S. (2007, DECEMBER 12). A Young Tinkerer Builds a Windmill. Retrieved from THE WALL STREET JOURNAL: http://www.wsj.com/articles/SB119742696302722641 Howard, G. (n.d.). Inteligencias Mà ºltiples: La teorà ­a en prà ¡ctica. Barcelona: PAIDÓS. Ossola, A. (2014, November 12). Scientists Are More Creative Than You Might Imagen. Retrieved from the Atlantic: http://www.theatlantic.com/education/archive/2014/11/the-creative-scientist/382633/ Sean T, F. (Director). (25 june 2013). El Sistema Educativo Finlandà ©s Subtitulado web [Motion Picture]. Segan, S. (2016, May 20). The case for disruption in Latin Americas. Retrieved from The World Economic Forum on Latin: https://www.weforum.org/agenda/2016/05/a-case-for-disruption-in-latin-america-s-classrooms/

Tuesday, August 20, 2019

Factors Influencing the Technical Defensive Measures on Spyw

Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl Factors Influencing the Technical Defensive Measures on Spyw Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl