Thursday, December 26, 2019

Violent Games An Addictive Product - 873 Words

In 2014 there was a popular game named Flappy Birds this was created by Dong Ngugen. This game generated  £50,000 per day, however this game was removed down as people were addicted to the game. Dong Nguyen said, I can t take it anymore my life is not as comfortable as before, and I am losing my sleep over this game. Not only did this affect Dong Nguyen but other people as it caused serious addition and serious incidents occurred. As a result from this game a 17 years old boy stabbed his brother 17 times in the chest because he had a higher score. Therefore, action had to be taken and the game was removed. The developer said But it happened to become an addictive product. I think it has become a problem. To solve that problem, it s†¦show more content†¦As a result of playing games it can lead to children or adults getting restless and irritated in the long term. However, aggression is more common in boys age 12-15 but this decreases by age. Children are affected more with aggressive behaviour and feel the urge to play digital games. This is due to their brains still developing. According to research shown in the article of Applied Development Psychology, violent gaming also has an influence on brain development. As a result of violent games causing the individual to become more aggressive, study has shown that the heart rate is affected in boys aged between 12-15. Researchers from Stockholm University, Uppsala University and Karolinska Institute in Sweden have worked together with this study. In this study several boys aged 12-15 were asked to play two types of digital games in the evening to determine whether violent games has an impact on the heart rate and sleep of children. The outcome of this study was that the heart rate consistency was a concern when children played violent games compared to non-violent games. However the children who played violent games before sleeping felt they had not slept well compared to non-violent games. Lack of communication in families is a serious problem and this is because children are isolating themselves in their rooms playing digital games and not

Wednesday, December 18, 2019

Essay about Film Analysis Scarface vs. The Departed

The gangster or mob film genre has captivated audiences for nearly one hundred years, dating back to the silent film era. Introduced through films such as The Musketeers of Pig Alley (1912) and Underworld (1927), the genre has become increasingly complex in its development, evidenced by the sophisticated narratives and advanced cinematographic techniques of more recent films such as Road to Perdition (2002) and The Departed (2006). This paper will serve to analyze only two of these brilliant works, and will do so through a compare and contrast format. Howard Hawks’s Scarface: The Shame of the Nation (1932) focuses on gang warfare and police intervention during a power struggle for Prohibition-era Chicago. This pre-Hays Code gangster film†¦show more content†¦Martin Scorsese effectively uses a complex twist of plot in which the narrative of the main antagonist of the film, Staff Sergeant Colin Sullivan (Matt Damon), is paralleled and intertwined with that of an opposin g character, William Costigan Jr. (Leonardo DiCaprio). Colin Sullivan, raised in a poor Irish neighborhood of South Boston and trained to become a mole for Irish mobster Frank Costello (Jack Nicholson) after his acceptance into the Massachusetts State Police, not only must pretend to flush out the suspected mole on the force (himself), he must also find the opposing infiltrator (Costigan Jr.) which the State Police have planted in Costello’s crew. The level of complexity that arises from this scenario is unprecedented in the genre and conclusively demonstrates the development of this type of film from its introduction to the present day. Although the differences in overall plot of these films may vary greatly on a macro scale, The Departed is hauntingly reminiscent of Scarface when analyzed with a higher level of detail. First of all, the name of the reigning mob boss who controlled the illegal alcohol trade that is murdered by antagonist Tony Camonte (Paul Muni) in the openi ng scene of Scarface is named Big Louis Costillo. This name is strikingly similar to that of Frank Costello, the Irish mob boss

Tuesday, December 10, 2019

Cyber Security Challenge on Online Shopping-Samples for Students

Question: Discuss about the Cyber Security Challenge on Online Shopping. Answer: Introduction The aim of this report is to enhance awareness on the cyber security while doing online shopping and making transactions or paying for any product. One of the popular shopping portals of UK has been chosen in this project to compare its cyber security system and comparison has been done by ten peer-reviewed journals based on the cyber security awareness on online shopping. Internet has become an integral part of the lives of citizens of UK, online shopping is attracting various internet users because of their easy and fast activity and responses on the product an individual want to buy. This has increase the probability of more cyber crime cases related to the finance and money transaction. This report emphases on the techniques or ways by which an individual come over such cyber crime issues with the reference of many experienced writer and their peer-reviewed journals. ASOS Within its slogan discover fashion online ASOS is one of the leading and favourite online portals for the citizens of United Kingdom (UK). ASOS sells cutting-edge fashion and offer varieties of products related to fashion which is making ASOS.com a hub of thriving fashion community. ASOS sell more than 80,000 branded products including its own-brand products to mobile and web users. It has expanded market in UK, US, China, Europe and many other countries in the world(ASOS.com, 2017). The mission of ASOS is to become the worlds number-one online shopping destination for fashion-loving 20-something. It has more than 21 million followers in the social media platforms who engaging with the organization every day. Literature Review It is the responsibility of the development team of an organization doing online business to be reactive and proactive towards the concern of security threats in online shopping and e-commerce where as shoppers should be vigilant while buying any online product (Damodaran Helminen, 2016). According to Clarke, Thompson and Birkin (2015) E-commerce is growing in a very rapid manner due to the options of choosing wide varieties of products and many technologies which are new and innovative are being involved in the proliferation of e-commerce. An individual of UK should read and implement the guidelines about securing networks and systems available for securing online transaction during shopping online for any product (Clarke, Thompson Birkin, 2015). They have proposed latest evidence of consumption patterns in the UK population by various relative graphs and pictured how fast online shopping is spreading in the UK economy. Iqbal and Hunjra (2012) defined e-commerce which is completely same process as online shopping and stated that online shopping is a part of e-commerce. They have analyzed and compared market status and analysis of different developing countries including UK based on factual data. It was concluded in the paper that there is the need to increase expertise for the improvement of IT security among the organization and make databases more secured (Iqbal Hujra, 2012). Reviewing the annual report of ASOS, various ups can be seen as they have strengthened their dedication through discreet IT security team (ASOS, 2017). This emphases on mitigating both internal and external data and IT security threats by increasing capability of team by involving expert and experienced IT members. Relating this context a paper was written by Amer et al., (2013) which focus on the increment of online shopping practice by internet users and relative cyber security threats raised due to practicing online shopping for buying any product. This paper involved e-commerce, online shopper to make the topic much clear. Paper has reviewed habits of online shopping in UAE and identifies the gap. Paper implemented that majority of the population is not securing their network safely or there is very less awareness about the cyber security among the population. For this threat ASOS has made new improvement in the system which was stated in the annual report was that, their controlling and processing within the website was being regularly checked and enhanced to ensure the data of customer and their information are appropriate and complies with applicable laws and expectations of the customer. Amer et al., (2013) analyzes the existing policies and legal rules for the online shopping and also proposed new policies that should be implemented in the system to minimize threats of cyber crime. Rahim et al., (2015) discussed that as cyber security is not a new topic thus various journal and researchers have already wrote various article related to this topic. This helps them to identify different and new techniques to make approaches in improving the cyber security. In this article youngsters were not the main area of discussion whereas whole group was focused and aimed at combating identity theft of any user (Rahim et al., 2015). Comparing annual report of ASOS it was stated that large investments have been made in enhancing the security system for the transactions using credit card with advanced encryption and regular testing of those encryption and to prevent any type of un-authorized access. New alert systems have also been implanted to alert if any un-authorized access is being attempted on the website. As described in the article online apparel retailing: roles of e-shopping quality and experiential e-shopping motives, Online shopping is getting matured as the time passes and growth is slowing bringing a competitive environment for the retailers in the market. Ha and Stoel (2012) stated that in particular industries or organization observes call for better approaches of understanding of the effects of features of online shopping quality for consumer satisfaction and related securities while taking characteristics and information of the consumer in consideration. Writers does not reach to any conclusion but based on the evidences proposed in the article it can be concluded that awareness about cyber security is the need of the time, to improve the relation between the customers and retailers in order to set that mind towards good behaviours relating to online shopping and the retailers (Ha Stoel, 2012). It is the need of the time to protect confidential data and information of an individual regarding the cyber security breaches that held in last few years (Franke Brynielsson, 2014). A literature review found on Cyber situational awareness in which a review on cyber situational awareness have been proposed which was based on systematic queries relating four leading scientific databases. Franke Brynielsson (2014) had focused on different Cyber issues rising in the world including UK. Paper was full of evidences that this threat has become a serious issue related to the privacy of an individual practicing online shopping. This paper concluded that there are many actions taken and plenty of works were dedicated towards the awareness of cyber situations (Sasse, Bada 2014). They also concluded that various security exercises of different kind, offers particular interest on increasing security of personal information and various cyber situational awareness. Another article found which was relative towards the awareness of cyber security among older and younger adults named Online Shopping Intention in the Context of Data Breach in Online Retail Stores (Chakraborty et al., 2016). This article emphases on the decisions taken based on the hacking events that recently takes place around the world. This paper also builds a research model on the engagement of individuals in e-commerce in context with the security threats and data breach. Various age groups were selected in this article and approaches were made about the threats and how much awareness needed related to the cyber crime and cyber security. Chakraborty et al., (2016) concluded that incorporation of personal actions like monitoring bank account details they have put forward richer understandings on the privacy and security of an individual taking into account online shopping made by them. Sidi et al., (2013) also put forward their thought on this awareness in a paper in which facilities of online shopping and internet banking were concerned topics to deal with in matter of online shopping pointing out their relative consequences and threats. Based on various evidences like graphs and statistics, they have concluded that cyber crime is increasing in rapid manner and greater promotional efforts are needed to increase awareness among each group of people of the community (Sidi et al., 2013). Conclusion Based on the above report it can be concluded that, as number of internet users is increasing with rapid speed because of its easy access and lots of benefits, there are lots of consequences of using internet. Online shopping is the most common activity an individual of UK mostly do when connected to the internet but there may be several threats related to the cyber crime. Each age group of people are using internet for shopping and making payment for the products without having proper awareness about what loss they can suffer. There may be exposing of personal information which may be very sensitive like credit card details and bank account t details which may result in serious loss to the individual. Various peer-reviewed journals have been proposed in the report to emphasis on how much cyber security awareness is important among the citizens of UK in order to protect their personal information and be safe from cyber crime activities References: Amer, F., Abdulrahim, H., Juma, S., Rajan, A. V., Ahamed, J. (2013, December). Shopping online securely in UAE. InCurrent Trends in Information Technology (CTIT), 2013 International Conference on(pp. 153-160). IEEE. ASOS. (2017). Retrieved 12 August 2017, from https://www.asosplc.com/~/media/Files/A/Asos-V2/2016-in-review/financial-review/28-10-2016-ar.pdf ASOS.com. (2017).About Us | ASOS.ASOS. Retrieved 12 August 2017, from https://www.asos.com/about/ Bada, M., Sasse, A. (2014). Cyber Security Awareness Campaigns: Why do they fail to change behaviour?. Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., Rao, H. R. (2016). Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults.Decision Support Systems,83, 47-56. Clarke, G., Thompson, C., Birkin, M. (2015). The emerging geography of e-commerce in British retailing.Regional Studies, Regional Science,2(1), 371-391. Damodaran, D., Helminen, F. (2016). The Impact of Strategy to Real Time Chat Process: A Qualitative Multi-Method Study in the E-commerce Context. Franke, U., Brynielsson, J. (2014). Cyber situational awarenessa systematic review of the literature.Computers Security,46, 18-31. Ha, S., Stoel, L. (2012). Online apparel retailing: roles of e-shopping quality and experiential e-shopping motives.Journal of Service Management,23(2), 197-215. Iqbal, S., Hunjra, A. I. (2012). Consumer intention to shop online: B2C E-commerce in developing countries.Middle East Journal of Scientific Research,12(4), 424-432. Rahim, N. H. A., Hamid, S., Mat Kiah, M. L., Shamshirband, S., Furnell, S. (2015). A systematic review of approaches to assessing cybersecurity awareness.Kybernetes,44(4), 606-622. SIDI, F., JABAR, M. A., MUSTAPHA, A., SANI, N. F., ISHAK, I., SUPIAN, S. R. (2013). MEASURING COMPUTER SECURITY AWARENESS ON INTERNET BANKING AND SHOPPING FOR INTERNET USERS.Journal of Theoretical Applied Information Technology,53(2).

Monday, December 2, 2019

Thailand Essays (775 words) - Provinces Of Thailand,

Thailand Thailand was Siam for most of its history. It is unique among southeast countries because it was never colonized by Europe. This phenomena affects the very nature of the land and its people to this day. The Thais call their country "Prathet Thai," which can be translated as "Land of the Free." Thai people came from China's Pamir Plateau around the 10th century A.D. because of the agricultural potential in the region. Modernization of Thailand began in the 19th century under King Mongkut and his son, Chulalongkorn. He ended slavery and exposed the nation to Western concepts and technology. The exposure lead to a revolution in 1932, and the absolute monarchy was replaced. Siam became Thailand in 1939. For many years there was continual conflict between military and civil forces for control of the country. In 1988 there was a democratic transfer of power, and 1992 saw a constitutional reform which stated that no military member could serve as the Prime Minister. The democratic transfer of power was a smooth one. (Exergy). Today Thailand is a constitutional monarchy. The king is the chief of state but has few executive responsibilities. King Bhumibol Adulyadej has been king for 50 years and is very respected. The prime minister, currently Chuan Leekpai, heads the government. The legislative National Assembly consists of two houses: a 270-member Senate, whose members are appointed by the king, and a 360-seat House of Representatives, whose members are directly elected. The judicial branch consists of three court levels, of which the highest is the Supreme or Sarndika. All over the age of 18 are able to vote. In villages, local chiefs are elected by the people. (1,5). Thailand is located in Southeastern Asia, bordering the Andaman Sea and the Gulf of Thailand, southeast of Burma. It borders Burma, Laos, Cambodia, and Malaysia. Thailand has a tropical climate characterized by three seasons. From May to October the southwest monsoon brings warm, heavy rain. From November to February during the northeast monsoon the weather is dry and cool. The hot season, from March to May is characterized by high temperatures, humidity, and an absence of rain. (8) Topographically Thailand can be divided into four regions. The North is a mountainous region consisting of natural forests, ridges and deep, narrow, alluvial valleys. The Central region, the basin of the Chao Phraya River, is a lush, fertile valley. It is the richest and most extensive rice-producing area in the country and has often been called the "Rice Bowl of Asia." Bangkok, the capital and most populated city, is located here. The Northeast, or the Korat Plateau, is an arid region characterized by a rolling surface and undulating hills. Harsh climactic conditions often result in this region being subjected to floods and droughts. The South is a hilly to mountainous area with thick virgin forests and rich deposits of minerals and ores. This region is the center for the production of rubber and the cultivation of other tropical crops. Thailand's minerals and resources consist of the following: tin, tungsten, timber, rubber, natural gas, lead, tantalum, gypsum, lignite, fluorite, and fish. (9) Local transportation in Thailand are usually by bus or taxi. While most people do not have cars, greater ownership has significantly increased urban traffic problems. (Traffic moves on the left side of the road.) Railways 4,623 total km Highways 56,903 total km 52,806 paved km 4,097 unpaved km Canals are often used for transportation in rural and some urban areas. The Chao Phraya River serves as the most important waterway for Bangkok. Merchant and commuter traffic on this river is common. There are 3,999 km of principal waterways and numerous minor waterways navigable by shallow-draft native craft. Ports and harbors are in Bangkok, Laem Chabang, Pattani, Sattahip, Si Racha, and Songkhla. There are about 40 international airlines with 288 flights in and out of Bangkok's Don Muang International Airport per day. International flights are now available to provincial centers such as Chiang Mai, Phuket and Had Yai. Domestic air services also connect Bangkok with the Kingdom's provincial cities. Airports 100 total 86 paved runways 14 unpaved runways Heliports 2 total The government communications system is well developed, and the public telephone system is adequate for most needs. There are 1,553,200 telephone sets in use. (5,8,9) The most interesting thing Thailand has to offer, though, are its people. Thailand's total population is at 60 million. Other significant information include the following: growth rate 1% birth rate 17 births/1,000 pop. death rate 7.05 deaths/1,000 pop. age breakdown mean 25.6 -14 25% 15-64 69% 65- 6% (8)