Monday, September 30, 2019

Becoming Self Directed Learners

For an individual to be successful there is a need to become a self-directed and a self-aware learner. Being one entails the person to exercise habits which can influence his success. These habits are the so-called Habits of the Mind, which are presented in this paper, are most important to be practiced by both students and professionals in order to acquire knowledge and in order to discover that learning is, indeed, fun and exciting.In the context of being a self-directed learner, it is very evident that there is a need for an individual to possess skills and talents which makes him unique and which can make him the best student and professional he can be. However, to direct one’s self is not an easy tasks for it takes one to have patience and understanding that everything in the surrounding comes from a certain origin and that is what has to be discovered in the learning process. Moreover, self-directed learning and being a self-aware one makes an individual acquire more kno wledge other than what is taught and given within the four walls of the classroom.As mentioned, having to practice the 16 habits of the mind is the important factor which greatly influences a person’s success and his way towards being a self-directed and self-aware learner. Other than these 16 habits, there are also other factors which are important; these includes focusing one’s attention on the tasks and responsibilities being assigned to and being able to have that initiate and common sense to take necessary actions should the need arises.This paper clearly discusses how a student and a professional must engage themselves in behaviours and attitudes which can contribute to their success. INTRODUCTION All individuals have the intention of becoming a successful professional in whatever field one wants to engage himself in. There are factors which can influence the success of a person. It all starts in having a god foundation of basic, secondary and tertiary education. Academic institutions must, therefore, give the best instructions to all students so they can land a good job soon after they graduate.On the other hand, the success of a student could not only be attributed to the instructions given the teachers within the four walls of the classroom. There is also a need for the student to learn things on his own, to explore the world and to discover things which are not taught in school. It is a fact that everything is not learned from school. Some things are learned through experiences; reading books, newspapers; watching television shows and browsing the internet. These are not only the sources of information. There can be a lot more should a student is willing to devout much time of it.One of the many factors in which a student must develop in his early years of schooling is the ability to direct his own self towards the learning process. To possess the ability of self-directed and self-aware learner makes him easy to understand the instructi ons given by the teacher and to discover the wonders of the world. A self-directed learner and a self-aware one is one of the important behaviours each student must have in order to achieve what they want to achieve and in order to become what they want to be in the future.Successful business and government leaders in the country have the initiative to learn and discover things on their own; thus, they have practiced being a self-directed and a self-aware learner. ANALYSIS AND DISCUSSION Students use various ways to learn and students have various intellectual levels, either. But this must not hinder one’s desire to be ahead of others and to learn new things other than those being taught in school. One of the attributes of being a self-directed learner is the ability to apply the 16 Habits of the Mind. These habits have been characterized by successful personalities in the world.These include having the persistence and perseverance to complete a task, being an impulsive manag er, to listen to others with understanding and empathy, to think with flexibility, have the ability of metacognitition, to strive for accuracy, to question and pose problems, to apply past knowledge to new situations, to think and communicate with clarity and precision, to gather data through all senses, to respond with wonderment and awe, to create, imagine and innovate, to take responsible risks, to think interdependently and to remain open to continuous learning.These habits focus the attention of the students and professionals on the processes and strategies to engage in an effective learning environment. (Campbell) The behaviour to direct one’s self to learning is a process and a psychological predisposition of the learner. In this process, the learner, on his own, identifies his needs, defines his learning goals and develops and implement the learning plans. Those who are successful in the practice of this process are those who are highly ready for self-directed learnin g which happens to be a complex mixture of knowledge, skills, habits and attitudes.(Guglielmo,P) In addition, self-directed learning is natural process in which it has not lost its power to output a high quality education which can bring fulfilment. For self-directed learning, the learner must choose the content on his own, be able to determine schedules, to learn with great passion and to lead and live a very productive life. Self-directed learners have the initiatives to develop learning style on their own. They are responsible in their own time and action. (Langerfeldt)For a student or a professional to become a successful self-directed and self-aware learner, one must possess the ability to engage himself in new styles and ways to acquire knowledge. With the advent of information technology, there are various styles which can then be applied by anybody who craves success. Being a self-directed and self-aware learner requires one to be a leader on his own. Being a leader means be ing real, being authentic. Being a leader also means focusing one’s strengths on the tasks assigned and to never forget that there is always a room for improvement and being a leader means to capitalize on one’s uniqueness.(Ambler,2006) In addition, there is a need for an individual to raise his awareness on the things that matter most. To raise self-awareness, one must be given choices regularly. For the teachers, there is a need to put himself on the learner’s shoes, the teacher must analyze the advantages of this type of learning and the teacher must be able to employ effective strategies to ensure that learning is facilitated in the most easy and convenient way. (Chojnacka,2000)To become a self-directed and self-aware learner, one has to practice mindfulness- that is to focus on the most important things which can contribute to the success of his own self and to the company, in general. There is also a need for an individual to know himself so he can make ch oices on how he can respond to the demands of the people around him and the situation he might encounter in the future. When one has an in-depth understanding of his own self, it is much easier for one to be consistent and to follow and trust those people who are sincere. (Ambler, 2007)The most important factor to influence one’s success is having the ability to direct one’s self in learning and be more aware of the people and the environment in which he is a part. Another characteristic of becoming a self-directed learner is the ability to be resourceful – to explore, investigate and delve into the reasons behind the existence of things. Being enrolled in the world class academic institution is not the only assurance to become a successful and an influential person; but also having the ability to lead one’s self towards the endless quest for knowledge.Students must always remember that learning is a continuous process; hence, they must acquire skills whi ch can make them different from the rest. In self-directed learning, the learner must be able to understand and recognize that learning includes actions on their part and they must acquire certain skills and knowledge to meet their learning needs. There must also be strategies in which these are flexible and adaptable to the learner to ensure that the process is conducted in a very smooth flow. (Wulff, Burke & Hurley, 2001)CONCLUSION In the world where competition is so stiff and strong, there is a need for an individual to possess skill which makes him ahead of others and which makes him more saleable than others. This starts in having the ability to learn and engage his self in activities which can enhance his critical-thinking and logical skills. To become a self-directed and self-aware learner, one must have the reasoning ability and the initiate to take actions on how to uncover the truth behind the existence of everything.Not only should this be sought by the learners but also the unending process of learning must be fully understood. It is, therefore, important for students and professionals to become self-directed and self-aware learners in order to excel and to bring pride and glory to the organization in which one works. It may not be an easy task to become a self-directed learner; however, it is a very fulfilling one. Lastly, in the area of learning, being a self-directed and self-aware are important behaviours which students and professionals must possess.RECOMMENDATION Becoming a successful student or professional is no easy task for one must be a self-directed and self-aware learner. To become such, it is recommended that students, as early as their education years, must practice the habits of the mind in order to exercise their thoughts and to invoke their reasoning ability to be able to cope with the demands of the people and the environment. It is also important for the teachers to give activities to students which allows them to think rationa lly and with deep understanding on what they are doing.In the same manner, in the professional world, there is also a need for an individual to engage his self to activities which enhances greater chance of developing his skills such as listen and understand that no two people or situation are the same. The attitude of listening and understanding are two most important factors for one to become a self-directed and self-aware learner. In addition, it is also recommended that an individual must, at all time, use his initiative in attacking problems. REFERENCES Ambler, G. (2006). †Leader, Be Yourself†. Retrieved on May 3, 2009 at [WWW] http://www.thepracticeofleadership. net/2006/04/03/leader-be-yourself/. Amber, G. (2006). â€Å"The Practice of Mindfulness†. Retrieved on May 3, 2009 at [WWW] http://www. thepracticeofleadership. net/2007/07/18/the-practice-of-mindfulness/. Campbell,J. â€Å"Theorising Habits of Mind as a Framework for Learning†. Retrieved on M ay 3, 2009 at [WWW] http://www. aare. edu. au/06pap/cam06102. pdf. Chojnacka,E. (2000). â€Å"Raising Self-awareness in advanced Learners Practicing Listening Comprehension†. Retrieved on May 3, 2009 at [WWW] http://www. iatefl. org. pl/tdal/n3selfaware. htm. Guglielmo,P. (2003).â€Å"Becoming a More Self-Directed Learner†. Retrieved on May 3, 2009 at [WWW] http://media. wiley. com/product_data/excerpt/49/07879650/0787965049. pdf. Langerfeldt, B. (2009). â€Å"Self-Directed Learning-The Seven Benefits of Designing your own Education†. Retrieved on May 3, 2009 at [WWW] http://ezinearticles. com/? Self-Directed-Learning—The-Seven-Benefits-of-Designing-Your-Own-Education&id=1054279. Wulff,S. ; et al. (2001). â€Å"Guided Self-Learning: Strategies for distance and On-site Education†. Retrieved on May 3, 2009 at [WWW] http://www. uwex. edu/disted/conference/Resource_library/proceedings/01_7. pdf.

Sunday, September 29, 2019

United States Bill of Rights and American Sporting Tradition

Gun Control Gun control would not help crime or murder rates because instead it disarms the law abiding citizens, therefore putting them at a disadvantage in defending there selves against criminals. The second amendment states that citizens have the right to bear arms. Guns have also been an American sporting tradition for years, and have saved many lives from rapist, murders and innocent civilians from the hands of criminals. The second amendment is part of the constitution and is something that should never be taken away, and can’t be taken away.The amendment says that â€Å"A well-regulated Militia, being necessary to the security of a free state, the right of the people to keep and bear Arms, shall not be infringed. † The first 10 amendments to our Constitution protect our most basic rights from being stripped away by an overly zealous government, including rights that all Americans hold dear. The United States Bill of Rights plays a central role in American law an d government, and remains a fundamental symbol of the freedoms and culture of the nation.One of the original fourteen copies of the U. S. Bill of Rights is on public display at the National Archives in Washington, D. C. This amendment and right give us the citizens a chance to defend ourselves from danger from not only criminals but also a foreign attack. A shooting sport is a competitive sport involving tests of proficiency (accuracy and speed) using various types of guns such as firearms and air guns. Hunting is also a shooting sport, and indeed shooting live pigeons was an Olympic event only once, in 1900.The shooting sports are categorized by the type of firearm, target and distances at which targets are shot at. Shooting sports have been a part of the Games since Baron Pierre de Coubertin brought us the first modern Olympiad in 1896. It was one of the first nine events held at the first Olympic Games along with track and field, Cycling, Fencing, Gymnastics, Swimming, Tennis, We ightlifting, and Wrestling. Guns have been a huge part of American history since the Olympics started in 1896.Guns have been used for many years not only to defend our country but also defend ourselves in the event of being attacked by a criminal. If the availability of guns is the major reason for the murder of people, why isn’t it that when the rate of gun sales go up the murder rate doesn’t go up as well? The answer is simple guns don’t kill people, people kill people. Imagine if the 10,000+ victims had guns of their own. That statistic could have shockingly stayed the same, just with different victims: the criminals.Americans tend to believe that guns are easily obtained, when in reality federals laws already passed make it impossible for criminals to legally obtain a weapon. Gun sales have gone through the roof since president Obama took office yet in terms of violent crime, the United States is safer today than it was 20 years ago. Violent crimes will cont inue to exist with or without stricter gun control. Guns will always be obtained by criminals if they want to get their hands on one, and making stricter gun control laws will only make civilians defenseless against these criminals.Taking the right to bear arms away will not save lives it will only cause more violence and since criminals don't follow the laws in the first place more laws would only hinder law abiding people not the criminals; they will still get any type of gun they want because the all mighty dollar is king. Even if we outlawed all guns criminals would still have them smuggled into the country just like drugs. The only thing that would accomplish would be law abiding people would be defenseless and the criminals would rule.

Saturday, September 28, 2019

Despite the rhetoric of employee engagement, organisations still want Essay - 1

Despite the rhetoric of employee engagement, organisations still want to exert tighter control - Essay Example Despite the positive results of employee engagement, the organisations exert tighter control on the employees so as to make them more disciplined and increase the productivity (Brief & Weiss 2002). Taylorism or scientific management aims at simplifying and optimizing the jobs so as to increase the productivity of the employees. The theory depicts that the employees and managers should cooperate so as to maintain a good relation (Parker 2005). According to Frederick Taylor, the workers are motivated by the money so they should be offered fair day’s pay and he also mentioned that if the workers failed to achieve the goal for the day he/she does not deserve to be paid as high as a productive worker. Taylorism highlighted efficiency and does not concentrate on the employee welfare. The theory detailed that few workers are efficient compared to other hence they should be motivated with higher incentives. The main purpose of the essay is to highlight the reason why organisations exert tighter control on the employees despite positive result of employee engagement in light of Taylorism. In the past few decades, employee engagement has gained prominence due to its successful results in organizations. A number of researchers are executed on this topic in order to understand whether it has helped in developing good relationship between employees and managers. According to Holbeche & Springett (2003), employee engagement is defined as the combination of different commitments, which are made by the employees to the organization; it also aims at adding value for assisting the colleagues. However, Schmidt (2004) has defined employee engagement as the relationship between satisfaction and commitment in job. Here, satisfaction refers to the emotional or attitudinal elements wherein, commitment indicates motivational and physical elements of the individuals. He

Friday, September 27, 2019

Call centres and home working (or teleworking) solutions provide the Essay

Call centres and home working (or teleworking) solutions provide the answer to many process design problems of the 21st century...more in the order instructions - Essay Example hat come with extended use of call centers and home working services is the issue of delegating duties to operators who are non-experts, says Production and Operations Management Society (1998). How can a company achieve the maximum level of growth if it is relying on services offered by non-professionals, who are not even affiliated to the company? These operators normally work from a script; therefore, according to the Production and Operations Management Society, they do not have the interest of the company they are working for at heart. Over use of such operators can eventually bring a company down, and this becomes worse than an ethical issue. Another ethical issue that comes to light when companies rely on call centers is incompetence according to Starr (1999). Companies are supposed to be fully aware of the needs of their customers. This knowledge helps the companies to know what to do in order to meet customer demands. When the company works as a whole, there is bound to be more success than failure. However, with the advent of call centers and home working solutions, many companies have resorted to relegating some of their work to third parties, with no regard of how this will affect customer satisfaction in the services provided by the company. All the operations carried out in the company need to be taken with the same level of seriousness, even when they seem too trivial to have any major effect on the company. Even when the call center agents are aware of the firm’s customers’ needs, there is a very high likelihood of the agents not performing as is required of them. Good performance of the employees is one of the things that contribute to high levels of production for a company. Because the agent is far removed from the company, he will not bother to ensure that his services are up to the standards required. This poses a big problem to operations management in a company since the quality of services will have been compromised. The company may

Thursday, September 26, 2019

Eingemauert walled in (Germany's inner border) Essay

Eingemauert walled in (Germany's inner border) - Essay Example The city of Berlin became a strange sort of island within the Eastern portion. One half of the city continued with western capitalist shops and businesses, while the other half developed under the more repressive communist regime. Citizens and visitors could not cross over from one side to the other without extensive border checks, and most Berlin families were suddenly divided by this physical barrier. Many East Germans tried to break through the alarmed fences, which were guarded by troops in watch towers. More than a hundred people were killed in these attempts, because the guards operated a shoot-to-kill policy. The ugly wall, with its defensive mines and barbed wire became known as â€Å"the death strip.† The purpose of this wall was to keep East Germans inside the communist area and to prevent them from escaping to the wealthier and freer society in the West. In 1989 the wall was finally destroyed, when communism failed, and ever since then Germany has been reunited. The wall survives today only in a few symbolic places as a reminder of the recent

Wednesday, September 25, 2019

Compating Two Architecs Essay Example | Topics and Well Written Essays - 2250 words

Compating Two Architecs - Essay Example Rapid urbanization and the high demand for houses has led to variations in the architectural designs that are used in the design of structures. There are contradictory forces between those who propose simple structures that are practical without ornaments and those that demand for traditional architecture that embraced ornaments to beautify the structures. Significantly, there is a great divide between the construction of simple practical structures that do not lay emphasis on ornaments and using of ornaments in architecture. It would be appropriate to consider the impact of either form of architecture to the environment. In essence, architecture in either the traditional or modern form should be able to stand harmoniously with culture.(Rhodes, 1995). It should be noted that the changing facets of architecture have been brought about by commercialism and consumption attitudes, architectural fashions and professional egoism that have significantly transformed over the decades. Towns a nd urban centers should have architectural designs that provide an identity to the place and present an appreciation of the cultural aspects of the place. Over the generations, architecture has been between mankind and the environment around them. As individual characteristics are different so it should be with cities, with urban planning. In traditional architecture, ornaments were accorded very high value. ... Tall imposing buildings are meant to show economic advancement without necessarily being appealing from the ornamental perspective. The prerequisites are visibility and surprise; the creation of a distinct image in the observer’s mind for capturing his attention. This goes to the extent of borrowing symbols and motifs from earlier periods or other culture in order to legitimize a new social order. Modern architecture has given prominence to the concept of â€Å"internationalization†. The design of buildings has become uniform regardless of the cultural background. It has become a norm to have generic high rise block buildings in almost every city in the world. The advent of modern architecture in the 1920s marked the beginning of the demise for ornamental architecture. The notion of good design has evolved to mean that an architectural design has to be plain and simple. According to Loos (1998), ornamentation was unnecessary and had high cost implications. The origins o f modern architecture can be attributed to the social and political revolutions of that time. Advances in technology and engineering gave rise to new materials such as iron and steel which encourage minimalist design. The paper seeks makes a comparison between two architects: showcasing modern minimalist architecture and the traditional ornamental architecture. The major issue is to analyze the impact of both forms of architecture to the society. Notably, the impact of the evolution of architecture over time is analyzed in order to ascertain its relevance to the society and the environment. Traditional Ornamental Architecture: Dankmar Adler The definition of an

Tuesday, September 24, 2019

Audit and financial statements Essay Example | Topics and Well Written Essays - 2250 words

Audit and financial statements - Essay Example The scope of external auditor's work covers the audit of financial statements, probity in the use of public money and value for money in the use of resources. Internal auditor objectively examines, evaluates and reports on the adequacy of the internal control environment as a contribution to the proper, economic, efficient and effective use of resources. External audit is conducted in accordance with International Standards on Auditing (ISA) and with the Audit Commission's Code of Audit Practice. Internal audit's strategy and plan is agreed between internal audit and management. It is approved by the Audit Committee and cannot be directed by external auditor. Effective co-operation between external auditor and internal auditor means more than avoiding duplication. An effective framework of co-operation and co-ordination ensures liaison, co-operation on work programmes and the sharing of information. This can be achieved through: The external auditor has various responsibilities when it comes to performing the audit. It is the responsibility of the external auditors to perform audit of financial statements in such a way that they areable to form opinion, including: Auditors have a responsibility to satisfy themselves that the audited body has put in place proper arrangements to secure economy, efficiency and effectiveness in its use of resources. While doing so, the auditor must consider and assess the relevant significant business risks. Auditors are not required to report to audited bodies on the accuracy of performance information that the audited bodies publish. Auditor's work is limited to review of the systemsput in place by the audited body to collect, record and publish the information. Nor are auditors required to form a view on the realism and achievability of the assessments published by those audited bodies. The auditor's report should contain a clear written expression of opinion on the financial statements taken as a whole. The auditor's report includes the following basic elements: (a) Title (b) Addressee (c) Opening or introductory paragraph containing (i) Identification of the financial statements audited (ii) A statement of the responsibility of the entity management and the responsibility of the auditor (d) Scope paragraph containing (i) A reference to ISAs or relevant national standards or practices (ii) A description of work performed by auditor (e) Opinion paragraph containing (i) A reference to the financial reporting framework used to prepare the financial statements (ii) An expression of op

Monday, September 23, 2019

Intermediate Microeconomics Essay Example | Topics and Well Written Essays - 750 words - 1

Intermediate Microeconomics - Essay Example es alike : all declared bankruptcy and the State had to infuse millions of $s into the economy in the form of economic stimulus to keep the economy from completely crunching. "This collapse in housing value is sucking in all borrowers," said Mark Zandi, chief economist at Moodys Economy.com. The New York Times quotes â€Å"Like subprime mortgages, many prime loans made in the United States in recent years allowed borrowers to pay less initially and face higher adjustable payments a few years later. As long as home prices were rising, these borrowers could refinance their loans or sell their properties to pay off their mortgages. But now, with prices falling and lenders clamping down, homeowners with solid credit are starting to come under the same financial stress as those with subprime credit.† An article in the WSJ [2007] speaks about the sub prime crisis and its analysis by the Journal., â€Å"To examine the surge in subprime lending, the Wall Street Journal analyzed more than 250 million records on mortgage applications and originations filed by lenders under the federal Home Mortgage Disclosure Act. Subprime mortgages were initially aimed at lower-income consumers with spotty credit. But the data contradict the conventional wisdom that subprime borrowers are overwhelmingly low-income residents of inner cities. Although the concentration of high-rate loans is higher in poorer communities, the numbers show that high-rate lending also rose sharply in middle-class and wealthier communities†. According to the same article, even in 2006, when the housing market was weakening, some lenders were still willing to make riskier loans. The analysis of loan data by The Wall Street Journal indicates that from 2004 to 2006, when residential property prices were at their peak i n many parts of the country, more than 2,500 banks, thrifts, credit unions and mortgage companies made a combined $1.5 trillion in high-interest-rate loans.†This article describes how the subprime

Sunday, September 22, 2019

Leadership Study Essay Example for Free

Leadership Study Essay Question 1: What is your opinion of Gerry’s approach to evaluating the output of the new-product development group? While Gerry seems ready for fresh and new product ideas, his approach to evaluating ideas presented by Maria and the new-product development group is harsh and in my opinion put forth as disapproval vice constructive criticism. The team has been working hard and Gerry’s comments, â€Å"I get the impression that there is a lot of activity going on here, but it does not seem to be focused activity†, would make me defensive and rather than listening to Gerry, Maria is probably thinking about how to respond to the snide comments and feedback. Gerry could have been more tactful and should have been more supportive when turning down the teams ideas and putting Maria on the defensive. As a result, they are likely to interpret criticism as a personal attack on their self-worth.1 (DuBrin, 2013, p. 362) It would have been better in my opinion to say nothing or use tact in his approach and rather than criticize, he could have used it as a coaching opportunity and turned down Maria’s idea with constructive feedback. Question 2: Do you think that Maria is getting too sensitive to criticism? Gerry’s comments are not constructive but rather criticism so, no, I don’t think Maria is getting too sensitive to Gerry’s criticism. Garth Laidlaw pointed out that new-product development is a risky business and that 90 percent of new-product ideas never make it to the market shelves so Gerry should’ve expected some failures. I think Gerry should have come into the venture using what DuBrin calls a use loose-tight leadership style. Looseness refers to granting space for new ideas and exploration, whereas a tight approach means finally making a choice among the alternatives.2 (DuBrin, 2013, p. 365) Innovation is also enhanced when workers throughout the organization are able to purse absurd ideas without penalty for being wrong or for having wasted some resources.3 (DuBrin, 2013, p. 365) Question 3: How do constraints on creativity enter into this case? Gerry is not practicing transformational leadership and fostering an environment for change and innovation. The executive office sees a need for innovation, establishes a team and even places the team away from the corporate flag but I didn’t see Gerry having a clear vision or  providing any type of guidance on the types of goods or sector that the new product development group should focusing their talents. Information about establishing a climate for creativity can be divided into (1) leadership and managerial practices for enhancing creativity and (2) methods for managing creative workers.4 (DuBrin, 2013, p. 357) Gerry wants innovation and creativity, provided resources but his rigid leadership style would hinder creativity in any organization. One should provide excellent tools and resources, give creative people flexibility, turn down ideas gently, and employ creative people to manage and evaluate creati ve workers.5 (DuBrin, 2013, p. 366) The company seems focused on innovation for its own sake without a clear goal in mind, and Gerry is quick to criticize the ideas presented by the innovation team rather than recognizing opportunities in lemons. It takes a lot of lemons to make lemonade.

Saturday, September 21, 2019

The Brick Tower †a Speech by Justin Hudson Essay Example for Free

The Brick Tower — a Speech by Justin Hudson Essay Ladies and gentlemen, family, faculty and my fellow classmates of the class of 2010, before I begin I would like to thank those teachers who chose this modest speech among the outstanding collection of speeches written by my highly competent peers. I would also like to thank all the people who have expressed their support for me and their anticipation for this speech. To be told â€Å"You are the best person in the grade to give this speech†, or some variation of that statement, more than once is truly humbling, and you all are either the most polite people I know, or the kindest people I know. It is a great honor to give this address, and I promise I do not take it lightly. I have chosen every word quite carefully because I am fully aware of the responsibility you all have bestowed upon me. Today, I stand before you as a personification of conflictedness. I find myself on this podium experiencing numerous warring emotions, and I am certain many of you here empathize with me on that point. Firstly, and perhaps most obviously, I am filled with a great sense of happiness and accomplishment. My peers and I have put much effort for the last six years—a third of our lives thus far—into being able to stand here today and say that we’ve earned the right to stand here. It was by no means easy, and there were many times when I thought I would not reach this finish line. But those struggles have only made this moment sweeter. The people who are on this stage survived four years of Latin, or 8th grade swim class, or English with Ms. D’Amico, or BC Calculus, or the 25% rule, and I think all of us can take some pride in that. Yet, my ambivalence on this day stems from the very fact that this ceremony is the end of an arduous journey. While I am ready to continue my academic endeavors, knowing that Hunter has thoroughly prepared me for them, I am also filled with a deep sense of anxiety and sadness. Hunter has been my second home for the last six years, and it has bordered on becoming my first home. Between my time diligently taking notes in the classroom, playing Chinese Poker in the hallway, taking a nap in the G. O. office, frantically rehearsing for a cultural show or theater production in the auditorium, cheering for an undefeated basketball team in the gymnasium, or simply sitting outside on the senior steps, istening to a boom box and enjoying nice weather in the courtyard, Hunter has truly become a sanctuary for me. My life has revolved around the fourstory brick building that stands on East 94th Street and Park Avenue, and Hunter’s intimate class size means that I have become as connected to the people of this school as I have to the building itself. It may sound disingenuous to say that I will miss each and every one of you, but all of you in some small way have shaped me into the person I am today, so I thank you all for that. Of course, the comfort that I have attained at Hunter makes this departure a rather anxious one, but with anxiety comes excitement, and the end of this journey signifies the start of a brand new one. As I leave behind the warmth that I have experienced at Hunter to enter a vastly new and quite frightening terrain, I can only help but think back to the last time I was in this situation, as a fresh-faced, wide-eyed twelve-year old entering the foreboding, windowless Brick Prison for the first time. Every aspect of my life since that point has been overwhelmingly positive, so all my fears about what lies ahead are slightly tamed by the idea that I will at least come close to experiencing in my future what I have already experienced at Hunter. However, ladies and gentlemen, more than happiness, relief, fear or sadness, I feel a very strong emotion that I cannot ignore today. More than anything else, today I feel guilty. I feel guilty because I don’t deserve any of this. And neither do any of you. We received an outstanding education at no charge based solely on our performance on a test we took when we were eleven year olds, or four year olds. We received superior teachers and additional resources based on our status as â€Å"gifted†, while kids who naturally needed those resources much more than us wallowed in the mire of a broken system. And now, we stand on the precipice of our lives, in control of our lives, based purely and simply on luck and circumstance. If you truly believe that the demographics of Hunter represent the distribution of intelligence in this city, then you must believe that the Upper West Side, Bayside and Flushing are intrinsically more intelligent than the South Bronx, Bedford-Stuyvesant and Washington Heights, and I refuse to accept that. It is certainly not Hunter’s fault that socioeconomic factors inhibit the educational opportunities of some children from birth, and in some ways I forgive colleges and universities that are forced to review eighteen year-olds, the end results of a broken system. But, we are talking about eleven year-olds. Four year-olds. We are deciding children’s fates before they even had a chance. We are playing God, and we are losing. Kids are losing the opportunity to go to college or obtain a career, because no one taught them long division or colors. Hunter is perpetuating a system in which children, who contain unbridled and untapped intellect and creativity, are discarded like refuse. And we have the audacity to say they deserved it, because we’re smarter than them. As students, we throw around empty platitudes like â€Å"deserve† and â€Å"earn†, most likely because it makes us feel better about ourselves. However, it simply isn’t the case. I know for a fact that I did not work as hard as I possibly could have, and I think the same is true for everyone on this stage. Nevertheless, people who work much harder than we ever could imagine will never have the opportunities that lie in front of us. I apologize if this is not the speech you wanted to hear, but you will have the rest of your lives to celebrate your accomplishments. I apologize if I have not inspired you, or uplifted you, but we have failed to inspire and uplift an entire generation of children. That being said, let me make it very clear that I am not giving anyone here a moral lecture, for I am as complicit in the system we are a part of as anyone else in this room. If anything, I only make these remarks to further emphasize how much Hunter has meant to me, because I am acutely aware of where I would be now without it. As recipients of fortune, we more than anyone else should be able to understand and respect what our high school experience has meant to us, and has done for us. My guilt ultimately stems from my awareness of the academic, social, emotional and psychological tools that Hunter has blessed us with. Therefore, I believe the best way to assuage this guilt is to use those fortuitous tools to not only better myself, but also improve the society that surrounds us outside these oh, so narrow walls. I do not know the capacity in which I will be able to make this world a better and more just place, but I strongly believe that education is the most effective means of creating social improvement, which is precisely why this is a battle we cannot concede. My experiences at Hunter have left me with one final emotion; the last sentiment I will share with you today is hope. I hope that I will use the tools that Hunter has given me as a means to provide opportunities to others, not out of a sense of paternalistic philanthropy, but out of a sense of duty to give to other people what Hunter has given to me. I also hope that you all will do the same, in whatever way you see fit. Even more so, I hope that in the near future, education itself will not be a privilege for the few in this world. I hope that a quality education will not be a privilege for the few in this country. I hope that the Hunter community will descend from its ivory tower made of brick, and distribute its tools evenly to the mass of humanity that is the City of New York. I hope that, despite its problems, Hunter can prove to be the rule, and not the exception, to what can exist as a school. Finally, I hope from the bottom of my heart that omeday a class speaker can stand on this podium and look into an audience of his closest and dearest friends whom he never would have met without Hunter and whom he’ll never forget, an audience of faculty members he has a deep respect and admiration for, an audience of family members who have supported him throughout his entire life without asking for anything in return. I hope this child can stand on this very stage, look at the most important people in his life, and feel happy, sad, relieved, scared, accomplished or whatever his heart desires, without feeling guilty about a damn thing. Thank you for your time.

Friday, September 20, 2019

Factors Influencing the Technical Defensive Measures on Spyw

Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl Factors Influencing the Technical Defensive Measures on Spyw Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl