Monday, January 27, 2020

Event design and experience

Event design and experience Introduction Before we can discuss what an event is we must understand what the definition of event design is, for the purpose of this report we shall be employing a definition taken from EMBOK which we feel is the clearest definition. Event management is the process by which an event is planned, prepared and produced. As with any other form of management, it encompasses the assessment, definition, acquisition, allocation, direction, control and analysis of time, finances, people, products, services and other resources to achieve objectives. An event a mangers job is to oversee and arrange every aspect of an event, including researching, planning, organizing, implementing, controlling and evaluation and events design, activities and production. Silver (2004a) Update EMBOK structure. Chicago the theatrical musical was performed at the Kings Theatre, Glasgow and was attended on the 10th October 2009. For the purpose of this report we shall be looking at the how the event was staged and the interaction of the performers, audience members and stakeholders which when put together would hopefully make the experience a positive one for all those involved. The first known record of theatre was noted by historians in the performance of the sacred plays of the myth of Osiris and Isis in 2500 BC in Egypt. This story of the god Osiris was performed by the Egyptians annually at festivals throughout its civilization and thus marking the beginning of a long relationship between theatre and religion. Theatre has also played a large part in society by interacting with the public as well as entertaining and educating them. Description of Event The main purpose of modern theatre is to entertain the customer and as such that is the main reason why people in 2010 attend productions. Kings Theatre, Glasgow was opened in 1904 at such a time when Glasgow was one of the leading industrial cities in the UK if not the world and as such the building retains a sense of history for customers who attend performances today. The performance on the night lasted 2 hours 30 minutes with one standard interval of 15 minutes after the 1st act which is common place for all theatre productions. Seating in the Kings Theatre is over 4 levels and includes Stalls, Grand Circle, Upper Circle and the Gallery and shall seat a maxim of 1,785. On the night of the 10th October the cast was performing to a Full House as it was the productions last Saturday night performance before leaving Glasgow, this factor was an added bonus when it came to the atmospheric conditions for the customers or another word for it would be an Eventscape Analysis of Elements of Interaction Interacting people At an event such as a musical not only is it the cast and audience who interact but a whole host of other people which could include the stakeholders, ticket sellers, ushers, merchanance sellers. Rossman states that to; Understand the role that relationships play in the interaction of a programme and anticipating how they may contribute to or detract from client satisfaction is an important element of place. Programmers cannot simply assume that the best course of action is always to foster or create a relationship between individuals who attend an event Rossman (2003, p.38) As such event designers do not have to provide a relationship for everyone or different groups that shall take part in the production and subsequently if they do they run the risk of over complicating the event. First contact that a customer would have had in regards to Chicago the Musical would either have been the advertisement of the event or the online or telephone booking of tickets. This is where the customer will start to make expected expectations and where the event designer and the customer can differ in their expectations, which could lead to a shortfall for the customer and disappointment for the event designer. What would be the purpose of an event if people were not going to participating in the event! The answer would be none. People are what make an event; they are what make an experience by interacting with the customers or participants. Since this report is going to be in reference to a theatrical event I shall try to include references which will refer to the theatre. Relationships Jackson argues that, not only are characters and story line likely to have the biggest impact upon audiences but the metatext (Harris et al., 2003) is an important task that needs to be undertaken for events if they are to reach their experiential goal (2005, p.8). Taking this into account and having the currant fashion of casting celebrities in leading roles in order to capitalise on multiple audience avenues, this will offer the event designer the possibility of increased numbers for the run of the production. This extra dimension could offer another market base of potential audience members who had never previously considered going to the theatre. Their first contact would have maybe been an article in a newspaper or online advertising the fact that their favourite soup star would be performing in Chicago. In this case the soup fan feels that they already have a relationship with the character but this relationship runs the risk of failing due to pre-conceived ideas and expectatio ns when the soup character is confused with the theatre character or falls short of delivery. Rules Rules play a large part in everyday life and are a guide as to how we can interact with others or situations. Rossman, 2003 states that Rules through are also codified and ceremonial and there are also rules of everyday discourse that require understanding. Looking at the example of the theatrical performance of Chicago which was performed at the Kings Theatre Glasgow, this event ran to a widely accepted template of rules and rituals. Although there are rules which are in place for the purpose of legal or for behaviour reasons, there are also polite-ceremonial rules which are also in force throughout the performance. An example of this would be that it would be deemed inappropriate for an audience member to talk or leave their seats while the performance is still taking place. Another polite-ceremonial rule would be that it would be considered rude for any audience members to eat anything which would make a noise and distract other audience members from enjoying the performance. By having rules which govern the audiences interaction of the performance this would influence the experience that the audience would have. Common place for theatrical performances is to have everyone seated at least 5 minutes before the performance is due to start this is done by the means of a tannoy annoyisment of Ladies and Gentlemen, 5 minute to curtain call. There are also rituals which take place before, during and after a performance and would be expected by the audience, if they did not take place and audience could possibly feel disappointment or even that the performance was incomplete. Audience member through past experiences and expectations now assume that the all the cast should take to the stage for one last bow and then clear the stage to be left with the leading actors for a final bow and show of appreciation . If this was not to happen I feel that the audience would continue to sit in their seats with a feeling of confusion and disappointment. Objects There are three different types of objects as stated by and they are represented by social, symbolic and physical meaning. For the purpose of the Chicago performance the object which has become symbolic for the performance would be the score which was composed by Fred Ebb according to the Internet Broadway Database (www.ibdb.com). Without this particular music the performance for Chicago would not be Chicago, it would become something else completely. Looking at the physical objects of the musical this would include the Kings Theatre building in which the performance took place. Also the characters themselves in the musical would be a physical aspect for the objects as the characters are specific to this musical and could not be transferred to another. For the Social object for the performance the audience had come together for a shared experience with most having an appreatation for musicals. They would have had to have paid for their tickets and as such would have either purchased them online or direct at the ticket office at the Kings Theatre. Physical Setting Chicago the Musical was staged as discussed earlier at the Kings Theatre, Glasgow. Possible locations for a world renowned musical to be staged in Glasgow would only include the Kings and Theatre Royal, bookings for both theatres would have been made at least 1 year in advance. Venues for theatre or musicals can vary according to many factors which could influence the choice for the event designer. Physical Setting for the event designer would also look at catchment area for customers the reason why Glasgow was chosen would include the fact that it is Scotlands largest city and that the musical had already performed at the Edinburgh Playhouse. Fortunately the performance of the musical is not synonymous with the venue and this allows the act to travel to new locations. Although the venue does change, the set in regards to the performance shall stay the same no matter where the musical is performed. This means that there is no limit to where the event can perform but also that there is continuity for the customers who do attend the event at the different locations. According to Allen el al., 2005 The relationship between event and location is often fundamental to the experience, and one useful categorisation is that given to hallmark events where the event has become linked and identified with the spirit of a particular place. Also to be included in the Physical setting of the performance would be the temperature for the audience members, whether that to be too cold, too hot or it was an outdoor event if it was raining. On the night of the 10th October the Kings Theatre, Glasgow was a capacity sell out performance and the outside temperature was pleasant for the time of year. Unfortunately for the whole of both the first and second half of the performance the inside temperature of the theatre was unbearably hot which resulted in the side emergency exists being opened to although cooler air for the cast and audience members. This aspect resulted in audiences members having a negative experience throughout the performance which could have jeopardised the whole enjoyment of the event for the audience. Animation Graham Berridge states that animation in regards to events is the most difficult of the 6 elements which we have covered in this report. Some of the most successful events are the ones that appear to be spontaneous in their design for the audience, although this is rarely the case from the event designers point of view. In regards to a theatrical performance in the terms of animation all plays, operas, musicals and theatre productions must from both the audience and the actors perceptive have structure throughout the performances although for different reasons. For the purpose of theatre the performance must have structure in order for the event to run smoothly and on schedule, this must be planned in advance. Movement, dance and choreography must be planned and rehearsed and actors must learn their lines. All this once put together would allow the audience members to feel that the performance, although staged the overlapping elements will have a flow to the design. If an audience member were to purchase a Programme Guide on the night of Chicago they would have had clear written view of the structure of the performance and the actors as well as when they could anticipate the break in the show. Conclusion In order to fully understand an event the customer or audience member must be able to analyse what has happened at that event to completely experience the full effect from the event. For people in the events industry to try and understand an event, Solomon (1983) provides the industry with a definition which will allow us to break down the process of analyse; Symbolic interactionism focuses on the processes by which individuals understand their world. It assumes that people interpret the actions of others rather than simply react to them Solomon (1983) Audience members throughout the theatrical performance shall interpret different symbols and react to them in their own way which shall result in the event designer having to anticipate every possible reaction, which is extremely difficult. Was the event a success? This question shall be answered differently for each and every audience member as each person will interpret the event in their own way. Each of Rossmans six elements will go into their event analysis and will result in understanding the event better. The theartrcal performance of Chicago runs to a well oiled plan which is easily transferred from one venue to another and has run since 1975. This allows the cast and crew to have an easy tranison between locations and would show up any potential problems to the event designers. References Allen, Judy, The Business of Event Planning. 2004 edition. John Wiley Sons Canada Ltd Anglia Ruskin University, Harvard System of Referencing Guide, Available at http://libweb.anglia.ac.uk/referencing/harvard.htm [Accessed 25/11/09] Berridge, Graham, Events Design and Experience. 2009 edition. Elsevier Butterworth Heinemann Blowdin Glenn, Allen Johny, OToole William, Harris Rob, McDonnell Ian, Events Management. 2nd Edition. Elsevier Butterworth Heinemann Internet Broadway Database, Available at http://www.ibdb.com/person.php?id=5654, [Accessed 20/12/09]

Saturday, January 18, 2020

The Importance of Employee Engagement

Change is a constant in today? s modern business activity. As Harvard Business School Professor John Kotter wrote in Fujitsu? s `Fit for Change? report, â€Å"the current rate of change within businesses is faster than the rate at which organisations are improving†¦many organisations just can't keep up with the speed of change. † (www. theinformationdaily. com, 2012). This more and more complex and competitive environment inflicts a greater pressure on the employees; given that the employees are the heart of organisations not approaching them appropriately is one of the main reasons of corporate failure (Argenti, 2009).Although there is not a lot of research done in this field as it is a relatively new concept (Saks, 2006), understanding the importance of employee engagement and implementing a well-developed internal communications plan is crucial for success, especially during change (Dolphin, 1999). The organisation should be guided by experts through all this complexit y if it wants to overcome all the tension that originates from the dynamics of change and survive. THE IMPORTANCE OF EMPLOYEE ENGAGEMENT Many authors claim that an organisation? accomplishments, financial performance and employee outcomes may be predicted by the levels of employee engagement. However, it is surprising that even if it is a logical assumption, it appears that employee engagement is waning and that disengagement among the majority of today? s workforce is costing huge amounts of money to organisations in productivity loss (Saks, 2006). At present, workers are well educated, have greater expectations than those of past generations, and aspire to have a better understanding of the company they work for (Argenti, 2009).According to Argenti (2009), most companies? senior managers exclude lower-level employees from taking part in most decision-making. According to Dolphin (1999), employee communication is too often conducted by in-experienced and junior personnel. Therefore , it could be said that organisations do acknowledge the importance of employee engagement to some degree but are not following an appropriate and effective two-way communication strategy that will engage their staff. ORDER AND CHANGEEvery organisation has a culture and identity of its own and these should be consistent, coherent, and clear. When an organisation suffers a big change, it might have the need to acquire a new identity and/or alter or even create a whole new corporate culture (Dolphin, 1999); to be able to direct this change effectively, there must be a well-defined vision. Most of the definitions of vision in this context make reference to an ideal or a future to which the organisational change should lead to (Palmer, Dunfard ; Akin, 2006).Without a firm vision and effective internal communications, the â€Å"changes introduced by managers may seem arbitrary and unneeded†¦ vision helps to motivate staff in working towards the change and engaging in what may appea r to be daunting or risky actions† (For Kanter et al. , as cited in Palmer et al. , 2006, p. 245). Sutton and Khan (1986 as cited in Jimmieson et al. , 2004, p. 12) argue that when a deep change is about to happen, workers â€Å"go through a process of sense-making in which they need information to help them establish a sense of prediction and understanding of the situation†.Palmer, Dunfard and Akin (2006) insist in the importance of having their employees well informed about the situation and about what is expected from them, To the extent that the strategic intent is not complemented by clarity as to expected actions, the chances increase employees will fail to convert a change initiative into supporting action at their level of organisation. The Key point here is that the lack of supporting action is not due to overt resistance or even apathy; it is due to the lack of clear understanding of what such supportive action would â€Å"look like. (Palmer et al. , 2006, p. 149) Organisations must therefore aim to achieve a balance between order and change. For instance, they can only operate efficiently if members execute their roles consistently, perform everyday operations, and uphold ordered structures, but they also need to stay open and agile enough to react to and anticipate the fluctuating stresses of today? s changing commercial environment. (Jacobs, 2004, p. 382). Carl Weick (1979, as cited in Jacobs, 2004, p. 82) highlights in his relational perspective the role of communication when dealing with the tension that arouses between these two elements and suggests that organisations are in essence the outcome of communication collaborations. Lewin? s Three Stage Model of Change (Carnall,2007, p. 70) can be used to help the organisation better understand this process. It consists of three stages: 1. Unfreezing. It is related to cultural change.Identifying both present behaviours and required behaviours necessary to achieve the organisation? s mi ssion and common goals and analysing the differences, with the participation of the company? s members, is the first step of â€Å"unfreezing† actual change. 2. Changing/Moving. Identifying the procedures and changes in the structure that will enable the execution of the new behaviours and the implementation and examination of accomplishments. 3. Refreezing. Instilling the new behaviours, attitudes, and values in the group.This is usually done by rewarding new behaviours, carrying out policies, implementing an effective communication, and educating members in order to support the new culture and behavioural principles; commitment to change is attained in this stage. However, as organisations and their environments are ever more uncertain and dynamic, many changes may occur at once and when one area is refreezing another might be unfreezing or moving. This has led Clark and Clegg to believe that `successful management in the future must be based on intelligence and creativity and the capacity to question and learn? â€Å"executives must learn how to combine continual change with the ability to sustain `business as usual? † (1998, as cited in Carnall, 2007, p. 78-79). An organisation is dynamic, it is persistently reinventing itself, and therefore must be monitored constantly. THE RISKS OF CHANGE AND THE IMPORTANCE OF ORGANISATIONAL SUPPORT A possible reason for failure could be that organisations simply do not dedicate enough time or attention to understand the psychology of change. Employees? xperience is a critical factor that should be considered; it is how people adapt and react to change that makes a difference. Firstly, changes in an organisation are not linear by nature and thus uncertainty is the most common psychological condition that emerges as a result (Callan et al. , 2004); â€Å"much of what we refer to as resistance to change? is really ‘resistance to uncertainty’ meaning that the resistance originates from the proces s of dealing and handling change, not from the change itself (Carnall, 2007, p. 3). Secondly, Palmer, Dunfard and Akin (2006) argue that people? perceptions of how they believe that change will affect their personal interests will influence their readiness for it. People have a tendency to support changes that do not seem threatening to their interests and resist those that appear to be harmful. (Palmer et al. , 2006, p. 149). Managers should understand the potential risks of letting employees face changes on their own without a consistent support on behalf of the organisation. Doubt and uncertainty should be dissipated and substituted by safety, and mutual interests should be addressed to avoid feelings of threat.According to Argenti (2009) effective internal communications not only requires facilitating employees with relevant and sincere information but it should also reinforce their belief that they are significant assets to the company and that subsequently their matters are to o. Listening to them and allowing their participation in conversations regarding organisational change will keep them â€Å"excited about their work, connected to the company? s vision, and in a position to further goals of the organisation† (Argenti, 2009, p. 84). An example that describes poor attention to how stakeholders react to change (whether they are predisposed to welcome it or reject it from the beginning) is Kodak? s announcement of its reduction in workforce to its staff, and of its dividend cut to its investors. They ignored the importance of setting an adequate strategy to promote a positive response prior to change and this basically resulted in resistance to change from both groups which led the merger with Compaq Computers a failure (Palmer et al. , 2006, p. 1) REASSURING EFFECTIVENESS IN COMMUNICATION Before any action is taken, the organisation must have a sense of the present effectiveness of its internal communications. Argenti (2009) reveals that an exce llent way to measure the effectiveness of its actions is by executing communication audits and systematic temperature checks to discover the employees? attitudes towards the organisation itself, their opinion about the quality of the communications they are getting, and whether the messages are being understood.Once this is done, an internal communication framework can be implemented to work on solutions to any communication deficiencies and satisfy those requests. The Strategic Employee Communication Model and Best-practice Definitions (Appendix A) can be used in a change programme as â€Å"benchmarks against which to measure a company? s employee communication strengths and weaknesses as well as a model of effective change†. According to Barrett (2004), both the model and its different elements were inspired by research done in numerous Fortune 500 companies on what actually works in employee communication.The best companies integrated many of these definitions in their pra ctice scheme. This model links all principal factors involved in employee communication between them and to the company? s manoeuvres and strategy; it analytically breaks down communication into distinguishable and manageable portions and illustrates how interconnected and inter-reliant each portion is when employee communication is placed strategically within the organisation, a must in order to make change feasible. What moves this model from a tactical level to a strategic one is the direct connection to the firm? â€Å"strategic objectives and business planning process plus the overlay of supportive management with on-going assessment of individual and company communication. † (Barrett, 2004, p. 22). An example of a good communication in practice is what CEO Gordon Bethune did in Continental airlines. Every month, he held an open-house in his own office where employees were welcome to go and talk to him about any issues, suggestions, or complaints, and in numerous occasio ns he would go himself to meet the employees at their workplace.This platform for open, informal, and sincere discussion was his trait of leadership. He has been recognised for having significantly improved employee spirit and productivity as well as enhancing the global culture of the firm. This is illustrative of what should be done to have the organisation prepared in the eventuality of change. THE LEARNING ORGANISATION. FROM INDIVIDUALS TO A TEAM In order for the organisation to move as a whole it should behave and act as one.Organisations should provide the ground for individuals to move out of their sense of self, be flexible, and connect with and contribute to the group consciousness. Many authors emphasise the need of creating learning cultures within organisations in order to achieve success during change. â€Å"Teams, not single individuals, are the key to successful organizations of the future and†¦ individuals have to learn in the context of the team† (Append ix B). Hurst (1995, as cited in Carnall,2007, p. 65) for instance exposes that a performance organisation should evolve into a learning organisation when it faces complexity; â€Å"tightly defined tasks, control systems and rigid structures† should be replaced by â€Å"recognition, networks and teams†. His ecocycle model of eight stages points toward renewal through which the company reinvents itself, more explicitly, â€Å"in which people rethink what they seek to achieve, with whom and how, and thereby recreate the organisation†¦ it is certainly a learning process†. The complexity theory can throw some light on this perspective.As Darwin, Johnson and McAuley (2002, cited in Carnall,2007, p. 84) note, the basic idea that lies beneath the relevance of the complexity theory within the literature regarding organisational behaviour is that of a multifaceted adaptive organism described as a coherent network of agents interacting in parallel with no ? command an d control framework? and who are ? adaptively intelligent? (Appendix C). This view links to the idea of ? self-organisation? (Carnall,2007, p. 84). Emery (2004, as cited in Carnall, 2007,p. 85) also presents â€Å"an analysis of open-systems theory-based action research as an enabler of learning and change†.She starts off by stating that learning is fundamental for viable change and then argues that practitioners must deal with all individuals at every level of the corporation and all practical areas must be implicated in some kind of practise that will enable them to take part in this learning process. However, she highlights that there are certain obstacles that might get in the way such as certain attitudes of the elite members, fail to use a common language throughout the organisation, and diverse framework and priority schemes.Another issue to tackle is the fact that individuals have different learning rates and they learn in different ways (Carnall, 2007). That is where the role of internal communications plays a significant role. Professional practitioners should be able to identify where communications fail and target unlike audiences with different techniques to be able to engage them appropriately. We therefore can determine that the objective of education in the long-run would be to create a â€Å"strong sense of listening and of responsiveness [that will] permeate(s) the organisation† (Macleod, p. 9) by: -Forming engaging managers that will know how to communicate cultures and values and treat their personnel with respect. As MacLeod ((Macleod, p. 79) ) states in his report, managers who engage â€Å"facilitate and empower rather than control or restrict their staff; they treat their staff with appreciation and respect and show commitment to developing, increasing and rewarding the capabilities of those they manage. †. -Giving employees a voice and tools to address management with their concerns.They must feel â€Å"they are l istened to and see that their opinions count and make a difference†¦ [And that they are able to] speak out and challenge when appropriate† (Macleod, p. 79) CONCLUSION Employee engagement levels can predict an organisation? s accomplishments and performance as it is claimed by many authors. However, due to today? s complex environment it is more than necessary to build up a strong internal communications strategy. Employees should not be isolated from the organisation as a whole and should be informed and involved in it. The corporate culture should be coherent and the vision should be clear.If organisations fail to communicate all this properly and engage its employees into believing that change is not synonym of threat, resistance will appear. Resistance may lead to a break in the internal homeostasis and the consequences will show up as a failure when trying to move the organisation forward. REFERENCES Argenti, P. (2009) Corporate Communication. 5th ed. Singapore: Mc Gr aw Hill. Carnall, C. (2007) Managing Change in Organisations. 5th ed. Essex: Prentice-Hall. Dolphin, R. (1999) The Fundamentals of Corporate Communications. Butterworth-Heinemann. Jimmieson, N. t al. (2004) A Longitudinal Study of Employee Adaptation to Organizational Change: The Role of Change-Related Information and Change-Related Self-Ef? cacy. Journal of Occupational Health Psychology , 9 (1), p. 11-27. MacLeod, D. and Clarke, N. (2009) Engaging for Success: enhancing performance through employee engagement. [report] Department for Business Palmer, I. et al. (2006) Managing Organizational Change: A Multiple Perspectives Approach. s. l. : Mc Graw-Hill Saks, A. (2006) Antecedents and Consequences of Employee Engagement. Journal of Managerial Psychology, 21 (7), p. 00-619. www. theinformationdaily. com (2012) Making your organisation fit to change. [online] Available at: http://www. theinformationdaily. com/2012/12/21/making-your-organisation-fit-to-change [Accessed: 4 Mar 2013]. J acobs, G. (2004) Corporate creative thinking. In: Oliver, S. M. ed. Handbook of corporate communications and public relations. London: Routledge, pp. 382-384. Barrett, D. J. (2004) A best-practice approach to change communication. In: Oliver, S. M. ed. Handbook of corporate communications and public relations. London: Routledge, pp. 22-24. . APPENDICES Appendix A. Figure 2. 1 Strategic employee communication model (Barrett, 2004, p. 23) *Appendix B. Senge? s five disciplines: 1. Systems thinking: everyone must learn how to view things as a whole and that one set of events has impact on others 2. Personal mastery: ? the discipline of continually clarifying and deepening†¦ personal vision, of focusing†¦ energies, of developing patience, and of seeing reality objectively.? 3. Mental models: ? learning to unearth†¦ internal pictures of the world, to bring them to surface and hold them rigorously to scrutiny? 4.Build a share vision: leadership is the key to creating and co mmunicating the vision†¦ the leader creates vision but is prepared to have it reshaped by others 5. Team learning: teams, not single individuals, are the key to successful organizations of the future and individuals have to learn in the context of the team (Senge, 1990, as cited in Carnall, p. 164) *Appendix C. Darwin, Johnson and McAuley (2002, Carnall, p. 84) describe a multifaceted adaptive organism: 1. It is a network of ? agents? acting in parallel, often interconnected, ways but without any ? ommand and control? framework 2. These agents are ? adaptively intelligent? ; constantly seeking and making sense of patterns, testing ideas, evolving and learning. 3. Change is achieved through learning, evolution and adaptation. 4. Control of the system is dispersed throughout the system. 5. Coherence within the system arises out of competition and cooperation among the agents as they see advantage in alliances and other arrangements for mutual support. This view links to the idea of ? self-organisation?. (Darwin et al, 2002, as cited in Carnall, p. 84)

Friday, January 10, 2020

Computer Hacking is Ethical

Austin Areas English Ill Honors Mrs.. Mills 14 December 2012 Computer Hacking is Ethical Computer hacking is a term that most everyone in today's society is familiar with. When the average person hears news about computer hacking, most likely they think about cyber-crimes, website defacement's, or knocking various websites offline. This inaccurate description is Just the image that today's media creates. In reality, true hackers are much different. Computer hacking is not the only type of hacking in today's society.Hacking actually originated from partaking, which is the art of racking a telephone network (â€Å"A Brief History of Computer Hacking†). Hacking is seen as being blackball, or wrong, when hacking can also be beneficial to the world. There are different types of computer hackers: â€Å"Hastiest,† ones who hack to express a political opinion, â€Å"Hobbyist† hackers, those who hack for enjoyment, and â€Å"Research hackers,† those who hack to lea rn about security and fix vulnerabilities (â€Å"License to hack? Ethical hacking†). As mentioned before, the first computer hackers were not people who were hacking to earn some quick cash. In 1878, two years after the telephone was invented y Alexander Graham Bell, a group of teenagers who worked to maintain the New York switchboard were fired because they were interested in seeing how the phone connections were made and how the calls were distributed to specific locations. Their actions were essentially the equivalent of early computer hackers.These boys were trying to break into the telephone system to understand and see how the switchboard worked (â€Å"Timeline: A 40-Year History of Hacking†). Computers were not always in the easy to use, graphical interface they are today. Along the time period of the ass, mainframe computers were very popular. Most universities and companies would have rooms dedicated to containing these mainframe computers, which were essentia lly a large chunk of metal locked away in a controlled environment. Due to the prices and exclusivity, users had to fight for time to obtain access to these slow- moving machines.Since these mainframe computers were so expensive and resource intensive, meaning they required time, knowledge, electricity, and money, computer programmers went out on a ledge to learn and create ways to speed up processes and modify hardware to increase performance speed (â€Å"Computer hacking: Where did it begin and how did it grow? ). In return, the machine would be able to complete more tasks and operations in a shorter time period. Hiring a hacker to modify one's machine in the ass and ass would definitely increase business functionality (Parks).The term â€Å"Hacker† did not earn the definition it has in today's world until the sass. Users discovered that they could apply their knowledge of the inner workings of a computer for their own gain. This was the time period when viruses, mallard, and other nasty cyber infections were created to earn their coder or hacker money (â€Å"Timeline: A 40-Year History of Hacking†). In the early sass, a man named John Draper discovered that he could recreate the pitch a telephone used by using a whistle obtained from a box of cereal.By using this whistle, Draper could recreate the 2600-hertz audio tone and score some free long-distance calls. Draper's actions were one of the first illegal actions committed by a hacker, which earned him the nickname â€Å"Captain Crunch. † Later in the sass, devices called â€Å"Blue Boxes† were invented by a computer club in California. These boxes were used to help change a tone to match the tone created by a telephone, thus making telephone tampering easier to use. These boys went by the names of Steve Jobs and Steve Woozier, the creators of Apple Inc. â€Å"Timeline: A 40-Year History of Hacking†). Attention towards partaking was created during this decade, resulting i n a few computer and telephone hacking magazines being created. These magazines would benefit those who wanted to become partakers and computer hackers, by teaching them techniques, and giving access to those who had already accomplished these illegal acts (â€Å"Timeline: A 40-Year History of Hacking†). Another effect from the huge amounts of attention towards hackers was a new law being passed, called The ComprehensiveCrime Control Act, giving the Secret Service Jurisdiction over cases including credit card and computer fraud (â€Å"INCURS Abstract†). Later in 1987, a seventeen-year-old hacks into AT's computer network, which led to his arrest. This boy was caught because he did want most teenage boys do, he bragged on an online bulletin board about it. Federal authority says he committed the hacking from his bedroom, and was one step away from breaching into AT&T's switching system, the system that controlled most of the nation's communication access fine (â€Å"Ti meline: A 40-Year History of Hacking†).In the year 1988 the first self-replicating virus was created by a twenty-two year old graduate named Robert Morris from Cornell University that was designed to take advantage of an exploit in UNIX-based systems. The Morris-worm, named after the creator, infected nearly one tenth of machines connected to the internet. Morris was arrested for releasing the virus and was sentenced to three years of probation, 400 hours of community service, and a $10,000 fine (â€Å"Zen and the Art of the Internet†).No other major hacks occurred until the mid to late ass, when two hackers known as Data Stream hacked into computers and systems owned by institutions such as NASA and Korean Atomic Research Institute. One of the two was caught by detectives form Scotland Yard and was discovered to be sixteen years old (â€Å"The Case Study: Rome Laboratory, Griffins Air Force Base, and NY Intrusion†). The year after, Vladimir Levin allegedly used his laptop to transfer funds from Citibank's computer network to various accounts across the world. Eventually Levin was extradited to the US, sentenced to three years in prison, and ordered to pay Citibank $240,000.The exact amount of money stolen is unknown, but is estimated to be around $3. -$10 million, not all of which has been recovered (â€Å"How To Hack A Bank†). Later that year legendary computer hacker Kevin Nitpick was arrested in Raleigh, North Carolina, and accused of breaking security violations, such as copying computer software, breaking into various networks and stealing information, including close to 20,000 credit cards. He spent four years in Jail without trial and was released in early 2000. Nitpick was accused of crimes dating back to the mid-sass (â€Å"Timeline: A 40-year history of hacking†).After the year 2000, many to most cyber- attacks or hacks have been caused by mallard users unknowingly downloading them onto their PC. Most newly created enamelware bypasses anti-virus scans, which means no one is ever one hundred percent safe on the internet. The graph below displays the type of virus or mallard threats received on various US computers (â€Å"Microsoft Security Intelligence Report†). Every computer hacker is powered by a motive or several motives. Usually malicious hackers are motivated from self-gain, either money or fame.Malicious programmers create mallard programs to do their bidding; such software can log every key one presses, steal sensitive data such as passwords for personal and banking websites, r add one's computer to a ring of infected computers that can be used to Dos websites (â€Å"Ethics in Computing†). A Dos attack is when packets of data are sent to a Webster that eventually overload the server with data to the point where the server crashes, therefore knocking the website offline. More recently, Anonymous has taken credit for Dosing major banking websites offline (â€Å"Bank of Amer ica Hit By Anonymous Dos Attack†).There are many different types of Dos attacks; the most common is a JODI Flood, which sends a JODI packet to random ports on a server. When a packet is sent to a port where there is no application listening on that port, the server replies with a Destination Unreachable packet, so the server has to respond to every single JODI Packet with an Unreachable; the part that crashes the server is when the Unreachable Packet is sent (â€Å"UDP Flood Attack†). Hackers sometimes will sell their bootee, which is the term that describes a ring of infected computers.When a hacker sells or rents his bootee, the infected PC's are transferred over to the buyer for their use, which is usually for more illegal Dos attacks. There is extremely easy money when it comes to selling information attained from hacking, whether it is selling hacked website accounts for popular websites like Youth or websites that require a monthly subscription. Most of the transa ctions are made online and are close to untraceable. Finding a competent hacker on the internet is the equivalent of going to Iraq and looking for AY Quad.Hackers know how to hide, where to hide, and how to stay safe (â€Å"Hackers Selling Cheap BOOTEES and DOS on Forums†). Even though hackers know how to hide, that does not mean they cannot get caught. Hacker Jon Paul Soon illegally hacked into his previous employer's network with malicious intent. This network was a medical network that contained health records, names, addresses, and provided services to seventeen different clinics in San Diego. Soon was punished with five years in prison and a combined fine of over four hundred thousand dollars, along with a ban from using a computer (â€Å"Hackers: Crimes and punishments†).Teenage hackers usually get off easier, with punishments like time in a Juvenile center, a ban from computers, community service, or very light prison sentences depending on age. FBI informant Ma x Butler was a hacker who was charged in 2001 with possession of stolen passwords, computer intrusion, and thirteen other counts. He risked going to prison for forty years because he decided to stop helping the FBI catch other hackers. These are Just a few cases of the risks hackers take for the thrill or self-gain from hacking (â€Å"5 Of the World's Most Famous Hackers & What Happened to Them†).With such strong consequences, one might wonder why an individual would want to become a computer hacker. Internet users become hackers because they know how to work the system; they know how to yap's the law and do close to anything they want (â€Å"The Hacker Work Ethic†). Hackers are purely cyber thieves who terrorize innocent users using their superior knowledge of how computers and the internet work. There are indeed an abundance of hackers who have malicious intent, but there are those who hack for a higher purpose (Roberts).Identifying what type of hacker one is dealing with is extremely easy; all one must do is look at the end product and ask a few questions. Is this hacker trying to steal information? Is the hacker trying to infect systems? If so, then that hacker is malicious. Other hackers hack for the learning experience. They want to learn more about computers and how systems change when modifying specifications. Hacker Sarah Flannels describes the work she put into her encryption algorithm as, â€Å"l had a great feeling of excitement †¦ Worked constantly for whole days on end, and it was exhilarating.There were times when I never wanted to stop. † Pursuing knowledge has been the fuel for many computer users since the first computers were created in the sass. These people live by the idea that the best way to learn is to take a hands on approach (â€Å"Types of computer hackers†). Contrary to black hat hackers, a type of hacker exists known as the white hat hacker. White hat hackers are the people who help infected users on the web. Many black hat hackers such as Kevin Nitpick, Kevin Paulsen, and Mark Been have turned white hat after serving time in prison or on probation (â€Å"12 â€Å"White Hat† hackers you should know').Not only to white hat hackers try to reverse the effects of black hats, but they also hack websites. Many businesses hire penetration testers, A. K. A. White hat hackers to try to penetrate the businesses' servers or databases to test how protected the businesses' websites are. Penetration testers, commonly referred to as Pen Testers, report back any exploits they have covered while hacking their employer's website or database, and then they patch the exploit, thus making a safer internet.Companies believe that if a white hat hacker can penetrate their security, then so can a mischievous black hat hacker (â€Å"tithe hat' hackers in demand†). An example of a famous white hat hacker is computer analyst and expert Touts Samurai, who police used to track down and appr ehend Kevin Nitpick in 1995 after Nitpick had evaded the FBI for years, and caused well over $100,000 in damage to systems belonging to Motorola, Monika, Sun Microsystems, and NECK (â€Å"The trials of Kevin MitoticThis is Just one example of a hacker being caught by another hacker. Police computer security analysts and hackers to look decipher cyber evidence that is related to crimes under investigation, along with cyber-forensics to break down crimes and solve them quickly (â€Å"The Kevin Nitpick/ Touts Samurai affair†). Hollywood has also tried to portray computer hacking in movies such as Hackers, from 1995, and War Games from 1983.The movie Hackers is about two computer hackers named Crash Override and Acid Burn, who seemingly fight each other with silly fonts and awful homepage graphics. Later on in the movie, he US Secret Service is involved when another associate of Overrides hacks into a school's mainframe and downloads a garbage file. This file actually contained a computer virus that could apparently capsize the company's oil tanker fleet. After a few other friends are arrested, everyone is cleared of their charges and the movie ends happily.In reality, all of these hackers would have been in prison, and would not had their charges dropped, not to mention the fact that a company had the code to a computer virus that could control their entire oil tanker fleet on a garbage file in their easily hackle mainframe (â€Å"Hackers†). Legitimate hackers later defaced the movie Hacker's website to express how they felt about the silliness in this movie (â€Å"Hacked Movie Site†). Nothing really big happened, only some text was changed and a few pictures were defaced with satirical pictures drawn over them.The website still has the hacked version of their website mirrored, meaning it is still accessible to the web. Included in the text of the defaced website were lines describing how Hollywood misunderstands technology and will never be able to comprehend the hard work and time needed to perform some of the acts that hackers accomplish. No en can tap a few keys on a keyboard and hack into a company's mainframe, website, or database.Hackers included a scene where someone managed to access a supercomputer with Just the password â€Å"GOD† and has the UNIX operating system replaced with some other three dimensional interface does not represent the real world in any manner (â€Å"Episode – Hackers†). The movie Live Free or Die Hard also butchers computer hacking in the sense that the computer hacks in it are so good at hacking that they can control entire cities, including quotes like â€Å"Okay, I want you to hack into that traffic light and make it red.Almost all of the incredible feats provided by Hollywood in movies is practically impossible, or would require months of research to perform. Many hackers believe that Hollywood will never portray legitimate hackers correctly (â€Å"Hollywood Ha cking – Television Tropes & Idioms†). Computer fanatics are compelled by the mystery of the machine. When Mr.. Hake, the Computer Applications teacher from Erwin High was asked why he was so fascinated by computers when he first had access to them, he replied with, â€Å"They were new and exciting; no one really knew where we were going to go with amputees, but everyone seemed to want to use them. † Mr..Hake described that people were compelled to study computers due to their mysteriousness and interesting possibilities (Hake). Switching from being a computer fanatic to being a computer hacker can happen really quickly when one may see how easy earning, or stealing money actually is on the internet. Or maybe the thrill of breaking past security will push the moderately to advanced computer user to turn to the dark side of computer hacking. Malicious hackers will always have a hard time as long as the be is full of white hat hackers to make their Job, or hobby mor e difficult (â€Å"Meaning of Hacking and the Different Kinds of Hackers†).In conclusion, not every person who knows their way around a computer's boundaries is unethical. While there are many intelligent and malevolent hackers loose on the web, it is still a safe place. Today's media does not accurately portray hackers or the hacker's philosophy, and neither do cut-rate Hollywood movies. Media websites control how civilians see cyber criminals, due to that factor, most innocents see hackers has people who are out to no good. The white knights of the internet are never given the appreciation they deserve, because of them we are as safe as we are now.White hat hackers have patched countless exploits caused by bad-natured hackers. Governments can Jail as many hackers as they want, but they can never Jail a philosophy. Hackers will always exist; they will always be out to gain something out of their exploits. Society needs to understand that hackers also hack to prevent collater al damage, or to catch the worst of the worst hackers. There are good hackers and bad hackers, Just as there are good people and bad people; not all hackers are unethical.

Thursday, January 2, 2020

Questions On Feminist Identity And Reactions Of Gender...

MCS*3500 – Reflection 1 – Threats to Feminist Identity and Reactions to Gender Discrimination Tyler Ciprietti – 0786162 – tcipriet@mail.uoguelph.ca 1. Describe the context (why it was done, the general interest and what the researchers wanted to find out) of the research and research question (what is the hypothesis). /10 The goal of the study was to identify factors that shape women s responses to in-group members who protest gender discrimination. The participants were all undergraduate females that were all given the same information prior to the start of the study. The one difference was the scenario (manipulation) in which the female lawyer was being discriminated. The researchers told some participants of the study that the lawyer†¦show more content†¦To examine these hypotheses, the researchers had the female participant group read about an unfair hiring decision in which a law firm chose not to grant the deserving candidate a position, and hired a less experienced male candidate instead. 2. Describe dependent, independent, and moderating variables. How these variables were measured and manipulated in this study. 10 Independent = Condition either protest or no protest Dependent = many of them; Outcome measures in case.....(4) We are only replicating the evaluation of target.†¨Moderating = Pervasiveness of gender discrimination. The variables in the study helped to differentiate the participant’s opinions on the female lawyer. In this case, the researchers are only replicating a small part of the study. There were 4 possible dependent variables that were measured. 1) Anger Toward the Target – this was measured through statements like â€Å"I feel angry at Catherine†. The higher the score, the greater the amount of anger was expressed. 2) Evaluation of Target – participants evaluated the likeability of Catherine by measuring statements like â€Å"I admire Catherine,† â€Å"I would like to be friends with Catherine†. 3) Evaluation of Target’s Response – This measure addressed evaluations of the target’s response to the decision. Participants