Monday, August 5, 2019

Factors Influencing the Technical Defensive Measures on Spyw

Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl Factors Influencing the Technical Defensive Measures on Spyw Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl

Sunday, August 4, 2019

Film Analysis about Women in the Movie Pretty Woman Essay example -- e

The Hollywood movie Pretty Woman (1990) is about a prostitute in Hollywood, marrying an extremely rich businessman, in spite of her mutual distrust and prejudice. The movie contains the basic narrative of the Cinderella tale: through the love and help of a man of a higher social position, a girl of a lower social status moves up to join the man at his level. Vivian Ward (Julia Roberts) in Pretty Woman comes from a small town in Georgia, and works as a prostitute on the streets of Hollywood to support herself. Although Vivian's social position is very low, she has a strong sense of personal dignity and independence. Even though sometimes she have to stand by the street with empty stomach to wait for clients, Vivian and her friend Kit still keep themselves from the control of pimps, and "act as their own agents". Later, at the end of Vivian's one-week business arrangement with wealthy Edward Lewis (the Prince to her dream), which culminates in love and growing mutual respect, he offers her an apartment, a car and a credit card to get her off the streets, but she refuses. For Vivian, however, this arrangement is only different in terms of "geography" and terms of payment for the "business†; between them. Vivian knows that in society her own effort is the key to supporting herself and eventually securing a better future. She wants to set up a life in the city and tries very hard to look for a job. Due to lack of a skill, although she is willing to do heavy or dirty work, she is not able to find a job with enough pay to support herself. Her goal in life is simply to support herself by her own effort instead of letting somebody else arrange and control her life. This, in it self, represents a spirit of active effort for someone like Vivian. In addition to her efforts in trying to support herself and realize her own goals, Vivian also endeavors to help others. With a part of the $3000 windfall she earns from her week with Edward Lewis, she presses her friend Kit to pursue her long-dormant desire to become a beautician. And her most significant achievement is helping Edward Lewis, the corporate raider, rediscover his humanity, so he can build things instead of dismantling the work of othe rs for profit, and find a more meaningful life other than locking himself in work. The two aspects discussed above display the changes of emphasis on self-... ...ulminates in an attempt to rape her. In the attempted rape scene, it is very clear that Phil wants to rape Vivian not to quench an uncontrollable sexual impulse, but to give vent to all his anger for what he has lost -- the money from an unfriendly buyout that Edward has overturned with his newfound humanity, and the control of Edward. Phil wants to humiliate Vivian as he feels he has been humiliated, and, if possible, destroy her. The rape is not about sex but about abasement and power. Pretty Woman, 1990s Hollywood movie, embodies many new as well as old values and ideologies. I was surprised when I saw that, the old themes and sexual stereotypes are not completely abandoned, but the old portrayals of gender stereotypes are transmuted. Finally, the movie says that women, first of all, should rely on themselves and not submit to any kind of domination. They should simply support themselves by their own efforts instead of letting someone else arrange and control their lives. The movie also demonstrates how a girl possessing the virtues of honesty, patience, prudence, industry, and obedience can be rewarded with a husband and the attendant better life and higher social position.

Saturday, August 3, 2019

Further Celebration at Heorot :: Essays Papers

Further Celebration at Heorot PASSAGE SUMMARY Beowulf returns to Heorot after the heroic fight with Grendel's mother; and the Danish warriors, who were unable to stop the monsters' attacks themselves, salute the greatest of Geats. Beowulf greets Hrothgar and tells him about the war under water, the failure of Hrunting, and the slaying of Grendel's mother with the sword he found in the cave: "The sword itself had already melted, its patterned blade burned away: the blood was too hot for it, the spirit that had died there too poisonous" ( Norton, p.48). He presents the golden hilt of the giant sword to Hrothgar, who is grateful to Beowulf for making the land of the Danes free of monsters. Beowulf also brings Grendel's head as the evidence of his glory. Hrothgar then reminds Beowulf about the sin of hubris and tells him the story of Heremod as an example of what happens when that sin overtakes a man. The king also advises the hero, "Have no care for pride, great warrior" (Norton, p.49). Then everyone at Heorot enjoys a great feast. The next day, Beowulf returns Hrunting to Unferth, but says nothing about the sword's failure. Important Names BEOWULF is the remarkable hero of the Anglo-Saxon epic Beowulf, "the greatest of the surviving epics composed by the Germanic peoples" (Norton, 22). He is famous for his strength ("he has in his handgrip the strength of thirty men") and for his courage in fighting monsters. In the epic, Beowulf fights Grendel, a hateful monster who terrorizes Heorot; Grendel's mother, who tries to avenge the death of her son; and the Dragon, who threatens Beowulf's tribe and burns his hall. HROTHGAR is the noble and wise king of Danes. He is referred to as "protector of warriors" and "ring-giver," the latter epithet used to tell readers he is generous. He builds a magnificent mead-hall, Heorot, which becomes threatened by Grendel. Unable to fight Grendel himself, Hrothgar and his people suffer from his attacks for years until Beowulf comes and offers his services. GRENDEL is a monster who is a descendant of Cain, the brother-slayer. For twelve years, Grendel attacks Heorot and kills Danish people: "he wanted no peace with any of the men of the Danish host" (Norton, 29). Hrothgar, the Danish king, doesn't have enough strength to fight Grendel. Only Beowulf can rescue the Danes from the monster's attacks.

Friday, August 2, 2019

Innocence in William Blakes The Divine Image Essay -- Blake Divine Im

Innocence in Blake's The Divine Image  Ã‚      Blake was both a poet and an artist and he created many Illuminated works which combined the two. These forms, each powerful in their own right are even more so when used together as in "The Divine Image." In analyzing this piece I will be looking at the elements and principles of art, the corresponding ‘elements and principles' of poetry and how they support one another to convey William Blake's idea of Innocence. Elements are the fundamental building blocks used in either art or poetry. In art they are line, shape/form, value, texture, colour (which I wasn't able to deal with in this case as the only reproduction was black and white) and space. In poetry one might classify the elements as word choice, word placement, scansion or meter, capitalization and punctuation. Principles are what are produced by putting the elements together. In art they are focal point, movement, subordinate area (background or setting), contrast and repetition. Interestingly in poetry several are similar, namely movement, contrast and repetition. Other things one might classify as principles of poetry are rhyme, line treatment, and tone. Of all the elements of art I will be dealing with, line and shape are by far the most important. All the figures are outlined and the vines running throughout the picture constitute line as do the letters. Line is also essential in the creation of value as this was printed on a press and all the ink is the same value. To create changes in value Blake used different densities and numbers of lines. The only texture in this work is a sort of implied texture that comes with creating value through a build up of line; some areas tend to acquire a ridged look. The use o... ... contrast of the living and the fire but neither the vine nor the figures are consumed. This presents an image of innocence similar to that of the Lion and the Lamb. Both the poem and the image serve to re-enforce each other as they present the freedom, harmony, and safety found in the state of Innocence. It seems fitting that these together would be called an Illumination as they help shed light on Blake's true meaning. Works Cited and Consulted Blake, William. Songs of Innocence and of Experience. Intro. Geoffry Keynes. New York: Oxford University Press, 1967. Easson, Kay. "The Art of the Book." Blake in His Time. Essick and Pearce ed. 1978. (35-51). Frye, Northrop. "Poetry and Design in William Blake." The Journal of Aesthetics and Art Criticism. 10 (Sept., 1951) 35-42. Mellor, Anne. Blake's Human form divine. U of California P Berkeley; 1974.

Thursday, August 1, 2019

Coyote Blue Chapter 3~5

CHAPTER 3 The Machines of Irony Bring Memory Santa Barbara After Sam's secretary gave him the address of his appointment he hung up the cellular phone and punched the address into the navigation system he'd had installed in the Mercedes so he would always know where he was. Wherever Sam was, he was in touch. In addition to the cellular phone he wore a satellite beeper that could reach him anywhere in the world. He had fax machines and computers in his office and his home, as well as a notebook-sized computer with a modem that linked him with data bases that could provide him with everything from demographic studies to news clippings about his clients. Three televisions with cable kept his home alive with news, weather, and sports and provided insipid entertainments to fill his idle hours and keep him abreast of what was hot and what was not, as well as any information he might need to construct a face to meet a face: to change his personality to dovetail with that of any prospective client. The by-gone salesman out riding on a shoeshine and a smile had been replaced by a shape-shifting shark stalking the sale, and Sam, having buried long ago who he really was, was an excellent salesman. Even as some of Sam's devices connected him to the world, others protected him from its harshness. Alarm systems in his car and condo kept criminals at bay, while climate control kept the air comfortable and compact discs soothed away distracting noise. A monstrous multi-armed black machine he kept in his spare bedroom simulated the motions of running, cross-country skiing, stair climbing, and swimming, while monitoring his blood pressure and heart rate and making simulated ocean sounds that stimulated alpha waves in the brain. And all this without the risk of the shin splints, broken legs, drowning, or confusion that he might have experienced by actually going somewhere and doing something. Air bags and belts protected him when he was in the car and condoms when he was in women. (And there were women, for the same protean guile that served him as a salesman served him also as a seducer.) When the women left, protesting that he was charming but something was missing, there was a numb er that he could call where someone would be nice to him for $4.95 a minute. Sometimes, while he was getting his hair cut, sitting in the chair with his protections and personalities down, the hairdresser would run her hands down his neck, and that small human contact sent a lonesome shudder rumbling through him like a heartbreak. â€Å"I'm here to see Mr. Cable,† he said to the secretary, an attractive woman in her forties. â€Å"Sam Hunter, Aaron Assurance Associates. I have an appointment.† â€Å"Jim's expecting you,† she said. Sam liked that she used her boss's first name; it confirmed the personality profile he had projected. Sam's machines had told him that James Cable was one of the two main partners who owned Motion Marine, Inc., an enormously successful company that manufactured helmets and equipment for industrial deep-sea diving. Cable had been an underwater welder on the rigs off Santa Barbara before he and his partner, an engineer named Frank Cochran, had invented a new fiberglass scuba helmet that allowed divers to stay in radio contact while regulating the high-pressure miasma of gases that they breathed. The two became millionaires within a year and now, ten years later, they were thinking of taking the company public. Cochran wanted to be sure that at least one of the partners could retain controlling interest in the company in the event that the other died. Sam was trying to write a multi-million-dollar policy that would provide buy-out capital for the remaining partner. It was a simple partnership deal, the sort that Sam had done a hundred times, and Cochran, the engineer, with his mathematical way of thinking, his need for precision and order, his need to have all the loose ends tied up, had been an easy sale. With an engineer Sam simply presented facts, carefully laid out in an equationlike manner that led to the desired answer, which was: â€Å"Where do I sign?† Engineers were predictable, consistent, and easy. But Cable, the diver, was going to be a pain in the ass. Cable was a risk taker, a gambler. Any man who had spent ten years of his life working hundreds of feet underwater, breathing helium and working with explosive gas, had to have come to terms with fear, and fear was what Sam traded in. In most cases the fear was easy to identify. It was not the fear of death that motivated Sam's clients to buy; it was the fear of dying unprepared. If he did his job right, the clients would feel that by turning down a policy they were somehow tempting fate to cause them to die untimely. (Sam had yet to hear of a death considered â€Å"timely.†) In their minds they created a new superstition, and like all superstitions it was based on the fear of irony. So, the only lottery ticket you lose will be the winning one, the one time you leave your driver's license at home is the time you will be stopped for speeding, and when someone offers you an insurance policy that only pays you if you're dead, you better damn well buy it. Irony. It was a tacit message, but one that Sam delivered with every sales pitch. He walked into Jim Cable's office with the unusual feeling of being totally unprepared. Maybe it was just the girl who had thrown him, or the Indian. Cable was standing behind a long desk that had been fashioned from an old dinghy. He was tall, with the thin, athletic build of a runner, and completely bald. He extended his hand to Sam. â€Å"Jim Cable. Frank told me you'd be coming, but I'm not sure I like this whole thing.† â€Å"Sam Hunter.† Sam released his hand. â€Å"May I sit? This shouldn't take long.† This was not a good start. Cable gestured for Sam to sit across from him and sat down. Sam remained standing. He didn't want the desk to act as a barrier between them; it was too easy for Cable to defend. â€Å"Do you mind if I move this chair over to your side of the desk? I have some materials I'd like you to see and I need to be beside you.† â€Å"You can just leave the materials, I'll look them over.† Technology had helped Sam over this barrier. â€Å"Well, actually it's not printed matter. I have it in my computer and I have to be on the same side of the screen as you.† â€Å"Okay, I guess that's fine, then.† Cable rolled his chair to the side to allow Sam room on the same side of the desk. That's one, Sam thought. He moved his chair, sat down beside Cable, and opened the notebook computer. â€Å"Well, Mr. Cable, it looks like we can set this whole thing up without any more than a physical for you and Frank.† â€Å"Whoa!† Cable brought his hands up in protest. â€Å"We haven't agreed on this yet.† â€Å"Oh,† Sam said. â€Å"Frank gave me the impression that the decision had been made – that this was just a meeting to confirm the tax status and pension benefits of the policy.† â€Å"I didn't know there were pension benefits.† â€Å"That's why I'm here,† Sam said. It wasn't why he was there at all. â€Å"To explain them to you.† â€Å"Well, Frank and I haven't gotten down to any specifics on this. I'm not sure it's a good idea at all.† Sam needed misdirection. He launched into the presentation like a pit bull/Willy Loman crossbreed. As he spoke, the computer screen supported his statements with charts, graphs, and projections. Every five seconds a message flashed across the screen faster than the eye could see, but not so fast that it could not nibble on the lobes of the subconscious like a teasing lover. The message was: BE SMART, BUY THIS. Sam had designed the program himself. The BE SMART part of the message could be modified for each client. The options were: BE SEXY, BE YOUNG, BE BEAUTIFUL, BE THIN, BE TALL, and Sam's personal favorite, BE GOD. He'd come up with the idea one night while watching a commercial in which six heavily muscled guys got to run around on the beach impressing beautiful women presumably because they drank light beer. BE A STUD, DRINK LIGHT. Sam finished his presentation and stopped talking abruptly, feeling that he had somehow forgotten something. He waited, letting the silence become uncomfortable, letting the conversation lay on the desk before them like a dead cat, letting the diver come to the correct conclusion. The first one to speak loses. Sam knew it. He sensed that Cable knew it. Finally, Jim Cable said, â€Å"This is a great little computer you have. Would you consider selling it?† Sam was thrown. â€Å"But what about the policy?† â€Å"I don't think it's a good idea,† Cable said. â€Å"But I really like this computer. I think it would be smart to buy it.† â€Å"Smart?† Sam said. â€Å"Yeah, I just think it would be a smart thing to do.† So much for subliminal advertising. Sam made a mental note to change his message to: BE SMART, BUY THE POLICY. â€Å"Look, Jim, you can get a computer like this in a dozen stores in town, but this partnership policy is set up for right now. You are never going to be younger, you'll never be in better health, the premium will never be lower or the tax advantage better.† â€Å"But I don't need it. My family is taken care of and I don't care who takes control of the company after I'm dead. If Frank wants to take a policy out on me I'll take the physical, but I'm not betting against myself on this.† There it was. Cable was not afraid and Sam knew no way to instill the fear he needed. He had read that Cable had survived several diving accidents and even a helicopter crash while being shuttled to one of the offshore rigs. If he hadn't glimpsed his mortality before, then nothing Sam could say would put the Reaper in his shaving mirror. It was time to walk away and salvage half of the deal with Cable's partner. Sam stood and closed the screen on the computer. â€Å"Well, Jim, I'll talk to Frank about the specifics of the policy and set up the appointment for the physical.† They shook hands and Sam left the office trying to analyze what had gone wrong. Again and again the fear factor came up. Why couldn't he find and touch that place in Jim Cable? Granted, his concentration had been shot by the morning's events. Really, he'd done a canned presentation to cover himself. But to cover what? This was a clean deal, cut and dried. When he climbed back into the Mercedes there was a red feather lying on the seat. He brushed it out onto the street and slammed the door. He drove back to his office with the air conditioner on high. Still, when he arrived ten minutes later, his shirt was soaked with sweat. CHAPTER 4 Moments Are Our Mentors Santa Barbara There are those days, those moments in life, when for no particular reason the senses are heightened and the commonplace becomes sublime. It was one of those days for Samuel Hunter. The appearance of the girl, the wanting she had awakened in him, had started it. Then the Indian's presence had so confused him that he was fumbling through the day marveling at things that before had never merited a second look. Walking back into his outer office he spied his secretary, Gabriella Snow, and was awed for a moment by just how tremendously, how incredibly, how child-frighteningly ugly she was. There are those who, deprived of physical beauty, develop a sincerity and beauty of spirit that seems to eclipse their appearance. They marry for love, stay married, and raise happy children who are quick to laugh and slow to judge. Gabriella was not one of those people. In fact, if not for her gruesome appearance, an unpleasant personality would have been her dominant feature. She was good on the phone, however, and Sam's clients were sometimes so relieved to be out of her office and into his that they bought policies out of gratitude, so he kept her on. He'd hired her three years ago from the resume she had mailed in. She was wildly overqualified for the position and Sam remembered wondering why she was applying for it in the first place. For three years Sam had breezed by her desk without really looking at her, but today, in his unbalanced state, her homeliness inspired him to poetry. But what rhymed with Gabriella? She said, â€Å"Mr. Aaron is very anxious to talk to you, Mr. Hunter. He requested that you go right into his office as soon as you arrived.† â€Å"Gabriella, you've been here three years. You can call me Sam.† Sam was still thinking about poetry. Salmonella? â€Å"Thank you, Mr. Hunter, but I prefer to keep things businesslike. Mr. Aaron was quite adamant about seeing you immediately.† Gabriella paused and checked a notepad on her desk, then read, â€Å"‘Tell him to get his ass in my office as soon as he hits the door or I'll have him rat-fucked with a tire iron. â€Å" â€Å"What does that mean?† Sam asked. â€Å"I would assume that he would like to see you right away, sir.† â€Å"I guessed that.† Sam said. â€Å"I'm a little vague on the rat-fucked part. What do you think, Gabriella?† Gabriella, Gabriella, As fair as salmonella. â€Å"I'm sure I don't know. You might ask him.† â€Å"Right,† Sam said. He walked down the hall to Aaron Aaron's outer office, composing the next line of his poem along the way. It wouldn't surprise me in the least If you were mistaken for a beast. Aaron Aaron wasn't Aaron's real name: he had changed it so his insurance firm would be the first listed in the yellow pages. Sam didn't know Aaron's real name and he had never asked. Who was he to judge? Samuel Hunter wasn't his real name either, and it was certainly less desirable alphabetically. Aaron's secretary, Julia, a willowy actress/model/dancer who typed, answered phones, and referred to hairdressers as geniuses, greeted Sam with a smile that evinced thousands in orthodontia and bonding. â€Å"Hi, Sam, he's really pissed. What did you do?† â€Å"Do?† â€Å"Yeah, on that Motion Marine deal. They called a few minutes ago and Aaron went off.† â€Å"I didn't do anything,† Sam said. He started into Aaron's office, then turned to Julia. â€Å"Julia, do you know what rat-fuck means?† â€Å"No, Aaron just said that he was going to do it to you for sucking the joy out of his new head.† â€Å"He got a new head? What's this one?† â€Å"A wild boar he shot last year. The taxidermist delivered it this morning.† â€Å"Thanks Julia, I'll be sure to notice it.† â€Å"Good luck.† Julia smiled, then held the smile while she checked herself in the makeup mirror on her desk. Walking into Aaron's office was like stepping into a nineteenth-century British hunt club: walnut paneling adorned with the stuffed heads of a score of game animals, numbered prints of ducks on the wing, leather wing-back chairs, a cherry-wood desk clear of anything that might indicate that a business was being conducted. Sam immediately spotted the boar's head. â€Å"Aaron, it's beautiful.† Sam stood in front of the head with his arms outstretched. â€Å"It's a masterpiece.† He considered genuflecting to appeal to the latent Irish Catholic in Aaron, but decided that the insincerity would be spotted. Aaron, short, fifty, balding, face shot with veins from drink, swiveled in his high-backed leather chair and put down the Vogue magazine he had been leafing through. Aaron had no interest in fashion; it was the models that interested him. Sam had spent many an afternoon listening to Aaron's forlorn daydreams of having a showpiece wife. â€Å"How was I to know that Katie would get fat and I would get successful? I was only twenty when we got married. I thought the idea of getting laid steadily was worth it. I need a woman that goes with my Jag. Not Katie. She's pure Rambler.† Here he would point to an ad in Vogue. â€Å"Now, if I could only have a woman like that on my arm†¦Ã¢â‚¬  â€Å"She'd have you surgically removed,† Sam would say. â€Å"Sure, be that way, Sam. You don't know what it's like to think that getting a little strange could cost you half of what you own. You single guys have it all.† â€Å"Stop romanticizing, Aaron. Haven't you heard? Sex kills.† â€Å"Sure, suck the joy out of my fantasies. You know, I used to look forward to sex because it was fifteen minutes when I didn't have to think about death and taxes.† â€Å"If you do think about death and taxes it lasts half an hour.† â€Å"That's what I mean, I can't even get distracted with Katie anymore. Do you know what someone with my income has to pay in taxes?† The question came up in every one of their conversations. They had worked together for almost twenty years and Aaron always treated Sam as if he were still fifteen years old. â€Å"I know exactly what someone with your income is supposed to pay in taxes, about ten times what you actually pay.† â€Å"And you don't think that that weighs on me? The IRS could take all this.† Sam rather liked the vision of a team of IRS agents loading large dead animal heads into Aaron's Jag and driving off with antlers out every window while Katie stood by shouting, â€Å"Hey, half of those are mine!† No matter how much Aaron attained, he would never let go of his fear of losing it long enough to enjoy it. In his mind's eye, Sam imagined Aaron mournfully watching as they carried the wild boar head out by the tusks. â€Å"This thing is gorgeous,† Sam said. â€Å"I think I'm getting a woody just looking at it.† â€Å"I named it Gabriella,† Aaron said proudly, forgetting for a moment that he was supposed to be angry. Then he remembered. â€Å"What the fuck did you just pull over at Motion Marine? Frank Cochran is talking lawsuit.† â€Å"Over a little subliminal advertising? I don't think so.† â€Å"Subliminal advertising! Jim Cable fainted after that stunt you pulled. They don't even know what happened yet. It could be a heart attack. Are you out of your fucking mind? I could lose the agency over this.† Sam could see Aaron's blood pressure rising red on his scalp. â€Å"You thought it was a great idea last week when I showed it to you.† â€Å"Don't drag me into this, Sam, you're on your own with this one. I've pulled some shit in my time to push the fear factor, but I never had a client attacked by an Indian, for Christ's sake.† â€Å"Indian?† Sam almost choked. He lowered himself very gently into one of the leather wing-backs. â€Å"What Indian?† â€Å"Don't bullshit me, Sam. I taught you everything you know about bullshitting. Right after you left his office Jim Cable walked out of the Motion Marine building and was attacked by a guy dressed up as an Indian. With a tomahawk. If they catch the guy and he tells that you hired him, it's over for both of us.† Sam tried to speak but could find no breath to drive his voice. Aaron had been his teacher, and in a twisted, competitive way, Aaron was his friend and confidant, but he had never trusted Aaron with his fears. He had two: Indians and cops. Indians because he was one, and if anyone found out it it would lead to policemen, one of whom he had killed. Here they were, after twenty years, paralyzing him. Aaron came around the desk and took Sam by the shoulders. â€Å"You're smarter than this, kid,† he said, softening at Sam's obvious confusion. â€Å"I know this was a big deal, but you know better than to do something desperate like that. You can't let them see that you're hungry. That's the first rule I taught you, isn't it?† Sam didn't answer. He was looking at the mule deer head mounted over Aaron's desk, but he was seeing the Indian sitting in the cafe grinning at him. Aaron shook him. â€Å"Look, we're not totally screwed here. We can draw up an agreement signing all your interest in the agency over to me and backdate it to last week. Then you would be working as an independent contractor like the other guys. I could give you, say, thirty cents on the dollar for your shares under the table. You'd have enough to fight the good fight in court, and if they let you keep your license you'll always have a job to come back to. What do you say?† Sam stared at the deer head, hearing Aaron's voice only as a distant murmur. Sam was twenty-six years and twelve hundred miles away on a hill outside of Crow Agency, Montana. The voice he was hearing was that of his first teacher, his mentor, his father's brother, his clan uncle: a single-toothed, self-proclaimed shaman named Pokey Medicine Wing. CHAPTER 5 The Gift of a Dream Crow Country – 1967 Sam, then called Samson Hunts Alone, stood over the carcass of the mule deer he had just shot, cradling the heavy Winchester.30?C30 in his arms. â€Å"Did you thank the deer for giving its life up for you?† Pokey asked. As Samson's clan uncle, it was Pokey's job to teach the boy the ways of the Crow. â€Å"I thanked him, Pokey.† â€Å"You know it is the Crow way to give your first deer away. Do you know who you will give it to?† Pokey grinned around the Salem he held between his lips. â€Å"No, I didn't know. Who should I give it to?† â€Å"It is a good gift for a clan uncle who has said many prayers for your success in finding a spirit helper on your vision quest.† â€Å"I should give it to you, then?† â€Å"It is up to you, but a carton of cigarettes is a good gift too, if you have the money.† â€Å"I don't have any money. I will give you the deer.† Samson Hunts Alone sat down on the ground by the deer carcass and hung his head. He sniffed to fight back tears. Pokey kneeled beside him. â€Å"Are you sad for killing the deer?† â€Å"No, I don't see why I have to give it away. Why can't I take it home and let Grandma cook it for all of us?† Pokey took the rifle from the boy, levered a cartridge into the chamber, then let out a war whoop and fired it into the air. Samson stared at him as if he'd lost his mind. â€Å"You are a hunter now!† Pokey cried. â€Å"Samson Hunts Alone has killed his first deer!† he shouted to the sky. â€Å"Soon he will be a man!† Pokey crouched down to the boy again. â€Å"You should be happy to give the deer away. You are Crow and it is the Crow way.† Sam looked up, his golden eyes shot with red and brimming with tears. â€Å"One of the boys at school says that the Crow are no more than thieves and scavengers. He said that the Crow are cowards because we never fought the white man.† â€Å"This boy is Cheyenne?† Pokey said. â€Å"Yes.† â€Å"Then he is jealous because he is not Crow. The Crow gave the Cheyenne and the Lakota and the Blackfoot a reason to get up in the morning. They outnumbered us ten to one and we held our land against them for two hundred years before the white man came. Tell this boy that his people should thank the Crow for being such good enemies. Then kick his ass.† â€Å"But he is bigger than me.† â€Å"If your medicine is strong you will beat him. When you go on your fast next week, pray for warrior medicine.† Samson didn't know what to say. He would go to the Wolf Mountains next week for his first vision quest. He would fast and pray and hope to find a spirit helper to give him medicine, but he wasn't sure he believed, and he didn't know how to tell Pokey. â€Å"Pokey,† the boy said finally, very quietly, his voice barely audible over the hot breeze whistling through the prairie grass, â€Å"a lot of people say that you don't have no medicine at all, that you are just a crazy drunk.† Pokey put his face so close to Samson's that the boy could smell the cigarette-and-liquor smell coming off him. Then, softly, in a gentle, musical rasp he said, â€Å"They're right, I am a crazy drunk. The others are afraid of me 'cause I'm so crazy. You know why?† Sam sniffed, â€Å"Nope.† Pokey reached into his pocket and pulled out a small buckskin bundle tied with a thong. He untied the thong and unfolded the buckskin on the ground before the boy. In it lay an array of sharp teeth, claws, a tuft of tan fur, some loose tobacco, sweet grass, and sage. The largest object was a wooden carving of a coyote about two inches tall. â€Å"Do you know what this is, Samson?† Pokey asked. â€Å"Looks like a medicine bundle. Ain't you supposed to sing a song when you open it?† â€Å"Don't have to with this one. Nobody ever had medicine like this. I ain't never showed it to anyone before.† â€Å"What are those teeth?† â€Å"Coyote teeth. Coyote claws, coyote fur. I don't tell people about it anymore because they all say I'm crazy, but my spirit helper is Old Man Coyote.† â€Å"He's just in stories,† Sam said. â€Å"There isn't any Old Man Coyote.† â€Å"That's what you think,† Pokey said. â€Å"He came to me on my first fast, when I was about your age. I didn't know it was him. I thought it would be a bear, or an otter, because I was praying for war medicine. But on the fourth day of my fast I looked up and there was this young brave standing there dressed in black buckskins with red woodpecker feathers down his leggings and sleeves. He was wearing a coyote skin as a headdress.† â€Å"How did you know it wasn't just somebody from the res?† â€Å"I didn't. I told him to go away and he said that he had been away long enough. He said that when he gave the Crows so many enemies he promised that he would always be with them so they could steal many horses and be fierce warriors. He said it was almost time to come back.† â€Å"But where is he?† Samson asked. â€Å"That was a long time ago and no one has seen him. If he was here they wouldn't say you were crazy.† â€Å"Old Man Coyote is the trickster. I think he gave me this medicine to make me crazy and make me want to drink. Pretty Eagle, who was a powerful medicine man then, told me how to make this bundle and he told me that if I was smart I would give it to someone else or throw it in the river, but I didn't do it.† â€Å"But if it is bad medicine, if he is your spirit helper and doesn't help you†¦Ã¢â‚¬  â€Å"Does the sun rise just for you, Samson Hunts Alone?† â€Å"No, it rises all over the world.† â€Å"But it passes you and makes you part of its circle, doesn't it?† â€Å"Yeah, I guess so.† â€Å"Well maybe this medicine is bigger than me. Maybe I am just part of the circle. If it makes me unhappy then at least I know why I am unhappy. Do you know why you are unhappy?† â€Å"My deer†¦Ã¢â‚¬  â€Å"There will be other deer. You have your family, you are good in school, you have food to eat, you have water to drink. You can even speak Crow. When I was a boy they sent me off to a BIA school where they beat us if we spoke Crow. Next week, if your heart is pure, you will get a spirit helper and have strong medicine. You can be a great warrior, a chief.† â€Å"There aren't any chiefs anymore.† â€Å"It will be a long time before you are old enough to be a chief. You are too little to be unhappy about the future.† â€Å"But I am. I don't want to be Crow. I don't want to be like you.† â€Å"Then be like you.† Pokey turned away from the boy and lit another cigarette. â€Å"You make me angry. Give me your knife and I will show you how to dress this deer. We will throw the entrails in the river as a gift to the Earth and the water monsters.† Pokey looked at Samson, as if waiting for the boy to doubt him. â€Å"I'm sorry, Pokey.† The boy unsnapped the sheath on his belt and drew a wickedly curved skinning knife. He held it out to the man, who took the knife and began to field-dress the deer. As he drew the blade down the deer's stomach he said, â€Å"I am going to give you a dream, Samson.† Samson looked away from the deer into Pokey's face. There were always gifts among the Crow – gifts for names, Sun Dance ceremony gifts, powwow gifts at Crow Fair, naming ceremony gifts, gifts for medicine, gifts to clan uncles and aunts, gifts for prayers: tobacco and sweet grass and shirts and blankets, horses and trucks – so many gifts that no one could ever really be poor and no one ever really got rich. But the gift of a dream was very pure, very special, and could never be repaid. Samson had never heard anyone give a dream before. â€Å"I dreamed that Old Man Coyote came to me and he said, ‘Pokey, when everything is right with you, but you are so afraid that something might go wrong that it ruins your balance, then you are Coyote Blue. At these times I will bring you back into balance. This dream that I dreamed I give to you, Samson.† â€Å"What does that mean, Uncle Pokey?† â€Å"I don't know, but it is a very important dream.† Pokey wiped the knife on his pants and handed it to Samson, then hoisted the deer up on his shoulders. â€Å"Now, who are you going to give this deer to?†

Fear of Heights

Many individuals suffer from a phobia or a natural fear of something or a current situation that they may have been in or are in currently. One of the most common phobias is having a fear of heights, also called Acrophobia. Acrophobia is often mislabeled as vertigo. Researchers have said that â€Å"those with an extreme fear of heights, that the stronger their fear is, the bigger the error could be (Callaway, 2009). The fear of heights in different learning perspectivesSomeone that is truly associated with acrophobia can go into panic mode when having to face that fear, normally right away their first thought is to grab ahold of something to help them feel more secure, but then there are others that will start shaking, sweating, holler, panic, or even break down and cry. When the individual that has this phobia starts to show all those signs that is their unconditioned responses starting to show. (Fritscher. 2011) The system that helps alert us is the unconditioned stimulus.  (Rud en, 2012)At times their unconditioned stimulus will kick in to say and make them panic to the extreme levels of them crawling around on all fours or even as so much lay in a fetal position (Fritscher, 2011). Although every person handles their phobia in a different manner, most still find it difficult to trust in their own sense of balance and when this occurs, they can’t think properly because they are trying to deal with the fear of heights. (Fritscher, 2011). An example could be that someone went on vacation, they went to New York with their family.Anyone that goes to New York more than likely knows about the many skyscrapers, one being The Empire State building. That building in particular has 102 floors and has about 1, 860 steps from top to bottom and stands tall at 1, 454 feet (www. esbnyc. com). Now, most that have acrophobia, their unconditioned responses kick in, they start thinking the worse possible thoughts. If they are using the elevator to reach the different l evels building, then you will start to see the signs of an unconditioned response kick in.They will shake, sweat, hard to calm down and will have the fear of not being able to hold onto things. If they are using the steps to reach the different levels, that individual could very well start thinking if the possibility of a fire occurring. Not knowing what level the fire could possibly be on, they start to panic and stop thinking clearly and if they are giving directions over a loud speaker, their fear is going to already be showing and they may not be listening very well to hear the instructions that are given.When we start thinking along the lines of conditioned responses, we could use visiting a skyscraper as an example as well. We can use an individual’s response when they do start to panic, sweat, crawl on all fours or even be in the fetal position. We can associate the conditioned stimulus to their fear of heights and know when they show those symptoms that is their condi tioned response to facing their fear (McLeod, 2008).Certain situations may become helpful and if the individual trust you enough to help them, allowing them to face their fears can be beneficial, but if the individual starts to panic moving he or she to a safe location will allow them to relax and regain their thoughts (Ruden, 2012) When individuals have the fear of heights, it is critical for them to seek some sort of therapy to help treat the anxiety that comes along with phoebe (Ruden, 2012) When trying to find treatment for acrophobia, he or she will find that it is normal to go through a behavioral program.The program with help to slowly expose an individual to different situations such as taking them to heights, allowing the person to express their fears and concerns all the while of teaching that individual relaxation tips that will help them remain in a calm state and be able to help themselves to overcome the fear that they have (Bailey, 2008).