Wednesday, July 31, 2019

Animal Kingdom 54

Animal Kingdom Humans have always had an interaction with animals since the beginning of time. They hunted animals for survival, and humans were their prey. However, scientists believe that our ancient relatives â€Å"treated the animals with respect. †(Stetson). So why do we continue to consume and brutally murder, and torture animals for the means of food and clothing when there is this claim to â€Å"love† and â€Å"care for† animals? We should treat all animals with kindness and respect. We should learn to understand them and not treat them as equals.We owe it to animals to show empathy and treat them better to become better people at heart. Animals such as dogs or cats kept as pets hold strong companionships with their owners in our society. Some humans consider animals to be mindless while others don’t, but I believe that they are capable of love, emotion, and thought process. Although, animals do not speak a language we can understand we can certain ly see their intelligence. They’re capable of unconditional love and learning. Humans should have respect to our fellow non human animals.There are so many animals that serve a purpose in this life than just being a pet or for a means of food or entertainment. Dogs, for example are particularly helpful as certified service animals to help the blind. There are stories all over the nation of the selfless acts animals perform to save humans from death or accidents. Hurting poor defenseless animals is just cruel and inhumane and really says a lot about the person’s character that would actually do such a thing. The characteristics of animals are similar to those of humans.They care for their young just like human parents nurture their young. They’re capable of showing affection, happiness, and sadness. So how is that not proof of feeling? Animals have different characteristics just like those similar to humans. But they rely more on animal instinct than anything els e. We as humans rely more on logic. Animal abuse happens all over through various forms such as animal entertainment, animal testing, and hunting. These animals that are being used in the media industry, fights, circuses, and lab testing are treated poorly and these events sometimes even lead to death.What do these actions say about humans? How can we carry out these inhumane acts where animals are being hunted for their fur, tusks, and feathers? People who are associated with trading animals for consumption treat the animals most cruelly. Those individuals care more about their profits than treating animals with respect. â€Å"We know what we see on undercover videos of factory farms and slaughterhouses is wrong. (There are those who will defend a system that allows for occasional animal cruelty, but no one defends the cruelty, itself. )† (Foer 431).I don’t believe that eating meat can actually be a form of animal abuse, but â€Å"We have so internalized this behavio r-â€Å"meat†-eating-that we do not even recognize it as a choice, but rather blindly accept it as a normal and necessary way of life; â€Å"meat† consumption is ‘just the way it is. ’† (Garbato). No one should be forced to stop eating animal â€Å"meat† because it is a choice that we all have. â€Å"Food is not rational. Food is culture, habit, craving and identity. † (Foer 431). The horrific treatments of animals in factories which are later bought for consumption should have stricter regulations.Animals shouldn’t have to suffer and be tortured in so many ways for our essentials. â€Å"100 years ago, animals were considered nothing more than possessions; the properties of humans. No thought was ever given as to how the animals felt. Nothing was done to prevent the suffering of animals. † (Angelicguides). Many animals are still considered possessions, and are dying for a means of meeting the population’s needs for food, entertainment, clothing etc. There has got to be a better way to be more humane towards defenseless animals.Cruelty towards animals reflects our true character and we should strive to be more kind. We should learn from animals and experience the same peace they live in on a daily basis. â€Å"But I might learn something of mindlessness, something of the purity of living in the physical senses and the dignity of living without bias or motive. † (Dillard 351). For that reason we should treat animals with respect and kindness because they can show us the true beauty of life and I think we can learn how to become better people.

Chapter 3: Research Design and Methodology Essay

Chapter 3: Methodology and Design Chapter 3 Research Design and Methodology 3.1 Aims This investigation was concerned generally to see how new technologies come into the everyday lives of different people, and how in turn these people engage with these offerings: the way they are appropriated, including adoption, learning and struggling, but also other strategies for non-adoption, or arms length appropriation. Particular issues include the influence of knowledge, use and resource on ICT appropriation within and between domains of the life-space, addressing both opportunities for crossover and reinforcement of boundaries. More broadly it asked how the appropriation of technologies, such as the PC, the mobile phone and the Internet is proceeding now that certain technical elements and skills have left the domain of the early adopter. The study started from three motivations: 1. To study everyday use and context of technology in its broad rather than narrow definition, covering the whole of the life space. This sought to overcome the limitations of previous research that focuses rather exclusively on the home, or work, or clubs only, and generally neglects crossovers, (except when work comes in to the home in the case of tele-work). It is also sought to explore how the computer and some other technologies cross over between domains, and the supposed convergence of television, computer and telecommunications technologies. 2. A ‘person centred’ approach to living with technology, rather than an ‘artefact centred’ approach. With so many products being developed, rather than follow the uptake of a specific selected technology, which may fail, or succeed, this study looks at what is actually appropriated or engaged with by the respondents in different circumstances during a period of intense technological change. 3. A sociotechnical approach to appropriation, based  on three levels. Rather than being artefact or system centred, the study recognises the socio-cultural nature of innovation in the ‘information society’. It seeks to understand: Chapter 3: Methodology and Design a) The biographies and appropriation of things or artefacts themselves. b) The biography and appropriation and reinvention of proposed uses, programmes and visions that accompany artefacts. Often a particular technology may fail, but it is only a step on the way to adoption and development of a class of services such as home shopping, or the mobile office, computers in education. In an age of multiple competing technologies and service providers, the class of service is another key level of analysis. Reinvention of services and changes in attitude often occurs ahead of technical innovation, but nevertheless can be seen as part of the innovation process. c) A third level is that of issues on the macro scale, but affect individuals and communities – issues such as privacy, reliance on technology, the effect on the news media, on national identity, the idea of progress through technology etc. This includes â€Å"tales of technological utopianism† (Kling and S., 1988) and dystopianism, as well as more concrete issues such as copyright. These may be harder to grasp, but they are central to the idea of the information society, are the subject of extensive academic business and policy work, and are debates that are accessible to everyone. They are also represented by particular products – such as government legislation, which is in its turn ‘consumed’ in its own way. 3.1.1 Research Questions From these general aims, a number of specific research questions and issues emerged and were further refined in the course of developing the research design. The main questions are summarised below: 1. What are the crossovers between work and home and other domains of life in the experience and appropriation of new ICTs? How does technology help break down boundaries, or used to reinforce them? 2. What are the issues that make adoption and use of ICTs difficult, such at they create ambivalence between benefits and problems, and need practical and social resources to cope with them 3. How important is the local social network as resource and factor in the diffusion of technologies, and the appropriation process? (This question was particularly interesting since some of the technologies in question are ‘network’ technologies, and their use depends on having other people to use them with). 4. Why do people not adopt new ICTs that are becoming popular all around them, and what does it mean to be a non-adopter? Can we also ask how people resist technical change? Chapter 3: Methodology and Design These questions throw light on the greater issue of whether we can question an individualistic consumption and ownership model. Two secondary questions that motivated the research, but are not examined in this thesis in details are: 1. How are people experiencing the convergence of technologies, industries etc, and engaging with the industry driven development of new classes of services and uses. Are there types of classes of uses developed by users, or parts of everyday life that are not part of the industry and policy agenda. How are, and may people respond to the key services that are being developed for new technical platforms, and what applications and services appear to be proving most relevant and popular? 2. How do the academic and policy issues around the innovation and appropriation of new ICTs form part of the experience of people not necessarily engaged with them directly? How do these issues become apparent and how do people engage with them? In these questions issues of personal, social, functional and technical ‘context’ is be central. The Social Shaping of Technology perspective suggests a social constructivist perspective on one hand – the way that  technologies, uses, concepts and roles are constructed in context and in ‘use’, but on the other hand stresses the influence of the characteristics of the technology, and in this case information and communications, in shaping the meanings and context. While the meanings of technologies may be shaped by the broader social and cultural context, and discourse, the technology itself has a powerful reverse effect. Most studies of technology and innovations have found the same broad trends in use and adoption of ICTs, with age, gender, money and occupation being important predictors of attitudes, use and rate of adoption. Assumptions are made about the difference between the way men and women, or the young and the old, approach technology, and are addressed by industry. However as ICTs become less ‘technological’, and digital computing technology becomes more and more ubiquitous, I wanted to take a critical Chapter 3: Methodology and Design stance, not looking for stereotypes but trying to see from ‘bottom up’ observation how and why there may be different approaches to new ICT between people, based not only on demographics, but also on a range of other influencing factors. Do changes in employment, education and expectations alongside changes in technology challenge our stereotypes of women and men, or the old and the young? In order to tackle this sort of issue I needed to study a number of different milieu, with a range of people of various ages, occupations, resources, attitudes to technology etc, in order to get a range of different examples to compare and contrast. However the number of people I could interview would be limited by my time and the type of research method I chose. 3.2 Designing the Field Work This research design builds on research done into use of technology and media in the home in the various other spaces using a qualitative research method1. This discussion of the methodology attempts to present some of the specific tools and experiences used to inform the design of the research and the development of an interpretation. 3.2.1 Studying the Process of Adoption and Domestication Some studies of technology are aimed at building up a picture of the use of technologies in a social system at a particular time in a generally stable situation. Others investigate the process of domestication from the moment a technology is adopted. The processes leading up to adoption are generally investigated in hindsight. Diffusion studies tend to look in hindsight at the diffusion of an innovation though a community, following one particular technology. Adoption studies, even those concentrating on word-of-mouth, and personal influence, do not look closely at the actual process of interactions in details, and seldom use qualitative research methods. In my research I wanted to look at natural setting over a period of time, to try and see what natural encounters there were with technologies, why and how these occurred, and how people engaged not only with technologies, but with ideas about them too. I wanted to see how people linked innovations into their existing cultural and technical world, how different technologies were interpreted, and how they were appropriated. I wanted Chapter 3: Methodology and Design to uncover this process and seek to understand in the context of the everyday activities, relationships, background and events of the respondent. In particular, I wanted to see how processes within the social network played a role in the way people encountered and coped with innovations. I developed a method of research, many elements of which I were reinforced by observations from number of researchers from different disciplines. Rogers (Rogers and Shoemaker, 1971) suggests that diffusion research needs to be much more processoriented than is general. It should be qualitative, and follow sequences of events over time, to try and get closer to understanding the actually adoption process. He also suggests that instead of focusing on single innovations, we should see them as part of clusters, with adoption of one linked to others, especially when boundaries between technologies is not very clear. These clusters or complexes need to be investigated in an  evolutionary sequence. He suggests we have to look for how these links are made by potential adopters, and not rely on the classification of experts. In particular, he suggest not falling for the empty vessel fallacy, assuming that potential adopters do already have the knowledge and skills (â€Å"indigenous knowledge systems†) to evaluate and use innovations relevant to their lives. In fact this is the approach of sociology of technology and of consumption – to understand how interpretations of an innovation are arrived at in the culture in which it emerges or is introduced. Developing research out of the consumer research paradigm, Mick and Fournier (Mick and Fournier, 1995) criticise the lack of research that focuses on the on the context of consumption, the pre- and post-adoption aspects of consumption and the role of symbolic. They developed a methodology using phenomenological interviews to give insight into emotional responses, as well as rational explanations given in retrospective interviewing. In particular, they recommend multi-method approaches used in longitudinal inquiries in natural settings (Mick and Fournier, 1998). Moores, who did several details studies of the domestication of radio and satellite TV suggest that future research should look to a range of ICTs, not just media technologies, and look outside the home as well as inside (Moores, 1996). Some have started to do this Chapter 3: Methodology and Design sort of research, such as Frissen and Punie (1998), who study the role of technologies in the lives of busy people.  Haddon, who has conducted much research in this field, makes a number of suggestions about the type of research that needs to be done to understand how people are appropriating the Internet (Haddon and Hartman, 1997). These include what the phenomenon symbolises to different people, including concerns that may make them wary; how they first encounter the Internet, what support they have and any problems they face; how it is perceived and maybe used in relation to other technologies and media; and where it can possibly fit into the time structures of households and individuals. (Haddon and Hartman, 1997). Technologies must not only be put in the context of other technologies and the social context, but in terms of the activities that people do to make them relevant and meaningful. It might be more interesting to go beyond what people actually say about the idea of electronic commerce to consider whether current purchasing practices might favour consumption via the Internet. For example, if a particular household only buys goods and services from offices and shops and pays in cash, not even using a credit card, then arguably they are far removed from electronic commerce over the Internet – such a development would be a major new innovation for them. Whereas for someone already tele-shopping by some means, doing so over the Internet is a variation or extension of what is familiar to them. (Haddon and Hartman, 1997). In studying a long term process of adoption, obviously it is important to find out what people actually do in their everyday activities, to understand how particular products, such as home shopping services could be relevant, and how their adoption may correspond to existing practices, or represent radical changes in activities. In some ways we are trying to find out what people might ‘need’, not in terms of specific solutions, but as â€Å"an invisible phenomena that can be deduced from the structure of everyday life† (Desjeux, Taponier et al., 1997, p.253). 3.2.2 Focusing on the Life-Space and Technology Venkatesh studied the appropriation of computers in the home and suggests that sociotechnical studies have to â€Å"attempt to capture the structure and dynamics of computer adoption and use in the home, by looking at the interaction between the social space in which the family behaviour occurs and the technological space in which technologies are embedded and used.† (Venkatesh, 1996) This is similar to much of the domestication research that tries to understand the structure of the moral economy in the home Chapter 3: Methodology and Design (Silverstone, Hirsch et al., 1992; Silverstone and Hartman, 1998). This involves looking at symbolic and practical structures of the home in terms of time, space, activities, roles, power relations, rules, and use of technologies. Studies of the workplace and computerisation take a similar view, looking to understand not only the formal organisation of work, but also the many informal relationships and activities. The aim is to build a model from the ‘bottom up’ model of â€Å"how the user will derive value from the product or service† (Carey and Elton, 1996, p.41/42), how they will make sense of in light of all their experiences across the life-space2. The intention of this study was to link the various domains of life, to study the ‘moral economy’ of both home and the work place, but also through relationships and activities that cross boundaries. Into this study of the greater life-space I needed to study how technologies arrive in this space and how they are domesticated. To do this I had to look at all the domains of activity and types of activity that made up people’s lives, and could be affected by new ICTs. The following figure gives some of the possible areas of application of technology. Chapter 3: Methodology and Design Chapter 3: Methodology and Design 3.2.3 Gaining Access One problem is to gain access to respondents, and the problems of being able to study them, and gain some familiarity with their world, or share their ‘reality’. Social science methodologies propose many different ways in which this can be achieved, and guidance on the extent to which involvement in a respondent’s life world is necessary to for particular descriptive or analytic ends. Practical problems include getting people to speak to the researcher at all, then getting them to be open, co-operative, and sincere in discussing the aspects of their lives that interest the researcher. More fundamental for research methodology is the reliance on the personal descriptions of the respondents, who may either intentionally conceal or mislead the researcher, or unintentionally mislead them. In studying someone’s life world, it is unlikely that the respondent will be able to comprehensively and thoroughly describe not only their opinions and thoughts, but the details of everyday activities and relationships, and the context in which they conduct them, especially in the space of a relatively short interview. Participant observation is a method that tries to surmount these obstacles, but at the expense of huge effort by the researcher, and can only be carried out in a situation where the researcher can actually live or work within a small group over an extended period of time. Since I intended to look at a number of groups, and across the social network of one particular member, this type of methodology is impossible. What is more, gaining access to the work place or social clubs may be possible, but living in private homes is very difficult. Only a few researchers have tried this (for example, James Lull in order to examine media use (Lull, 1990)). I wanted to study the way people encountered new technologies over a period of months or even years, when in fact key events may only occur very infrequently, so this did not make much sense. Other research methods used in media studies include asking the participants to keep diaries. This again is does not get any closer if especially if salient events occur very infrequently and outside the period of research interaction. I wanted to interview not only users of new technology for whom the technology had a direct personal relevance, but also non-users for whom it did not. I expected that during Chapter 3: Methodology and Design the process of research many of the respondents would be likely to encounter and form opinions on new ICTs and have some engagement with the process of innovation and diffusion, however unwillingly. I had to find a method that would enable me to gain access to people who did not have any interest in the subject of research- new media technologies, and who would be difficult to contact or engage with though a research method based on current users. Especially for these people I had to develop a number of tactics to bring out the discussion of new ICTs, and to build an understanding of each person’s life-world and the way that they encountered and engaged with ICT  innovations. 3.3 Initial Concept of Research Method Instead of selecting a range of established social groups, say a workplace, a club, a nuclear family, a group of friends, a shopping centre, I decided from the outset to use an Informer approach, taking as my point of entry an individual who would to some extent participate in the research as a co-researcher, and provide entry into their social ‘world’. Blumer suggest that the researcher â€Å"seek participants in the sphere of life who are who are acute observers and who are well informed†(Blumer, 1969, p.41). The research design then involved mapping the various other people that these respondents engaged with (both in relation to specific uses of ICTs and more generally) in different domains of their life sphere. I would then conduct interviews with those they work with, their family, their friends, and ask them to report on their experiences of traditional and new media and communication technologies. The Informant, and the others they identified, would not be selected on the basis that they personally use or buy any particular technology – given the symmetry principle that non-use is just as interesting as use. The crucial point is that it is the Informant’s social network and individuals within it that are being studied, not only the key Informants themselves. Whilst the selection of the initial informants would obviously have an important influence over research outcomes, any such shaping by the researcher would then be diffused as the interviews moved out to the networks identified by the Informants. Although such an approach does not Chapter 3: Methodology and Design eliminate the bias inherent in selection of respondents this kind of snowballing method does open up the range of people interviewed. The involvement of the Informant was conceived as being important for practical and theoretical reasons as well – an informant will have to be engaged as a co-researcher who will provide access for the researcher to their social groups. I did not presume that the Informant’s position would  be un-problematic, but anticipated that there would be many difficulties with their relationship to the research, and their role in forming the opinions of their groups. In fact the informant role as a point of passage between social groups is very important – however they are unlikely to be unique points of passage in real life. By interviewing a number of people who shared similar experiences and knew each other, or knew a common contact this method would also enable me to compare the experience and interpretations the respondents had of particular events, shared spaces, relationships and each other. This would make the study satisfy some of the basic demands of an ethnographic study. The aim was to conduct this study on a longitudinal basis – with the idea of repeating the fieldwork after maybe 1 year, by which time I expected that there would be appreciable changes in the discourses and use of technology in society in general and in the groups being studied. Interviews were conducted on a semi-structured basis with the help of a schedule of questions and issues (included in the Appendix). I also explored the use of other devices to prompt responses in a less structured way. Having carried out a ‘dummy run’ with these research instruments on friends and fellow students, I then undertook an initial ‘pilot study’ with the first group of interviewees. Since I was attempting an experimental and rather unstructured research design, which potentially threw up further problems, for example in data analysis, the pilot study provided an important opportunity for assessing and refining the research design. Chapter 3: Methodology and Design 3.3.1 Designing the interviews I was not trying to trace the network of influences, but rather study a group of people who interact at home, work and in other social situations, and compare their different approaches and study how they influence each others, and how the influence of third parties is passed on and ‘negotiated’ in the group. There is no need to do a complete network analysis for this, but in putting together the sample, an informants ego (personal) network is to be the basis for selection. I had to design an interview guide that would investigate the individual’s background, their everyday activities, major and minor events in their lives and their relationships with others. This would include information on activities that are currently the target of the development of ICTs, such as workplace activities, shopping, banking, media, entertainment, communications and information use. I mapped out the range of areas of life that I might have come up in the following Table. I would then focus on the knowledge and use of ICTs and how they were engaging with them. Since I was investigating the adoption process, I also tried to find out how they went about adopting new products, covering information seeking, advice taking, buying, learning etc, for what ever product. This included the importance of different personal relationships in making decisions, finding out information, and forming opinions, compared with reliance on ‘public sources’ such as shops and media. I also asked about broader issues to do with the development of technology and its impact on society, attitudes towards change, and if they had knowledge of in policy issues involved in the ‘information society’. Chapter 3: Methodology and Design The interview was flexible enough to range over issues that the respondents brought up. The main topics covered are in the table. Background, life themes and history Education background Family background Life history Important relationships Resources Everyday activities and recent events Events Life changes Work activities Domestic life 3 Shopping practices Information, Media and Communication Information use and attitude Media use Work communication Friends and family communication ICT use and knowledge ICT use ICT adoption Social Network’s use of ICTs ICT attitudes Engagement with ICTs Knowledge about ICTs Problems with technology Knowledge of implementation of ICTs in government and industry Policy issues on ICTs Table 1 Topics covered in interview schedule 3.3.2 Primary analysis of success of first pilot interviews, and comments for proceeding with concluding research on pilot. The initial respondents were found through an acquaintance, a primary school teacher who agreed to help. She named a colleague and her family as her closest network, whom she shared most things. The details are given in the next chapter. The first set of interviews was conducted in January 1997. All eight interviews were transcribed. The interviews explored the life of the participant – looking at domestic, social, employment, and economic situation, and some life history. It then looked at a number of everyday activities drawn from the original ‘plan for looking’ at new media in everyday life. The interviewing approach started not from technology, but from particular activities, and attitudes towards those activities, the social relations involved, and included instances of specific technologies. The questioning aimed to find out what the important activities, preoccupations and relationships are in the participants’ lives, and their attitudes and practices around them. Then more particular questions were asked about technology in everyday life, based on the earlier remarks of the participant, and introducing new themes. There was not an attempt to get them to define ‘technology’, or Chapter 3: Methodology and Design use my vague definition, but technologies were seen in the context of particular practices, activities and expectations. I was happy with the results of the first interviews. They laid considerable groundwork for asking about the changes in use and expectations about technologies in context over the last year. However I made changes to the question schedule, mostly as a result of how I actually conducted the interviews, but also to reinforce some of the background material. For example, I needed to bring out more details of the relationships between the participants, and ask their opinions on the other’s attitudes to information, technologies and the other activities and interests identified in the research plan. I also asked more about significant others that I was not interviewing, who lay outside the social circle of the principal informant. 3.3.3 Finding and engaging respondents I found the rest of the respondents by focusing on finding principal informants with specific backgrounds that I thought would be interesting in the light of particular interpretations of the technology: these included computer entrepreneurs, artists, senior business managers, students and unemployed teenagers. I also wanted informants who would be interested in the topic and agree to help me persuade their family, colleagues and friends to help me. Through word of mouth and email-lists and a local cybercafe I found three informants who put me in touch with their personal networks. Details of the respondents are given in the next chapter in summary and in the Appendix in much fuller detail. 3.3.4 Conduct of the interviews While I only met most of the respondents for the interviews twice, I spent a considerable amount of time with the Informants. I usually met them once to explain the purpose of the work, and get an idea if they would be interested and willing to help, and also if they could provide me with a network to interview. In particular, I met frequently with the informants in Groups 2 and 3, who were developing very interesting multimedia projects. This included spending the night on the floor of one while visiting his home in Chapter 3: Methodology and Design a snowstorm in the north of Scotland. I visited them where they worked and in their homes for the first and second interviews, and in the case of groups 1and 3, travelled to visit other members of the group with them. I made the interview the focus of a meeting in which I also tried to develop an understanding about how they lived, where they worked, the relationships with others, their interests and engagement with the subject by observation and in conversations around the interview. These conversations were used to make myself feel at home, and to make the respondent realise that I was not coming to grill them about their knowledge of complex technologies, which worried some of them. The conversations also revealed things about their relationships with others in the network, and sometimes raised issues that would not have come out in the rather more formal interview. Coming to the second round of interviews was easier in some respects, probably due to familiarity of the interviewee with me and the process of the interview, and the more relaxed relationship between me and the interviewee However, while some of the respondents had had many experiences with new technologies over the gap, others had had almost none, and could not see the point of the interview. Nonetheless it was important for me to find out why they had not, and find out what they knew about the experiences of others in their network. 3.3.5 Second Stage Empirical Data Collection The Second Interviews focused on current attitudes and use of technology, and investigate experiences and changes in activities, personal situation and  technology awareness since the first interview. It looked for the role of others in these experiences. I attempted to get participants to tell more in-depth stories about their encounters with technologies, and the way these experiences were communicated and shared at the time, and subsequently. I also wanted to try some other interview techniques to enriched the research. This is not quite ‘triangulation’ but a way to expand and deepen the understanding, rather than perform any alternative or cross-checking. For this I included interviewing in groups and using pictures to stimulate talk: Chapter 3: Methodology and Design 1. To discover what each participant knows about and is ignorant of, in relation to technological developments that have been announced by the ‘supply side’ of industry and government, particular functions and uses of new media technology, or issues raised by multimedia use. In the first interviews I waited to the very end to ask about awareness of the Internet, Digital TV etc, and offered short explanations if the participant did not know and wanted me to explain. Otherwise I did not. I wished to pursue a similar course this time, finding out how aware of these developments they are today. I used pictures, and scenarios based on their particular ‘life-worlds’. This way I hoped to discover the depth of knowledge, and interest in developments in multimedia. This will enhance my understanding of what technologies or ideas the participant comes into contact with. 2. To investigate the importance of the close social network, and to use it as a reflexive tool to bring out shared experience, and differences in attitudes and knowledge. To do this I interviewed some of the respondents in pairs or group. This was aimed at bringing out stories that did not come up in our individual talks, and to bring up more details about the relationships. It was also an attempt to give me a closer insight into shared experiences around technologies, uses of technology and attitudes including what views are held in common, what has not been shared by the participants, how they rate different sources of information and influence, and their impressions of future developments in new media technology. 3. To investigate the interaction between different areas of everyday life:  home, work, social, public, the different relationships with people in these different domains, different communications patterns, and the boundaries created between these areas. 4. To investigate changes in multimedia. Originally the research tried to focus on the aspects of everyday life that the supply industry has been predicting would be affected by new technology: e.g. shopping, information, communication at home and work, a range of work practices and activities, education and training, banking, entertainment etc. The questions explored these areas, focusing in Chapter 3: Methodology and Design advance on the issues that were arising from the supply side agenda, but allowing the respondent space to speak about how new technology was coming into their lives, and look for areas where it might do. Over the time of the research, a great many changes have come about in the use of ICTs – often in areas quite banal, and with unforeseen applications and technologies. The second interviews tried to uncover those experiences, and applications that have developed that are outside the main areas of hype. The interviews looked for ways that new technology came to be judged or coped with. I specifically looked for engagement and utility dimension of relationship to information, communications, learning or entertainment systems. The exercise showing the photographs was somewhat successful, although with some people they had no idea about any of the issues involved. The photos mean that it was easier to introduce the subjects. Sometimes it felt like going over old ground. Doing the interviews in groups led to some more information being divulged and the discussion that ensured were interesting as they revealed differences in knowledge, and attitude between those in the groups, be they a couple, a family etc. 3.4 Analysis of Data I interviewed 29 people in 4 groups, with two sets of interviews, with each interview lasting between one and two hours. Computer-aids were used to assist the management and analysis of the mass of interview transcripts. The first job was to try and extract from this material quotes corresponding to all the issues I had raised, and look for new ideas and issues arising directly from the respondents words. The NUDIST package proved extremely helpful with its powerful facilities for cross-referencing excerpts. Crucial to this is the elaboration of a set of reference terms. I developed a rough set of terms in analysing initial interviews from the first group – and subsequently refined these in the light of a larger number of responses. The aim was to balance on the one hand an openness to a wide range of responses, and on the other the need to group these experiences. This enabled a simultaneous investigation of the data from the ‘bottom up’, i.e. from the interviews themselves, and from the ‘top down’, engagement based on Chapter 3: Methodology and Design themes derived from existing theory and research questions. The categories generated and classified are listed in the Appendix. They proved very helpful in analysis, building up a picture of important dimensions of the experience of ICTs. However, as we see in the detailed empirical chapters, it was necessary to generate further more detailed schema for analysing particular aspects and processes in ICT adoption (and nonadoption). The use of computer-tools allowed considerable flexibility in this respect. These nodes were then linked further together in a number of emerging themes relevant to the network, technology, technology problems and attitudes, non-adoption, adoption, knowledge, communication and information use. Searches of the marked texts enabled groups of quotes reflecting different issues to be bought together quickly. However there was still a need to structure this in a simpler and more straight forward way in order to actually write the stories and compare and contrast experiences. 3.5 BEAN (Background, Events, Activities and Network) To structure the resultant data a framework was needed that would focus on particular dimensions of everyday life relevant to understanding the way  that people encounter technologies, think about them, adopt and use them. The approach I chose was to look at the data from four angles: Background or personal history, Events, Activities and the social Network or BEAN to make an easily memorable acronym. This gives a way to assemble the contextual information, and to highlight crossovers and boundaries in the consumption, use and domestication process. It also gives framework for then moving to analysis based on domestication, appropriation, adoption, diffusion, and consumption models. These dimensions are obviously not independent: activities are related to the network, and changes in activities and relationships. Many events could be argued to be particular types of activities that people take part in. Background or Personal History: The respondents all have a history of experiences, of use and adoption of technologies and services that influence their activities and attitudes during the study. The personal history goes beyond this to broader history of relationships, education, and other activities. This dimension includes reflections on the Chapter 3: Methodology and Design life course of the individual or group. It looks at the possibility of personal innovativeness. Events: There are three types of events that influence the adoption and appropriation of innovations: life course events, cyclical events, and one off social events or technological experiences. These events may be periods of considerable length (such as particular project at work, or the learning period for a new innovation). Activities: these describe the spheres of everyday life in which the respondent takes part, such as work, school, family life, community life, and the activities they engage in within those spheres. The use and attitude to information, technologies and communication is examined within the context of these activities. These include work tasks, domestic tasks, leisure activities, media use etc. Activities will reflect, but not be actually linked to the stages of the respondents’ life course. Changes in activities are linked to events. Network: the personal network describes the relationships of the respondent, with whom they share spaces, ideas, decisions, experiences etc. The network is not fixed, but evolves over time. These are now examined in more detail: 3.5.1 Background/Personal History Background and personal history approach looks for the attitudes, experiences, knowledge and motivations of the respondents: Life themes, Motivations, values, attitudes that are broadly continuous during our lives, or through long periods. They include certain ‘psychological’ factors related to ‘innovativeness’, enterpreneurialism, self-centredness etc. outlook on life, attitude towards relationships and community, priorities. At any one time certain themes may be more apparent or easily expressed than at others. They can also develop over time as a result of major events and experiences (e.g. (Douglas and Isherwood, 1979, 1996; Douglas, 1996) and work on lifestyles (Chaney, 1996)). It is not obviously not possible to look at why these exist in detail: where the line between ‘genetic’, early life shaping, and later life changes is, and how we can change ourselves. Past life projects, Past life events: Chapter 3: Methodology and Design The past experiences and events that shape attitudes, knowledge, social network, Knowledge, values, priorities and attitudes: The attitudes and knowledge that are carried forward at each stage of life to the next. Routines, repertoires, habits, beliefs: There is nothing deterministic about the influence of our past on our present, new life projects can draw on this knowledge and experience, but can also be attempts to overcome, change or retreat from aspects of earlier life projects. At the level of technology, media, information and communications there are: ß ß ß ß ß ß Experience of using and seeing technology, personal and vicarious Education in ICT Interest in innovation, new products and services Interest in information about the world Attitudes towards technically mediated or interactive activities. Particular experiences, personal habits and routines, myths and beliefs about ICTs, 3.5.2 Network The personal network is those people we have relationships with in our daily life. It ranges from close and intimate relationships of family friends, through colleagues in ‘public life’ to casual, weak relationships, acquaintances etc. These relationships can be voluntary or obligatory, friendly or hostile, or anywhere in between. Networks associated with life projects e.g. family, work colleagues, friends from other activities Knowledge and resources associated with networks: The network brings with it knowledge and resources, obligations, division of responsibility and resources). Shared myths of social groups in the networks, History of relationships, shared experiences, knowledge of and about those in the network. Symbols with meaning exclusive or special to the network. Cross over of networks. Different networks in our lives can be kept separate or overlap. People have different sorts of networks – strong, close, highly connected, weak and dispersed, radial – an individual is part of several not overlapping networks. Self-perception within network, Relates to our own perception of our place within a network – our status, value, contribution etc. Chapter 3: Methodology and Design Functional and symbolic roles in networks: Responsibilities, status, influence, specialisation, demands. This includes what we do in the network, and how we are respected – the moral and the ‘economic’ roles and the stereotypes and images of others in the networks. At the level of ICTs there are: ß ß ß ß ß People in network who use new technology Those who are trusted and accessible for information and advice Those who are considered examples, opinion leaders Status of technology knowledge and use in a relationship Use of technology in mediating relationships 3.5.3 Activities These are the things we do – they are not always rationally explained by goals, and often emerge from compromises and restrictions, as much as from voluntary choice. Activities include routine ‘everyday’ activities. They include maintain and developing relationships, motivation and goals, actions, consumption, creation and production, communication, and learning. Current life projects The activities that make up and support our life projects i.e. Work status, family status, leisure interests. These life projects are linked closely to life stage. These include all the things we do as part of jobs, studying, maintaining our relationships, managing our home, being a citizen, and a consumer. Childhood Adolescence Leaving home Student Early unemployment 20s Early Family Delayed Single Delayed Family Maturity in work Older children Motherhood Children leaving home Divorce Second Family ‘Empty Nest II’ Early retirement Young elderly Old Elderly Table 2 Possible Life stages Current Goals and motivations: (Why, what) These are specific to life projects and to more general life themes, and are the reasons why we undertake (most of) our activities. Chapter 3: Methodology and Design Priorities and pressures: Limits of time, space, efficiencies sought – we prioritise activities according to pressures and restrictions, often trading off between different demands, projects and motivations. Interactions: Many of our activities are related to our interactions with others: our network Crossover between life projects: Management of boundaries: we have activities aimed at maintaining boundaries between different areas of life, or trying to bridge them. Knowledge associated with activities: Tacit and explicit knowledge related to activities. Myths associated with the activities and the institutions. Knowledge needed to perform activities: At the level of ICTs: ß ß ß ß ß ß ß ß Activities using ICTs Activities where ICTs currently in common use Activities where use of ICTs are currently being innovated Communication circles and patterns Information work – processing information, finding information Education Activities were there is pressure for efficiency improvements Time hungry activities 3.5.4 Events Events are particular sorts of activities that take a short time to achieve and stand out as remarkable against normal activities. They normally involve a change in regular or routine activities and have a significant effect, but can themselves be cyclical or regular as well as unique. Appropriation and domestication process events are very important as they often mark important stages in personalisation, in changing attitudes, in making rules, learning and in changing relationships. Events picked up on in the interviews were those that occurred before or during the period of study. Since this was done by self reporting, only the events that they found significant to the questions (which were varied) were reported. However the questioning was designed to reveal a range of events. Chapter 3: Methodology and Design One class of events I call ‘life events’. I group life events into two categories, major, those that have involve upheaval, and minor, things that may not involve much change, but can be the opportunity or cause of change. Of course there is cross-over, and with hindsight a minor event could be the cause of major change (a new friendship that ends in marriage, or a new interest that leads to a career or major leisure activity). Major life events are events that involve considerable material, relationship and symbolic upheaval. They include marriage, divorce, changing job, major injury, moving house, starting and finishing education, redundancy, entering relationship. How these effect different people is of course a subject for other research, but for my purposes, I see them as important trigger events, and the research shows they can have some considerable effect both in the material acquisition of ICTs. Minor events include minor illness, holidays, buying large items, promotion, making new friends, new activities. Life events: Significant events in life projects – often changing points between one project and a new one. Annual events: Regular practical and symbolic events that are marked by activities of the individual or shared in their group, organisation. Often mark cycles of life, and can be connected to particular life projects. Some may be linked to a subculture, others drawn from more universal culture (public holidays, festivals) Network events: Events that involve the network, these particularly relate to forging or changing relationships. Boundary events: The boundary event initially marks the change from one regime to another, but can also be an event that confirms the boundary when it is challenged. For example, boundaries in relationships, domains in life, the start and end of life projects, the making of rules. Often they are symbolic activities marking other changes (e.g. beating the bounds, initiation rites, and special anniversaries). I also include events that become important in defining boundaries, or for breaking them down: e.g. getting a computer that enables work to be done at home, a decision not to get a computer to keep home and work separate, a family decision to limit TV viewing for children. Appropriation events: Chapter 3: Methodology and Design Related to technology events – but particularly to do with the adoption of new innovations, and important events in the appropriation and integration of them. Technology events: Remarkable events with the use and adoption of technology, maybe a number of small events that are linked together in the mind of the respondent. One of the problems of one-off interviews is to try and understand how people change their minds, and when. One model would be to assume that there are specific events or experiences during which people either gain information, or have to make decisions and analyse and take evaluate that information or knowledge according to their values, circumstances, goals, relationships and resources. However, under this model how ‘large’ or explicit are these events. For some people there may be definite times when decisions or knowledge and attitude formation, affirmation or change occurred. For others there may be a slow accumulation of knowledge, through minor events, or for example, constant use of a technology. Any event may also only be a marker or a crisis point in some underlying situation, something that is the cummulation of chronic problems, or a trigger that tips the balance in favour of adoption. Equally there may be a decision against adoption. A vaguely neutral or negative position may be crystallised by a particular event. Sometimes it is an event from outside (e.g. the arrival of a bill), or an individual deciding that enough is enough. 3.5.5 BEAN and models of consumption and Domestication The analysis was helped by linking the BEAN framework to two other analytic frameworks, the domestication model and the consumption model of Holt (1995). By working with these I was able to derive grid indicating a range of issues to look for in relation to how people used and interpreted ICTs both in use and in the process of domestication. Again, these were used as a guide in the analysis of the data, rather than as boxes to be filled in from to illustrate every possible combination. Chapter 3: Methodology and Design Activities Experience mediated by work, domestic, leisure, social activities Network Experience in context of other people – their influence. Events Context or trigger for adoption shapes experience Personal History Attitudes built over time and experience Integration Integration of ICTs through everyday activities. Meanings through using/doing Integration in a social space (moral economy) Meanings through sharing.? Appropriation at a time of change. Integration work time learning Classification Classification against other specialities in institutions Others to classify oneself with and against in relation to ICTs Play Activities that are shared around ICT use, maintenance, purchase etc The people with whom innovations, adoption, use are shared. Developing relationships around ICTs Bring into contact with new people, obliged to reconsider identity Shared events Personal capacity to appropriate and personalise ICTs and innovations developed through experience (scripts, creativity) Attitudes to others v.v. ICTs developed over time and experiences Experience (Subjective) Table 3 The BEAN approach and. Holt’s consumption model Past experiences of using and adopting innovations and ICTs Chapter 3: Methodology and Design Activities Appropriation Objectification Network Events Personal History Appropriation imposed from outside, or seen as fitting activities of household – from work to media use. Activities enable appropriation (resources, money, knowledge) Object brought into the home and placed relevant to activities intended for: work, play, individual or group use. Discussion, debate within household, and with, networks outside – enrolling expertise, and resources Event for whole household – e.g. moving, or for individual e.g. new job, school. Or regular event, e.g. Christmas. Media event Past experiences of ICTs in the home, and the experiences of individuals appropriating from outside Debate over where it should be placed, in what context, how it can be moved. Who is in control; Who is expert set. Discussions of new acquisition Routines of sharing, Emerging rules of use, disputes over use, sharing, discussion integrated into routines, everyday life. Changing relationships of control, expertise. Tool to challenge or re-enforce. Bringing knowledge, attitudes from outside network in, developing knowledge that is translated out again. Attitudes of those outside. Changing boundaries. Others come into to use†¦ Conflict over changing boundaries The installation event, ceremony, the gift giving event, Previous experience with ICTs of different sorts, Breaking points, rule making points, particular events demanding use, decisions to restrict, change use, upgrade, Attitudes to others v.v. ICTs developed over time and experiences. Preexisting routines how they fit new acquisition, preexisting hierarchies Events: use of ICT for/by people from outside. Particular discussions outside home, experiences outside that are brought in, real or electronic. Willingness to share home experience with outside, pre-existing relationships with outside. Incorporation Integration into the activities in the home, routines of space and time – changes in activities Changing existing routines and activities (e.g. displacement, replacement of activities) Conversion Changing boundary of activities. Use of ICT at home that change outside activities (e.g. work routines) bring activities into the home – e.g. socialising in home, electronic or ‘real’. Reinforcement of boundary. Table 4 The BEAN approach and the domestication model 3.6 Preparative Work and Reflections on the Research Process In preparing the research, and developing an understanding of the process I would be investigating in others, I reflected on my own experience and everyday life, using a number of the tools from the literature and those I was developing myself. As I Chapter 3: Methodology and Design developed the research from the original rather different conception, and noticed a number of issues that would subsequently become important. These tools included keeping a diary of my own social network and contacts, and a diary of my own adoption of the mobile telephone, in the context of the issues raised by the BEAN, Domestication and Consumption models, recording my own subjective reactions and thoughts and learning, the practical aspects of learning and using a mobile phone, particular events, and the reactions of other others over a period of two years (These are given in the Appendix). This gave considerable insights into a personal technology that created ambivalence and crossed over into all domains of life, and into the way I could engage with those I was interviewing, and the sort of issues I would have to investigate. Finally, in parallel to the formal research, I was continually watching the way I saw people using and talking about new ICTs, and asking for stories, which were usually forthcoming in response to finding out what I was investigating. These stories reinforced what I was finding in the interviews, and in many ways pushed the direction of the research. One aspect was constant trade in ICTs between people, gifts, sharing etc. Second was the importance of individuals who were enthusiasts and earlier adopters in their social networks, who provided resources, help and encouragement for others. This was true for groups of experienced users, who needed someone to keep them updated on new technology, and for novices who needed a first step on the ladder. Third were the constant problems that were encountered, and the stress that went along with the benefits of use. A number of events also prompted and encouraged my research. One of these was a major trial in the US of an English au pair accused of murdering a child in her care. At the time of the judgement the judge chose to put the verdict on the Internet. He did this not out because the Justice Department had instigated it as a policy, but because his son had persuaded him it was an good thing to do. This was a very public demonstration of the cross-over of influence between home and work in the adoption of the Internet. Chapter 3: Methodology and Design 1 Interpretative or ‘qualitative’ research, developed in the 20th century based on the ethnographic research of the Chicago school, especially George Herbert Mead. Herbert Blumer, who developed the ideas of Symbolic Interactionalism based on the work Mead suggests â€Å"The task of scientific study is to lift the veils that cover the area of group life that one proposes to study† (Blumer, 1969)p.39. Interpretative research stresses the importance of the individual and intersubjective interpretation in understanding social processes, but also in the actual practice of social science – there is the’ double hermeneutic’ (Giddens 1976) of the researcher interacting and interpreting Mead (1934) in (Prus, 1996)) the social situation that is being studied. The ethnographic method calls for the researcher to put themselves in the shoes of the other person (Berger and Luckmann, 1966), to share the reality of the ‘life-world’ of the other. Al though a theoretical basis is important, the researcher should use ‘inspection’ with a great deal of flexibility to investigate presumptions. The social situation should be approached from different angles and be imaginative, free, flexible, creative. Interpretative research stresses the importance of the individual and intersubjective interpretation in understanding social processes, but also in the actual practice of social science – there is the’ double hermeneutic’ (Giddens 1976) of the researcher interacting and interpreting (Mead (1934) in (Prus, 1996)) the social situation that is being studied. However, what ever the lengths a researcher may go to take the other’s stand point they are inevitably going to interpret the social situation according to a formal and informal logic that they bring to the research process. What a researcher should do therefore is to try and make explicit both to themselves, and to their readers is not only the theoretically imposed interpretative window or frame, but the emotional, personal and contingent influences on their interactions with the those whose liv es that are studying and on the interpretative process. 2 Desjeux et al. (Desjeux, Taponier et al., 1997) suggest four main dimension of investigation of the everyday to investigate the link between the social and the technical : Delegation of responsibility, to machines, to other people in the social network, and to commercial providers; Routines; Planning of activities; Improvisation. 3 Shopping is an area where there is considerable promise for new technology for home shopping, information gathering etc. There are very different types of use of technology in different retail outlets and for different goods, and different goods lend to mail order etc. Mail order is also an established business used by may people, from books and CDs, to clothes, consumer electronics, white goods, almost anything. The mail order market serves different groups. Catalogues that sell a wide range of goods are generally providing a planned credit service for low income purchasers. Other products such as books and music are sold though clubs and mail order because overheads are lower, and they service a regular purchasing habit. They can also provide a greater choice, and operate on lower overheads than high street retailers. There are specialist mail order services for products that are not normally available except in specialist shops, and mail order companies can offer better prices based on lower overheads and economies of scale from a country wide or global market. There are also more and more single range or brand name mail order services from high street retailers and others, for whom mail order is a form of direct marketing. They run services as a complement to high street operations. Mail order and use of direct marketing information resources has been a big area of development in multimedia around mass market e-commerce

Tuesday, July 30, 2019

Jailbreaking

When Apple designs these products, they come with a redesigned firmware that restricts certain capabilities that otherwise the device would be able to do, such as wife mobile hotshots, direct downloading capabilities, and more Insignificant features, like moving screen savers. Along with the understandable, â€Å"deserved† capabilities Jailbreak offers, It also enables the ability for the user to access and download APS, and settings that Apple's firmware protected against due to their Illegal content. Thus the question on the topic Is If jailbreak is the â€Å"right† thing for a user to do with his/her device.Due to the fact hat the user purchases the device outright, they should have the right to do whatever they please with the firmware and device itself even if it enables illegal activities, the user should be able to decide whether or not to obey the law, and the user should have full control of their apple device. When someone purchases any material object, it is the assumption that the buyer has the right to do as he/she pleases with the purchased object, and the situation should not be any different for the ‘Touch, Phone, or Pad, Thus making the process of Jailbreak morally acceptable, as well as legally Just.If a restriction Is put on a person's own property, then the property really Is not owned, which Is okay, If that Is pre-deloused to the buyer so that they know that everything about the purchased object must maintain its original construct. In the case of these Apple products, stipulations were not pre-disclosed to the buyer, and instead Apple attempted to put restrictions on the process of jailbreak after the products were sold, which is morally unacceptable, as well as unfair to the user.When someone goes to the electronics store, or apple vendor to purchase the phone, r one of its cousin devices it is always the situation that the device is purchased outright, even if it is purchased with an attached cell phone contract, the device belongs to the buyer, but for some reason Apple still believes that although they have sold their product outright, they should still be able to control what the purchaser does with the device sold. This idea that Apple has Is completely ludicrous, and to put the situation In perspective, let's change the scenario, being the object purchased, and the business selling.Suppose someone went to a typical car dealership and purchased a brand new rives home in his new car, and starts tinkering with the engine, installing a blower through the hood, and a super charger for the extra speed. If the dealership called the buyer and told him that these modifications aren't allowed by their company, the buyer would be thoroughly confused and upset, for it is policy that once an object is purchased the buyer can do as they please with the object.Although there is a great difference between a car and an phone, the concepts involved with the two of them are essentially the same, when someone buys a car they can tinker, and add on to the icicle as much as they want, and the situation should be no different for any of the Apple products under discussion. The main point that Apple tried to use when trying to make the process of jailbreak illegal was when they stated that the process was in violation of copyright laws because it modifies the boatload they had designed, and have complete ownership of.Unfortunately for Apple, their case was lost in court, and the process of Jailbreak was proved to be legal, an article written about the case took an excerpt from the trial's outcome, writing, â€Å"Federal regulators lifted a cloud of uncertainty when they announced it was lawful to hack or â€Å"Jailbreak† an phone, declaring Monday there was ‘no basis for copyright law to assist Apple in protecting its restrictive business model. â€Å"(wired. Com).After losing their case in court, Apple decided to make a policy for Jailbreaks devices that disavowed any Apple Care (insurance) on the Jailbreaks pods. Apple's main reasoning for the policy they made, is that the modifications to the SO that Jailbreak does causes system errors, and other minor problems to the devices performance, Apple states (when speaking of why Jailbreak should not be permitted), â€Å"Disruption of services: Services such as Visual Biochemical, Youth, Weather, and Stocks have been disrupted or no longer work on the device.Additionally, third-party APS that use the Apple Push Notification Service have had difficulty receiving notifications or received notifications that were intended for a different hacked device. Other push-based services such as Mobile and Exchange have experienced problems synchronizing data with their respective servers. â€Å"(Redmond). Although what Apple states about how Jailbreak an hinder the devices performance, and cause otherwise non-existent problems may be true, it is not Justification to put a limitation on what a user can do to the devic e.Even if Jailbreak made the Apple product completely break without hope for repair, the act of doing it should always be the user's choice. Another aspect to look into when considering if the devices in question should be allowed to be Jailbreaks, is the illegal side of the capabilities Jailbreak offers. It is a known fact that once an phone is Jailbreaks, due to the fact it can connect online ritually anywhere due to the cell service, it can be one of the most devastating tools for a hacker.The significant difference between one of the Apple devices hacking, and a computer hacking, is this difference in internet connection, as well as mobility and concealment. After all, someone sitting outside of a house with a laptop and an encoder attached to the computer would look a lot more conspicuous than a passerby that seems to Just be testing on an phone, when in fact they could be using one of the many wife hacking APS like â€Å"rickrack† to access the files on your amputees, o r in your â€Å"cloud† trying to get social security numbers, credit card electronic storage.The fact that an phone alone could give hackers and identity thieves the Holy Grail they have awaited is a fact that Apple tried to exploit when giving reasons as to why Jailbreak should be illegal. Apple stated, â€Å"Security compromises have been introduced by these modifications that could allow hackers to steal personal information, damage the device, attack the wireless network, or introduce mallard or viruses. † (Redmond).Although every claim Apple made is a act, and there are security risks that come along with the legalization of Jailbreak, it is very obvious once the situation is examined, that if a hacker truly wished to us an Apple device to his/her evil ends, it really would not matter whether or not the process was legal or not for hackers and identity thieves are already doing illegal things, thus even if Jailbreak was â€Å"illegal† they would still do it .Although the negative aspects to Jailbreak are often magnified, there are actually more benefits than risks to the process. When a device is Jailbreaks, its full attention is reached. An entirely new app store is revealed to the user, APS that could not/ would not contract with the Apple app store are available for purchase, and sometimes for free.Along with thousands of new APS, Jailbreak also allows the user to customize the load out (home screen) and dock (bottom toolbar) to their liking, while still being connected to the original Apple app store. In an article about the pros and cons of Jailbreak PC world wrote, â€Å"Acadia and its newer, lighter competitor Icy are the unofficial app stores available only to Jailbreaks. In these tortes, you'll find hundreds of terrific APS that have been rejected from the App Store for providing features that Apple would rather you not have.Examples? Accorder is a camera app that enables video-recording on pre-ASS phones; Pedant allows tethe ring of your 36 connection to your laptop; and Gobble is an app for the Google Voice service. Plus, you can still get free and paid APS from the official App Store, so Jailbreaks get the best of both worlds. â€Å"(popcorn). With this substantial advantage given to Jailbreaks, it is understandable why it is done, and why it is the est. thing to do if the user truly wants complete control of their device without limitation.This reasoning for Jailbreak also proves that malice is not attached to every reason for Jailbreak, the process can, and more often than not is simply done to access APS, and customizations restricted by the app store, and as long as the reasoning is pure and without foul intention Jailbreak is the right thing to do. After every aspect of Jailbreak is examined, the pros and cons, the risks, and legalities, it is more than apparent that the process is morally acceptable to do, as Eng as the Jailbreak is also the owner, or has permission from the owner of the device .The process is also acceptable because of the simple fact that as of today it is legal, despite Apples efforts to make it otherwise. Through the use of the situation between Apple and Jailbreak people can be reminded of the importance of owning anything in life, the responsibility that comes along with the situation, as well as the great satisfaction, for when anything in life is truly owned the only person/ thing that can make the rules is the owner, a situation that is too often taken for granted in today's society.

Monday, July 29, 2019

Ethics Exam 2 Article Example | Topics and Well Written Essays - 2000 words

Ethics Exam 2 - Article Example I begin by defining such basic concepts as good and evil thereby making a decision based on my understanding of the two. As explained, ethics seeks to minimize harm. As such, I often define evil as any action that is likely to cause harm to others. Good, on the other hand, is an action that promises to safeguard the peace, safety and the moral fabric of the society. In analyzing the impacts that a situation or an action may have on the society, I begin by placing myself at the center of the action. This way, I feel the dilemma that one feels before making a decision and understand how any victim of such actions would feel. This way, I make a decision on whether a situation is ethical or not depending on how it affects the people. A situation becomes unethical when it harms or even threatens other members of the society. An ethical action is one that does not injure anyone. An injury in this context implies to both physical and psychological torments (Badiou 67). An abuse, for example, causes a psychological torment to the society. As such, one acts unethically if he or she abuses others in public. The same is the case with a fight, barbaric aggression or even theft since such acts cause physical injuries to the victims and loss of valuables. My thought process considers the social and cultural values. An ethical action preserves the social values while an unethical action violates the values thereby disrupting the social fabric. Moral leadership requires the leader to serve others and in the process lead them towards achieving a particular goal. Moral leaders strive to set perfect examples to their subjects. This way, such leaders persuade and influence the others by making them aspire to achieve the same levels of integrity. Personal integrity is an important feature that enhances the success of a moral leader. Such leaders must prove that they are trustworthy by adhering to the rules that guide their operations at the institution. A

Sunday, July 28, 2019

Financial Systems & Auditing Essay Example | Topics and Well Written Essays - 3000 words

Financial Systems & Auditing - Essay Example Ledger stores information needed for preparation of financial statements and final accounts. Books of original entry, also known as prime entry books where transactions are initially recorded, such books include sales journal, sales returns journals, purchases journal, purchase returns journal, cash book and general journal. Accounting or bookkeeping assumes vital and helpful role by creating the information for giving responses to numerous questions confronted by the users of accounting information. It gives information how great or terrible the budgetary state of the business is which products or activities have been productive (Singhvi & Bodhanwala, 2006:262). Bookkeeping is vital for a business entity because of the following reasons: - iii) As the business continues to grow, there is an expanded volume of business results in a huge number of transactions, and no business person is able to remember everything. With the help of accounting records, there is no need to remember various transactions (Demski, 2007:33). Apart from the cash flow statement the other accounts are always set on an accruals basis. This basis of accounting requires that the non-cash transactions be reflected in the financial statements for the period in which their effects are encountered and not in the one in which cash or money is actually received or paid. The accounts are often prepared on a going concern basis. This implies that the accounts are made on the assumption that the  organization  will continue to operate indefinitely or for the foreseeable future. The business has no intention to curtail their operation significantly. This concept helps a business to get long-term sources of finance or loans. It also shows the financial stability to the shareholders that will affect the prices of stock (Kolitz et al 2009:507). Because of many different ways of applying concepts, each entity must select the approach that gives the most reliable picture of the entity

Saturday, July 27, 2019

Death of a Salesman Essay Example | Topics and Well Written Essays - 1250 words

Death of a Salesman - Essay Example His son is yet to make something constructive about his life. Willy is scolded by Linda because he is being critical and head to the kitchen to get a snack. Whilst in the kitchen, Biff and Happy, his younger brother who was also visiting recalls about their adolescent lives and also debate their fathers behaviors which includes his criticism of Biff not living up to their fathers expectations and his mental degeneration. As their father Willy enters the room angry with them because of not achieving anything in life, Happy and Biff confides in Willy that Biff intends to establish a business preposition the following day in order to appease him (Miller, 2007). The following day, Willy asks his boss for a job transfer whilst his son Biff goes ahead to make his business proposition. Neither of them is successful in their missions. Willy gets devastated and eventually gets fired when the boss orders him that he needs a rest and he is no longer competent to stand for the company. On the ot her hand, his son Biff waits for centuries to have a word with his former employee who turns him down because he cannot remember him. Being frustrated, Biff goes to Charley’s office his neighbor and bumps into Bernard Charley’s son who is a prominent lawyer. Willy, Biff and Happy meet in a restaurant for dinner. Willy does not want to hear any bad reports from Biff. Happy persuades Biff to lie but he goes ahead and explains to his father what actually happened which makes their father very angry. Biff gets frustrates and leaves the restaurant. He gets escorted by his younger brother Happy and some two girls picked up by Happy. Willy is left in the restaurant upset and confused. On their arrival at home, they are confronted angrily by their mother for abandoning Willy, their father. Outside, Willy keeps talking to himself. Biff gets touched and goes outside in order to reconcile with his father Willy. In their discussion, there occurred some arguments making Bill to tel l his father that he is not worth for anything great. In addition to that, he insists that he and his father are simply ordinary. The argument ends when Biff and Willy hugs while shedding tears and telling his father to let go the dreams that are unrealistic and instead accept him the way he is. He declares to his father that he really loves him so much. Instead of listening to what Biff utters to him, Willy acknowledges that his Son Biff has reconciled with him and now satisfied that Biff will pursue businessman as his lifetime career. Intentionally, Willy murders himself by crashing his car. The main reason for the murder is for Billy to utilize the life insurance cash to open up his business. On the contrary, Bill at his father’s funeral claims that he can never become a businessman. His young brother, Happy on the other hand, decides to follow the footsteps of his father. The most significant themes in the play are such as abandonment, the pursuit of an elusive American D ream and betrayal. From the American Dream theme, Willy whole heartedly believes in the American Dream promise. For example, he believes that a personally attractive and well liked man in any business automatically acquires the modern American lifestyle material comfort it offers. Unfortunately, Willy interpretation of the American dream is extremely superficial. This is because; he dislikes Bernard childishly as he perceives him as a nerd. As such, his blinded interpretation of the American Dream makes his psychological mind to rapidly decline when he is

Friday, July 26, 2019

No topic Term Paper Example | Topics and Well Written Essays - 500 words - 1

No topic - Term Paper Example Our hospital provides our patients with 24/7 psychological support. Moreover, there is a perfect opportunity for family members to take part in these meetings and see positive results of our help. In spite of our efforts, there are some complaints from our patients. We clearly realize that they suffer from constant pain and depression and that is why we would like to apologize for making you and your mother worry. We can assure you that we do our best to make our patients feel comfortable in the process of treatment. We can solve this problem together and work in the name of good emotional conditions of our patients. We would like to invite you to visit meetings and trainings, which are free of charge and available for family members of our patients at any convenient time. Programs of support â€Å"Trust me†, â€Å"We hear you†, â€Å"We shall overcome† are available online at www.wakemed. com. You can contact me via email or by cell phone, which I specified on my visit card you have. We are looking forward to cooperation, understanding and help from you. Let’s help your mother live through this difficult period in her life

Asseing Cultural History Essay Example | Topics and Well Written Essays - 1250 words

Asseing Cultural History - Essay Example This essay will address the role of gender orientation, social skills and individualism vs. Collectivism degree in learning process and cultural belief of an individual Moreover, the essay will summarize the importance of history in shaping an individual’s culture. Cultural dimension theory of Hofstede is an important cross-cultural communication framework, proposed and established by Greet Hofstede. This specific framework describes the effect of culture of a society on the human values. There are six different dimensions in this framework. Individualism vs. Collectivism can be considered as an important dimension among those six dimensions. This plays an important role in shaping cultural beliefs of an individual. This is the measure to which the social individuals are integrated into a particular group. People of European countries rank high in this list. On the other hand, people of Asian countries rank low in this list. People of Western countries believe in individual goal development, activities and achievement. On the other hand, people of Asian countries believe in collective work, collective performance and group achievements. It is the cultural trend, family orientation and family environment of individual that drive them towards specific approaches. Two different family structures can be identified in this world, such as joint family and nuclear family. The concept of joint family can be identified in Asian countries. On the other hand, the concept of nuclear family can be identified in several western countries. In joint families, family members used to take decisions collectively. On the other hand, in nuclear families, the head of the family used to take individual decision (Ibro scheva & Ramaprasad, 2008). These specific cultural orientations and guidelines are also followed by people in workplaces and several social institutions. Therefore, it can be stated that the degree of individualism vs. Collectivism

Thursday, July 25, 2019

Analysis of Organizational Dialogue Research Paper

Analysis of Organizational Dialogue - Research Paper Example Employee engagement and productivity is one of the strategies that have assumed increasing significance in recent years (Rashid, Asad & Ashraf 2011, p. 98). While employee engagement as a strategy has been assuming increasing significance, its implementation has been experiencing challenges and an increasing number of organizations have significant engagement problems. According to the study by the Gallup Institute (2008, 2009), there are significant engagement problems in the Australian workforce and these results appear to reflect a broader global pattern in the developed economies (Gallup 2009). Leadership plays a major role in engaging the employees in the transformation process within the organization. In general terms, employee engagement is defined as the extent to which employees are motivated to participate and contribute to the achievement of organizational goals and objectives (Cook 2008, p. 37). Engaged employees tend to willfully highly recommend their workplace, have hi gher overall job satisfaction, and favorably rate their pride in their workplace. Leadership communication can greatly impact on employee engagement in any particular organization (Wiley 2010, p. 48). In order to have a clear understanding of how leadership communication impacts employee engagement, this paper will critically analyze the impact that leadership communication has on employee engagement based on contemporary research. The latest research indicates that organization’s leadership and leadership communication have a significant impact on the employees’ engagement levels and their overall opinion about the organization (Eisenberg, Goodall & Tretheway 2009, p. 26). The type of leadership adopted by an organization is defined by the style of leadership communication. Hackman and Johnson (2009, p. 11) define leadership as a form of human communication that transitions behaviors and attitudes to focus on collective shared needs and goals. This definition indicate s how fundamental leadership in general and leadership communication, in particular, is in employee engagement (Gerard & Ellinor 2001, p. 59). Leadership communication impacts on how employee commits themselves to their roles and to the vision, mission, goals, and objectives of their organization (Wiley 2010, p. 47). The Kenexa Research Institute (KRI) observes that their latest results on the effectiveness of leadership in an organization are 51% globally. It states that results indicate that employees in India, Brazil, and United States reported the highest ratings of leadership effectiveness, at 69%, 59% and 54% respectively (Rashid, Asad & Ashraf 2011, p. 101). Leadership effectiveness is measured by evaluating how organization leadership gains the confidence of employees through their communications, actions, and decisions, and how leadership keeps employees informed about company direction, as well as how they are seen to having the ability to deal with the organizationâ€℠¢s challenges (Cook 2008, p. 40). The research by KRI is crucial in critically analyzing the impact that leadership communication has on employee engagement. In evaluating leadership effectiveness, one of the critical aspects that are evaluated is how leadership communication impacts on the employees’ commitment towards achieving organizational goals and objectives (Dixon 1998, p. 15).  

Wednesday, July 24, 2019

Assignment 4 Essay Example | Topics and Well Written Essays - 500 words - 9

Assignment 4 - Essay Example Organisms can also trigger mutation in their DNA. The process occurs naturally after the genes have stopped functioning normally. Mutations can be helpful and harmful depending on how organisms are affected. For instance, it can be harmful if it leads to faulty protein sequence. This is because it causes some proteins to stop functioning or function poorly. Very few types of mutations are beneficial to organisms. Mutation is also helpful because it make it possible for some species to adapt to their environments. It can lead to irreversible loss of goods characteristics in some species. One of the common medical conditions associated with mutations in humans is the sickle cell anemia which occurs due to mutation of chromosome 11 (Adams, 2009). Another related issue is sexual reproduction that occurs when different organisms within the same species join their gametes. It leads to higher genetic variation compared to asexual production. This is because in sexual reproduction organisms receive more chromosomes from its parents. Organisms that produce sexually have unique characteristics compared to those produced asexually. They are usually not identical to their parents like those produced asexually. The unique characteristics enable the offspring to prosper in their environments. Sexual reproduction has resulted to the occurrence of many breeds of organisms today. Migration also affects genetics in various ways. It increases the chances of different organisms within the same species to mate. Organisms in different regions might have different characteristics. Mating enables the organisms to produce offspring with the parent’s characteristics. Migration can cause subtraction or addition of alleles in a population. For example, if organisms with good genetic characteristics move to another area it causes alleles subtraction in that area. Areas that receive the organisms with good genetic characteristics experience a gain of

Tuesday, July 23, 2019

Statement of Needs Essay Example | Topics and Well Written Essays - 750 words

Statement of Needs - Essay Example Stagman et al. (2011) argues that â€Å"the use of alcohol and illicit substances by youth often leads to adverse health outcomes. According to the Office of Adolescent Health, the case of substance abuse among adolescents has risen exponentially within the last decade. In the state of Illinois alone, the number of cases of cocaine use among high school students, from grades 9 to 12 is equal to the national percentage of 3%. Also, the rate of high school students in Illinois who are indulging in the use of inhalants is at 10%, just a per cent lower than the national average (Centers for Disease Control and Prevention, 2012). In Illinois, the support for substance abuse victims is often deficient and stationary as most are funded by private organizations and are also expensive, and that is on top of the fact that adolescents who are victims of substance abuse are not aware that they can get rid of drug and alcohol addiction. Furthermore, Stagman et al. observes that one factor that really challenges the reduction of substance abuse among adolescents is government fund because the delivery of care cannot be carried out without appropriate funding (Homer et al., 2008). In a mission to make a difference in the lives of many people suffering from the effects of substance abuse, the Gateway Foundation Alcohol and Drug Treatment is dedicated to the task of promoting awareness to adolescents about the adverse effects of substance abuse and restoring the physical, psychological, and cognitive health of the patients. The main concern of the organization is how to reduce substance abuse among adolescents in the State of Illinois by initiating public awareness campaigns that target adults and adolescents. Most of the substance abuse victims are those who have not gone in school or who are out-of-school youths. Due to lack of guidance and ultimate freedom to choose, they are often led to wrong directions. One

Monday, July 22, 2019

Different Theories of Management Essay Example for Free

Different Theories of Management Essay Nowadays we have new implementing plans for management. The different theories of management are: classical, behavioral, quantitative and quality management theory, systematic and contingency management theory. The classical management theory focuses on finding the â€Å"one best way† to accomplish and manage task (p. 37,2008. W. Plunkett, R. Attner, G. Allen). The behavioral management theory recognizes employees as individuals with real human needs. It is very important for the manager to establish trusted relationships and value his/her employees. Successful leader will put his staff first. Good communication with employees- key to success! From my personal experience, I had bad first-level management in our department. The most important, I felt that, they are using employees as a machine in the factory, like in old days practices. There were no communication connection between workers and â€Å"the boss†. All they wanted to know your working schedule: â€Å"When are you coming to work or can you stay late today? â€Å" I could not work there for a long time. There was no teamwork feeling and very poor customer service. Now, I have a better place to work, where the leaders appreciate and value you. I definitely have closer relationship with management. Our manager has a good communication skills, she creates a warm, productive atmosphere. We solve problems together as a team. I am proud to say that we only get a positive feedback from our customers. The quantitative management theory uses mathematical tools to help plan, control and analyze nearly everything in an organization. Quality management process is leading to ability to meet the needs of the customers. Total quality comes from satisfied customers. The systems management theory powers that an organization comprises various parts that must perform tasks necessary for the survival and proper functioning of the system as a whole. Human resources management is a core of the organization, because those people responsible for interviewing people and checking their professional skills. The contingency management theory is based on the premise that manager’s preferred actions or approaches depend on the variables of the situations they face (p. 50,2008). Early Management Theories In the past, the old system required the boss to do everything. For example, to manage, planning, processing, thinking, finance and analyze budget. Frederick Taylor (1856-1915) The Father of Scientific Management. Scientific Management theory arose from the need to increase productivity in the U. S. A. especially, where skilled labor was in short supply at the beginning of the twentieth century. The only way to expand productivity was to raise the efficiency of workers. Taylor devised four principles for scientific management theory, which were: 1. The development of a true science of management, 2. The scientific selection and training of workers, 3.  Proper remuneration for fast and high-quality work 4. Equal division of work and responsibility between worker and manager Successful management requires an understanding of the fundamental concepts of effective management techniques and principles. In order to gain such insight, and manage effectively and efficiently, managers must develop an awareness of past management principles, models and theories. From the turn of the 20th Century, the need for a formal management theory was growing evident; organizations required a system to guide managers in an attempt to improve productivity and efficiency of workers. This urgency for a theory saw the development of six major management approaches, the focus of this essay will be on two of the classical management theories; the scientific management theory and the human relations movement. The contributions of both these theories will be examined, followed by an analysis of the similarities and differences that these two theories propose. The last point will see a discussion of the relevance that these two theories have in modern managerial practice.

Sunday, July 21, 2019

Key Theories Of Desistance From Crime Criminology Essay

Key Theories Of Desistance From Crime Criminology Essay When a criminal is able to stop the behavior that characterizes his or her criminal activities, the gradual process involved is what is termed as desistance. Apart from the fact that it has practical applications for probation workers with criminal offenders from the community, desistance also has a strong link and connection in the rehabilitation of a criminal. However, it is evident that theories of desistance when compared to the theories of the start of criminal behavior have not been fully researched on and expanded in the field of criminology (Smith, 2007). It is therefore a good sign when studies of desistance increase drastically especially since the last twenty years; this has been particularly noticeable after the formulation of the life course theory that was done by Sampson and Laub. But as Piquero (2004:103) explains, continued research has been significantly affected by methodological and theoretical issues. Moreover, theorists in the field have not been able to come up with a universal definition of desistance. Consequently this paper endeavors to create a workable definition of desistance and to furthermore give a preview of the updated main facts and theories of desistance. Understanding desistance Oxford Dictionary defines desistance as, to desist or to stop doing something; cease or abstain. Applying this definition to criminology is however a bit technical. The big question is usually about time, if a criminal is able to stop a certain criminal behavior for four weeks for example, is it correct to classify him or her as an accomplished case of desistance? What is the recommended time for one to be sure that he or she is free from the crime? Developing a clear definition of desistance therefore becomes quite an issue especially since it is not well understood whether or not relapse and recidivism are crucial in the study of desistance. The option of observing a criminals past behavior to best highlights his or her possible future behavior is also still not well structured (LeBel et al, 2004). Laub and Sampson (2001) as a matter of fact agree that a definition of desistance cannot be made, they support that the questions in a particular research best deduce the definition of d esistance for the researcher (cited in Maruna, 2006). According to Shadd Maruna, for a habitual offender, any recognizable time spent without doing any crime is called primary desistance. However studies on recidivism and relapse cannot be complete without an outline of achieving long term desistance. Maruna goes on to therefore state that secondary desistance is when a criminal is able to change his identity and take an almost permanent direction to a life free of the initial crime that was a norm in his behavior. Studying secondary desistance is important as it seeks to understand how initial offenders can be able to keep a distance from their crimes. Desistance is therefore not the final result of the end of a crime; it is actually the process that is gradual and continuous till the end result of successful desistance. Sampson and Laub (2001) acknowledge that there is a huge difference between the stopping an offence and the continuous change to a crime free lifestyle. They mark that as compared to theories of offending, desistance theories have not yet been fully studied and explained, however desistance is now understood as the procedure necessary for acquiring a n accomplished state of non-offence. It is important that a criminal who wants to change must be willing to change his or her self identity and concept to be able to grasp the full context of change. Gottfredson and Hirschi (1990) explain that on the contrary it is a common occurrence to find ex-offenders who have undergone desistance commit other acts of deviance, (cited in Sampson and Laub, 2003: 298). Desistance is therefore basically the ability of a former criminal to be able to completely withdraw from a crime and to maintain being in that state regardless of the challenges involved when trying to keep away. Some of these challenges are drug abuse and addiction, unemployment, few academic opportunities, social pressure and return to environments with high crime rates (Richards and Jones, 2004). Career criminals are those who have been criminal offenders for a considerably long period of time (Maruna, 2001). According to Laub and Sampson (2003), career criminals rather than small time offenders should be given more attention in researches on desistance. However another major problem in the study of desistance is the availability of completely successful offenders in desistance to the researchers in the field (Maruna, 2001; Burnett, 2004). Total desistance to many ex-offenders is quite a hard step as most of them usually end up going back to their initial criminal tendencies (Piquero, 2004). Addiction is a very significant factor that is more often overlooked yet its contribution to the whole process of desistance has a major impact on the ability of a criminal to completely change. It is therefore important to understand the connection between the two before arriving at a definition of desistance. From a number of researches it has been recognized that the link between addiction and criminal activities is actually very strong. A drug addict is therefore more likely to engage in crimes (Maruna, 2001). Moreover the cause of addiction and criminality are as a matter of fact very similar. Frisher and Beckett (2006:141) found that a large percentage of drug abusers are very active members in criminal gangs. Therefore, when defining desistance, it is necessary to note that the complete resistance of both criminal offending and drug abuse must be realized (Maruna, 2001). To achieve the purpose of this paper desistance can be described and defined as the initial process allowing quality desistance from drug abuse, criminality and other forms of deviance for an ex- criminal. Quality desistance in this case is the is the total termination of previous criminal behaviors together with other possible forms of deviance like drug abuse for at least ten years accompanied by a change in the identity of an individual. Desistance theories Ageing Age has been found to be a significant factor in criminology, as one grows older it is noted that their level of criminality greatly reduces. (Smith, 2007; Sampson and Laub, 2003; Gluecks, 1943; cited in Sampson and Laub, 2003; Gottfredson and Hirschi, 1990; cited in Sampson and Laub, 2003). In 2000 in the United Kingdom 19 year olds were found to have committed crimes fifty times more those which men of over fifty years had committed. According to research the total lifespan of a criminal is usually general considering factors like early deaths, imprisonment and when a criminal is evolving to avoid being detected (Maruna, 2006). In a research of 411 criminal males in London, Farrington (1990) realized that as the criminals grew older, their crimes reduced greatly with time but this however depended on different types of crimes (cited in Smith, 2007). For example, burglary is at its highest at age 20 while fraud and drug abuse offences record their highest at the age of 25 all the way to 30 as burglary sets on a steady decline afterwards. Nevertheless for the persistent hardcore criminals into their 70s, there was a clear connection between their age and their crime rates according to studies by Laub and Sampson (2003, 2005, 2005b). Furthermore they realized that alcohol and drug offences were their highest in the mid- thirties as compared to other offences. They finally came to a conclusion that both age and the type of crimes affect the whole process of desistance as well. However there have been different explanations to the not clear age crime curve. Developmental criminologists have been able to link the age of an offender and the capability of total desistance to childhood related issues. (Mulver et al, 1988; cited in Sampson and Laub, 2003; Nagin, 2005; cited in Sampson and Laub, 2005a) Offenders are therefore divided into two distinct groups, the adolescent and the persistent adult offenders. As a result it will be evident that in their late teens the adolescents will be able to grown out of crime and will be able to work on their social circles basically due to their education and good social integration skills. The adult offender however will find it very hard to terminate deviancy due to unsuccessful relationships, academic prospects and also due to their low cognitive capabilities (Moffitt, 1993; 1994; cited in Sampson and Laub, 2003). As a result of this theory, criminals are therefore grouped into two separate groups that are very different from each other due to childhood causes. And for any chance of desistance then one has to be in the right group. Sampson and Laub (2003; 2005a; 2005b) on the other hand are against that approach and explain that anyone can be successful in desistance irrespective of which group they fall in (2003:179). According to them childhood factors of offence do not determine desistance but instead help to explain the whole process of desis tance. Gottfredson and Hirschi have their views as well and point out that with the gradual process of growing old offenders usually find themselves stopping deviance (1995; cited in Sampson and Laub, 2003). They expound that for any organism there is always a stage of discontinuity that applies to criminology and the study of desistance and its links with age. Consequently, desistance becomes an expected phenomenon in the normal life of a criminal. Maruna (2001) however does not fully agree with this because according to him desistance, especially at the beginning, takes a huge amount of emotional, psychological and even physical effort and resources. Gluecks (1943) agrees with this too because he highlighted that desistance is from a change that comes with maturity, meaning, an offender gradually stops committing a crime (cited in Sampson and Laub, 2003). This process is more often evidenced after the age 25 when a criminal starts tiring and gets less involved with crime. This theory howe ver is not left out on the criticisms since it is claimed that it does not fully address the issue of age and its role in desistance (Maruna, 2001; Sampson and Laub, 2003). Acknowledging that age is a significant factor in desistance, Sampson and Laub (1992) further argue that the importance of turning points in life and social contacts is underestimated in the maturational reform (cited in Maruna, 2001). Life Course Theory A significant study on 500 men up to the age of 32 was carried in the 1930s and 1940s by the Gluecks (1943; cited in Sampson and Laub, 2003; 2005a; 2005b). Sampson and Laub later on in an impressive research followed up on 52 of these men and investigated on their criminal career to the age of 70. They found out that the causes of desistance and persistence are actually opposites, namely, deliberately productive agency, establishment of limits in social relationships and organized routine activities (Sampson and Laub, 2003; 2005a; 2005b; 2006). Their finding indicated that job stability, military service and marriage were able to positively contribute to achieving desistance. These turning points were realized in the process of desistance whereby an offender seeks to start a new life by changing location or even starting a new job like entering the military for example. This however does not necessarily involve starting over, sometimes these offenders work to gain back and maintain t heir original contacts like a job or a marriage in their quest to stop their criminal tendencies. Whichever path desistance takes these turning points often lead to: an elimination of the past chance for the growth and development of new social contacts that have a positive effect on an individual types of direct and indirect evaluation and observance of character planned routines with a central concern to family rather than peers circumstances allowing for change in identity and development of new scripts of a new self These factors, they explain are true and are not affected by the type of marriage and the crime life of an individual , though informal, parenthood and cohabiting have also been linked to successful desistance (Sampson and Laub, 2006; Katz, 1999). Individuals with none of these social bonds are also more able to stop offending because; in the end they do not lose anything. Rebecca Katz (1999:13) indicates that, families may play a significant role in developing desistance since family influences self control and delinquency. Life course theory emphasizes on the strong influence of the social environment to offending explaining that absence of criminal peers reduces the chances of an individual ever engaging in offences and in the end positive attitudes favoring change will grow (Warr, 1998; cited in Sampson and Laub, 2003). Life Course Theory contradicts the link between developmental theories in criminal careers and desistance. It agrees that adulthood experiences are essential as w ell but to some point more significant in establishing the possible trajectory of desistance (2003). Circumstances, structural set-ups and personal choices all work together to promote desistance. The theme that desistance is a systematic process that continuously gets renewed, underestimates the importance of research on personal encouragement and the influence of social environment (Sampson and Laub, 2003:171) Agency Yet another essential element that has been pointed out as key in achieving successful desistance is agency. (Burnett, 2004; Maruna, 2001; McNeill, 2006; Maguire et al, 2006; Maruna, 2001; Sampson and Laub, 2005 a). The theory of rational offence understands the fact that a criminal is able to make decisions based on his judgment of what is good or bad according to him in his crime life. Agency therefore works hand in hand with rational choice in the key decision making processes of a criminal. Agency is important since it assists in the overall process of making a rational choice. Furthermore, when the inconsistent prototypes of criminal activities are considered together with financial and familial challenges most criminal encounter the theory of rational choice cannot by its own back up volitions to desist (Burnett, 2004; Sampson and Laub, 2005b). In their study of the Gluecks men Sampson and Laub (2005a) discovered that agency was a necessary component in the process of desistanc e. There is more to the structural support in the process of desistance, agency is required to offer the determination and persistence part of the equation. Agency determines the will to keep moving on and only those who are persistent will be able to manage the whole process. Measuring the determination and charge to persist the whole process of desistance is quite a challenge and as a result creates yet another crucial factor in the concept of turning points (Maruna, 2001) (Sampson and Laub, 2005a:177). Moreover it is a quintessential component in the study of desistance and persistence in a criminal career that has however not been fully researched to date. In their research of the life course theory Sampson and Laub assert that they have been seeking to explain the importance of the human agency as an aid in understanding desistance and other deviance forms (2003:177). Knifing offà ¢Ã¢â€š ¬Ã… ¸ ones past, has come out to be a vital element to describe the ability to be able to accomplish a successful desistance for some individuals. To achieve this voluntarily, agency is necessary since it is one of the most difficult things to do and needs a lot of determination. It is a process that is more often accompanied by cutting all past contacts and establishing new ones for example geographical location and family. Most importantly though, Maruna et al (2006a) explained that it can as well involve change from the inside, or a change in the way the offender thinks about him or herself, their past, and their environment. It is this positive change that motivates an offender to persist on and maintain desistance for longer (Maruna, 2001; Sampson and Laub, 2003; 2005a; Maguire et al, 2006). Contemplation time was found to be a crucial moment that assisted in creating a turning point to desistance according to a study by Margaret Hughes (1998). And it was found that the opportunity to contemplate came as a result of a change in geographical location, imprisonment and residential treatment programmes. Hughes participants found their desire to change develop when they removed from the usual environments and being able to get ample time for self actualization. Social identity Researchers have tried to explain the phenomenon whereby some individual are able to sustain long term resistance while others do not, and it has been discovered that apart from agency, an individuals self identity change is similarly necessary. When an offender creates a a different set of beliefs and perspective chances of maintaining desistance are normally guaranteed to some point (Burnett, 2004). That is why programs like the cognitive behavioral therapy and the 12 step that work to develop a change in personal identity are advocated for during incarceration (Maruna, 2001). Each and every individual, whether an ex-offender, offender or normal citizen has a unique self identity through which their actions are guided upon, it is therefore as a result of this mechanisms that give people the different circumstances they exist in. The significance of change in a criminal life is often subjectified by self-narratives (McNiell, 2006). More often though not a fact; self narratives have been of assistance when people seek to explain their actions. Narratives very often change throughout the life course and understanding narratives, helps individuals realize the significance of past and present events in our lives (Sampson and Laub, 2005a). In a desistance study in Liverpool, Shadd Maruna investigated the different self narratives of two distinct groups of offenders whereby one persisted and the other desisted, to account for the changes in ex-offender identities (Maruna, 2001). He was able to find out that both the desisting and persistent criminals actually had more or less the same personality characteristics and were not as agreeable and conscious as the general population. Self-narratives are the only components that divided the two groups after thorough interviews. Active offenders had what Maruna called a, condemnation scriptà ¢Ã¢â€š ¬Ã… ¸ (2001), meaning, they saw life as an unfortunate abyss of hostility and uncertainty. They believed that circumstances had pushed them to their present situation and there was nothing they could do to change things and that the authority pushed them even further away. Desisting ex-offenders on the other hand had a positive outlook on their past and present and this is what assi sted them to continue with their desistance process. It is this self-narrative that may be the tool needed for successful desistance. The past and present life of an ex-offender is often different and this is almost basically due to the self narrative (Maruna et al, 2007). This self narrative attaches a psychological component to the real facts of the past and creates a purpose and meaning in the life of an offender. This is what brings about the positive outlook and assists in achieving desistance. In a study focused completely on religious changes of rehabilitated offenders, Maruna et al discovered that their self-narrative was interestingly altered after changing their religious beliefs (Maruna et al, 2006b). As a result the importance of this self narrative is once more highlighted as it helps an offender realize that the past can be changed and that the future has a hope even for those in long sentences. The offender is therefore able to have a new sense of identity, empowerment, purpose and forgiveness. The self narratives of most offenders in the desisting group have a common characteristic Maruna describes as, the redemption scriptà ¢Ã¢â€š ¬Ã… ¸ (2001). This is basically the belief that an offender is a good person and that his or her past was merely as a result of circumstances of crime, recidivism and addiction. As a result of this, the offenders are able to endeavor to live new lives as they continue in with their desistance. They are then able to view themselves as role models with the necessary knowledge and experience to advice and educate the next generations, something Maruna calls, Making Goodà ¢Ã¢â€š ¬Ã… ¸. The major difference therefore between the desisting offenders and the persistent ones is the positive energy they surround themselves with. Confidence and self belief are as a result pointed out to be essential qualities as they guide an offender to understand that their past was a necessary component for them to be where they are at the present. This redemptive narrative helps them realize that they are not their past and that their future is what that matters. The acknowledgement of a supreme power beyond them has also been a contributing factor in the lives of these offenders. This is because they realize that their past might have been a plan to give them the positions they hold in the present, like being counselors and youth leaders. This moral superiority and change from the past, according to Maruna, is to make up for long stretches of lost life. During desistance according to Stephen Farrall some offenders undergo long periods of creating new social identities (2006:85). However much these offenders change, it is not forgotten that they acknowledge they are responsible for their criminal past. Ideologies that ex-offenders feel responsibility and burden from their past crimes are actually not evidenced by researches (Maruna, 2007). Successful offenders in desistance often admit to the guilt of their past but they however rationalize their actions and justify or blame themselves and accept that circumstances might have pushed them to criminality. Sometimes however they do not accept their actions and believe that the society pushed them to crime. This however does not cultivate the necessity of an ex-offender to acknowledge the wrongs from past life rather than putting blame on the society and the initial environment (Maruna, 2001). The Liverpool Desistance Study prove that a concurrent characteristic of the redemption script is an offender accepting to take control of changing his future however they do not acknowledge their past crimes. However a concurrent observation is made that most candidates of successful desistance accept responsibility for their past and future and have the will to persist the challenges they will face. Maruna (2001:88) consequently gives the summary of the desisting persons narrative as: development of inner beliefs that truly describes an individuals personality a positive look at an individuals capability of changing in the future the purpose driven enthusiasm of giving back to the community particularly the next generation Life-Course-Persistent and Moffit Adolescence Deviance: Groups of Development Moffitts (1993) concept of dual taxonomy of offending similarly tries to explain the processes of desistance and persistence. Moffitt (ibid) outlined that offenders can be grouped into two; adolescent limiteds and life persisters. Moffitt proposes that the two groups are different and unique from each other in their offence and desistance processes, with the life course persisters having a different aetiology to the adolescent limited offenders. It is explained that they may be suffering neurological problems that affects their cognitive and learning skills. This is therefore evidenced by poor social skills even in the family leading to the various forms of anti social behavior and poor self control Gottfredson and Hirschi (1990). Early signs of antisocial behavior are a common characteristic of life course persisters (for example under-age drinking, premarital sex) as a result they are often excommunicated from their initial societal setting because of poor behavior, development and social bonds. Early signs of antisocial behaviors like these are normally a clear indication of a persistent criminal career in the future. This will be in connection to the age graded theory meaning there patterns of crime will be different and theirs will be a continuous cycle of events of affected marriages, work, education and relationships. Moffitt continues to argue that adolescent limited are not affected by any neurological problems like life course persisters and are able to successfully develop their social networks and cognitive skills. Therefore the causal factors for their criminality are connected to the gap between social development, age and desires. Age for example prevents them from engaging in adult behavior like sex or drinking. As a result of deviance from their desires, they tend to associate with the life course persister leading to the growth of their deviance. However, due to their developed social skills and academic success they are likely to be able to change more easily if they choose desistance. This is because they will be able to depend on their strong social bonds for support. Maruna (cited Laub Sampson 2001) explains that as a result of giving more credit to dispositional rather than personality traits, the proper steps involved in discovering the consistency of criminality is achieved. Sampson and Laub note that when personality traits do not change gradually with time people are still more often capable of making a change. Researchers therefore have to examine other factors influencing personalities like personal strategies and self-perceptions Maruna (cited ibid). Narrative script There are two distinct narrative script types in the desistance literature that highlight how criminals really view themselves and their societal roles. For the persisters their script usually has a concurrent theme of condemnation. More often they blame external conditions like poor family relations and lack of education for their criminality. They generally have an external locus of control. In contrast the offenders who finally become successful in desistance have a redemption script. They are complete opposites of the latter and are fully responsible for their actions. As a result they make a positive choice to stop the crime by accepting rehabilitation programmes. They are described to have an internal locus of control. Factors that influence the particular narrative script that gets adopted by a criminal are majorly internal factors such as personality and genetics especially after rehabilitation. A higher chance of a redemptive script is noted to be as a result of intense rehabilitation. A probation workers relationship with an offender has also been linked to affect desistance. It is there important for these officers to have empathy skills that are crucial in the process of guiding an offender to desistance as they strive to be able to re-integrate back into the society. Relevance of desistance theory The desistance theory is relevant in a number of different applied and academic professions. The desistance theory to researchers may provide a foundation to be able to examine the different factors that contribute to the cessation of a criminal offence from a theoretical view. The desistance theory allows for a number of different crimes in history and their approaches like the Lombrosian biological positivism, to have consideration in the present society which has an evident difference in its ways of thinking. As a result criminology is more understood and its relationship with other disciplines like psychology, politics and social policy acknowledged. This will consequently allow the development of collaboration for a positive cause of reducing re offence rates. The desistance theory on a practical level has assisted the criminal justice system (CJS) to identify possible solutions to cases of reoffending of successful candidates of desistance through for example initiating community based sentences. This kind of programme is sure to gradually decrease the number of criminals in HM Prison Service institutions for short periods. Studies have shown that short-term sentences in prisons for example (those for less than six months) often lead to increased crime rates after release. This is well explained by the fact that these short-term prisoners to not undergo complete metamorphosis from not covering all the rehabilitation programs. Their exposure to the hard core criminals in the prisons who have been there for longer and have been experienced criminals also contributes to their overall change. In addition desistance theory assists in the continuous development of training programmes for the respective professionals responsible for working with ex-offenders in the community. For example the Probation Service (see Narrative script section, above). Controversies It is important for the general public to realize that desistance is achievable and takes time. Offenders should therefore not be viewed as bad people who cannot live with others even after rehabilitation programs. The public is therefore advised not to discriminate these groups of people in their society. Reintegration cases of offenders back into the society have always caused massive outrages by a large percentage of the public community. There are numerous related cases of such circumstances that have often been quite difficult and delicate to handle. For example in 2011, the case of the reintegration of Jason Owen, he had been imprisoned for allegedly taking part in the killing of Baby P (Peter Connelly) in 2007, and in 2011 he was the released after his sentence was over. The Sun newspaper immediately kicked off a campaign to find him. Readers were urged to write and report to the newspaper of any knowledge of his whereabouts. There was an article in the same newspaper that sent sentiments of outrage over the fact that the ex-convict had actually tried to find a job. This is a clear indication of how the effort of successful psychological research can be nullified by news reports in the popular media. This kind of outrageous reporting is especially a common characteristic of Tabloid newspapers. Their influence over the public is often impressive and they are as a result able to manipulate and affect the attitudes of the wider public towards their view of desistance and offenders. As a result of this, future recidivism is often developed gradually due to the ill-informed public. Newspapers then use this recidivism as proof of their initial correctness. Conclusion