Tuesday, January 28, 2020

Impact Of Facebook On Students Academic Performance Commerce Essay

Impact Of Facebook On Students Academic Performance Commerce Essay The use of social Networking sites, such as Twitter, Facebook, Likendin, Orkut etc are growing day by day in India. Facebook is one of the popular social networking site among young adults and college students. Further, very few researches have focused on influence of Facebook on students Academic performance in India. Through this research, we have tried to throw a light on the relationship between use of Facebook, a popular online social Networking site students academic performance. The study will be undertaken to know the frequency of usage of face book. Also, the study will try to find out the relation between time spent for use of facebook and time for study .The study will focus to know the most preferred social networking site among students and also to know the impact by the ownership of GPRS phones and use of facebook. For this research, descriptive research design will be used. The sample size will be 300 Students of Ahmadabad. Structure questionnaire developed to measure influence of Facebook on college students Academic Performance with respect to Ahmedabad. 1.0 Introduction Socializing via the Internet has become an increasingly important part of young adult life. Relative to the general population, adolescents and young adults are the heaviest Internet users.SNS are the latest communication tool for interaction with people in their networks Social networking sites can be defined as an online platform which builds and reflects the networking among people and builds relationship among them. People share their interests, activities each other through such sites. The most famous social networking sites in India are Orkut, facebook, LinkedIn, Ibibo, Twitter.One such website is Facebook, whose founder was Mark Zuckerberg along with his roommates and fellow students Eduardo Saverin Dustin Moskovitz and Chris Hughes. The website was launched in February and privately owned by Facebook Inc. It was ranked as the most used social networking service worldwide by a January 2009 compete.com study. Facebook also consists of individual profile, his/her social links, list of personal interests, contact information, personal information, photos and various other things. Through such sites, users can communicate and share with friends various activities and also join groups of their interests, like pages, advertise product/service. It also offers privacy settings wherein an individual can see only the specific parts of profile. Users can also control the information viewed by others through their privacy settings. Such websites generate huge revenue by advertising and posting banner ads. Asia stands at second position among the facebook users in the world having 183.9 millions of users having 4.7% penetration level. Facebook is very popular social networking site among the college students. Several researches have examined the effect of social media on the academic performance of the students Through this research, we have focused on one of the social networking site i.e facebook and tried to find out the influence of facebook on academicperformance of the students. 2.0 Literature Review In the paper entitled The influence of social networking sites on students academic performance in Malaysia by Adam Mahamat Helou and Nor Za irah Ab. Rahim, they tried to study the students perceptions on the use of social networking sites and its influence on their academic performance.They found most of the respondents do feel that the SNSs have more positive impact on their academic perfor mance due to its use for various academic activities such as communicating with the faculty and university authority, communicating with lecturers and supervisors, making academic discussions with classmates and chatting with friends in respect to topics o f educational interest Nicola Cavalli Et al. in his paper Facebook influence on university students media habits: qualitative results from a field research found that nearly half of them were unfamiliar with facebook site and contrary during 2009 all of the respondents were aware and about 59% of them use it regularly. In the paper Effects of social network on students performance: A web-based forum study in Taiwan the researcher investigated the effects of social networks on the performance of students online education. They found that students who are more active on facebook have positive effect on their academic performance. In a study of Lessons from Facebook: The Effect of Social Network Sites on College Students Social Capital by Sebasti  n Valenzuela2, and Kerk F. Kee4 University of Texas at Austin they examined that there exists moderate relation between intensity of facebook usage and life satisfaction, social trust, civic participation and political engagement of students. In the paper The relationship between facebook usage and academic performance A study at Ohio state University by Aryn Karpinski and Adam Duberstein (Ohio Dominican University) found that facebook usage was associated with lower GPAs, and less time studying. Those who use facebook tended to have lower GPAs than those who did not, and it appears from the slew of articles written about it, that within the group that used facebook that more usage was associated with lower GPAs and less time studying. A study on The Benefits of Facebook Friends: Social Capital and College Students Use of Online Social Network Sites by Nicole B. Ellison,Charles Steinfield and Cliff Lampe examines the relationship between use of Facebook, a popular online socialnetwork site, and the formation and maintenance of social capital.The study suggested a strong association between use of Facebook and the three types of social capital, with the strongest relationship being to bridging social capital. In a research paper entitled Lessons from Facebook: The Effect of Social Network Sites on College Students Social Capital by Sebastià ¡n Valenzuela, Namsu Park, and Kerk F. Kee at University of Texas at Austin examines if Facebook, is one of the most popular social network sites among young adults in the U.S. 3.0 Objectives To study How much time students actively spent on face book. To know the most preferred social networking site among students To know the impact by the ownership of GPRS phones and use of facebook. To study association between the use of facebook and academic performance. 4.0 Research Methodology A descriptive research was used for study Impact of Facebook on studentsacademic performance. A survey approach was chosen to gather information from students of Ahmedabad. Non-probability sampling technique or convenience sampling was used. The structured questionnaire was developed and administered to 100 respondents. Before finalizing questionnaire opinion of expert panel was taken and it was followed by pilot survey of 15 students . Data and information gathered through questionnaire were analyzed using SPSS Software. Various statistical tests like chi -square and fisher exact test were performed to study Impact of Facebook on studentsacademic performance. 5.0 Hypothesis H1: There is significant association in academic performance among facebook users with different frequency H2: There is significant association for ownership of GPRS Phone and use of facebook. 6.0 Analysis and Interpretation 6.1 Most preferred social networking sites SNS Responses Facebook 107(40.1%) LinkedIn 5(1.9%) Twitter 13(4.9%) Orkut 42(15.7%) YouTube 41(15.4%) Google+ 59(22.1%) Total 267(100%) Table 1 To study most preferred sites among students we have asked multiple choice questions to respondents what is your most preferred social networking site. Table 1 shows that 40.1% respondent preferred face book ,Google+ is followed by facebook . LinkedIn and twitter are not preferred by students of ahmedabad. 6.2 Time spent on Facebook Table 2 Time spent on Facebook 30 min. to 1Hr 1 hr to 2 hr >2 hr Total Day 22 21 7 9 59 Week 16 11 5 3 35 Fortnight 1 0 1 0 2 Month 4 3 2 1 10 Total 43 35 15 13 106 Table 2 Table 2 show the time spent by students on facebook , it reported that students who used facebook generally the logged In several time or once in a day and spent time 1 hour or less than that mostly. Very few students log in on facebook fortnightly or monthly. So we can say that students use facebook frequently. 6.3 Purpose of Facebook Purpose of Facebook Responses Keeping in Touch with Friends 93(29.4%) Looking Photos/Videos 37(11.7%) Playing Games 14(4.4%) Chatting 69(21.8%) Applications 20(6.3%) Messaging 43(13.6%) Communicating with Faculties 21(6.6%) Making Academic discussion Group 19(6%) Table 3 Results of Table 3 shows that 29.4% Students used facebook for keeping touch with friends, 21.8% respondent used facebook for Chatting only 6.6% respondents used facebook for Communicating with faculties and making academic discussion so, majority of students preferred to use face book for keeping touch with friends, chatting and messaging. for Playing games, communicating with faculties and for academic discussion very less students preferred Facebook. 6.4 Hypothesis 1 H1: There is significant association in academic performance among facebook users with different frequency. To check association of academic performance among facebook users with different frequencies chi-square test of association were performed . Time Percentage 30 minutes to 1 hour >1 hour Total 13 11 8 32 >=60 Percentage 9 10 8 27 Total 22 21 16 59 Table 6 Chi-square test Degree of Freedom 3 Level of Significant 5% Calculated Value 0.2915 Table Value 7.8150 From above table we have found that calculated value for chi-square was 0.2915 and table value at 5% level of significant and 3 d.f was 7.8150 which is greater than calculated value so, we found that there is no significant association in academic performance among facebook users with different frequency. 6.5 Hypothesis 2 H2: There is significant association for ownership of GPRS Phone and use of facebook. Some literature studies found that introduction of the Smartphone increased the usage of the facebook. So to find out the relationship between ownership of GPRS supported phone and use of facebook, Fishers exact test was used. Result of the test shown in table below. Value df Asymp. Sig. (2-sided) Exact Sig. (2-sided) Pearson Chi-Square 4.718a 1 .030 Continuity Correctionb 2.558 1 .110 Likelihood Ratio 4.095 1 .043 Fishers Exact Test .062 Linear-by-Linear Association 4.664 1 .031 N of Valid Casesb 87 To study association for ownership of GPRS phone and use of Facebook Fishers exact test was performed. P-value of fishers exact test is 0.062 which is greater than level of significance value (0.05) So, There is no significant association for ownership of GPRS phone and use of Facebook. 6.6 Perception of Facebook To study perception towards facebook whether facebook have any impact on academic performance of students we have asked several questions and asked respondents to rate according to their perception where 1 for strongly agree and 5 for strongly disagree. Statements Mean score Facebook influences my academic performance negatively, because they distract me from my studies. 2.86 Using Facebook requires spending money and are wastage of time and by this way it will affect my academic life. 2.96 Addiction to Facebook is problematic issue that affects my academic life. 2.95 I find it hard concentrating on study knowing that I can play online games and visit the site just by logging into it 3.08 I compare my grades before I become engaged into the Facebook and after I became involved. I see a drop in my academic performance. 3.11 Facebook is personal/ social-canà ¢Ã¢â€š ¬Ã… ¸t be used for education. 3.01 The usage of Facebook is useful in higher educational institutions, because it is an effective communication application. 2.49 Group discussions can be arranged with my classmates using Facebook. 2.42 An appointment can be fixed with my lecturer through Facebook. 2.84 Facebook is helpful in my studies because I can receive announcements from lecturers and faculty. 2.77 Facebook help in my studies because I can discuss my assignments with friends. 2.52 Using Facebook improves my interaction with classmates and lecturers 2.57 I use Facebook to facilitate academic activities and coordinate with friends 2.50 Table 7 Table 7 we found that students have neutral opinion for facebook is personal cant be used for education and because of facebook there academic performance is dropped. Rest of statement students are agree. 7.0 Findings and Conclusion: Among the students, facebook is the most preferred social networking site and google plus is the second preferred site. Maximum students use facebook on daily basis for various purposes like chatting and being in touch with friends. The use of facebook is very less for academic purpose like discussion with faculties. There is no impact on students academic performance due to the use of facebook. Use of GPRS phone has no impact on facebook usage.

Monday, January 20, 2020

capital punishment :: essays research papers

Capital Punishment and Deterrence Abstract Capitol Punishment has been around since the beginning of mankind; eye for an eye and tooth for a tooth. Since then the public have debated for or against capital punishment revolving around issues of deterrence, retribution, discrimination and Irreversibility. Leaving us with the responsibility to analyze the factors surrounding capital punishment. A number of studies have also been done specifically on the deterrent effects of capital punishment. Many officials believes that capital punishment not only prevent s the offender from committing additional crimes but deters others as well. The research of Franklin E. Zimring and Gordon J. Hawkins demonstrated that punishment is an effective deterrent for those who are criminally inclined. Another research has been to examine murder rates in given areas both before and after an execution. Clear and cole(2000) have examined more than 200 studies evaluating the effectiveness of the death penalty in deterring crime. A recent study found that a significant deterrent effect is associated with the increased use of capital punishment since 1977 ( Dezhbakhsh, Rubin and Shepherd, 2001). Michael Radelet and Ronald Akers attempted to determine if having the Death Penalty indeed act as a deterrent on criminal homicide. Is the theory of â€Å"Just Deserts† (Bedau, 1978; Finckenenauer, 1998) in anyway credible? It is also often argued that death is what murderers deserve, making criminals reap what they sow. Most believe that in order to assure deserts, the punishment should always fit the crime. It would require us to rape rapists, torture torturers, and inflict other horrible and degrading punishment on offenders. It would require us to betray traitors and kill multiple murderers again and again, punishments impossible to inflict. ( Bedau 1978). However the principle of just deserts is understood to require that the severity of punishments must be proportional to the gravity of the crime, and that murder being the gravest crime deserves the severest punishment, then the principle is no doubt sound. But it does not compel support for the death penalty. What it does require is that crimes other than murder be punished with terms of imprisonment or other deprivations less severe than those used in the punishment of murder. Criminals no doubt deserve to be punished, and punished with severity appropriate to their culpability and the harm they have caused to the innocent. But severity of punishment has its limits -- imposed both by justice and

Saturday, January 11, 2020

Internet security Essay

Modern technologies have inevitably changed the social, economic, political, and professional aspects of lives across the globe. Such technologies have brought with them reliability and efficiency of communication and execution of electronic financial transactions, evident in E-commerce. According to statistics, electronic financial transactions over the internet have grown by over 70% during the past on decade compared to its prominence during the 1990s (Ena 2008, p. 14). This has been attributed to the fact that small business are increasingly engaging in the competitive business advantage of online marketing for their products, a practice that was earlier dominated by big corporations. Nevertheless, electronic financial transactions over the internet are marked with numerous security threats. Security threats attributed to electronic financial transactions are not only a potential infringement to our right to privacy, but have been a source of economic loss for individuals and institutions. Among these threats, internet fraud, identity theft, and network hacking are the most commonly identified threats to the reliability of internet-based financial transactions (Glaessner, Kellermann, & Mcnevin, 2002). However, the government, security software scientists, and financial institutions have engaged in concerted efforts in promoting security of online financial transactions. In this essay, the author will identify and discuss the different kinds of security threats relevant to financial transactions over the internet, their nature, severity, and the actions that have been taken or can be taken to address the threats and their effectiveness. Case studies of actual security incidents will be given to support the analysis. The problem of security threats on internet-based electronic financial transactions has been identified as a major drawback to sustainable embracement of the competitive advantages brought by this unique technological advancement in the community. Although the actual economic damages caused by internet crime is hard to assert, a consensus between law enforcement and IT scientists has it that over $500 millions are lost in the USA alone due to internet related crimes (Glaessner, Kellermann, & McNevin, 2009). There are numerous security threats to electronic financial transactions over the internet. Identity theft and fraud is a quite common form of security to internet-based funds transfer. Identity theft is the act of using the identity of another person to illegally gain financial advantages (Glaessner, Kellermann, & McNevin, 2009). To achieve this, perpetuators engage in misrepresentation of information to lure their target victims to conduct a financial transaction or provide personable information such as credit card number and password. Numerous research findings have found that the process of acquiring another person’s details is realised through use of e-mail messages (mainly spam) or using fake websites to entice potential victims (Glaessner, Kellermann, & McNevin, 2009). Such information is used in executing activities such as conducting unauthorised emptying of the victim’s account and opening and operating an account in the victims name and failing to settle its associated bills. This leads not only to loss of funds by the victim but also source of debt as financial institution seek account bill charge payments from the victim. According to statistical evidence from the Internet Crime Compliant Center, of the internet crime cases reported in 2008, an estimated 13 percent involved fraud and identity theft (Maclean 2009). Further, the statistics have indicated that such a figure is quite low given that most incidences of internet crime activities go unreported. Still on fraud as a security threat to internet-based financial threats is the problem of non-delivery of goods and services. A quick browse into most websites in the internet, one finds many sites promising lucrative employment or business opportunities. However, most of these engage in dictating for payment of services that are non-existent. FBI reports have it that over 27 percent of internet fraud activities involve payments for non-existent business and employment opportunities (Ena 2008, p. 18). Another form of electronic financial transactions over the internet is the confidentiality threat brought by malicious computer programs. In the recent past, the information technology has witnessed an increase in the number and complexity of malicious computer programs. The most common types of malicious programs are virus and worms, which serve to corrupt executable computer programs (Organization for Economic Co-operation and Development 2007). Through this, the authorised suffer the costs of losing their confidential information saved in the machine or network. Moreover, distributed access denial programs are a major threat to the reliability of online financial transfer. This is because they compromise their ability of an authorised individual to access, transact, and/or monitor their electronic financial accounts. Nevertheless, Trojan horse, backdoors, and rootkits are the main threats to electronic financial transactions over the internet given their capability to gain access into personal accounts without detection by the user. Trojan horse and backdoors computing are the most destructive malicious programs to the security on internet financial accounts and networks. Trojan horse computing for example gives the capability of ensuring continued operation of the system (they prevent attempts to shutdown the system) once it has been installed in the system (Glaessner, Kellermann, & McNevin, 2009). This gives the perpetuators of the crime adequate time to execute practices such as remotely accessing personal information as well as conducting unauthorised electronic financial transfers from their accounts. On the other hand, backdoors computing serves the purpose of compromising the security of an attacked system to enhance easy unauthorised access in the future (Glaessner, Kellermann, & McNevin, 2002). To achieve this, this computing technique allows for the creation of bypass into the attacked networks to compromise its normal authentication requirements. This has been blamed for potential long-term security attacks to electronic financial transactions accounts over the internet. Rootkits are found to protect malicious computer programs from being detected or deleted by the user upon installation into the system, thus allowing for ease corrupting of personal accounts as well as the network connections (Maclean 2009). Thus malicious computer programs are a real threat to internet-based financial transactions. In addition, confidentiality fraud has gained much important as a security threat to electronic financial transactions over the internet. The right to privacy is a fundamental individual right. This is more crucial in financial transaction as it protects sustainable realisation of social and economic development among community members. On the contrary, it is estimated that an estimated 14 percent of internet based crime activities engage in privacy frauds. Such problems are instigated by hacking practices (Khosrowpour 2000, p. 76). Hacking as a threat to individual privacy involves actions that allow the remote access of confidential personal or institutional information. Thus, hacking threatens individual privacy as well as security of online financial transactions. Following the appreciation of the competitive advantage brought by electronic financial transactions over the internet compared to other modes, much concerted efforts have been engaged by the key stakeholders in the field in promoting its security. First, the government as the custodian of the social and economic aspects of its citizens has enacted and enforced numerous laws governing electronic funds transfer. Such include the Electronic Funds Transfer Act of 1978. This act defines numerous rights, responsibilities, and liabilities for participants involved in electronic funds transfer (Ena 2008, p. 9). According the law, the victims of erroneous electronic transactions should communicate with the financial institution not later than sixty day. On the other hand, the financial institutions are bound by the law to investigate and resolve such error within 45 days. In addition, customers should report loss of credit cards to their financial institutions to mitigate potential illegal transactions. To realise this, the Electronic Funds Transfer Act dictates that financial institution should provide its customers with reliable contact number for enhancing communication (Ena 2008, p. 19). Another important law in mitigating security threats on online financial transactions is the Patriotic Act which provides for increased government surveillance on the internet. The purpose of law is to mitigate terrorism activities over the internet such as communication and transfer of fund online for funding terrorism activities. This law gives the law enforcement agents the legal authority to tap internet communication between suspected crime offenders. Such has the implication that these provisions can significantly aid in promoting the war on online transaction security threats. On the other hand, commercial and constitutional laws are quite effective in prohibiting illegal electronic transaction. This is evident from the fact that fraud and identity theft activities remain a criminal act according to the commercial laws of America (Ena 2008, p. 19). Moreover, the right to privacy is sufficiently protected by the provisions of the first amendments to the civil rights bill of the American constitutions. Still, the American government has established the Internet Crime Compliant Center which is responsible for documenting incidences of internet crime activities. This body is a partnership of the FBI and the National White Collar Crime Center. In addition, the organisation works closely with local and international law enforcement agencies in qualifying the dynamic patterns internet crime activities. The security software scientist community on the other side has engaged numerous resources in the designing and production of highly reliable security safeguard software for protecting the authenticity of online financial transaction. It is worthy noting that the process of innovation in the software development has been on the hike over the past one decade (Carey 2001, p. 45). This can be evident from the numerous software outsourcing and direct investment by major software corporations across the globe. Through this, these companies enjoy the competitive advantage of tapping and taming the best brains in the IT field for promoting viable solutions to internet crime activities. Further, internet providers have employed qualified network administrators for preventing, identifying, and reporting incidences of internet related criminal activities. On the other side, financial institutions are marked with the responsibility of ensuring safety of financial transactions and storage for their customers. This is the reason behind effective monitoring practices that have been put in place by these institutions in safeguarding confidential institutional and customer information. It is a common practice for financial institutions to engage in constant changing of their network authentication codes. This serves to complicate the process of internet crime perpetuators gaining unauthorised entry into their networks. Another precaution taken by these institutions is closely monitoring financial transaction and blocking as well as reporting suspicious activities to the relevant authorities for legal actions (Glaessner, Kellermann, & Mcnevin 2009). To achieve this goal, most financial institutions engaged in electronic financial transaction over the internet contract IT professional company to manage their networks. This outsourcing practice brings with it the advantage of speciality, an element that ensures quality and reliable services in promoting online transactions’ security. Nevertheless, the war against electronic financial transactions over the internet security threats remains a major concern to the reliability of this modern funds transfer technology. This has been blamed to the lack of awareness among members of the general public (Khosrowpour 2000, p. 4). True to the later, the process of qualifying the exact economic loss caused by insecurity on internet-based financial transactions is complicated by the fact that only a few cases of the incidences are reported to the relevant authority. Therefore, the war on internet security issues should ensure adequate awareness of the public on how to identify these crimes, prevent them, and/or were to report them. In addition, the global community should seek to establish a unifying law against internet crime as a way of increasing cooperation in the process through elimination of existing bureaucracies. All in all, the problem of electronic financial transactions over the internet security threats remains a major challenge to the reliability of this technological advancement in the society. This is because of the ever changing tactical attacks and innovations employed by internet crime offenders to promote their criminal interests (Carey 2001, p. 102). Some of the mostly cited instruments for promoting insecurity in internet-based financial transaction are malicious computer programs such as Trojan horses, rootkits, and backdoors. This is due to the fact that such programs are capable of hindering from the system user while still compromising the systems authentication provisions, thus allowing for remote access by unauthorised persons. Such call for the government, software scientists, and financial as well as all other stakeholders to invest more resources in the war against internet transactions insecurity. This should put into consideration the need for promoting public awareness on the nature of internet crimes and were to report them as well as viable prevention measures.

Friday, January 3, 2020

Film Review Royale With Cheese - 1340 Words

Jasvinder Singh Prof. Sarah Markgraf Intro to Cinema 5 December 2016 Royale with Cheese Pulp Fiction by Quinton Tarantino falls into the genre of a Gangster film but has elements of other genres as well like Film Noir and Black Comedy. Pulp Fiction has a balance of drama and comedy along with hard to watch scenes like rape, violence, gore and heavy drug use. Tarantino’s style of movie making help make Pulp Fiction the classic it is today. The mise-en-scene, cinematography and other elements of movie, including sound effects and round characters leave us intrigued as well as content with the story structure as well as its ending. The storyline jumps from one storyline to the next and presented in nonchronological order. Tarantino gives us bits and pieces of one story then jumps to another. This style of narrative is unusual. Ultimately, the whole story comes full circle. The opening scene ends where the scene began. We see the conclusion of the robbery and how it connects to the film. In one of the first scenes with Vincent Vega and Jules Winnfield, we see the pair going to collect money for their boss Marcellus. When Jules and Vincent go to the trunk to get their guns, we see them at a low angle. Props and dialog indicates the authority and danger of the two men. We now know they are gangsters. Singh 2 When Vega and Winnfield are in the apartment, Winnfield is standing in front of Brett making small talk. The scene is tense, although he is notShow MoreRelated Pulp Fiction Essays1384 Words   |  6 Pagesaction, time alters and we find ourselves riding down the street with Vincent and Jules John Travolta and Samuel L. Jackson), two hit men on their way to work. As the men travel to work they discuss such worldly things as gourmet food, like the Royale with cheese, and the sexual innuendoes involved when one gives a foot massage. These two intellects do the dirty work for the infamous Marsellus Wallace (Ving Rhames). Due to Wallaces lifestyle, the movie branches off into three separate stories.