Saturday, January 25, 2020

Impact of Identity Theft in E-Commerce

Impact of Identity Theft in E-Commerce ABSTRACT In the world of today, where time is money and information is a corporate asset, protection of data confidentiality and integrity has become critical. Today, companies are focusing much more on how to secure their businesses from identity fraud, which has emerged as the modern day menace. As I found research on identity theft is rather limited. This research will provide more knowledge of the subject. The aim of this research therefore was to find and assess the impact and the level of identity theft in e-commerce. This was achieved by using analytic induction from the existing research literature and analysis of feed back from the various business executives, industry specialists and company clients through a questionnaire. After introducing identity theft and its impact on the corporate sector in detail, in the first two chapters with the data protection laws; it discusses their merits, demerits, controls and loopholes, the third chapter of this study delves into the methods and techniques used to prevent identity theft, it discusses in detail their efficacy, efficiency, implications and limitations while the last chapter is a case study of an organization where , existing data has been collected from various sources and has been critically analyzed and reviewed. A quantitative method approach has been employed in carrying out this research, besides carrying out a case study of an organization Moreover, aim to decrease the risk and effects of identity theft in e-commerce possible best practice techniques were identified through this research which was achieved through a study of existing literature which results the formation of a policy document. This policy document was also evaluated by industry experts. INTRODUCTION Like Mcleod and Scheel (2001) says, â€Å"e-business creates higher customer satisfaction, by providing quicker service, less effort to buy a product or service, and less business cost compared to a business run without the use of information technology (IT)†. Internet is also called worldwide network of computers. It provides excellent opportunities for an organization to do their business online. To get more customers and to increase the publics awareness of the business, it is very important to represent themselves on the Internet and their products, resulting in increased sales volume and higher profits. Security implications hold back the business. Nowadays, Credit card companies, banks and software companies work together to produce a broad standard to do safe online business. Whereas on the other hand System Hackers are trying to get as much information as possible, which they can easily sell in the black market. Some of the staff in companies also busy in selling their customers details in the same black market. Specific guidelines should be followed by companies to develop a safe and successful appearance in the online business. Some critics like Professor Richard Walton CB, (2005) however quarrel, The rise of the Internet and other modern technologies has brought about a fundamental change in commercial life. He further says that thieves have been stealing wallets and credit cards for a long time, but the growth of online buying and on-line banking has made Identify Theft the fastest growing white-collar crime in the U.K. and America, Its a big problem, and it can happen to anyone. On the other hand, some people are disagreed that the major cause of Identity theft is internet. As per Thomas C. Greene (2005) he said, that The vast majority of incidents can be traced to (what he calls) skimming, or dumpster diving, he goes further to say that plain stupidity among those who own our personal data are also contributive. Only a small fraction of such incidences result from on line transactions. I found majority of research is on the topic of identity theft, which usually consists of some variations in the phrase identity theft is the fastest growing crime in the United kingdom or it begins with a quaint anecdote about the tens of thousands of identity theft victims that emerge each year. According to a report published in the American angle, Anne P.Minz (2002) which says that the consumer sentinel network of agencies gathering data on e-commerce fraud, reports that in 2001 alone, there were 204,000 complaints, compared to 138,900 reported in 2000. It is noticeable that 47% increase demonstrates the growing nature of the problem. Figures such as the ones noted above are apparently disconcerting, in other to glean possible remedies which in turn demands for additional research on this issue. There are so many occasioning of identity theft and different ways this may be consummate. The overheads and wounded are considerable to financial institutions as well as individuals, but the overheads are often difficult to reveal or enumerate, mainly for individual punter sufferers. If an individual is auspicious enough to avoid financial responsibility for the theft, in so many ways they still endure losses in different ways, which may not be substantial; most of the time the affecting damage is very heavy that some sufferers commend suicide while so many others hunt for therapeutic or psychiatric assistance. In an attempt to recover from the theft or loss, sufferer may end up costs more money and time. These two must not be perplexed as theft resembles fraud in that and both engagedin some form of unlawful takings, but fraud requires an extra component of false pretenses formed to persuade a sufferer to turn over wealth, property or other services. Theft, by difference, needs only the illegal captivating of anothers possessions withthe aim to enduringly divest the other of the possessions. Harsh punishment is for fraud because of more planning is involved in that than does the theft. However, for the use of this study we are going to focus on identity theft in e-commerce in accessing the effect on online business in UK. Definition of Identity Definition of Theft â€Å"Theft† can be defined as per English Law act 1968 section (1). Subsection (1), that a person is guilty of theft if he is deceitfully appropriates property belongs to another with the purpose of enduringly miserly the additional of it; and that steal and theft shall be construed consequently. It is irrelevant whether the appropriation is made with a view to expand, or is made for the thiefs own benefit. As per encyclopedia dictionary 2007, Sometimes theft is used synonymously with larceny as a term; however, we can say that, it is actually a broader term, encircling many forms of dishonestly taking of property, including cheating, double-crossing and false pretenses. Some states categorize all these offenses under a single statutory crime of theft. Property belonging to another is taken without that persons consent will be assumed as theft, where Theft could be regarded as criminal act. Sense of Identity Theft In the Identity theft and assumption prevention Act of 1998 the term identity theft was first codified, where the act makes it as a federal crime when someone deliberately uses or transfers, without legal permission, a means of identification of another person with the aim to commit, or to aid or support, any unlawful activity that constitutes a breach of federal law, or that constitutes a offense under any applicable state or local law. In addition, the act defines it as a means of identification as any name or number that may be used, alone, or in combination with any other information, to identify a specific person. Identifying information is noted to be, surrounded by other things, passport number, a name, date of birth, drivers license or national insurance number (NI), access device or telecommunication identifying information. Identity theft may be broadly defined as the unlawful acquirement or the use of any aspect of an individuals personal information for committing some form of criminal activity (Hoar, 2001; LoPucki, 201; Slosarik 2002). This definition is proposed to cover any type of crime that falsely uses a victims name, home address, bank account, credit / debit card number, national insurance number, date of birth, etc. (Federal trade commission, 2004) Formal Definition of Identity Theft Although the act of simply embezzlement ones private information is an offense, the key factor to be notable here is that this information is then used to declare to be someone else. In other words we can say when someone else uses your identity as his own with the ultimate ambition for fiscal, material, and monetary gain. The Internet, the evolution of e-commerce, online shopping, and wireless capability, the explanation of identity theft can be further extended to comprise such things as the hacking into the customer databases of large organizations; stealing of usernames and passwords; the theft and hacking of network login sessions; and onwards. The development of e-commerce and particularly Wireless has compounded the problem of identity theft. Basically, it can happen worst yet to anyone, anywhere and at anytime, at variable edges in the way that information can easily be stolen. For example, Identity theft can occur by an individual simply rummaging through the trash cans at the local dumpster (the technically it is well-known as â€Å"Dumpster Diving†, and will be discussed later). Identity theft can also happen at your workplace, particularly if you do most of your work through telecommuting over a wireless link. Suppose yourself sitting in a cafà © at the train station, and while you are waiting for your train. Your laptop computer is connected to the â€Å"Hot Spot† or wireless link at the cafà ©, and you access your confidential customer data as well as an important work e-mail, but how do you know if the wireless link is for authentic? For example, there could be someone sitting next to you, and this person could have set up a fake wireless access point, and you unintentionally logged into that, thinking that you have really linked to a legitimate, safe and encrypted wireless link. Now, you can see that, this person has all the right to use your customer information, usernames and passwords as a result of that fake link, or â€Å"rogue† Wireless access link, And then you are completely unaware to all of this (this situation is well-known as â€Å"The Evil Twins†). Nowadays, you can see every where there is always a case of theft of identity going on almost every day. First, it was simply stealing a Bank Account Number or 16 digits credit card numbers, but now this crime is going on a large scale, where it affects millions of people all at once. Some peoples working in companies where they are steeling and selling customers full details under the table. As according to the BBC world report (March-2008) on local TV news, that HSBC Bank lost one data disk (compact disk) of their customer details. As we move more towards a wireless and mobile world, people who launch identity theft attacks are becoming much more stylish in the manner in which these attacks are launched. We are also seeing a trend today where large corporations are becoming very complacent in protecting their customer databases from these attacks. There are also trends going on where small, Wireless devices with huge capacity are being used in identity theft crime, and private information is even sold during auctioning processes over the internet. Definition of the term â€Å"Electronic Commerce†: â€Å"Electronic Commerce refers generally to all forms of commercial transactions involving both organizations and individuals, that are based upon the electronic processing and transmission of data, including text, sound and visual images† (OECD, 1997), â€Å"Electronic commerce is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video. It encompasses many diverse activities including electronic trading of goods and services, online delivery of digital content, electronic fund transfers, electronic share trading, electronic bills of lading, commercial auctions, collaborative design and engineering, online products (e.g. consumer goods, specialized medical equipment) and services (e.g. information services, financial and legal services); traditional activities (e.g. healthcare, education) and new activities (e.g. virtual malls).† (EC document, 1997) â€Å"Electronic commerce is the carrying out of business activities that lead to an exchange of value across telecommunication networks† (EITO, 1997) â€Å"E-commerce involves business transactions conducted through computer networks. The e-business literature deals with the technical facilities needed to run a business smoothly.†(Laudon and Laudon, 2000) â€Å"E-business creates higher customer satisfaction, by providing quicker service, less effort to buy a product or service, and less business cost compared to a business run without the use of information technology (IT)† (McLeod and Schell, 2001). Both of these approaches to e-business point to changes in the entire vision of a classical understanding of business. Service industrys challenges Companies are using electronic funds transfer (EFT) for their customers as the fast and secure way of transactions, at present; there are two most excellent ways to handle money online: personal checks and credit cards, there are other fast and secure methods to exchange funds online. Electronic funds transfer (EFT) is another name for online money exchange. Here, the exchange of digital money is involved between buyers and sellers. In the front customer authorization is made over the Internet where Banks handles the transactions behind. To ensure higher level of security specialized authentication systems should be adopted. IDs and passwords are one of the most fashionable methods of data security are in use to access a server or Internet site, but these are often poor. To address this problem, Axent Technologies has developed hardware and software solution called Defender that creates unique, one-time passwords that cannot be guessed, shared, or cracked (Venetis, 1999). â€Å"The system incorporates software on the users computer that communicates with the Defender Security Server on the other end. When the user connects with the server, a software token is activated that automatically establishes a dialogue with the server. A new password is generated during each session, removing any possibility that the user will forget to change his/her password on a regular basis† (Venetis, 1999). This study aims not only to evaluate benefits of adopting secure solution to identity-theft, but also to see that what best practices should be adopted by the Companies, which add value to their online business. Through in-depth research, I will be able to examine why customers switch to new online companies for their shopping. I will see techniques other companys uses to give confidence to their customers to retain them. Although there is a very limited research available on prevention of identity theft in e-business, but my aim is to study how I can contribute from the experiences of other companys perspective. By using quantitative method approach, I will try to test the current literature available on the subject matter. The study is based upon research conducted throughout the report from a variety of sources. The scope of the study is the assessment of tools, technologies and architectures that may involve in identify theft in e-commerce. As the scope of â€Å"Identity theft in e-commerce† is a diversified, so I have limited my research to online fraud detection and prevention methods. Why this research? The Literature provides insights into factors underlying the impacts of identity theft on e-business and failure results: customers lack of confidence, inappropriate variety of technologies structures, lack of ability to control and secure online businesses, lack of adoptable techniques and processes, but lack of study on how to secure online business. Research Questions To concentrate the research primary and secondary questions have been devised to establish a central path to guide the research. PRQ:What technologies are currently in place to combat fraud and how do they work? SRQ:Looking at previous fraud prevention techniques, have new technologies actually prevented and deterred fraud from the mainstream areas? The past study on identity theft in e-commerce was not enough to solve the problems. As the cyber crime growing rapidly, it is very difficult to secure online business. The purpose of this dissertation was to investigate why the organization like XYZ UK Limited not able to continue their online businesses and what new techniques and best practices are in use by others to run their online businesses. What are the techniques that were appropriate for identity management and how well the organization (XYZ UK limited) complies with these techniques? The quantitative data was collected through an online questionnaire addressed to approximately 50 business executives, partners, experts and consumers. AIMS AND OBJECTIVES This research emphasizes the issues in private company (XYZ-UK Limited) regarding the risk and impact of identity theft that company had faced while doing online business and also the problems they had been through in transactions, made on the Internet. I will also put forward what new techniques should be adopted to increase more business and customers satisfaction. To see companies involved in e-business and how to overcome their problems. Adopt new techniques and ideas to have secure online business. Following are research objectives: To analyze, the affect of cyber crime on businesses and with its consequences on customer relationship. Determine the protection level that the company has provided through its security Policy to maintain the privacy of their customers sensitive information and determine its compliance with industry best practices. To identify the reasons that results for the company in suffering loses and losing business opportunities and determining their plan to overcome those constraints. Analyzing new strategies acquired by the company to achieve the level of protection and review their effectiveness in accordance with existing practices. To provide opinion whether new methods for safe on-line business ensure customers satisfaction or need of improvement. Organization of Research This research is organized as follows. The first chapter, as noted, introduces the research and objectives. The second chapter provides the brief overview of literature on identity theft in e-commerce and describes the critical background identity theft associated with e-commerce., and third Chapter consists of Methodology. Chapter 4 Analysis of the findings of Survey as well as content analysis to assess the scale of the effect of these factors on e-commerce success as supposed. Chapter 5 is a policy document can be used as best practices. CHAPTER2 Literature Review â€Å"Whats my ROI on e-commerce? Are you crazy? This is Columbus in the new world. What was his ROI?† (Andy Grove, chairman of Intel) CHAPTER TWO Literature Review DEFINITION OF E-COMMERCE Various definitions of e-commerce are there; the one given at this point is an attempt to relate to this research. â€Å"Electronic commerce is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video. It encompasses many diverse activities including electronic trading of goods and services, online delivery of digital content, electronic fund transfers, electronic share trading, electronic bills of lading, commercial auctions, collaborative design and engineering, online products (e.g. consumer goods, specialized medical equipment) and services (e.g. information services, financial and legal services); traditional activities (e.g. healthcare, education) and new activities (e.g. virtual malls).† (EC document, 1997) While, defining the term â€Å"Electronic Commerce† ranges from broad (EITO) to the very narrow (OECD), basically they are equivalent. A patent description of transactions rather than the scope of activities are there. A hurdle in drafting a precise definition of e-commerce is the continuing evolution of science and technology and its impact on ever-changing environment. (Civil Jurisdiction, 2002) Identity theft may be broadly defined as the unlawful acquirement or the use of any aspect of an individuals personal information for committing some form of criminal activity (Hoar, 2001; LoPucki, 201; Slosarik 2002). This definition is proposed to cover any type of crime that falsely uses a victims name, home address, bank account, credit / debit card number, national insurance number, date of birth, etc. (Federal trade commission, 2004) Some authors and authorities have obviously been some hard work on the result of identity theft to those whom their identity had been stolen; they were trying to see how identity theft can be avoided and possible ways to avoid ones identity being stolen by the criminal specially in online business and to find what identity theft in e-commerce is about. For instance, Mehdi Khosrowpour (2002) defines â€Å"identity theft is a form of hacking which results in possession of personal data and information by the hackers to masquerade as the true identity owners for future use†. IMPACT OF CYBER CRIMES ON BUSINESS E-commerce oriented Businesses are often having a fear that exposing security weakness gives the opportunity to hackers to penetrate into business sensitive information and do the damage. These concerns have shown to have negative impact on consumer attitudes toward using the Internet to make purchases. (Koufaris, 2002) The outcome is failure in doing business online. The losses can be divided into â€Å"direct† and â€Å"indirect losses†. The complete impact of identity theft is not completely understood so far, but latest researches importance the fast development and major costs linked with the offense have discussed and looking to solve it. Near the beginning debate around identity theft relied on subjective proof which is mainly reported by the popular press Identity theft is in many ways a more harmful act that can have continuous effects on major financial effect on merchants as well as on customers. Recent studies have found that identity theft victims often suffer the same emotional consequences as victims of other crimes. The crime of identity theft can be difficult to track because it takes many forms and is used to facilitate other crimes, such as credit card fraud, immigration fraud, Internet scams, and terrorism. Identity fraud arises when someone takes over fictitious name or adopts the name of another person with or without their consent Rt Hon David Blunkett MP (2002) DIRECT LOSSES Direct losses can be defined as losses in terms of monetary value. Reflection of such costs can be seen as incorporated costs of the market incentives faced by such parties addressing the issue. Surveys conducted by experts show the range of financial losses that the businesses have suffered. Identity theft losses to companies are over two times greater whereas to consumers three times that are linked with conventional payment deception. Analysis of recent consumer surveys has suggested that while users may view the internet as a marketing channel valued for its convenience and ease of use for shopping, security and privacy issues are very influential on decisions to buy online†. (Smith and Rupp, 2002a, b) In e-businesses associated fraud losses are also normally charged back to merchants. From the perspective of the credit card issuer, the cost of identity theft for illegally purchased products is most likely to be claimed against the applicable retailers by the credit card issuer. Internet merchants fraud-related costs are high, and when those costs are combined with growing consumer fears of identity theft it results in significant damage to the business. For consumers, the main impact of identity theft is the unauthorized use of their credit card accounts that could make them suffer financial losses. Corporate identity theft provides perpetrators to conduct industrial sabotage resulting in possible fines to businesses for breach of regulatory rules. Another form of direct losses is the loss of data, according to studies data breaches cost companies losses in terms of administrative performance, management defections and loss of critical and sensitive business data as well as customer data. It will also allow consumers to sue if their personal information is improperly taken from online transactions (Tillman, 2002). It also results in cost overheads for companies to implement preventive measures and techniques. Additionally there will be costs for the recovery of loss-data. It also impacts the company to continue its business processes, above all companies may go out of business because of major data-loss. One more category of direct loss is the loss of equipments and products, since it is very easy for id theft criminal to divert the delivery or shipment of goods by having unauthorized access to the place where it is convenient to pick it up. INDIRECT LOSSES There could be many indirect losses because of identity theft. For example, the time and resources spent on corrective action after the identities and personal information have compromised. However, the ultimate indirect loss, in this regard is, the loss of goodwill, company reputation, customer confidence and relationship with trading partners. Reputation is one of trustworthy behaviour and plays an important part in determining the willingness of others to enter into an exchange with a given actor (Grabner-Kraeuter, 2002, p. 48). It has also estimated that businesses fear to accept large number of orders because of their susceptibility, especially they turn away overseas transactions and hence get to lose business. The combination of financial losses coupled with reputation and customer trust provide great level of damage to the e-businesses. In terms of reputation, it can said that any e-commerce scandal will become headline of news immediately and the media is always curious about such scandals, thus the publicity of any such incident ruins the company reputation largely. Consumers always worry about their privacy. Many researchers have found that, a majority of internet users worry about spreading of personal data, because the person stealing someones data can use it to misuse the bank accounts, conduct a crime using the details of somebody else, can easily get away from worst situations or can even cross countries borders using fake identities, all of the above can create problem for the person whose identity has been used for all such crimes. Liability issues are always in concern when companies are dealing with trading partners or doing the business within a country having strict laws for companies to be found liable if they do not protect their own and critical information of others. Theft of corporate identities may adversely affect morale of third party employees as well as the competitive advantages that a company may have with its trading partners. Using a network perspective, concerning interrelationships between people and organizations, economic relationships between organizations embedded in networks of social relationships (Galaskiewicz, 1985; Granovetter, 1985; Uzzi, 1997). Improper handling of information can also take companies to court where they can held accountable for negligence and can face severe fines including imprisonments. Another aspect of indirect loss is the damage to the credit history of both customers and businesses. Businesses will no longer be able to obtain business loans to boost their business and also cannot obtain insurance benefits from insurance companies. Similar things happens to customers, once their history has been marked susceptible they cannot obtain bank loans, credit cards, health claims and even a better carrier. In summary, the above psychoanalysis shows a picture what an individual or a business might suffer from if cyber criminals steal their identities. E-commerce and Main Categories Nowadays businesses are using heterogeneous computer environments to integrate their proprietary systems with the external world. Database servers and application servers supported with middleware to interface with online connections; these include HR management, supply chain management and customer relationship management. Through electronic networks where the purpose is to achieve businesses, E-Commerce can be separated into major categories: Business-to-Business (B-TO-B) relationship Business-to-Customer (B-TO-C) relationship Business-to-Government (B-TO-G) relationship Consumer-to-Consumer (C-TO-C) relationship Mobile Commerce (m-commerce) relationship The two core categories are Business to Business and Business to Customer. Business to Customer (B-TO-C) B-TO-C e-commerce is a part of the business, which deals with commercial activities between companies and customers. Companies can easily make their strategies according to the needs and requirements of customers, based on analysis of customers statistics in this model, these statistics can be based on marketing, sales and customer service components (e.g. ordering, online assisting, delivering and customers interaction etc.). E-tailing The most common form of business-to-consumer (B2C) transaction is E-tailing. (Electronic retailing) It is the selling of sellable merchandise over the Internet. E-Tailing: Revolutionary Trends in E-Business Recent studies have found that 1997 was the first big year for e-tailing. Dell Computers claimed as they processed a multimillion dollar orders taken through their Web site. In 1996, was the success for Amazon.com welcomed Noble Barnes to launch its E-business site whereas, Commerce Net/Nielsen Media disclosed that 10 million customers had completed purchases on-line. A systematic approach in this regard, needs a good combination of business strategies and dynamic networks. â€Å"The total of these structures is called a dynamic strategic network† (Dyke, 1998). One of the best examples of B-to-C e-commerce is Amazon.com, an online bookstore that launched its site in 1995. The benefits of B-TO-C e-commerce includes that it provides instantaneous communication between consumer and trader as well as products and services can be access globally and transactions happens in real time, whereas the risk includes, the confidentiality and privacy of customers information. Business-to-business (B2B) and business-to-customer (B2C) transactions are used in e-commerce and is a type of online shopping. Advantages of B2C e-commerce; The subsequent advantages are: Shopping can be quicker and expedient. Prices and Offers can alter immediately. The website can be incorporated with Call centers directly. The buying experience will be improved by Broadband communications. Background of E-Shopping E-Shopping was in

Friday, January 17, 2020

Gender role Essay

Falling Angels is a trip the jobless fantastic toe choreographed by Jiri Kylian and is accompanied by the song Drumming from Steve Reiches. The relationship between the music and the move is fully represented in sections throughout the piece. Kylian finished the dance in 1989 which is a period when there was a commixture of music and freedom within the move workforcet of dance. Falling Angels is performed by octad women dancing to rhythmic drumming. Women in that period of fourth dimension had stepped forward in their position of power and were equal to men in the economy, this may have been a reason Kylian chose alone female dancers. Kylians composition expresses emotions through movement which connects to the reference and creates an understanding of the messages being portrayed. These messages that women had gained equality were portrayed through the employment of dynamics and motifs as well as sharp and percussive movements. Is it possible for Angels to fall? Jiri Kylian’s work Falling Angels raises many controversies about the interpretation of its steps and movements. Some employ a feminist frame of analysis, and the role women portrayed in the twentieth century of western culture. Others believe it to have no underlying significance or meaning other than the beauty of the movement. This research will demonstrate that Falling Angels reflects the female role in the twentieth century of western culture. This study will analyze Jiri Kylian’s understanding of women, and how they were depicted during the late twentieth century. It will be determined that Falling Angels reveals Kylian’s view of women through the medium of dance as informed by surrealism and minimalism. In the choreography, his choices of surrealism and minimalism help portray his understanding of women. These choreographic choices communicate Jiri Kylian’s underlying message and inspiration for the work of art. By studying Jiri Kylian and his meaningful decisions, the true intent of his work unveils, and the question if Angels can truly fall will be revealed. The purpose of this study is to analyze the choreographic elements of surrealism and minimalism in Jiri Kylian’s Falling Angels, and describe how these elements influenced the choreography to depict the female role in the twentieth century of western culture. The beginning of Falling Angels is a period of silence during which eight women walk from the shadows of upstage into scattered positions in front of the audience. They correspond calmness and composure adding a sense of a kinesthetic awareness within the dancers as they slowly advance A short, invariable drum beat made by the stick tapping on a bongo drum begins and the dancers respond by fish fillet in turns and performing a single flapping motion to poise themselves in isolated areas inside individual light spots shaped like squares. The flapping is controlled and could be understand as a symbol representing the movement of an angel, hence the cognomen of the dance. The setting of the stage involves black curtains and bright lights focusing on the centre of the stage. It compliments the tight black leotards and skin biased flats that the women are wearing and also focuses on the features of the womens torsos and faces. The movements in this section are non-locomotor and comprised of changes in dynamics. Motifs such as the gestures of flapping, tingle and lunging then swaying.

Thursday, January 9, 2020

Factors That Affect The Academic Performance Of College...

Introduction There have been several studies researching the factors that affect the academic performance of college students. Some of these factors include family, personal habits, attitude, and social activities. Another important factor is the sleeping habits of the student. Sleeping is one of the most significant basic need that humans need. It is a biological necessity that plays an important role in each individual’s health. Sleep is not only important for health, but it is also important for learning and cognitive performance, such as enhancing memory and improving problem-solving abilities. For most students, college environment can affect their daily routine due to social activities and requirements in academics. Because of this, a regular sleep is often neglected and this will lead to the consequence of bad academic performance. Studies have indicated that over 60% of students are having sleep deprivation (Ahrberg et al., 2012). Furthermore, many students are unaware that sleeping early make them perform better than class rather than staying up late and study. The purpose of this research study is to remind the undergraduate students of Ball State University that they should maintain good sleeping habits in order to perform better academically by providing evidence and analysis. Summary Sleep deprivation has become a common problem among college students. In Ball State University, there are students complaining about daytime sleepiness. Some of them couldn’tShow MoreRelatedFactors Affecting Students Behavior1638 Words   |  7 PagesTHE FACTORS THAT AFFECT STUDENTS ACADEMIC PERFORMANCE A TERM PAPER PRESENTED TO MRS. R. VILLAHERMOSA STA. TERESA COLLEGE BAUAN BATANGAS IN PARTIAL FULLFILLMENT OF REQUIREMENTS FOR THE SUBJECT ENGLISH IV MARCH 2013 PENALOSA, GRACE MARIE D. MANALO ANTHONY CHRISTIAN ARETA ALLYZZA JOIE ACKNOWLEDGEMENTS: This term paper would not be accomplished without the generous contributions of any individuals and organization. We are very much gratefulRead MoreFactors Affecting Academic Performance...1690 Words   |  7 PagesFACTORS AFFECTING ACADEMIC PERFORMANCE OF FIRST YEAR COLLEGE STUDENTS OF THE DIVINE WORD COLLEGE OF BANGUED FIRST SEMESTER 2010-2011 Mary B. Gallardo,MST-Math, Alfreinell S. Castillo, BSC, Jessie T. Sibayan, AB, Marianito T. Taeza, AB, and G. Regil D.Valera, BSCE Registrar’s Office, Divine Word College of Bangued June 1, 2011. The objective of this study was to examine factors such as age, gender, high school graduated from, and Grade Point Average (GPA) in fourth year and to identify whetherRead MoreFactors Affecting Academic Performance of Working Students1519 Words   |  7 PagesCHAPTER 1 THE PROBLEM AND ITS BACKGROUND Introduction Student jobs have become a sort of trend among students around the world, who wants to be a working while they are studying. In short, the term that suits this trend is ‘Earn and Learn ‘ policy. Other reasons why student jobs are popular among students are they help to cope up with the constant increase in tuition fees, and a way to afford further educations. The problem has been developed with the question as to how theRead MoreThe Effects of Students Living Situation on Academic Performance969 Words   |  4 PagesTHE STUDY Academic performance is the evidence how well a student meets standards set out by local government and the institution itself.The extent of student’s learning in academics may be determined by the grades a student earns for a period of learning has been done. It is believed that a grade is a primary indicator of such learning. If a learner earns high grades it is concluded that they may also have learned a lot while low grades indicate lesser learning.   Going to college and living inRead MoreStress For College Students1463 Words   |  6 Pagesa quote that quite a few college students are familiar with and have probably said themselves. College can be a fun but also stressful time for students. They are focused on making sure they attend class and get passing grades so they can be successful and hopefully succeed in the next chapter of their life. Researchers at Columbia University and the University of San Diego conducted a study conducted a study to determine how stress negatively affects academic performance and enrollment. They wereRead MoreEffects Of Classroom On Student s Academic Performance1191 Words   |  5 PagesResearch Paper Title Introduction Students in college often state that they have boring or entertaining classes throughout their college experience. Although students take different classes and are in different faculties, there is always a common factor between classes that are boring. These boring classes often affect student’s academic performances in their respective specific classes. It is natural to assume that students are at fault for their poor academic performances, and not the class that theyRead MoreThe Effects of Social Factors in the Academic Performance of the Bbte Students College of Education1556 Words   |  7 PagesOF THE PHILIPPINES COLLEGE OF EDUCATION STA. MESA, MANILA THE EFFECT OF THE SOCIAL FACTORS ON THE ACADEMIC PERFORMANCE OF THE SELECTED STUDENTS IN THE BACHELOR IN BUSINESS TEACHER EDUCATION OF THE COLLEGE OF EDUCATION, POLYTECHNIC UNIVERSITY OF THE PHILIPPINES SBUMITTED BY: FLORENTINO, MARJORIE S. BENLOT, ZENNY T. FIESTADA, NATALIE JANE F. BBTE III-3D SUBMITTED TO: DR. CAROLINE SUMANDE I. INTRODUCTION In entering a new environment like universities and colleges, students tend to be joiningRead MoreFactors Affect the Academic Performance of Selected Working Student772 Words   |  4 PagesStudy Student jobs have become a sort of trend among students around the world, who want to work while they are studying. In short, the term that suits this trend is Earn and Learn policy. Other reason why student jobs are popular among students is they help to cope up with the constant increase in tuition fees, and a way to afford further educations. The problem has been developed with the question as to how the corresponding workloads and required working hours of working students affect theirRead MoreCollege Students Minds Are Getting Enough Sleep1618 Words   |  7 Pagesthing on many college students’ minds is getting enough sleep. Many college students may not think sleep is an integral part of life, when in fact many researchers have found how truly important it is. College is a time when students are transitioning into young adulthood, with increasing amounts of personal responsibility (Brown, Soper, Buboltz , 2001). This increase in responsibility, that at one point didn’t exist because of familial support, can lead to an interference in student sleep patternsRead MoreCollege Students and Stress1649 Words   |  7 PagesCollege and Stress There are numerous stress factors college students encounter while striving to complete their educational goals. Their grades may be affected by daily life situation stressors that accumulate throughout the semester. Students’ financial needs, lack of social support, family drama, and other various circumstances can all mount up to a tremendous amount of stress and may result in poor grades and lack of collected credits. In fact, stress continues to be a constant issue in people’s

Wednesday, January 1, 2020

During The Enlightenment Period, An Italian Social...

During the Enlightenment period, an Italian social philosopher named Cesare Beccaria became known for his idea of classical criminology. Classical criminology is the idea that criminals choose to commit the crimes and it can simply be controlled by punishment. This theory had several ideas: 1.) people have the free will to choose to become a criminal in order to meet their needs, 2.) they will not choose to commit the crime if they feel the punishment is not worth it, and 3.) in order to decrease the crime rate, the punishment must be able to convince the criminals that it is not worth it. Throughout the movie, Blood In Blood Out, the main characters struggle throughout their life that is filled with crime and violence. Miklo, who is†¦show more content†¦This is an ongoing problem with Miklo; he wants to fit in with a gang, weighs out the pros and cons and then decides to risk the punishment in order to fit in. Paco is different; he eventually wants to make everything better. At first, he makes poor decisions, but once he realized he was about to go to prison, he realized that the punishment is not worth it, so he chooses to join the military. After his injury, Cruz becomes a heroin addict in order to reduce the pain in his back. He made the decision that the heroin was worth it if it managed to reduce the pain. However, this resulted in the death of his brother and his family disowning him. Social Learning Theory: The social learning theory is the idea that observing other s social interactions will shape the person s behaviors. These observations can be from watching someone who is really close to you or can simply be from the media, which controls everyday life. Albert Bandura was one of the theorists who brought about this idea with his Bobo doll experiment. In this experiment, he would study the children s behavior after they watched an adult act violently towards the Bobo doll. In the end, these children would observe these adults and would then mimic their actions in violently attacking the doll. This became the basic idea of the socialShow MoreRelatedThe Enlightenment And The Enlightenment During The Scientific Revolution1686 Words   |  7 Pagesmotto of the Enlightenment,† (Kant). The Enlightenment consisted of the ideas of nature, reason, progress, and optimism. Sir Isaac Newton, a scientist during the Scientific Revolution, greatly influenced the Enlightenment due to his stan ce on natural law. The idea of a social contract, where the power to govern came from the consent of the governed, was a major force during this time period. Adam Smith, a physiocrat from Great Britain, supported the idea of laissez-faire economics. During this timeRead MoreComparison of the Renaissance and Enlightenment.3470 Words   |  14 Pagescivilization. The age of the Renaissance is believed to elapse over a period of about two centuries, approximately from 1350 to 1550. Above all, the Renaissance was a recovery from the Middle Ages and all the disasters associated with it: the Black Death, economic, political and social crises. For the intellectuals, it was a period of recovery from the Dark Ages; a period, which was called so due to its lack of classical culture. First Italian and then intellectuals of the rest of Europe became increasinglyRead MoreThe Green Bird, By Carlo Gozzi1824 Words   |  8 PagesThe eighteenth century marked a period of renewal within Italy. This transition saw the acceptance of new philosophies that were rampant throughout most of Europe (Yawney 2). The Age of Enlightenment, as it has come to be known, brought upon changes within the realms of economic, social, and religious affairs. However, amidst any form of radical change come those who do not attest to it. In his fable, The Green Bird, Venetian dramatist Carlo Gozzi incorporates subject matter that attacks notRead MoreEssay on The Scientific Revolution and The Enlightenment1731 Words   |  7 PagesScientific philosophers such as Galileo and Descartes threw out the old teachings of the church and challenged them with new ways of thinking. These men sought to prove that rational thought could prove the existence of God. They also challenged that it was an u nderstanding of a series of rational thoughts, not faith, would bring understanding of how the world worked. Traditional ways of thinking were ultimately challenged by logical and sensible rationale. Galileo Galilei was an Italian philosopherRead MoreThe Church: The Guardian of Culture in the Middle Ages1135 Words   |  5 Pageslands and reduce the influence of the nobility and the Church. Their power, however, was dependent on their subjects in the economic system of feudalism, which defined power relations. A lord would lend a fiefdom to a vassal, which thus created a social relationship in that the vassal owed service and the lord owed protection. The kings delegated hereditary lands to the nobles who administered them from their well-fortified castles, which simultaneously separated them from the people they ruledRead MoreCauses Of Success Of Renaissance And Western Europe2108 Words   |  9 Pagesthat time that still acts as a transition of the world from being an underdeveloped place to a place of enlightenment and knowledge. The developments made during the Renaissance in political, cultural, social, artistic, and educational arenas laid the groundwork for modern da y technological and social developments. World dynamics shifted very swiftly from the Middle Ages to the age of enlightenment. People started realizing the worth of developing intellectually which is why the whole of western EuropeRead MoreThe Eight Wars Of Religion1587 Words   |  7 Pagesreaction to the Medieval Roman Catholic doctrine and practices. After a procession of European religious wars in the 16th and 17th centuries, and especially in the 19th century, it spread throughout the world. Wherever Protestantism arose, it altered the social, economic, political, and cultural life of the area The wars would end with the Edict of Nantes an edict that ingrained a limited tenacity. Frances struggle with religious turmoil between Catholics and Protestants was an ongoing crisis, however, theRead MoreThe Eight Wars Of Religion1587 Words   |  7 Pagesreaction to the Medieval Roman Catholic doctrine and practices. After a procession of European religious wars in the 16th and 17th centuries, and especially in the 19th century, it spread throughout the world. Wherever Protestantism arose, it altered the social, economic, political, and cultural life of the area The wars would end with the Edict of Nantes an edict that ingrained a limited tenacity. Frances struggle with religious turmoil between Catholics and Protestants was an ongoing crisis, however, theRead MoreInfluences of the Romantic Period1575 Words   |  7 PagesInfluences on the Romantic Period Romanticism spawned in the late 18th century and flourished in the early and mid-19th century. Romanticism emphasized the irrational, the imaginative, the personal, the spontaneous, the emotional, the visionary, the transcendental, and the individual. Romanticism is often viewed as a rejection of the ideologies of Classicism and Neoclassicisms, namely calm, order, harmony, idealization, rationality and balance. Some characteristics of Romanticism include: emotion