Sunday, January 26, 2020
Problems with Mobile Commerce
Problems with Mobile Commerce The recent years have seen an explosive growth in the mobile phone industry. Research has shown that the number of mobile phone subscribers at the end of the year 2004 has passed 1.6 billion. Mobile commerce more popularly known as m-commerce has made the business mobility a reality. The concept of anytime and anywhere internet facility with an inexpensive and comparatively smaller computing infrastructure is the driving force towards mobile commerce. With the advancements in the Wireless communication, mobile commerce has become a new paradigm for personal communication without any constraints in location. There are no age limitations in conducting mobile commerce. Starting from the teenagers to the retirees, everyone is depending on mobile devices. Mobile Commerce is defined as any direct or indirect transaction conducted through the handheld devices such as PDAs and mobile phones facilitated through mobile or wireless telecommunication networks. It is a subset of electronic commer ce. E-Commerce and M-Commerce differ in the way the business is conducted. In E-commerce, online auction systems act as an intermediary between the buyer and a seller whereas mobile commerce is more personalized and is ideal for the location based services. The characteristics of mobile devices such as mobility, cost, portability, voice, more personalization and global positioning system (GPS) have made the establishment of new business models around mobile devices. Many applications such as mobile payment systems, entertainment, content distribution and business services have been developed. Consumers can use mobile phones as an ATM or debit card to purchase tickets or pay the bills online. Content distribution services such as real time information and notifications and location tracking systems are increasing every day. Consumers can get real time information such as stock quotes, traffic information, news and weather forecasts anywhere anytime on their mobile phones via the internet. In addition to the real time content services, mobile phones have become an entertainment medium. Entertainment services such as ringtone downloads, watching live TV broadcasts, online games and music downloads has become a youth trend today. A report from Screen Digest Ltd., a global market research company, shows that Korea and Japan accounted for 80% of the worldwide online game downloading revenues (approx. 380 million Euros). According to Juniper research, a company that specializes in mobile market and technologies, adult mobile services and mobile gambling services accounted for total revenue of US $1 billion and US $ 15 billion respectively. Mobile Commerce has a great impact on business services and applications. Extending the Enterprise Resource Planning (ERP) systems to have mobile functionality will provide the sales personnel and marketing staff with real time management and corporate data. Mobile inventory management applications benefit the logistic related business in their supply chain management. Also, no time and location based constraints helps in making the offices going paperless in which case a sales person need not have to carry loads of paper for the client delivery. Mobile Commerce is creating new opportunities for the mobile service providers as well as for mobile users. Experts have proposed that the next wave of computing would be mobile commerce and the first decade of 21st century would be considered as the decade of mobile computing and mobile commerce. The driving factors of mobile commerce include various interrelated forces. The social trends where every person is depending on his or her mobile for communication (mobile society), technological advancements and economics are some of the driving forces of mobile commerce. The success of the electronic commerce itself is another major driving factor for mobile commerce. Consumers have embraced the web based e commerce in their day to day life in such a way that they cannot think of doing their tasks without any electronic channel and this has made businesses to extend their services beyond electronic channel into mobile channel. In addition to the above factors, the lowered provider costs, increased internet speed and reliability, availability of content and information anytime through an instant access and reduced time to market have contributed for the growth of mobile services. Although the above mentioned factors indicate that mobile commerce is creating various opportunities for businesses, users and service providers, a report from the Business Studies 2009 shows that only 7% of the 90% of the Americans who own a mobile phone have used their mobile phones to conduct mobile commerce transaction. Electronic Commerce can be divided into four different categories such as Business to Business (B2B), Business to Consumer (B2C), Consumer to Business (C2B) and Consumer to Consumer (C2C). Mobile commerce is mainly concerned with the B2B or B2C market. With the widespread adoption of mobile phones, mobile commerce has a prosperous future in business to consumer (B2C) category. As Business to Consumer (B2C) is considered the future of mobile commerce, businesses and consumers are becoming more concerned about security issues since identity theft has become a growing problem. The wireless telecommunication industry has seen enormous advancements in technology and hence the development of standards. But a question arises on whether the early adoption of the standards may hinder future developments in mobile commerce. Let us have a look at the major differences between mobile commerce and electronic commerce and what drives the consumer to adopt m-commerce over e-commerce. The attributes such as ubiquity that is anytime, anywhere availability, high interactivity, convenience, personalization, that is mobile phones are more personal with most probably a single owner when compared to home computers or internet cafes which is shared between a number of people, and finally localization are some of the benefits of mobile commerce which is driving the consumer market. In short, mobile commerce offers more enticing market opportunities than e- commerce. While live internet on the mobile may sound intuitively appealing, it is very difficult to estimate the utility and the extent of its usage. Businesses, governments, service providers, mobile users and stakeholders still need to address many issues and obstacles before mobile commerce pervades in to our daily lives. The next section of the paper discusses the major issues in mobile commerce such as application issues, network challenges, consumer privacy and trust, security concerns, infrastructure problems and legal and regulatory issues. Key Issues in Mobile Commerce * Security in mobile commerce * Location management issues * Limitations of mobile devices * Ethics and Privacy * Wireless Infrastructure * Usability * Legal and Regulatory challenges * Consumer Trust * Interoperability and Compatibility Analysis Security in mobile commerce Wireless communications are more vulnerable than wired communication. Although most of the wireless data networks provide reasonable encryption, security has become a major concern with the introduction of high end mobile devices in the market and the anticipated increase in the number of devices. Many issues exists with the use of mobile devices to conduct transactions such as: Data could be lost and the mobile terminals itself could be misplaced or stolen due to its smaller size and contents stored in the device could be accessed by anyone who possesses the device due to lack of proper authentication techniques . Although mobile commerce enjoys mobility, it raises many serious security threats. In particular, as it plays a very important role in business and personal life, security issues have to be considered seriously. There are many aspects to consider in security which includes physical security, risk assessment, secure wireless transmission, secured access and malware. The built in security features such as passwords and locking keypads are not used by majority of wireless users and the data stored on these handheld devices are often not encrypted which makes it easy for anyone to access the information stored without any authorized access. The article Mobile Commerce: issues and obstacles mentions that Motorola, Ericsson and Nokia did provide industry standard digital signature for authentication but was discarded in 2006. Data transmitted over the wireless medium is more vulnerable for attacks. Wireless transmission can be intercepted and if is not encrypted or encrypted with a flawed protocol, then the information can be made known. Unsecured data transmission may be exploited by hackers for eavesdropping or à ¯man- in-the-middle attacks. Tradeoff between performance and security remains an issue of concern for low power mobile devices. Communication between mobile devices is in the form of ad hoc networks where one node communicates with another without a fixed infrastructure. Network decision making in ad hoc networks is decentralized, as a result all the network protocols rely on the cooperation between the nodes. An attacker can utilize this to compromise a single node with false routing information or can instruct all the routing to go through the compromised node. In addition to compromising the nodes, hackers may route the mobile users to download malicious or miscellaneous information or may even launch denial of service attacks. An attacker need not always target a mobile user but instead if a mobile user roams in an attackers zone he or she is vulnerable to attacks. Roaming in an attackers zone may lead to the alteration or stealing of data and information without the end users knowledge. The difficulty in tracing the wireless devices as they roam in different wireless zones, no fixed geographic points and the ability to go online and offline easily gives the malicious users an excellent advantage to launch the attacks. A question of who would be responsible for the financial or data loss remains a challenge in security. Is it the user or the wireless provider or the financial institution or the software provider held responsible for the loss? Someone has to be responsible for the loss and it is quite costly and becomes a risk for stakeholders. Hence there is a need for wireless risk management. There are some false impressions that only laptops or computers are exposed for viruses and cell phones or handheld devices such as PDAs and smart phones are immune to viruses. These viruses when downloaded by cell phones drain battery life or can simply increase the load on the network.28 The compromised security function may affect not only the network but also can lead to the loss of revenue in business. Location management issues Mobile Commerce is an emerging field which involves many applications such as financial applications, user applications, entertainment, mobile inventory management applications, mobile business re-engineering, mobile games and location specific mobile advertisements. All these applications require the support of location tracking to track devices, products or the people. The following figure shows possible mobile commerce architecture. The important components of mobile commerce include wireless infrastructure, user interfaces, devices, database, mobile middleware and servers. In general, mobile commerce is very dependent on the location information of the users, devices, products, services and servers. Because of the mobility involved in mobile commerce, the location management becomes a challenging task. With the varying requirements in precision, scalability and delay between different m-commerce applications, tracking becomes more challenging. Issues in location management include precision in tracking, updating the location, storage and access of the tracked information, updating of the existing location management schemes with few modifications, difficulty in modeling the context-awareness related to the location management, the overhead of location management for various mobile commerce applications under different network size, mobility patterns and transaction size. There are a number of location intensive mobile commerce applications which require location management support as their primary requirement in wireless network. The article Addressing Location Issues in Mobile Commerce identifies some of the location intensive mobile commerce applications which include mobile advertising, mobile financial applications, mobile inventory management and proactive service management. One of the most important components of mobile commerce is financial applications which include mobile banking, mobile money transfer, brokerage services and mobile payments. If implemented properly, these applications may eventually become a business tool. Mobile advertising is another category of application where advertising is targeted to the users depending on the demographic information collected by the wireless service providers and the location of the user. Location sensitive advertisements such as shopping deals or on-going specials can be accomplished depending on the surrounding area of the mobile users. Issues in mobile advertising are: who owns the location information, how to share this information between wireless providers, what are the storage requirements and how to satisfy the need of real time processing in order to capture the user information. Mobile inventory management is tracking the location of products, goods and services. This application is very helpful for logistic providers to determine the time taken for delivery to their customers in order to provide a better customer service and to compete against other businesses. Amongst different inventory management applications, rolling inventory is one of the interesting applications which involve tracking of multiple trucks carrying large amount of inventory which helps for just in time delivery of goods when a store needs certain goods or services. Another category of mobile commerce application is proactive service management which involves collecting pertinent information of current or future needs of a user and providing the service proactively. Some of the issues in these applications are security, reliability and the cost of deployment. Limitations of mobile devices Mobile phones, hand held devices such as Personal Digital Assistants (PDA) and pagers, palm sized computers and laptops such as tablets and vehicle mounted interfaces are some of the examples of the current wireless devices. Although mobility and flexibility are the main advantages of the mobile terminals, they lack in several aspects when compared to personal computers. Most of the mobile devices have constrained display capabilities with low resolution and small screen size. Limited and complicated input options due to small and multifunctional keypad. The requirement of mobile devices to be physically light and small hinders the development of user friendly interfaces and graphical applications. Mobile devices also have limited processing and computational power, memory and disk capacity, limited battery life and surf ability. All these drawbacks which do not support complex applications and transactions may lead to the limited usage of mobile commerce. Some of the must have features of smart phones are as follows: In order to satisfy multi-tasking and multi-application nature in smart phones, multi-tasking operating system is a necessary feature. Second feature for smart phones to conduct mobile commerce is a real QWERTY keyboard. The third feature is the QVGA or a high resolution display which is necessary for web browsing, gaming and MMS. Business productivity tools and application software for smart phones is a necessary feature to access business, sales, financial, inventory and real time information. Support of the 3rd generation technology for internet access is another important feature. Video and audio streaming, GPS and navigation capability and digital camera are another set of requirements which needs to be incorporated into the ideal client platform. Packing the above mentioned functionalities into a small handheld device with the multi-tasking operating system and a user friendly interface is a formidable task. Figure 2 shows a graph of the global cell phone and the smart phone shipment. As seen from the figure the percentage of the fully featured handsets are growing every year. Although the growth of the smart phones makes smart phones an ideal client platform for mobile commerce, the specifications of todays smart phones are not adequate for the transactions required for conducting mobile commerce. The success of the mobile commerce lies in the user satisfaction and the user experience in the new technology. Thus mobile device limitations have to be overcome for the widespread adoption of mobile commerce. Figure 2: Global Cell phone and smart phone graph Ethics and Privacy In the recent years ethics and privacy have become a major and touchy issue where consumers do not want to expose every aspect of their daily lives. Web applications such as maps and financial applications require personal information from the users which has created a negative impact with consumers. The risk of openness is comparatively more in a mobile environment which has created higher demands of privacy protection amongst the users. Being able to control information about oneself is what has made privacy a major concern for the society. Inappropriateness of the ringing of cell phones such as in a meeting is one of the annoying situations. This raises an ethical concern of the intrusion of cell phones at inappropriate circumstances. This gives rise to several questions on if mobile commerce evolves in such a way that it follows us around, monitors us and tries to anticipate our needs and delivers services, how much does it intrude in our private lives and the lives of people around us? Will there be a boundary between the work and the personal life? These issues if not addressed in a satisfied manner may become the obstacles for the adoption of mobile commerce. The article Mobile Commerce Adoption in China and the United States: A Cross Cultural Study states in its hypothesis 4 as Privacy Perception is positively associated with consumers intention to use mobile commerce which is in fact a true analysis. Federal Trade Commission has to increase its efforts in the inspection on mobile marketing industry. It is the responsibility of the wireless providers to protect the privacy of the consumers in the services they provide. A recent report shows that Verizon Wireless (VZW) customers were billed for downloading the ringtones and other mobile content which was advertised as free by the online marketers. Privacy has to be protected by the mobile service providers in order to make consumers feel comfortable doing business using mobile devices. It is very important for the wireless operators to protect their customers to the fullest and to stand by their word on treating every customer with respect. Mobile devices provide convenience to the consumers with the slimmer and compact style. In addition to that with the increase in the storage capability consumers are able to store more and more data. Research shows that ninety four percent of the mobile users stored phone numbers, eighty three percent stored digital photos, sixty five percent stored contacts and addresses, fifty five percent stored videos and forty eight percent stored their calendar appointments and music and other important information. With the vast amount of private data stored on the mobile devices raises a question of the protection of these mobile devices. If lost or stolen or damaged there is no way to back up the data. Wireless Infrastructure The wireless communication infrastructure required for mobile commerce is complex. The development of appropriate services and standards determines the success of mobile commerce. The technologies used for mobile commerce include wireless local area networks and wireless telecommunication. Bandwidth and data transmissions are some of the obstacles for mobile commerce. Wireless networks bandwidth are less when compared to the wired network. Although applications are created in such a way that it functions effectively in both the wired and mobile environments organizations still need to research on the interaction of the users through the wireless devices and network. Applications running successfully in a wired environment may encounter new problems such as data availability, fault tolerance, concurrency control and processing efficiency when ported to a mobile environment. The table below shows some of the wireless networking issues. Table 1: Comparison of mobile and wireless networks As seen from table 1, bit rate and coverage are two important factors. In addition to that the wireless quality of service which affects the performance in terms of delay and loss, reliability and survivability of wireless networks where a user can access mobile commerce application even during the network failures, roaming capabilities where a user can have access to multiple heterogeneous networks other quality attributes are some of the specific requirements of wireless infrastructure in order to conduct mobile commerce. Wireless Application Protocol or WAP is the protocol used as a standard for mobile commerce in the United States. WAP uses a set of common protocols to facilitate the interoperability among different wireless networks, applications and devices. But in reality WAP has failed to fulfill the technological promises. WAP cannot handle complex transactions such as sequencing of several services distributed over different networks. WAP is not suitable for a distributed networking environment. Another issue with WAP is it tends to be slower since it was not originally designed for broadband communications. The last problem with WAP is its charges are minute based; hence time consuming activities may become expensive. GPRS was designed as an alternative to WAP which is faster than WAP but it has its own downside. Since the charges are based on kilobyte download (kb) in GPRS, it may become expensive if mobile commerce service download volume is considerable. As there is an increase in the demand for bandwidth for new and existing applications, a lot of problems arise on how to obtain the unused airspace. Although reuse of frequency is increasing today the availability of frequency and bandwidth may become more limited in future. Wired devices such as laptops and PCs use a set of established wireless standards such as IEEE 802.11 and IEEE 802.11b. Will the mobile devices have the ability to interface with more than one communication environment? Will the communication technologies itself have the ability to interfere with one other? All these questions remain as a challenge. The table below consolidates the wireless infrastructure and communication issues. Table 2: Wireless Infrastructure Issues Usability Usability and user experience issues are often neglected in most of the businesses. It is necessary to understand and improve the usability of the web interfaces exposed through the mobile devices. Users conduct communication such as information search and transactions via user interface. Hence user interface is an important pre-requisite for satisfying customers sensory and functional needs. While mobile devices today can access a variety of applications, they enforce limitations in screen size resolution and have cumbersome input mechanisms. A survey from an internet on mobile internet users indicates usability as the biggest source of frustration. A complete understanding of different aspects of usability and how it might differ in a wireless context is necessary for all the designers and the organizations before leveraging the commercial benefits of mobile commerce. Device inefficiency may become a major issue for the adoption of mobile commerce. User interfaces if not properly designed may lead to a fifty percent transaction reduction via mobile devices. Addition of what is called cool features may make mobile devices less convenient for use. There are a number of guidelines available on web site usability such as on how to improve the layout and design of a web page, how to improve the components of a webpage. However these guidelines do not specify which aspects are critical and also the criticality may differ for different contexts and for different users. Furthermore there are limited guidelines on specific situation implementations. Thus it is necessary to understand what is important to users in order to create a more compelling mobile commerce and to drive revenues. The following figure shows the linking of usability, context and value. Figure 3: Linking of usability, context and value Relevance, Structure and Personalization are the important factors for a successful wireless interface experience. In addition to that it is necessary for the designers to understand the value the consumers derive from these three relevance, structure and personalization aspects in order to provide that value. Web presence is not equal to wireless web presence i.e. e # m. Mobile experience differs from web experience in both designs as well as in usage. Legal and Regulatory challenges Mobile commerce raises various legal and regulatory issues and challenges which is very broad as it includes safety along with many others. The difficulty in the application of the traditional laws and principles in the usage of wireless technologies is an issue facing mobile commerce. One particular case is when a seller tries to sell goods or services through a portal which is allocated to receive requests from wireless devices through specific network providers or when a person uses his or her mobile device (cell phone or a PDA) to purchase something poses many legal challenges between various parties as to who is responsible for regulating them and how should they be regulated. There are various legal issues need to be considered in mobile commerce, among them are the m-commerce contracts and identification of contracting parties and their legal capacities. Another legal issue in mobile commerce is determining the ideal method for payment. What methods need to be devised for the payment of a purchase from ones mobile? Another important question is what is the applicable law and jurisdiction if mobile devices are used for business transactions? The article on mobile commerce legal issues gives an example for the above question. What law would apply if a person residing in Lebanon who is a customer of Emarati uses his or her mobile to purchase software from a German firm whose server is located in the USA? Is it the law of the server location or the law of the country of citizenship of the customer or the law where the customer resides or the law of jurisdiction where the customer purchased software? If there is any dispute between the buyer and the seller, which court is responsible for the jurisdiction? Is it the court of the buyers country or the sellers country or the court agreed by both the parties? Digital cameras in mobile devices can be used for taking the photos and exchanging or sharing them over the internet instantly. The sharing or exchanging of the photos done without the proper authorization may result in the violation of the intellectual property rights including the copyright law. In that case who is liable for the infringement? The person who exchanged the photos on the internet or the network providers or the operators who facilitated the exchange? Is it possible to identify the person sharing the photo? Another aspect of mobile commerce issue is the safety and health risks. Safety includes many regulatory concerns such as terrorism and exposure to wireless devices. Today cell phones and other handheld devices are used in airplanes, automobiles, boats and more. This convenience has made the transactions on the go, but is this safe? Cell phones or other mobile devices installed in an automobile or a motor vehicle can distract the user from driving. Mobile commerce in the context of driving may pose serious safety concerns. Health risks of using mobile devices for conducting m-commerce include cancer. A research from the Foster and Moulder from the medical college of Wisconsin indicated that the radiations produced by the wireless devices may cause brain cancer. Cell phones are being used to set off the bombs remotely. A report from a Cellular news showed that terrorists used a cell phone to detonate the bomb in a min bus in Indonesia. Another recent bombing in London England was attempted by cell phones. A slight different issue in legal and regulatory is privacy. Todays wireless technologies provide a lot of information about the users to the network operators which include tracking of the users location. Competitive companies can purchase such information from the network operators which may lead to a privacy breach. The last but not the least issue in mobile commerce is the risk of crime. Hackers can steal the data and information from the mobile devices or simply overload the wireless network traffic to deteriorate the service. Is there any criminal law to incorporate these new types of crime and how will these penalties be enforced? Consumer Trust Trust plays an important role in mobile commerce. Trust is part of security issue but it is more of a business and psychological issue than a technical issue. This does not mean that trust has nothing to do with the technology, however it is necessary for the potential mobile commerce users to perceive wireless environment as a secure environment in order for the mobile commerce to reach its potential. Business relationships would not exist today without the trust which exists in many forms in business context such as laws and regulations, contracts, company policies and personal reputations. Building consumer trust in mobile commerce is a daunting task for the organizations, network providers and mobile vendors. E commerce is also facing the same issue because even today users do not trust technology. They are afraid to do any kind of financial transaction or any purchases using mobile handhelds. Trust plays an important role in business transaction too as trust lays the foundation between the businesses and the customers. The key characteristics in forming the trust include convenience, cost-efficiency, motivation, capacity and integrity. They all play an important role in gaining the consumer trust. Interoperability and Compatibility Interoperability is the ability of a mobile device to be used anywhere around the world. Compatibility as defined by the Gera and Chen is the degree to which an innovation is consistent with existing facilities and practice. Mobile commerce applications are said to be compatible if the applications and services satisfy the needs or lifestyle of a user. Compatibility can be classified into two types: Behavioral and Needs Compatibility. Behavioral compatibility is achieved when an innovation is consistent with the current technology and the users existing value. Needs compatibility is achieved when an innovation satisfies the needs of the users. Both behavioral and needs compatibility play a very important role in the adoption of mobile commerce. An example for the lack of the interoperability is when a network provider offers a text message acknowledgement within their own network and not on other network carriers. Mobile commerce is impeded by the existence of a variety of network communication standards. Applications are developed around the network standards and device characteristics which is the main cause for the interoperability issues. Efforts are being made to overcome
Friday, January 17, 2020
The Importance Of A Safe And Healthy School Education Essay
For more than twenty old ages, research workers and pedagogues have indicated the importance of a safe and healthy school environment in furthering academic accomplishment ( Luiselli, Putnam, Handler, & A ; Feinberg, 2005 ; Hymel, Schonert-Reichl, & A ; Miller, 2006 ) . Schools are the most important socialisation force next to the household and it is in school where kids form relationships which influence societal and academic results ( Wentzel & A ; Looney, 2007 ) . It has been suggested in assorted surveies that a supportive and caring school environment optimizes the academic results of pupils ( Nakamoto, 2008 ; Beran, 2003 ) . Caring and supportive school environments can merely happen when the socialisation experiences and relationships of pupils feature credence, tolerance, and regard from both instructors and co-students. To kids, friendly relationships are considered a important facet of development. As they mature and develop, kids are encouraged and expected to hold friends to give them a sense of credence and belonging. Without these equal dealingss, kids become vulnerable to adjustment troubles which can ensue to low self-esteem, anxiousness, solitariness, and depression. Unfortunately, non all kids are able to hold healthy equal dealingss in the class of their academic experience. The absence of equal dealingss or holding debatable equal dealingss makes kids susceptible to victimization. Children who are frequently bullied in school are those who have few friends. They are prone to Acts of the Apostless of bullying or aggression from their equals. The deficiency of equal support and a safe school environment consequences to depression, anxiousness, and in utmost instances, self-destruction ( Rigby, 2000 ) . Bullying as a serious national issue emerged after the Columbine shots in 1999. Since so, strong-arming has become a critical populace policy issue and to day of the month, 43 provinces have adopted antibullying Torahs to protect and safeguard the rights of kids from aggressive and violent Acts of the Apostless of their equals ( Anti-Defamation League [ ADL ] , 2010 ) . In the yesteryear, the job of intimidation was an unfastened secret that was seldom discussed, much less addressed by school functionaries and the community. Educators and parents by and large regarded it as a ââ¬Å" rite of transition â⬠which kids necessarily undergo as portion of the socialisation procedure. Public functionaries and school governments have lobbied for steps to advance safe and healthy school environments and there have been consequences from some intercessions to cut down intimidation. However, strong-arming remains a outstanding issue until today. Recently, the instance of the college freshe r Tyler Clementi who was cyberbullied until he jumped off the George Washington Bridge and high school pupil Phoebe Prince who committed self-destruction after being infinitely bullied by her equals in a Massachusetts public school has confirmed that the battle to set an terminal to victimization in schools has a long manner to travel. Bullying is a chronic job in American schools. Nine out of 10 simple pupils have been bullied by their equals, harmonizing to a simple questionnaire developed by research workers at Lucile Packard Children ââ¬Ës Hospital ( 2007 ) and the Stanford University School of Medicine ( Medical News Today, 2007 ) . In the last 15 old ages, much attending has been placed on the issue of strong-arming in schools both in the United States and in other parts of the universe. States like Norway, Sweden, Japan, and Australia have been at the centre of attending on issues related to strong-arming ( Green, 2007 ) . In the United States, many believe that intimidation is nil more than a childhood rite. School intimidation is now accepted as a type of ill will that can hold durable mental effects for pupils that are both victims and culprits ( Green, 2007 ) . Clearly, school intimidation has become a prevailing quandary that interrupts the societal dealingss between pupils, detracts from the positiv e quality of schoolroom experiences, and hinders pupils ââ¬Ë chances to larn. Bullying is a menace non merely to a safe and healthy school environment but to kids ââ¬Ës academic results every bit good. Ideally, schools provide a wider societal context for kids to develop from their early socialisation experiences within the place. As a effect, kids ââ¬Ës societal and emotional experience influences their cognitive development. Furthermore, schools allow pupils to see and larn new things which are critical to their rational development. If the school does non supply such an environment, kids may see societal and rational troubles ( Eccles et al. , 1999 ) . What raises serious concern among the educational community is the determination that intimidation may hold a negative influence in academic accomplishment of pupils. Ecological theoretical accounts of school accomplishment suggest that school results of kids are influenced by the quality of interactions they have with equals, parents, instructors, and other persons ( Broussard & A ; Garrison, 2004 ) . Hence, the chronic job of intimidation may discourage kids from experience their full rational development. Childs who are often victimized by their equals whether physically, verbally, or psychologically may endure from larning disengagement low anticipation of success, and accordingly, execute ill on school assignment and accomplishment trials. Particularly relevant to the present survey is research showing important links between school intimidation and academic public presentation ( e.g. , Buhs, Ladd, & A ; Herald, 2006 ; Juvonen, Nishina, & A ; Graham, 2000 ; Schwartz, Farver, Chang, & A ; Lee-Shin, 2002 ) . Students who are victimized by equals are likely to show hapless academic public presentation ( Buhs et al. , 2006 ; Juvonen et al. , 2000 ; Konishi & A ; Li, 2006 ; Nishina, Juvonen, & A ; Witkow, 2005 ; Schwartz et al. , 2002 ; Schwartz, Gorman, Nakamoto, & A ; Toblin, 2005 ) , as are kids who bully others ( Pereira, Mendonca, Neto, Valente, & A ; Smith, 2004 ) , consistent with statements that childrenaÃâ Ys societal experiences at school impact their academic public presentation ( see Hymel et al. , 2006 ; Weissberg & A ; Durlak, 2005 ) . Not all surveies have demonstrated such associations, nevertheless. Hanish and Guerra ( 2002 ) failed to happen a relationship between equal victimization and accomplishment a nd Woods and Wolke ( 2004 ) found that accomplishment was significantly linked to relational but non direct signifiers of victimization. Since the 1970s, the public schools in America have been placed under the microscope and answerability in all countries has been demanded. Parents are familiar with issues of proving and installation safety, but an extra country that has been brought to the head of the state ââ¬Ës attending is that of pupil safety. One specific country of important concern has been the issue of strong-arming and the deductions that student behavior can hold on the safety and security of all pupils. Teachers understand the degrees of influence and acknowledge the power of the household, the community, and the popular civilization to act upon behaviour. What they frequently do non understand is the extent or bound of their domain of influence. When instructors are asked to place hazard factors for the development of intimidation, they by and large rank the household and cultural factors such as telecasting movies, and pop music as holding the strongest impact on kids ââ¬Ës development of strong-a rming behaviours. When instructors are asked to bespeak which factors they can act upon, they recognize for the most portion, that their influence is limited to the schoolroom and school environment. Teachers are encouraged to concentrate their energy and resources on altering the countries within their domain of influence, that is, the schoolroom and the school. A figure of factors have been identified as lending to pupils sense of safety and belonging at school, but less research has examined the grade to which these factors really impact school public presentation. The present survey examined the function of two school clime factors in footings of their consequence on pupil accomplishment in math and reading. Although enlightening, these surveies focus merely on the person or pupil degree, non taking into history the school degree bunch of pupils. There is a famine of research sing the impact of strong-arming at the school degree in relation to academic public presentation. At the school degree, both strong-arming and teacher-student dealingss are, in kernel, facets of school clime that reflect an overall degree of tolerance for negative interpersonal interactions. As such, both represent school-level factors that can impact academic public presentation. To our cognition, there are no empirical surveies analyzing relationships between school clime, as reflected in reported intimidation and teacher-student dealingss, and single studentsaÃâ Y accomplishment. Consequently, in the present survey, we assessed the linkage between academic accomplishment and intimidation at the school degree utilizing a multilevel analysis technique that allowed us to besides see the possible buffering consequ ence of positive teacher-student dealingss. Specifically, the present survey addressed: ( a ) whether studentsaÃâ Y academic public presentation is related to the schoolaÃâ Ys strong-arming clime ( e.g. , Do pupils in schools that have a batch of strong-arming demonstrate poorer academic public presentation? ) , and ( B ) whether student-teacher connection influences the bullying-achievement relationship ( e.g. , Do pupils who enjoy positive connection with instructors show positive academic accomplishment despite high degrees of strong-arming in their schools? ) . Sexual activity differences were besides explored.Statement of the ProblemThe job of intimidation has existed since the beginning of clip. The issue of pupil safety in schools as it relates to school-yard intimidation, nevertheless, was brought to the head of the American populace with the calamities at Columbine, Jonesboro, Conyers, and Paducah. The job continues and has been aggravated by the coming of the cyber strong-arming possible. Young people ââ¬Ës li ves have been impacted for their full hereafter by apparently mindless childhood Acts of the Apostless. Small research exists today on the perceptual experience of public school decision makers in Missouri with respect to strong-arming being a job in their school. In order to turn to the job of the school-yard bully, we must foremost analyze the attitudes and head sets of the work forces and adult females in charge of educating and protecting our immature people during the school twenty-four hours. Before realistic stairss can be taken by decision makers in battling school toughs, one must first understand and acknowledge that intimidation is a job. Research reveals that there are so physical, psychological, and emotional jobs exhibited by the victims of strong-arming while go toing school, but old research has made a weak effort to decently link the emotions of the victims with the ability to larn while at school. ( Kumpulainen, K. , & A ; Rasanen, E. , 2000 ) Although intimidation is an age old job in America, gender besides plays a major function in the types and features of strong-arming at school ( Crick & A ; Grotpeter, 1995 ) . Female and male striplings have a inclination to move and respond otherwise under the force per unit area of a school bully. Traditional signifiers of intimidation still take topographic point throughout schoolrooms and play evidences of American public schools, but in today ââ¬Ës universe we are now threatened with an even more powerful and perchance more psychologically detrimental signifier of intimidation, which is normally referred to as ââ¬Å" cyber intimidation â⬠.Purpose of the StudyThis qualitative instance survey research is an scrutiny of the perceptual experiences of school staff on intimidation and its impact on academic accomplishment. The participants of this survey will include 10 simple class instructors and 5 counsel counsellors of schools belonging to the South Georgia School District. Participants wi ll be chosen through random sampling. Informant interviews will be the primary informations assemblage method to be triangulated with secondary informations beginnings such as school records, studies, accomplishment trials, and other pertinent paperss which may be used to verify and supplement the literature reappraisal for a more thorough treatment of the findings. Data will be analyzed through the qualitative content analysis method.Research QuestionsThe cardinal inquiry addressed in this survey is: How does the school staff perceive intimidation and its relationship with academic accomplishment in simple class pupils? The undermentioned research inquiries guide this thesis: Q1. How do instructors and school psychologists of a South Georgia School District define intimidation? Q2. From the point of position of school staff, what types of intimidation behaviours are prevailing in their several schools? Q3. How does strong-arming act upon the academic results of both bully and victim? Q4. What are their functions and competences in turn toing intimidation in the school environment? Q5. How can instructors and decision makers help turn to school intimidation?Restrictions and Boundary linesThis research narrowly evaluates the perceptual experiences of school staff from public simple schools within the South George School District. This research specifically addresses the factors that contribute to strong-arming inside the school premises, the type of strong-arming the instructors observed, and most significantly how intimidation affected the academic public presentation of the victims and culprits.Definition of Key FootingsSchool Achievement is a pupil ââ¬Ës comprehension of peculiar information and proficiency with specific accomplishments. Bully refers to person who uses physical or verbal aggression on something of a regular footing against other immature people. Normally, toughs are found to be stronger, bigger, and more aggressive than their equals and victims. Strong-arming refers to Acts of the Apostless which are comprised of direct behaviours such as tease, teasing, endangering, striking, and stealing that are initiated by one or more pupils against a victim. In add-on to direct onslaughts, intimidation may besides be more indirect by doing a pupil to be socially isolated through knowing exclusion. Victim of strong-arming are typically dying, insecure, cautious, and suffer from low self-pride, seldom supporting themselves or revenging when confronted by pupils who bully them. They may miss societal accomplishments and friends, and they are frequently socially isolated.VictimizationSchool StaffImportance of the StudyThe intent of this survey was to find if there was a perceptual experience that existed or did non be within the ranks of Missouri public school decision makers and pupils of Missouri public schools refering the country of strong-arming among adolescent-age kids. If is the survey revealed that strong-arming in fact existed in public schools in Missouri, what was the impact for the victims of such Acts of the Apostless on their academic accomplishment? If intimidation is determined as a job in schools, do male and female striplings prosecute in strong-arming every bit and by utilizing the same methods? Another cardinal constituent of this survey is to place what, if a ny, schools policies presently are in topographic point in public schools in Missouri and the possible demand to make and follow extra policies in order to protect the victims of strong-arming. Although this survey could be viewed as a qualitative survey, the research worker has chosen to analyse the informations and develop decisions based on the responses of perceptual experiences, academic accomplishment, and policies that are presently found in the questionnaires and studies. This was a descriptive research with the intent of puting a foundation for farther research in specific countries identified as holding possible important impact on pupil public presentation and educator-preparation plans. The end of the survey is to offer through empirical observation researched, educated suggestions and replies sing what and how to make and implement policies covering with all signifiers of intimidation. It is the purpose of the research worker that this information, one time analyzed and dissected, will be a meaningful tool to any school territory in the province of Missouri and around the United States in the country of school policies. It is the premiss of the research worker that this survey will cast new visible radiation on the issues of electronic devices, their usage at school, and the impact that those devices have on the acquisition procedure.
Thursday, January 9, 2020
Summary Of The American Dream - 1216 Words
Juan Adame Ms.kelly lepsig English IV 31 March 2015 The American dream Its a beautiful warm sunday morning and Im sitting in the porch of my house everything is quiet, my wife and my three kids still sleeping, every thing around peaceful because the house is in the middle of 5 acres of land. Thats what i think of when i hear the term the ââ¬Å"American dreamâ⬠and for most americans thats what their goal is ââ¬Å"a set of ideals in which freedom includes the opportunity for prosperity and success, and an upward social mobility for the family and children, achieved through hard work in a society with few barriers.â⬠( American Dream. Wikipedia) But its not only a dream that americans have but also ââ¬Å"Many Latinos from Mexico, Central America, and South America have made the decision to immigrate to the United States in recent years whether legally or illegally. In the literature, stories of immigration and hopes for the American Dream proliferated however, varying degrees of racism and anti-immigration sen timent were also revealedâ⬠. (The American Dream What Is The American Dream? Students.) ââ¬Å"All man were created equal ââ¬Å"with the right to life,liberty and the pursuit of happinessâ⬠Some of the reasons to believe the american dream is still alive are people are fighting to accomplish their goals and also more teens are fiscally literate and realistic when it comes to their future, said Sherry Chris, presidentShow MoreRelatedSummary Of The American Dream 1682 Words à |à 7 Pages01-25 4 December 2016 The American Dream The American Dream has historically been defined as upward social mobility through hard work and determination regardless of circumstances at birth. However, it seems that this dream has died. Those in the lower and middle class find themselves working multiple jobs just to survive. They live paycheck to paycheck and are unable to save money to allow them to buy a house and escape from their economic perils. I believe the American dream is dead because peopleRead MoreDeath of a Salesman Summary + American Dream5929 Words à |à 24 Pagesthe loft where they sleep.à The two grown men discuss their past failures.à Biff says that he cantà find a jobà that both pays well and is satisfying, while Happy similarly admits that he doesnt like hisà job as aà business clerk.à Both brothers day-dream for a time about going out west and making a living together on a cattle ranch.à Men built like we are should be working out in the open, Biff asserts. Happy too, but Biff especially, feels guilty that hes not lived up to his fathersexpectationsRead MoreWomenââ¬â¢s Income Inequality and The American Dream Essay1358 Words à |à 6 Pagesabout, the American dream. The American dream that everyone is equal and has equal opportunities. Although a big part of what goes on in the Untied States that just doesnââ¬â¢t fit the American dream; women are unequal in the work place. They are put under what is known as the ââ¬Å"Glass Ceilingâ⬠. Women do not get promoted in the work place and arenââ¬â¢t getting equal pay as men. This also leads to wag gap between the men and women. Both create income inequality for women and affect their American Dream. ThereRead MoreLangston Hughes Poetry649 Words à |à 3 PagesHughes, the most memorable figure of the Harlem Renaissance, wrote everything from plays, short stories, novels, and most importantly poetry. Hughesââ¬â¢ writing is based on his personal views on frustration that he had towards the plight of African Americans. Langston has no fear with anything he is involved in and stood up for his people. Unfortunately, his people responded negatively towards his actions, for they thought he was creating more racial tensions. Nevertheless, this was not Hughesââ¬â¢ intentionsRead MoreThe American Dream996 Words à |à 4 PagesMy definition of American Dream If we ask most Americans what is the American Dream? the common answers are to become successful, rich, owning houses, cars and etc. In other countries, many people see America as a land of opportunities for a better life and that is the reason why they come here. Every individual who come to America have their goals or dreams that they want to fulfill in life that they can not fulfill in their own country. In another word, their American dream are to have betterRead MoreWhat Is American By Hector St. John De Crevecoeur1250 Words à |à 5 Pages*Summary: ââ¬Å"What Is Americanâ⬠ââ¬Å"What is Americanâ⬠by Hector St. John de Crevecoeur was an advertisement for America. America is explained as a beautiful and structured place that came to be after work was done to a wild woody place. The text stated ââ¬Å" he beholds air cities, substantial villages, extensive fields, an immense country filled with decent houses, good roads, orchards, meadows, and bridges, where an hundred years ago all was wild , woody and uncultivated!â⬠Another point that was made thatRead MoreSummary Of Where Are You Going, Where Have You Been?854 Words à |à 4 PagesSummary: According to Barstow, Connie represents American innocence and powerlessness. Connie has a hard time defending herself against Arnold Friend because of her lack of knowledge and the impact of American culture. The mother-daughter relationship plays a significant role in the story because had Connie and her mother communicated better, Connie, who is still a child, would have be protected from the evil of the world. Barstow also points out that the modern American is unable to distinguishRead MoreThe Great Gatsby647 Words à |à 3 Pagespresented depending on the author. In Fitzgeraldââ¬â¢s The Great Gatsby, the American Dream was the theme that was presented, and according to the story it is unachievable and just an infant fantasy that America portrays. While reading the story, the charactersââ¬â¢ views on how their interpretation of the American Dream, is well established in the middle of the story. There were spectacular views and dark views on what the American Dream is; according to Nick Carraway, the novelââ¬â¢s narrator, Jay Gatsbyââ¬â¢s viewRead MoreHarper Leeââ¬â¢s ââ¬Å"to Kill a Mockingbird Seeks to Focus Upon the Hypocrisy of the ââ¬ËAmerican Dreamââ¬â¢. Discuss.729 Words à |à 3 Pagesthe ââ¬ËAmerican Dreamââ¬â¢. Discuss. The American dream can be defined as a national ethos which encourages freedom for all individuals regardless of their race, religion, colour or socioeconomic status. Through the theory of American Exceptionalism and the Declaration of Independence, ââ¬Å"all men are created equalâ⬠, the American Dream presents itself as a system of equal opportunity and prosperity for all citizens. Author, Harper Lee, effectively draws attention to the hypocrisy of the American Dream in herRead MoreThe Grapes Of Wrath And Huckleberry Finn Analysis819 Words à |à 4 PagesThe American Dream is a dream in which life is fuller, better, happier and free. In the two books Adventures of Huckleberry Finn by Mark Twain, and The Grapes of Wrath by John Steinbeck, à each book shows the American Dream in a different way. In The Grapes of Wrath, the American Dream is shown as in illusion. That being because America is going through the Great Depression and itââ¬â¢s very difficult to make a living or even have food on a plate. However, in Adventures of Huckleberry Finn, the American
Wednesday, January 1, 2020
Group Topic Getting Motivated - 1092 Words
Cameron Group topic: Getting Motivated The main focus for todayââ¬â¢s group was to assist group members in developing motivations and strategies for staying abstinent and change their life for better. Group members were to identify problem areas in their current life and identify steps that would take to achieve long term goals. PO attended group on time as scheduled and moderately participated in the group activity. PO completed the worksheet, and identified the top three long term goals are ââ¬Å"stay clean and healthy, work on partner relationship conflicts, and rebuild credit scoreâ⬠. PO shared his negative self-talk and positive affirmation with peers. It appears that PO believes that staying clean and sober would change his life for aâ⬠¦show more contentâ⬠¦PO reported that he was not working the last few days due to a car accident and he was injured and stated that he is under the doctorââ¬â¢s care. PO has positive treatment response. Daniel Group topic: Getting Motivated The main focus for todayââ¬â¢s group was to assist group members in developing motivations and strategies for staying abstinent and change their life for better. Group members were to identify problem areas in their current life and identify steps that would take to achieve long term goals. PO attended group on time as scheduled and moderately participated in the group activity. PO completed the worksheet, and identified the top three long term goals are ââ¬Å"stay clean and abstinent from all mind-altering substances, pay all my fines, and be a good fatherâ⬠. PO shared his negative self-talk and positive affirmation with peers. PO reported completed the FOSA program, and he has a printing job interview after the group. It appears that PO is making small steps to achieve his personal goals. PO has positive treatment response. Jeffery Group topic: Getting Motivated The main focus for todayââ¬â¢s group was to assist group members in developing motivations and strategies for staying abstinent and change their life for better. Group members were to identify problem areas in their current life and identify steps that would take to achieve long term goals. PO attended group on time as scheduled and moderately participated in the group activity. PO
Subscribe to:
Posts (Atom)