Monday, September 30, 2019

Review of related literature about jollibee Essay

INTRODUCTION BACKGROUND OF THE STUDY The original owner Tony Tan and his family opened a Magnolia Ice Cream parlor in Cubao, Quezon city in 1975.In 1978, he and his siblings engaged the services of a management consultant, Manuel C. Lumba, who shifted the business focus from ice cream to hot dogs after his studies showed a much larger market waiting to be served. Lumba was Tan’s last business and management mentor. Throughout its three decade history, Jollibee became a success enjoying rapid growth. The chain opened successful milestone stores in the following years: Its 100th branch in Davao on 1991;   The same month, Jollibee signed a deal to acquire 55 percent of China’s Guangxi San Ping Wang Food and Beverage Management Co. Ltd., operators of the San Pin Wang beef noodle business for 30 million RMB. On October 2011, Jollibee acquired a 54% stake in BK Titans, Inc., the sole franchisee of Burger King in the Philippines. In 2011, Jollibee opened 260 new stores, of which 167 were in the Philippines led by Mang Inasal (86) and Jollibee (40). This brought the company’s total number of stores to 2,001 as of end December 2011. The same year, Jollibee closed Manong Pepe foodchain in favor of Mang Inasal, and sold Dà ©lifrance to Cafà ©France. Overseas, Jollibee opened 93 stores, led by Yonghe King in China (70) and Jollibee Vietnam (11). In 2013, Jollibee opened its first store in Virginia Beach, Virginia as well as in Houston, Texas. The restaurant plans to expand to Toronto in Canada, Malaysia and Indonesia. They also plan to expand throughout the Southern United States such as Atlanta, HYPERLINK â€Å"http://en.wikipedia.org/wiki/Charlotte† o â€Å"Charlotte† Charlotte,Dallas and Chicago. Currently, aside from its flagship brand Jollibee, the group’s other brands are Chowking, Greenwich, Red Ribbon, Mang Inasal, Burger King, Yonghe King (China) and Hong Zhuang Yuan (China). Jollibee is an American-style fast food restaurant with Filipino-influenced  dishes specializing in burgers, spaghetti, chicken and some local Filipino dishes. In the Philippines, Jollibee serves Coca-Cola products for its beverages; in overseas markets, the chain serves Pepsi products. Jollibee started with five branches in 1978 and has grown to a strong network of a total of 801 stores in the country, and 96 stores internationally. In total, Jollibee has 896 stores worldwide as of November 2013. It is the largest fast food chain in the country with international locations in Brunei, Hong Kong, Indonesia, Kuwait, Malaysia, Qatar, Saudi Arabia, Singapore, Vietnam, the United States, and Canada. JFC is planning to expand Jollibee to other markets like Europe. Jollibee Chicken Joy Potential (Total Market) in last 25 years, Chicken Joy has evolved from just plain chicken product to a strong and well-loved brand in the QSR (quick service restaurant) industry. It reached the level of having an established emotional affinity among Filipinos given its constancy as a functional product and the heritage that it continuously imparts in every household. Primary Target Moms and dads with kids (0-12 years old), across socio-eco classes, chicken eaters positioning a uniquely delicious total sensory experience enjoyed by the whole family: Crispylicious, juicylicious, amoy delicious, and gravylicious, satisfies not only your family’s craving for a delicious chicken meal but also your family’s needs for bonding moments. Also, Jollibee, the country’s leading fast-food chain, was cited as one of the top 10 international fast-food restaurants in the United States. US-based food and drink website The Daily Meal listed Jollibee as among the favorite foreign food chains in the country. The website described Jollibee as â€Å"hugely popular in the Philippines, and has locations scattered around the US, largely in California. Aside from burgers, they offer fried chicken, spaghetti, noodles, and unique breakfast dishes like Spam, beef tenders, or sweet pork with rice.† The Daily Meal draws over eight million unique visitors per month and ranks as one of the fastest-growing content sites of all time. The food and drink website also produces annual reports, including the 50 Most Powerful People in Food, 101 Best Restaurants in America and 150 Best Bars in America.

Sunday, September 29, 2019

Prevalence of smoking and drinking Essay

Adolescence, from Latin word adolescere which means â€Å"to grow up† is a transitional stage of physical and psychological human development generally occurring between puberty and legal adulthood. It is most closely associated with teenage years. Adolescence is further divided into three more stages, the early (12-14 years old), middle (15-17 years old) and late adolescence (18-20/21 years old). In each stage of human development, there are physical, emotional and physiological changes that happen. This is based from the concept that humans have developmental tasks that should be accomplish per stage. In the adolescence stage, adolescents are in critical stage because teenagers are exposed to a larger environment (Macmillan Dictionary for Students, 1981). Background of the study Nowadays, teenagers that are exposed to different environment are now engaged to smoking and drinking alcoholic beverages for some reasons. The strong association between binge drinking and smoking among adolescents may be attributable, in part, to the fact that both adolescent alcohol use and tobacco use share a number of sociocultural risk factors. Researchers have found that these factors—including family and peer influences, demographics, advertising, economics, and alcohol and tobacco availability—are associated with adolescents’ initial and continued tobacco and alcohol use (Bobo, J. and Corinne Husten, 2000). According to the U. S. Surgeon General Report (1994), approximately 80% of adult smokers started smoking before the age of 18. Every day, nearly 3,000 young people under the age of 18 become regular smokers and an estimated 2. 1 million people began smoking on a daily basis in 1997. More than half of these new daily smokers were younger than age 18. This translates to more than 3,000 new youth smokers per day. The rate of youth initiation of daily smoking increased somewhat from 55. 5 to 74. 9 per 1,000 potential new users between 1991 and 1996, but remained level in 1997 (the 1998 National Household Survey on Drug Abuse). It is said that young people who come from a lowincome family and have fewer than two adults living in their household are especially at risk for becoming smokers and those with poorer grades and lower self-images are most likely to begin. using tobacco. Over the past decade, there has been virtually no decline in smoking rates among all teens. Among black adolescents, however, the prevalence of smoking has declined dramatically. Most young people who smoke are addicted to nicotine and were reported that they want to quit but are unable to do so (Statistics on Teens, 1994). In 2002, Komro and Toomey said that alcohol use by underage drinkers is a persistent public health problem in the United States, and alcohol is the most commonly used drug among adolescents. Accordingly, numerous approaches have been developed and studied that aim to prevent underage drinking. Alcohol use initiation rates for children rise quickly from age 10 up to about age 13, when they reach more than 50 percent. Subsequently, initiation rates begin to slow again (Kosterman, R. et al. , 2000). Moreover, alcohol is the most commonly used drug among adolescents. According to Epstein, J. et al. , alcohol use continues to be an important public health problem. Recent national survey data indicate that 41% of current 8th graders, 62% of 10th graders, 73% of 12th graders and 85% of college students have used alcohol. Even more troubling is that 11% of 8th graders, 22% of 10th graders, 25% of 12th graders and 40% of college students reported heavy episodic drinking. Domingo and Marquez found large gender differences in the risk-taking behaviors among Filipino adolescents and youths. Men are much more likely than women to drink, smoke, and use drugs. The large gender difference in risk-taking behavior among adolescents and youths is rather common in Asian countries but not in the U. S. In our case, The Philippines has no national law regulating smoking and sale of tobacco products. There is no minimum age requirement for the purchase of cigarettes and no law regulating the advertising and promotion of cigarettes. There is no law that requires the printing of warning labels on cigarette packages. Instead, the National Tobacco Administration (NTA) is supposed to protect and promote the â€Å"balanced and integrated growth† of the tobacco industry. Despite the results of a survey which say that 72 per cent of the polled adult population was supportive of having a legislation banning smoking advertisements. There are more restrictions on drinking than smoking especially of the minors. Those who are less than 18 years old are 2|Page prohibited from purchasing or drinking alcoholic drinks. However, the enforcement of this regulation is weak (Choe, M. and Corazon Raymundo, 2001). Objectives This study aimed to determine the prevalence of smoking and drinking of alcoholic beverages among senior high school students specifically: 1. to compare the prevalence of smoking and drinking of alcoholic beverages between senior students of public and private high school; 2. to contrast the occurrence of smoking and drinking alcoholic beverages among senior high school males and females; 3. to identify and rank the reasons why senior high school students smoke and drink alcoholic beverages; 4. to determine the awareness status of senior high school students in terms of the effects of smoking and drinking alcoholic beverages on their physiological health; and 5.to identify the effect of smoking and drinking of alcoholic beverages on the socialization of senior high school students. Review of Related Literature There are different factors affecting different behaviors of adolescents. One social theory studied by Travis Hirschi (1969) is a more general explanation of deviance than deterrence theory, but which is, in turn, primarily restricted to informal social control which comes from individuals being bonded to groups and institutions. 1236 grade 9-13 students from 62 randomly selected classrooms in 3 Canadian schools in the Borough of East York, 1 of Metropolitan Toronto’s 6 municipalities, were surveyed in December 1994 about their alcohol drinking beliefs and behaviors, and related lifestyle behaviors. Findings are based upon the analysis of data from 628 boys and 608 girls, of whom 799 were born in Canada. 24% of the students reported never having tasted alcohol, 22% had tasted alcohol but were not current drinkers, 39% were current moderate drinkers, 11% drank at 3|Page least 5 drinks per occasion at least once per month, and 5% did not answer. The most often stated reasons for not drinking were family upbringing and they believed adverse effects of alcohol consumption upon health, while the most often stated reasons for drinking were because it is an enjoyable experience and to get into a party mood. Respondents’ drinking patterns were significantly related to gender, ethnicity, grade, and the reported drinking habits of parents and friends. Older male adolescents who describe themselves as Canadian are more likely to drink heavily than are students who are younger or female, or self-identify as Asian or European. Current heavy drinkers are at greater risk than other students of engaging in other high-risk behaviors such as drinking and driving, riding with an intoxicated automobile driver, and smoking every day (Feldman et al. , 1999). In one of the surveys in US, half of respondents knew of a place near their school where kids could go to drink and get high during the school day, according to the yearly back-to-school survey, which polled 1,003 12-to-17-years old. And more than one-third said that students had ample opportunity during the school day to drug, drink and smoke without getting caught. Drug use in both public and private schools is on the rise, with 54 percent of private high school students reporting that drugs are available in their schools versus 24 percent in 2002 and 61 percent of students at public schools saying their schools are â€Å"drug infected,† compared with 46 percent in 2002. The researchers looked closely at the role of social media in teen substance use and found 75 percent of surveyed 12 to 17-year-olds said seeing pictures of teens partying with alcohol or marijuana on social networking sites such as Facebook or MySpace encourages them to party similarly (Gardner, 2012). Forty-five percent of teens – almost 11 million – said they have seen such pictures online and 47 percent of those teens said that it seems like pictured teens are having a good time. Teens who have seen these pictures were found to be four times more likely to have used marijuana, more than three times likelier to have used alcohol, and almost three times more likely to have used tobacco (CBSnews, 2012). 4|Page In the awareness of teenagers on the health risks of smoking and drinking, it was found in one of the studies that teenagers think that smoking is more dangerous than smoking. Teen smoking has declined in all three grades included in the study—grades 8, 10, and 12. Still, almost 19 percent of 12th graders reported current (past-month) cigarette use. This decline shows that more teens realize the harm smoking does to your body and are making the decision not to start. Also, teens’ attitudes about smoking have changed. They increasingly prefer to date nonsmokers and believe smoking to be a dirty habit. Likewise, among nearly all grades, trends over the past 5 years showed significant decreases in alcohol use, including first-time use, occasional use, daily use, and binge drinking. As with smoking, this decline may be the result of more teens understanding the risk of drinking alcohol and disapproving of this behavior (The Sara Bellum Blog, 2012). How teenagers feel about themselves plays a significant role in whether they choose to drink or use other drugs, according to a new report released today by SADD and Liberty Mutual Group. The Teens Today 2003 study also reveals that a teen’s â€Å"Sense of Self,† can influence sexual behavior, reaction to peer pressure, and, importantly, be affected by a teen’s relationships with parents (Henderson and Greenberg, 2004). Research has shown that the media over estimates smoking rates and often associates smoking with favorable attributes or situations. Given that the media plays a large role in influencing youth culture, portrayal of smoking in the media is of concern. In order to explore young people’s perceptions of smoking imagery in the media, 16 focus groups were conducted with 117 school students. Participants were asked to rate smoking images selected from audiovisual and print media, and to discuss their perceptions of these images. The results showed that young people perceived smoking in these media selections to be normal and acceptable. They identified with the stress relieving and social aspects of smoking, despite being well aware of the harmful health effects. Its acceptability as part of a ‘cool’ image was also noted. Positive images of smoking in the media have the potential to down play the serious health consequences of smoking by portraying it in a way that young people interpret as a 5|Page normal part of everyday life. They may also encourage a more neutral or tolerant attitude towards smoking among young people and therefore act to counteract other health promotion efforts to reduce teenage smoking (Watson et al., 2003). 6|Page METHODOLOGY The Participants In the study of determining the prevalence of smoking and drinking alcoholic beverages among senior students from private and public high schools, a total of forty senior high school students, twenty students comprising of ten male and ten female students from public high school and twenty students comprising of ten male and ten female students from private high school were randomly asked to answer the questionnaires provided by the group. The public school was a public national high school located in Los Banos, Laguna. On the other hand, the private school is a registered private non-sectarian high school in Los Banos, Laguna as well. The respondents have a mean age of 16 years old, ranging from 15-18, having a mode of 16. Measures The most commonly used and most frequently self devised measuring instrument, the questionnaire was used simply to obtain information directly from subject as to make a standardized list of factual information or elicited application that was generalized to a larger population. A one-shot survey questionnaire was used as the research instrument in the study of determining the prevalence of smoking and drinking alcoholic beverages among senior students from private and public high schools. It is a usual study design where a single group of individuals is selected for observation over a single, limited time period, usually because they have experienced some factor taken as important in shaping some outcome (Kelly, 2012). And according to Jupp (2012), it is akin to one-off crosssectional design. As shown in Appendix A, a letter to the respondent identifying our topic and informing our objectives were told. Moreover, see Appendix B for the complete copy of the questionnaire used in the study. 7|Page The questionnaire was divided into three parts: Personal information, Physiological status and Lifestyle, and Social Aspect. The Personal information section was used for determining the age, sex, type of school, religion, and parents’ civil status. While in the physiological status and lifestyle section, this would tell us how often the students from private and public schools smoke and drink alcoholic beverages. Also, to find out if the students were aware of the effects that these specific vices can contribute to their health condition. Lastly, the way of smoking and drinking alcoholic beverages of the students in terms of having a companion or not while smoking and/or drinking and the perceptions of parents and themselves were determined in the Social Aspect section. The Setting The researchers had entrusted the set of questionnaires to one of the respondents from public and one from private high schools. They were the ones who distributed the set questionnaires to their fellow senior high school classmates. The respondents were a given a whole day time to answer the survey questionnaire. The two entrusted students collected all the completely answered survey questionnaires at the end of the day. Data Analysis In the process of obtaining, the questionnaires were made, distributed and collected again. For a more simple analysis of the data collated, tallying was made in a tabulated manner. The data obtained were computed to get the percentage by dividing the number of score with the sum total of scores and then multiplying it by 100% using the formula: P = f / N x 100% Where: P – Percentage N – Total number of respondents F – Frequency 8|Page And lastly, for an easier glance to the data collected, it will have a graphical presentation in a form of bar graph, pie chart and other usual graphical ways to present the data. In order to identify the reasons why they smoke and what they think their parents perceive them a list of possible choices were mentioned in the questionnaire. These reasons were ranked 1 to 3 by the respondents who are smoking and/or drinking alcoholic beverages. In order to evaluate the rankings, an improvised rubric is formulated. Every number (rank) has an equivalent vote just to differentiate and identify the leading reasons. Rank 1 – 3 points Rank 2 – 2 points Rank 3 – 1 point The highest vote will be assigned as the top reason while the others will be ranked according to the accumulated votes. The tabulated rank can be found on the results and discussion. Other data, including the occurrence, prevalence, frequency, reasons, and perceptions of male and female senior students smoking and drinking alcoholic beverages among private and public high schools were tabulated and graphed in order to see the comparison. While in determining the awareness of the students if smoking and drinking alcoholic beverages had an effect on their health condition, and if they were able to gain friends were in a form of poll. 9|Page RESULTS AND DISCUSSION The prevalence of smoking and drinking alcoholic beverages among senior students of public and private high school were determined and observed. As seen in Table 1, the total number of students smoking is 3, with 2 females and 1 male in public school. While 4 students, with 3 males and 1 female in private school. Among the 40 students, 7 of them were smoking. Table 1. Number of male and female students smoking in private and public high schools Public Private Subtotal Male 1 3 4 Female 2 1 3 3 4 7 TOTAL As seen in Table 2, the total number of students drinking alcoholic beverages in public school is 6, with 4 males and 2 females. While there are 9 students drinking alcoholic beverages in private school. Among the 40 students, 15 of them were drinking alcoholic beverages. Table 2. Number of male and female students drinking alcoholic beverages in private and public high schools Public Private Subtotal Male 4 6 10 Female 2 3. 5 6 9 15 TOTAL 10 | P a g e The occurrence of male and female students smoking in public and private high school students is shown in Fig. 1. It was observed that there’s a higher number of smoking students in male category in private school. While, there is a higher number of smoking students in female category in public school. Moreover, students from private schools are more exposed to smoking. This might be because of the accessibility and affordability. Most private school students are in middle to high class statuses. Smoking 3. 5 3 2. 5 2 Male 1. 5 Female 1 0. 5. 0 Private Public Fig. 1. Occurrence of male and female students smoking in private and public high schools Conversely, The occurrence of male and female students drinking alcoholic beverages in public and private high school students are shown in Fig. 2.. It was observed that there’s a higher number of students drinking alcoholic beverages in male category in private school. While, there is a higher number of students drinking alcoholic beverages in male category in public school. Moreover, students from private schools are more exposed to drinking alcoholic beverages. This might be because of the accessibility and affordability. Most private school students are in middle to high class statuses. 11 | P a g e Drinking 7 6 5 4 Male 3 Female 2 1 0 Private Public Fig. 2. Occurrence of male and female students drinking alcoholic beverages in private and public high schools Table 3. Frequency of male and female students smoking in private and public high schools Daily 1-2 times a week 3-5 times a week Occasionally Public Male | Female | | 2 1 Male || | Female | Subtotal 0 0 Private Subtotal 0 3 1 0 TOTAL 0 5 2 0 12 | P a g e 0%. Smoking 0% 29% Daily 1-2x a week 3-5x a week Occasionally 71% Fig. 3. Frequency of male and female students smoking in private and public high schools Table 4. Frequency of male and female students drinking alcoholic beverages in private and public high schools Daily 1-2 times a week 3-5 times a week Occasionally Public Male ||| Female | | 4 1 1 Male |||| | | Female | | | Subtotal 0 | Private Subtotal 0 5 2 2 TOTAL 0 9 3 3 13 | P a g e Figure 4. Frequency of male and female students drinking alcoholic beverages in private and public high schools 0% Drinking 20%. Daily 1-2x a week 3-5x a week 20% 60% Occasionally Students involved in smoking in private and public high schools had their own reasons why they did the vice. As seen in Table 5, the most voted reason in public high school was to experiment, and the least was because they imitated it from their parents. On the other hand, the most voted reason in private high school was to experiment also and the least was because of losing weight and media influence. 14 | P a g e Table 5. Rank of reasons of male and female students smoking in private and public high schools. Smoking Public Private Rank Votes Reason Rank Votes 6 0 Imitated from parents 2 6 2 5 Peer pressure 3 4 3 3 Media influence (advertisements) 5 0 5 1 Fashionable 4 3 5 1 Form of rebellion 4 3 4 2 Wanting to lose weight 5 0 1 6 To experiment 1 8 18 24 Table 6. Combined ranking of reasons of male and female students smoking in private and public high schools Smoking Rank Reason Votes 1 To experiment 14 2 Peer pressure 9 3 Imitated from parents 6 4 Fashionable 4 4 Form of rebellion 4 5 Media influence (advertisements) 3 6 Wanting to lose weight 2 42. 15 | P a g e Reasons for smoking 7% To experiment 5% 33% 10% Peer Pressure Imitated from parents Fashionable 10% Form of rebellion Media influence 14% 21% Figure 5. Combined ranking of reasons of male and female students smoking in private and public high schools Students involved in drinking alcoholic beverages in private and public high schools had their own reasons why they did the vice. As seen in Table 7, the most voted reason in public high school was to have good time with friends, and the least was because of boredom and form of rebellion. On the other hand, the most voted reason in private high school was to have good time with friends also and the least was because of boredom and form of rebellion also. 16 | P a g e Table 7. Rank of reasons of male and female students drinking alcoholic beverages in private and public high schools Drinking Alcoholic beverages Public Rank Vote Private Reason Rank Vote 1 13 To have good time with friends 1 17 3 5 To experiment, to see what it’s like 2 10 5 2 To feel good, get high 4 7 4 4 Because it tastes good 6 4 2 9 To relax or relieve tension 3 9 7 0 Boredom. 7 0 5 2 To get away from my problems 5 6 7 0 Form of rebellion 7 0 7 0 Influenced by alcoholic parents 8 0 6 1 To get to sleep 7 1 7 0 To fit with a group I like 8 0 7 0 Anger or frustration 8 0 36 54 17 | P a g e Table 8. Combined ranking of reasons of male and female students drinking alcoholic beverages in private and public high schools Drinking Rank Reason Votes 1 To have good time with friends 30 2 To relax or relieve tension 18 3 To experiment, to see what it’s like 15 4 To feel good, get high 9 5 Because it tastes good 8 5 To get away from my problems. 8 6 To get to sleep 2 7 Boredom 0 7 Form of rebellion 0 7 Influenced by alcoholic parents 0 7 To fit with a group I like 0 7 Anger or frustration 0 90 18 | P a g e Reasons for drinking alcoholic beverages 2% 0% 0% 0% 0% 0% To have good time with friends To relax or relieve tension 9% To experiment, to see what it’s like 9% 33% To feel good, get high Because it tastes good To get away from my problems 10% To get to sleep Boredom Form of rebellion 17% Influenced by alcoholic parents 20% To fit with a group I like Anger or frustration Fig. 6. Combined ranking of reasons of male and female students drinking alcoholic beverages in private and public high schools High school students are indeed part of the society. However, that does not mean that all of them are aware on certain issues present in the status quo today. Figure7 shows us that in terms of awareness of male and female students in the effects of smoking to the health condition, 95% said that they are aware, and 5% said they are not aware. This just means that even though majority knows that this can affect health condition, there are still young students who are blindly exposed to this habit. Aware Not Aware 95% 5% Fig. 7. Awareness status of male and female students in the effects of smoking to the health condition 19 | P a g e Figure 8 shows us that in terms of awareness of male and female students in the effects of drinking alcoholic beverages to the health condition, 100% said that they are aware. Students were able to identify the negative effects of drinking to health condition. 100% Aware Not Aware Fig. 8. Awareness status of male and female students in the effects of drinking alcoholic beverages to the health condition. While it is important to know the reason why some adolescents smoke and/or drink alcoholic beverages, and after knowing if they were aware that these things affect their health conditions. We also have to look at the perceptions of people around them, and also what they think of themselves. In contrast to awareness of the respondents in the negative effects of smoking and drinking on health condition is their way of performing these vices, either alone, with friends, or both. Fig. 9 and Fig. 10 shows the way of drinking and smoking of public and private high school students respectively. It is observed that 53% or the majority of the students engage in drinking with friends, and 80% of them smoke either alone or with friends. This shows the social aspect of the students with their same age group in doing the said activities. 20 | P a g e Do you drink by yourself or with your friends? 0% Alone 47% With friends 53% Both Fig. 9. Way of drinking alcoholic beverages of male and female students among public and private high schools Do you smoke by yourself or with your friends? 0% 20% Alone With friends Both 80% Fig. 10. Way of smoking of male and female students among public and private high schools. 21 | P a g e Table 9. Perception of smokers and/or drinker of people on them Parents Cool || Friends Self 2 ||| 3 |||| 4 0 || 2 | 1 |||||-|||| 9 |||||-||| 8 |||||-| 6 |||| 4 || 2 |||| 4 Addict Good Bad As seen in Fig. 11, the majority of the students answered COOL as what they think their parents thought of them. The least vote was they thought that their parents think their children were bad. This means that even if they’re doing those kinds of vices, their parents still accept them. What your parents think of you? 9% 10% Cool Addict Good 23% 58% Bad Fig. 11. Perception of the respondents on what their parents think of them as they smoke and drink alcoholic beverages 22 | P a g e On the other hand, the Fig. 12 shows the perception of the respondents on what their friends think of them in engagement of the said vices. 54% think that their friends consider their activity in a good way because it helps them gain friends, to be able to interact, and to socialize well with other people. It is observed that what they think their friends perceive also had the same result as to how they comprehend themselves when they smoke or drink. What your friends think of you? 13% 20% Cool Addict 13% Good Bad 54% Fig. 12. Perception of the respondents on what their friends think of them as they smoke and drink alcoholic beverages It is also important that students can assess themselves even if they are doing some vices. As seen in Figure 13, majority of them still thought that they are good. However, 6% of the students thought they are addicts. Conversely, there is a consensus that 27% thought that they are cool and bad. 23 | P a g e How do you perceive youself? Cool 27% 27% Addict Good 6% Bad 40% Fig. 13. Perception of the respondents on what they perceive on themselves as they smoke and drink alcoholic beverages Perceptions are indeed important. But, it is still significant when it comes to application or reality. Are these students still gain friends after all their vices? In a poll seen in Fig. 14, 9 out of 15 said that they gained friends, and 6 out of 15 said that they did not gain friends. Meaning, there people who discriminate or dislike the vices. Or even if it’s okay for them, it is not proper to be exposed earlier. Did you gain friends? Yes No 60%. 40% 9 out of 15 6 out of 15 Fig. 14. A poll showing the effect of drinking and/or smoking on their socialization Seemingly, many committed smokers and/or drinkers showed that they gained friends after having learning how to smoke and/or drink. However, there are still some who don’t. 24 | P a g e LIMITATION AND SIGNIFICANCE Limitation There are certain problems that were encountered in the study. One of which is that the idea that honesty in answering these questionnaires have suffered. The respondents may or may not answer these questionnaires in full honesty. From here, we may have little discrepancies or percentage errors. Significance The significance of this study is for the teenagers to be aware in terms of the effects of smoking and drinking alcoholic beverages on their physiological health. This study can also help the parents of those teenagers to understand more the point of view of teenagers who are engaged to these activities. They can know the cause why teenagers are into smoking and drinking alcoholic beverage. 25 | P a g e SUMMARY, CONCLUSION AND RECOMMENDATIONS. Summary and Conclusion The study was able to conduct the research on the prevalence of smoking and drinking alcoholic beverages among senior students of public and private high school. 18% of the students in both public and private schools are engaged in smoking; however, there are students in private schools who smoke more than students in public schools. It is concluded that the social status of the students is a common factor since private school students have more access to cigarettes and could afford it than those in public schools. It is also determined that the male students in private schools and the female students in public schools are more prone to the said vice and their main reasons were: (1) to experiment; (2) peer pressure; and (3) imitated from their parents. With regards to their way of smoking, the students’ general frequency is 1-2 times a week, and they usually smoke either alone or with peers. Most likely they tend to smoke with their peers because it is their way of socialization. The students also perceive that they are also likely to gain friends when they smoke. It is concluded that the perception of the students to what their parent think of them is â€Å"in-the-trend† when they are engaged in smoking. The majority thinks that their parents consider them as â€Å"cool† or â€Å"sophisticated†. Aside from that, the respondents think that their friends refer to smoking in a good way, causing them to also perceive the same judgment. To summarize the above statements, it is evident that the students in their adolescent stage have more desire to please their peers rather than their parents because they want to have a sense of belonging and they want to socialize more with people of the same age group. Peers are the most important relationship in the teenage years. They engage in different kinds of activities, and one of those are vices. In this stage, the curiosity level of the person is prominent because he/she is able to perceive different kinds of activities from various types of people. Parents are also a factor because they are the ones who nourish their child’s well-being. What they do causes 26 | P a g e various impacts on the child, causing him/her to either imitate it or not. The social status of the students also has an effect on their engagement in vices; it depends on how well they can afford it and on what terms they could get access. On the other hand, not every student in both public and private high schools is aware that smoking can affect their health condition. 5% of the students are still blindly exposed to the effects of smoking; therefore, it is recommended that both kinds of schools should also give the students more knowledge and expose them.

Saturday, September 28, 2019

Product outsourcing to Far East Enterprises Limited

In management accounting the premise of relevant costing is applied in order to evaluate business decisions. Such costing premise implies that only incremental costs and revenues pertinent to the decision at hand are considered. Past costs, commonly known as sunk costs and/or unaffected costs are irrelevant to the decision-making process. Therefore the calculations computed in Appendix A of this Report abide with the relevant costing principle noted in this paragraph.At face value, the agreed price with FEE of $395 per unit is lower than the total manufacturing costs per unit of $425. However, before rushing into any drastic conclusions it is imperative to consider the relevant costs and revenues. Further more, in this case, a particular time frame ought to be set up, because FEE is requesting a two-year contract with the company. Therefore the relevant costs and revenues have to be computed on a two-year basis.Upon assessment of the incremental costs and revenues on the two year per iod, it is outlined in Appendix A that an Incremental Loss of $8,929,280 will occur if the company appoints FEE as its supplier for this particular product. Thus it is more financially viable to make the product rather than purchase it from a supplier. The reason behind such a loss mainly rests because the buy decision will be unable to affect the general company overheads, in which a substantial portion is allocated to the GPSN Model.

Friday, September 27, 2019

Assignment (primary research required) Essay Example | Topics and Well Written Essays - 3000 words - 1

Assignment (primary research required) - Essay Example The current paper, therefore, aims to look into the working environment of ADM Building and Property Services, a small-sized business in London, and identify their business behaviours and practises in relation to small business management. Primary Research: Interviews with ADM Building and Property Services Employees The following interviews were conducted among 5 employees, 4 managers, and the owner himself, and aimed to determine how business management has been integrated into their overall system, particularly their actual practises and attitudes. Opportunities and Challenges Presented by Small Business Management The first two questions were, however, focused on both the opportunities and challenges that are brought about by being in a small business. According to their responses: â€Å"Small businesses can be established at a low cost and even on a part-time basis. Because these businesses that are smaller in size, such as ours, have begun to adopt Internet marketing and have taken full advantage of the benefits that this offers, we have been to respond to specialized niches. Thus, we have been able to take action for what the marketplace demands of us†. â€Å"We have established strong relationships with our clients and customers; we have also been capable of identifying their needs and preferences so we can provide more individualized services. Due to such, we have attained a significant increase in development and accountability as well†. â€Å"Independence is a very important factor to consider when establishing a small business; this comes with the freedom to make our own decisions, take our own risks, and obtain the rewards for our efforts. There is the lack of constraints that are brought about by economic and other external factors. Nonetheless, allocating long hours for work and understanding that our clients are our bosses have always been a top priority†. â€Å"Most often, the problems we encounter are brought about by the pressures from competing with larger businesses. For instance, to find new customers has always been a great challenge for us. To establish a continual flow of business, it has always been very important to focus on marketing the services that we offer†. The Importance of Branding to Small Businesses The next questions focused on the actual management of business, including the importance of branding and the strategies that they use to develop their brand. Their responses included: â€Å"Branding is the image that the public has of our business; it does not necessarily refer to the brand that we aim to create but rather the perception of what others have of us. This perception can be affected by various aspects of our business, from the products and services that we offer to the marketing tools that we use†. â€Å"Internet usage has been of great importance to us, such as through social media and online search engines. Aside from reinforcing our brand, we also provide clear, relevant, and engaging information to our target audience. Marketing and advertising activities should always be integrated

Thursday, September 26, 2019

Context and Meaning, Teaching Vocabulary Essay Example | Topics and Well Written Essays - 500 words

Context and Meaning, Teaching Vocabulary - Essay Example The students can be shown separate pieces of silverware, which they know (a fork, a spoon, a knife), and then told that all they are called silverware. That is the teacher goes from particular to general concepts when introducing the word. Using authentic materials can be of a great advantage to teach students word meaning, because they are the real examples of how the word is usually used. However, such materials can be inappropriate for beginners because they may not be ready to understand and comprehend the presented information. In addition, teaching meaning, I believe, should not be separated from teaching other concepts of the language, so it might be more useful to use materials specifically developed to meet the learning needs of the students. For example, if the students have just learnt Present Perfect Tense, it is good to use Perfect structures in the materials for teaching meaning in order for the students to both revise and strengthen the knowledge of Present Perfect, and learn the new vocabulary on the basis of already acquired knowledge. In addition, when authentic materials contain many unfamiliar or new grammatical structures, they are more difficult for the students to understand, and, as a result, t he meaning of the separate words may be more difficult to explain too. The following text can be used to teach vocabulary to beginners. The words to introduce would be the names of the house premises: living room, kitchen, dining room, bathroom, bedroom. The text is accompanied by illustrations: a layout of the house, or pictures of separate rooms. The teacher reads the text showing each room on the

Personl conception of the mening of helth nd heling Essay

Personl conception of the mening of helth nd heling - Essay Example Descriptions of helth bsed on physiologicl mesurements ignore the ide of helth s vlue. Wht they offer in precision, they lck in depth; for, surely, being helthy is much more thn hving n your orgns quietly functioning within plus or minus two stndrd devitions of norml. Vlue-free descriptivist definitions of helth cnnot be more thn component of comprehensive concept of helth, for helth is vlued. Helth is vlue beyond formlizble knowledge. However, vlue-bsed definitions of helth lck universlity; they depend on the individul's (or culture's) determintion of wht is to be vlued. Descriptivist definitions ignore the subjective dimension, wheres normtivist definitions exlt it. The World Helth Orgniztion defined helth s " stte of complete physicl, mentl nd socil well-being nd not merely the bsence of disese or infirmity." (Genev: World Helth Orgniztion, 1958). This definition, if tken literlly, is meningless. However, we believe tht ll normtivist definitions of helth, including this hopelessly utopin WHO vision, derive from common ground, core mening or experience of helth tht requires interprettion. (Mordcci, 1995) ny experienced clinicin cn recll terminlly ill ptient who objectively seemed the sme the dy he died s the dy before except for hving (often quite explicitly) lost his will to live. Implicit in this will to live, nd of specil importnce to the seculr individul, is sense of life being worth living despite ll the suffering one my encounter in life nd despite the wreness of the certinty of deth nd nothingness. The helthy individul is well-functioning s whole, in hrmony physiclly nd mentlly with himself nd with his surroundings. lthough we tend to spek of helth s though it were commodity--something to be lost or regined--it is not detched from the person it belongs to. It is prt of the person's life story. Helth is dynmic; it hs pst, nd present, nd it is precondition for future. Desire, without which there is no story, belongs to the future--there lies the hoped for full blossoming of life. Thus there seems to be sort of inevitble metphysics embedded in the experience nd lnguge of helth nd illness, which clls for wreness nd for creful nlysis in the light of n dequte chrcteriztion of the concepts we use. It Is extremely importnt for medicine to be conscious of the depth of our desire for helth nd our fer of illness: they re not only physicl or biopsychologicl conditions tht cn be fced in reductionistic pproch. The existentil, morl, nd symbolic dimensions of the experience of illness must be ddressed s chllenges the ptient is required to fce with his culturl, personl, nd religious resources, nd in which the physicin is sked to help him not only s physicin but s person. No technicl nswer cn help the ptient to understnd nd fce the existentil dimensions of helth nd illness: in this respect, the eduction physicins now receive in mny countries round the world (nd especilly in the West) seriously limits their bility to cre for their ptients. Helth s wholeness, hrmony, nd well-functioning, nd s slvtion from deth is desirble end in itself However, the crux of concept of helth, nd its greter mening or vlue, is helth s mens. Helth is viewed s the experience of life s Promise of good; the ultimte good tht is hoped for is the full life--this we refer to s plenitude. lthough this is similr to Seedhouse's concept of helth s foundtion for chievement, the ide of plenitude

Wednesday, September 25, 2019

Questions answered Essay Example | Topics and Well Written Essays - 1250 words

Questions answered - Essay Example It is important to note that an proposition ought to have a defined timeframe upon which it will expire or be invalidated. Secondly, a contract must involve consideration (Meiners, Ringleb and Edwards, 2014). By delineation, consideration denotes the damages on the part of the supplier or entity giving the promise and must be quantifiable financially. The third element as posited by Meiners, Ringleb and Edwards (2014) is contractual capacity. There are legal guidelines outlining the qualifications of an individual with the capacity to enter into an contract with another person. For instance, an individual must be an adult or have attained eighteen years of age, be mentally upright. Any contract enterer with an individual who has not met the specified qualifications is invalid. The fourth element of a contract is legality (Meiners, Ringleb and Edwards, 2014). In this regard, the involved entities must be ready to bind their agreement legally. In case one of the parties does not deliver in regard to the promises outlined in the contract, the legality of the contract gives the party the basis to initiate legal proceedings against the other party. Fifthly, there must be a valid consent to enter into an agreement (Meiners, Ringleb and Edwards, 2014). By explanation, this means that an individual should individually assent to the agree ment without being forced. Informed consent is defined by Schermer (2002) as the practice or procedure through which a medical practitioner reveals all information relating treatment to a patient with an intention of providing him or her with all the relevant information required to make a choice to either allow or reject treatment. Patients, according to Schemer (2002), have a legal right to determine the type of treatment they prefer and it is the obligation of the physician to respect the patients decision. In order for a patient to allow or refuse treatment, the physician involved must explain in detail the

Tuesday, September 24, 2019

Corporate Antipolitics Essay Example | Topics and Well Written Essays - 1000 words

Corporate Antipolitics - Essay Example The advocacy of neoliberal principles may be defined as â€Å"economic Liberty†. Economic liberty has the influence of reducing government spending and enjoying free trade influences (Sawyer, 2004). The influences of such advances of communities ensure that the private sector has as stake in the management of resources. The influx of such a company’s influences cultures of communities. The other influences of such companies on various parts of the globe include improvement of welfare, provision of amenities and on economic conditions. On the other side, there have been an increased number of conflicts between groups and the government with such developments. To put into perspective, an example of such conflict is the current Nigeria oil wars. Ecuador is among the largest supplier of oil to the western side of the United States of America. With the increase of companies’ exploration of oil in the region, there has been an increased activism. Swayer in her examination of the influence of US oil companies in the nation brings diverse perspectives. The author points out that there since the rise of the movement against oil companies there has been three influences. The influence to the conflict on oil brings forth three players. These aspects are the Ecuadorian neoliberal policies, influences of the state and movements (Sawyer, 2004). The region on discussion faces various challenges. The Indigenous people of Ecuador have long struggled to control oil and land resources. This has led to the glamour for rights of the people. However, through neoliberal policies the government and the oil companies dictate norms. This has led to debates and demonstration. Through movements such as the OPIP that was prevalent during the 1990s, the author provides diverse perspective on politics of the land. The aspect of the struggle by such movements is the creation of Autonomy (Sawyer, 2004). The

Monday, September 23, 2019

Academic paper Essay Example | Topics and Well Written Essays - 1500 words - 1

Academic paper - Essay Example The paper will also discuss the metrics of implementing change in the HR operations of the organization. As a recap of the SWOT analysis conducted, it has been observed that the main weakness being faced by PAC is that the management styles used by the HR department are divisive. As a result, the employees are not motivated and the other issue is that in the staffing department, only one person is responsible for performing various tasks related to recruitment along with another recruit. The other weakness is that the employee grievances are not addressed on time. The leaders lack understanding of the needs of the employees and this contributes towards low morale among them. The major threat witnessed from this analysis is that the benefits and compensation structures are significantly high and they strain the financial status of the organization. The company is paying large sums of money to cover the benefits of the employees and this scenario may not be sustainable in the long run. From the findings outlined above, it has been recommended that cost cutting measures particularly in the area of labour force should be implemented. This will go a long way in helping the company to save money while at the same time improving its operations. The human resources department should be tasked with assessing the viable measures that can be taken in order to make necessary changes that would not negatively impact on the operations of the company. The other issue is that in order for the company to operate viably, it is recommended that it should adopt change especially in the structure of human resources management. During the contemporary period, it can be observed that change in the operations of the company is inevitable due to the dynamism of the environment in which the company operates (Jackson and Schuler, 2010). Thus, enlightened leaders should anticipate change and act accordingly and they should also take a

Sunday, September 22, 2019

A New Ending to the Lord of the Flies Essay Example for Free

A New Ending to the Lord of the Flies Essay Instead of coming at me, like I thought he would he ran the opposite direction and started screaming at the top of his lungs. By now the fire was out of control; it was racing down the mountain side, faster than fast. I started to run again, this time I was running toward the beach. â€Å"I need to get the littluns to safety† I said to myself. I ran and ran to the beach and went to grab the conch were it should have been; but I stopped myself. The conch is gone just like Piggy. Shattered, into a million pieces. I fell to the ground with exhaustion and grief. I could feel the heat of the fire coming nearer and nearer. As Jacks hunters came closer to me I heard them chanting a different chant. I could have sworn that I hear Jack screaming in pain. Someone burst out of the trees, screaming in pain. â€Å"Jack,† I said to myself as I looked to see if I was right. Sure enough I was right, but this was worse than I imagined, he was on fire! Half of his body was burnt. He looked at me with a sad, hurt look. He ran past me and jumped into the ocean. Jack never resurfaced, and I wasn’t about to go and get him. I heard more screaming behind me. I knew they were coming after me so I ducked down and tried to not move. Maybe they won’t notice me. It must have been ten minutes before I heard any noise coming out of the forest. But as everyone gathered around me it became silent. â€Å"Is everything all right? † I heard a somewhat familiar voice say. I looked up to see who was talking. I started to talk, but as I saw who it was my mouth just stayed open. â€Å"Dad? † I said in unbelief. â€Å"I knew it. † I yelled as I got up and ran to him. He stared as if I was dead. Maybe I am dead and this is all a dream. As I jumped in to his arms I was assured that I was alive when he caught me. He whispered in my ear. â€Å"Ralph? Is that you? † â€Å"YES! † I yelled â€Å"it is me! † I said more quietly. I started to cry out of relief. Dad started to cry too. â€Å"I thought you were dead! † he said barely above a whisper. â€Å"Well, how many of you are there? † he asked getting up and putting me down. â€Å"Um, I really don’t know. There are a few kids dead. † I said the last part a little quieter. â€Å"Well than, who is the leader. Roger was standing next to me. When dad said this, I half expected him to claim the glory, and I was going to let him. Instead he backed up, as did all the other kids. Roger spoke up, â€Å"Ralph is the leader. † He said this with a sound of remorse. â€Å"Ralph? How could you let this happen? † dad sounded surprised that I could let everything get so out of hand . â€Å"I tried to keep everything under control, but when jack got mad and left, everything went out of hand. You can’t honestly think that I could keep control over twenty some boys. I said this and started to cry. â€Å"Well then I guess we should get you boy’s home. † My dad said with a look of guilt on his face. I don’t blame him, though. On the ride home I couldn’t help but ask how mom is. She is fine apparently. I can’t wait to see her. Dad said she couldn’t get over the fact that I was gone. When we made sure that every one was home and good, we made our way home. As we arrived to the house I was reminded of the day I left here some time ago. As I burst through the door to start my life over.

Saturday, September 21, 2019

Zimbabwe Country Economy

Zimbabwe Country Economy Introduction â€Å"Our votes must go together with our guns. After all, any vote we shall have, shall have been the product of the gun. The gun which produces the vote should remain its security officer its guarantor. The peoples votes and the peoples guns are always inseparable twins† Robert Mugabe, 1976 Zimbabwe is a landlocked country in Southern Africa. One of the natural wonders of the world, the Victoria Falls, resides within the ‘Great Zimbabwe. It was once a major tobacco producer but now, in the hands of Robert Mugabe, has become a country with a deteriorating economy and is facing international isolation. This dissertation will analyse Robert Mugabes, the Zimbabwean Presidents, reign over the country and how he transformed from being a populist to a possible dictator. The research is based on the situation in Zimbabwe before the elections, which will be take place in March 2008. In doing so, the developments of the British colonial power in the country will also be highlighted, as many Africans believe it to be at the core of Zimbabwes current problems. Many have argued that his actions and beliefs were the presidents answer to the colonisation suffered by Zimbabwe; whereas others say he is simply retaliating against the views of Ian Smith, the former Prime Minister of Southern Rhodesia. It can be said that the true reasons for Mugabes descent into dictatorship will never be explicitly clear. Dictatorship in its broadest sense can be defined as a government with a single leader or party that exercises absolute control over all citizens and most aspects of their lives. Dictators of such power are perceived by themselves and their followers as above the law and able to act beyond constitutional constraints. This dissertation will, therefore, also analyse why dictatorship became the chosen method of government for a president, who clearly could have emerged from the 1980s and 1990s as a president who was clever, trusted and perceived by many a reliable leader. The British Colonialism Surrounding countries once perceived Zimbabwe as a breadbasket that could have potentially provided a source of surplus; this was the case until the colonisation had eventually occurred giving way to a vast amount of corruption to take place. The colonisation in Africa took force in the late nineteenth century. The presence of Cecil Rhodes in 1871 made the colonisation process move forward when he arrived during the year that the diamond bearing lodes were discovered. By buying out rivals who shared his views about the diamond industry, he was able to establish a successful career. Soon after, in the 1880s, Rhodes used his once successful tactic to control the gold fields that had been found in Transvaal. By the end of the nineteenth century, Rhodes was in domination of the South African exportation market of gold and diamonds, this was through his two companies: De Beers Consolidated Mines and Gold Fields of South Africa. Having achieved plenty of wealth, he had yet to fulfil his true dream to create an ultimate British Empire stretching down the African continent. Rhodess vision was made into reality when he proposed to incorporate the two companies with terms to allow investments for northern expansion. Soon after, in 1889, the British South Africa Company (BSAC) had been formed, which enabled the British Government to grant a royal charter. The fundamental purpose of such a charter was to allow British rule in central Africa without the involvement of the British Government, excusing them from any new responsibilities and expenses. Rhodes proposed many â€Å"deceiving treaties and concessions in order to develop the colonisation process of the regions land, labour, and precious metal and mineral resources†. Before the arrival of Rhodes and the British rule, there were a number of terriorial parts which were collectively referred under the name of Zambezi, they included Mashonaland, Matabeleland and Barotseland.Whilst expanding his company to the northern line of Zambezi, there was a change of name that came into effect in 1895; the na me Zambezi was officially changed to Rhodesia, after the colonial founder. The end of World War II brought changes in global power relations. The Suez Crisis highlighted Britains weakness and indicated that it was no longer a superpower; it was too weak to fight internationally and therefore could not ignore its dependency on the United States. As a result, Britain had little choice in decolonising, and had faced pressure from the US to withdraw their troops, to allow the United Nations (UN) peacekeeping forces to take over. It was the ‘Special Relationship, agreed by Roosevelt and Churchill that advocated for rights to be given to people and not states. The example set by the Jamaican Prime Minister; Norman Manley indicated that a black government could be efficient and work well. This gave rise to the possibility of decolonisation in South Rhodesia. In 1953, the British government came to a compromise by creating the federation of Rhodesia and Nysaland. Rhodesia remained a self-governing colony for several decades but this continued with no African suffrage. The economy of Rhodesia flourished during the federation, and it was assisted by the increase in copper prices globally. However, the economic benefits did not settle the political disputes, especially due to Britain providing other colonies with independence (such as Ghana in 1957). African people, later, got a vote when a ‘B roll was added to the electorate in 1957. Many political parties had formed during the federation in the struggle for an independent Rhodesia. The first leader was Joshua Nkomo, who was the President of the African National Congress, but this was banned soon after. Nkomo then in 1960 founded the National Democratic Party, but this was again condemned a year later. The African leader was very determined and was not staying down. In 1961 he created ZAPU (Zimbabwe African Peoples Union), in which his partners were Ndabaningi Sithole and Robert Mugabe. The political unrest amongst the African majority, with backing from the UN, enforced Rhodesias federal government to introduce a new constitution to allow black representation in the Rhodesian Parliament. However, strong disagreements between the ZAPU leaders over tactics, led to Mugabe and other ZAPU dissidents forming a new nationalist party, the Zimbabwe African National Union (ZANU), in August 1963. This new ZANU party were determined to impose tougher policies regarding the settlers in Zimbabwe. The growth in the formation of nationalist parties was something Ian Smith, the Prime Minister of Southern Rhodesia, did not take lightly. In his view, such a freedom of rights would create an immense loss of economic status to the white people. In South Rhodesia, the white people controlled the economy, which included the education system, businesses, and so on. It was difficult for the black people to acquire the skills required to carry out the management of such facilities and therefore created a cycle in which the black people suffered harsh economic conditions, a lower quality of education and were trapped in blue-collar jobs. The introduction of the new constitution created an opportunity for Smith to establish a new party, The Rhodesian Front. As soon as Smith became prime minister in 1964, he had Nkomo and Mugabe arrested. Smiths party was committed to white supremacist policies and offered the promise of an independent Rhodesia, to be governed by the European minority. Having strong white-separatist views, Smith attempted to prevent de-colonisation by rejecting the British proposal for independence in 1964 and instead formed a Unilateral Declaration of Independence (UDI) in 1965, which was not recognised by London. Soon after, Rhodesia drifted away from both Britain and the Commonwealth, which was followed by the African nationalist parties ZANU and ZAPU taking up arms against the regime. There was also involvement from Nkomos African guerrilla army against the Rhodesian security forces and backing from the South African forces, which came after 1967. The situation was not helped by the unification of Nkomo and Mugabe in 1976, in the formation of a united Patriotic Front. Essentially the reason for this is due to the state of peacekeeping in Africa. If an area in not peaceful, the social conditions fall, and the economy suffers. Due to the structure of African nations, none of the economies are seen to be strong enough to survive independently. As a result of there being a generally accepted view amongst African people that ‘power grows out of the barrel of the gun, many Africans are not aware of how to deal with a failing economic and social structure and therefore have resorted to corruption. This, therefore, indicates that African economies prosper when the nation is at peace but when there is disorder, a civil war is likely to erupt. The conflict against the regime, with such a large force from the African people, gradually turned into a civil war. Having seen the devastation that was occurring in Rhodesia, Smith found it difficult to avoid the need for some sort of concession for the black Africans. His plan of action seemed like it was based on an innocent measure to actually dissolve the conflict, however, he had simply disguised his true intention. Smith negotiated with a moderate African politician, Bishop Abel Muzonewa, leader of UANC (United African National Council). Smith offered to enable multi-racial elections in 1979, but this was only possible if Muzonewa secured the political and economic interests of the white population. With the Patriotic Front banned, Muzonewa won the elections and became Prime Minister of the transitional government. The conflicts continued with strong campaigning by the Patriotic Front and the guerrilla army. They did not settle until the Lancaster House Agreement, held in London, where the independence constitution, the pre-independence arrangements and the end of hostilities were discussed. Present at the meeting were the representatives of the British Government, the Rhodesian administration and the Patriotic Front. At the talk the UDI was overturned and Rhodesia was again reverted back to being a British Colony. In recognition of the need for the views of black Africans in the political arena, elections were organised to take place in February 1980. Robert Mugabe: The Leader In discussing the chosen path of the Zimbabwean Presidents reign, it is interesting to see why he was chosen to run as the leader during the 1980 elections as opposed to Nkomo. The Lancaster House Agreement (1979) highlighted the need for an internal solution to the on-going conflicts within Zimbabwe, which meant that the rivalry between ZANU and ZAPU had to come to an end. With Robert Mugabes movement being the largest, he was able to influence and motivate a larger population within the country, and so gain a larger percentage of votes during an election. Before discussing the political nature of the descent, it is important to establish the ways and means of Mugabe getting to such an authoritative position. Mugabe was a popular and eloquent leader; he was able to gain the attention of his audience quite effectively. It can be said that his audience, being the black Africans, were attracted to his persona, which is the way he presented himself to his audience. Mugabe can also be described as being quite charismatic; he was able to win over his audience by the means of his approach. Being in the limelight he was required to address his audiences in a way that would appeal to them, thus he was able to adapt to the type of listener he was speaking to. There have been many times when Mugabe was seen to be uplifting a rally by getting involved and giving his enthusiastic and loud audience the impression that he was a boisterous and proud man ready to stand up for his country, and then merely a few hours later he could effectively address attendees of a conference in an articulate manner. This is one of the reasons for the growth in his popularity. He was able to speak clearly in a well-structured way, which indicated the weaknesses in Nkomos presentation. As opposed to Mugabe, Nkomo could not speak English, which left him in a weaker position. For example, when having to speak at press conferences Nkomo required a translator, which could have made him appear less confident and not as knowledgeable as Mugabe. Studying in Britain gave Mugabe the chance to become fluent in English, which enabled him to address not only the white community but also the international community. He was a well-read man, with seven university degrees and eleven honorary degrees from six countries. With this background and the capability to also speak several local languages, he was able to appeal to a larger audience. It was not only his method of speaking that made him a popular leader; it was also the content of Mugabes speeches that attracted a vast number of people. His beliefs and ideals matched those of his audience and in presenting himself as a knowledgeable and well-established leader; he was able to convince even those who may not have initially believed that he was able to lead effectively. He was a very organised political leader and was known for his effective structure. This led to the general perception that he was an intellectual speechmaker and a strong bureaucrat. Another part of his persona was that he gave the audience exactly what they saw, in other words, ‘what you see is what you get. Mugabe was not a performer, he did not speak in a rehearsed manner, his speeches where given with little movement but with rigorous force in his voice. When emphasising things, Mugabe spoke loudly, but when dictating he was seen to be speaking slowly with a lower tone of voice. This can be seen as a technique to make the listener really pay attention to every word he is speaking as it is in a lower tone, and it may also at times add a threatening element to the content. The Zimbabwean leader did not use props when speaking; the effectiveness of getting his message across could be said as being his main technique in winning the audience over. In regards to his appearance, many would agree in saying that Mugabe is not physically attractive in an obvious way. Looking at the physical appeal that American leaders, such as Kennedy and Malcolm X may have had over their audiences, Mugabe was not relying on his physical appearance to play a part in his approach. This may be because physical appeal is not seen to hold any significance within the political arena of African society. Mugabe did however use his choice of clothing to signify his intentions. He is normally seen wearing either a military uniform or a civilian suit. When he spoke at conferences in an international arena he could be described as wearing the colours of Zimbabwe, to show his audience that he was the proud leader of his country. However, when speaking locally to the people of his party he was likely to be wearing the colours of ZANU-PF, a party which was formed in 1987 to dissolve hostilities between Nkomo and Mugabe, which are red and black. It is interesting to see that during elections he would normally be seen in neutral colours, this may have been a way of showing that he was not a dictator; someone who only wears military uniform and stands fanatically for his party. Recently, Mugabe has been seen wearing his own creation, the presidential sash. This could be observed as a way of representing himself as being someone distinctly different in the crowd during the elections, and to signify that he is the man with the power. Mugabe was able to show his audience that he was a political animal. He understood that power did not simply arise from nowhere; he knew that he had to work hard in order to persuade the black African people to support him and had to show them that he had what it takes to bring change to Zimbabwe. On the contrary, Nkomo used a very military approach; he resorted to fear as the method of gaining attention and support. Nkomo had the potential to be a good ‘general leader but not an effective political leader. With this in mind, it can be said that in the late 1970s there was the apprehension that Nkomo could become successful in forming his own regime, and therefore the result would be a break up of Zimbabwe. The fear of such an outcome meant that Mugabe would have an upper hand in the 1980 elections, with more support from the African nation. Research carried out by Max Weber and McGregor Burns outlines that there are several ideal-types of political action, which can be seen as being on the ends of a spectrum of possible political practises and political leadership. On one end, politicians can use their power to serve their own interests and therefore loose sight of the true goals of the game. On the other the power politicians have, descends into becoming the core of all their actions and therefore overrides other values and interests. In order to determine which end of the spectrum Mugabe stood on during the merger of the two leaders, the political life of ZANU-PF since its unification needs to be understood, and will be discussed in the next chapter. Robert Mugabe the Political Leader: ZANU, ZAPU Joshua Nkomo Soon after the Lancaster House Agreement, Joshua Nkomo had attempted to contact Robert Mugabe regarding the strategy they would use in the 1980 elections as an integrated party, The Patriotic Front. To Nkomos disappointment Mugabe had decided to stand alone as ZANU. Being granted an equal opportunity to participate in the elections of 1980, as anticipated, Mugabe alone was able to win over the majority of votes. The newly independent nation changed its name from Rhodesia to the historic name of Zimbabwe. This historic victory left Nkomo feeling extremely distressed; the leader of ZAPU felt betrayed and immense anger towards Mugabe; he spoke of Mugabe as being mistaken as the father figure of African nationalism in Rhodesia, when he felt he himself deserved that title. Mugabes ideology can be tested in the observation of the tactics used when constructing a new government. He had offered Nkomo the position of president; this being a fundamentally ceremonial role carried no executive powers. The role would have left Nkomo imprisoned by Mugabe, as there would have been no say on his part. Nkomo, understanding the nature of the role, rejected the offer; he had experienced imprisonment for much of his life and did not warm to the idea of having no right to speak his mind and lead on matters, which were important to him. Eventually, Nkomo settled for the role of Minister of Home Affairs, with control of the police too. The initial decision to exclude Nkomos involvement had caused further tension between the two leaders and with the victory behind him Mugabe became a bigger threat to Nkomo. Although he knew that he alone, as leader of ZANU, could win the elections, Mugabe recognised that Nkomos presence in the new government would help radicalise his force, so Mugabe offered him a place. This can be seen as a political strategy used by Mugabe to ensure that he had ultimate power. Whether or not this was a deliberate way of forming a one-party system in Zimbabwe will be examined below. First it is important to discuss the course Mugabe had undertaken when he came into power after a successful election victory. At the beginning of his time in power, Mugabe started out as a peaceful leader; his policies were calm and were seen to commit to the provisions that protected European political rights. One of Mugabes first moves can be described as introducing Marxist policies to Zimbabwe. These had initially caused immense harm to the economy, but with the changing fashion of the 1990s, there was a move towards a market system. It can be argued that Mugabe had not adopted a wholly Marxist approach to his leadership; rather his principles can be said as being classically socialist. It would have been expected of a Marxist leader to nationalise the farms in Zimbabwe. However, in contrary to this expectation, Mugabe had withdrawn from the idea of doing so in the early days of his leadership. As opposed to the expectation of a communist leader, Mugabe did not disown the farmers as he recognised that they provided the economic basis of the regime, and the country. Mugabes conciliatory approach in his leadership was not enough to drown out the conflict between ZANU and ZAPU. Tribal hostilities between the Shona people and the Ndebele people became a prominent feature of everyday life in Zimbabwe; this was even more so obvious when Mugabe dismissed Nkomo in 1982. However having recognised that their internal conflicts could potentially descend into a power struggle and were providing the leeway for Smith to stir between the two leaders, Nkomo and Mugabe decided to join forces and stop the prospect of Smith gaining ultimate power. It was in 1987 when the two leaders attempted to resolve their differences by merging into one, ZANU-PF, which meant that Zimbabwe became a one-party state. It is important to consider that in parallel to the introduction of the newly integrated party was the change in the constitution, which allowed Mugabe to be granted the role of executive president and Nkomo being named vice president. In essence this combination ga ve both leaders ultimate power over Zimbabwe. The political process of Mugabes descent into dictatorship can be traced back to the shift in forming a one-party state. The emergence of the integration was initially designed as a positive solution. Thus consideration should be placed on whether Mugabes real intention, in 1987, was to gradually turn his government into a dictatorship, or whether he was genuinely presenting a solution based on harmonisation. Did Mugabe no longer see Nkomo as a threat but rather as an ally in the war against the white regime? Or was he simply disguising the fact that he was keeping his friends close, but his enemies closer? Having the desire to be a long-term leader, did Mugabe decide to bring Nkomo in as a strategy to achieve this? The following chapters will answer the questions, which have caused confusion for more than 20 years. Robert Mugabes Political Strategy: Ian Smith, the White Community Robert Mugabes International Status To the surprise of many, including Ian Smith, Robert Mugabe had suggested that the confidence of the white people needed to be maintained in order to build a future for the country. It was a shock to Smith and many other white officials in Africa to grasp Mugabes approach. White people had been taught to hate him and had assumed that his gain in power would have been catastrophic for the country, especially for the white population. Smith had found his experiences of meeting Mugabe after the elections as being surprisingly pleasant, the newly elected leader was described as giving the impression that he was genuine about maintaining the relationship between the white and black community, â€Å"he behaved like a balanced, civilised westerner, the antithesis of a communist gangster I had expected†. Mugabes approach during the earlier period of his reign can be seen as an attempt to build trust. His primary concern at the time was to get the public to believe his public statements when speaking of leaving the past behind and holding no grudges in order to build a better future. Mugabe also managed to impress some of the former senior officials by retaining them in office. There was assurance that he would be working to benefit everyone in Zimbabwe, which would be possible if a level of trust was maintained between the former officials of the Rhodesia era and those of modern Zimbabwe. When Parliament opened, Mugabe and Smith were seen to be walking side by side. This left the white community feeling not only happy to be represented by their own MPs but also comfortable knowing that there was the presence of two other white ministers in government who had been specifically appointed by Mugabe; David Smith, the former Rhodesian Front minister, and Dennis Norman, the former president of the Commercial Farmers Union. This patronage by Mugabe enabled a reduction in the general feeling of depression and nervousness that had resided in the minds of the white community, and also gave the white community confidence in the newly elected government and their new leader. With feelings of trust and confidence in the government, the white farmers were found to eventually become supporters of the new government. For many whites, there were several benefits including economic sanctions, no military call-ups and no restrictions on their leisure pursuits. They also owned most of the commercial farmland, most of the countrys property and wealth, and were still in domination of commerce, industry and banking which meant that they obtained the monopoly of high-level skills. This gave the white community an upper hand in progressing, leaving a high number of black people stuck in a cycle of deprivation with lower standards of education and fewer skills being gained. With the black community having little access to gain skills and progress, it meant that the white community always had a gap to fill in Zimbabwe by occupying the higher posts in the workforce. Despite Mugabes approach to settle differences between the black and the white community there were still reservations on the actual outcome of the newly elected government and its effects on the country and its economy. For some whites, a Marxist black government was not something that they were willing to accept and this lack of confidence led to the steady exodus mainly to South Africa, which remained to be a country of white rule. Most left with the expectation of a deterioration in the standards of education, health, urban services and policing, whereas others were concerned for the job prospects of not only themselves but the effects on the future of their children too. There was also a feeling of dismay at the way the television and radio, which had once served as a source of propaganda for the Rhodesian Front, was now serving ZANU-PF. During the 1980s, as a result of the election outcome, nearly seventeen thousand white people emigrated, that was one tenth of the population. Internationally, Zimbabwe was perceived as acquiring a high status. Mugabe had maintained a close tie with the British with disregard to all past disputes; he believed that the war Zimbabwe fought was against colonialism and imperialism. His message was that Zimbabwe had gained independence so there was no problem with the British people and no need to quarrel. Having a highly regarded reputation, the newly independent country had been made many offers for financial assistance. This gave the government the opportunity to embark on a range of projects that would benefit the education system and healthcare services for everyone. This ‘honeymoon period for the new government was forming a globally reputable mark on Zimbabwe. Mugabe was seen as a leader who was really going to bring change to Zimbabwe by taking it out of the cycle that it was stuck in. This demeanour was illustrated in his intellectual, mature and reasonable outlook along with his sense of fair play. However, it was not long before ministers in Zimbabwe began criticising the white community in their speeches. The confrontations with South Africa officially marked the end of the honeymoon period. With the shock of Mugabes victory at the elections, many South Africans were hoping for a moderate black government but were disappointed to see a Marxist black government in place. It became South Africas primary aim to keep Zimbabwe in a weak and defensive position in order to destabilise it to present neither a security threat nor a stable African state. During 1981, there were several attacks on black ministers; the assassination of prominent South African Nationalist Joe Gqabi (Chief Representative of the African National Congress in Zimbabwe) in July, and the bomb blast at ZANU-PF headquarters in Salisbury during December signified treason against the new government. These attacks began a stream of turmoil, and led to Mugabes declaration of the honeymoon period being over as a result of the inhumane treatment; his views were that â€Å"because of their [the South African people] treason and crimes against humanity in Zimbabwe we could have put before a firing squad, but which we decided to forgive, have hardly repented†, he went on to state that â€Å"South Africa were harming race relations to destroy our unity, to sabotage our economy, and to overthrow the popularly elected government I lead†. The disorder in Zimbabwe worsened with threats from Mugabe that his government would be revising its policy on national reconciliation and would not hold back from taking steps in combating the criminals by giving them harsh punishments. Mugabes speeches not only attacked the white spies and saboteurs, but they gradually extended to the white community as a whole, with particular focus on the wealth they enjoyed. The situation in Zimbabwe began to create a sense of fear in the minds of the white community; a reflection of this was the growth in the exodus. Within the three years of independence, half of the white population had emigrated, which amounted to approximately 100,000 people leaving the country. Being the defender of the â€Å"white tribe†, Ian Smith argued that the government was incompetent and corrupt and that the well being of white Zimbabweans was under attack. During his visits abroad to Britain and the United States, Smith had been found to portray Zimbabwe as a country â€Å"suffering dire straits and heading for a one-party Marxist rule†. On his return, Smith was welcomed with retaliation by the government in the form of intimidation and demoralisation of the white community. Smiths passport had been withdrawn as a result of his apparent political bad manners and hooliganism whilst abroad and his premises were searched vigorously. Having begun his political reign in a peaceful manner, Mugabe can be seen to have later felt betrayed by the behaviour of the white community towards his government. The initial approach he had adopted respected the provisions that were for the benefit of the white Zimbabweans, and gave the impression that he had forgiven them for the treatment the black community had experienced. It can be assumed that he felt hatred towards the white people for betraying his respect for them. Although he was a well educated, calm and seemingly peaceful leader, it is difficult to understand why the once popular and civilised leader had gradually immersed into the notion of dictatorship. The life Mugabe had lived, his experiences and his beliefs, can be said to have influenced his change in governing styles, but the loss of trust in the white community, after gaining independence, poses the question: was Mugabe pushed or did he lead the way down the path towards dictatorship? The Phenomenon of Robert Mugabe Historical experiences indicate that the granting of independence to former colonies have usually provided the foundations for the formation of dictatorship. This is not merely the case for Africa alone, but can be witnessed in former colonies throughout the world. In the case of Southern Rhodesia, Robert Mugabe was the man who indulged into this with no tolerance of any opposition. Cases that show this absolute intolerance of opposition include the Matabeleland genocide in 1983 which put Joshua Nkomo in exile; and the treatment of Edgar Tekere, who stood independently against Mugabe in 1990, and had been intimidated as well as his supporters being beaten leaving his party the Zimbabwe Unity Movement in ruins. The more recent case of Garfield Todd, in the 2002 elections, shows how the leader of ZANU-PF uses intimidation and violence to get his own way.

Friday, September 20, 2019

Installation And Configuration Of Honeyd Computer Science Essay

Installation And Configuration Of Honeyd Computer Science Essay As an Open Source solution honeyd does not offer any support or Graphical User Interface for installation or configuration. The source code should be downloaded on the honeyd host, get compiled and the binary and configuration files of honeyd be installed. Then the Honeyd binary file could be run from the command line prompt of the Linux system used. A second more efficient way is to install the Honeyd package as root with the command: sudo apt-get install honeyd To function correctly, honeyd requires also the following libraries to be installed: libevent: a software library providing asynchronous notification for events libnet: a portable framework/library used for network packet construction libpcap: a framework used for capturing packets passing through a network Honeyd comes with numerous scripts written in the script languages Python and Perl by both NielsProvos and other contributors which can be used to emulate services on the appropriate ports in the virtual honeypots. Although installing and running honeyd might seem quite simple, it is a particularly complicated software tool with a range of command line parameters affecting its behavior. After being correctly installed on our system, the following command is used to start honeyd: honeyd -p /etc/honeyd/nmap.prints -d -f /etc/honeyd/honeyd_thesis.conf In the following, the above parameters used are explained in detail [1]. The first command honeyd instructs the Linux kernel to execute the honeyd binary file. The -p fingerprints option gives the pathname of the Nmap fingerprint file (here: nmap.prints) which contains the Nmap signature database that honeyd uses to emulate different operating systems at the network stack. This will dictate how honeyd will behave towards attackers depending on the emulated operating system. The -d flag allows honeyd to run in debug mode with all the messages getting printed on the current terminal. This mode can be useful when testing honeyd and its functionality on the fly. Omitting this flag will cause honeyd to run as a daemon process in the background. Another important command line parameter which is not used above is the -i flag. This flag is used when the computer system hosting the virtual honeypots has more than one network interfaces. In this case, the -i flag should be used to denote which interface or interfaces will be the ones receiving network traffic for the virtual honeypots. Finally, the -f command line parameter is probably the most important one as it lies at the heart of the honeyd configuration. The -f flag gives honeyd the path name for the configuration file (here: honeyd_thesis.conf) where all information about the virtual honeypots are kept such as which operating systems are used and which services should be emulated on each honeypot. Honeyds configuration file is a simple straightforward text-based file with a context-free-grammar configuration language which can be described in Backus-Naur Form (BNF). Although quite straightforward, it offers a wide variety of options when it comes to configuring the virtual honeypots. Its main role is to specify which are the IP addresses on which the virtual hosts will be running waiting for the attackers probes and what services should be emulated on each one of them. Templates constitute the core of the configuration files for virtual honeypots [3]. Honeyd works via the creation of templates which describe and simulate specific computer systems configured in great detail. The first step taken to create a virtual honeypot is to create a corresponding template which will specify the defining characteristics of the honeypot like the simulated operating system, the ports on which the honeypot will listen and the services being emulated. After that, an IP address will be assigned to the template bringing up the honeypot and operating at that specific network address. The command to create a new template is create and the parameter entered should be a name relative to the system intended to be simulated. Each template should have a different name. A different parameter that can be used is the default one. This can be used in case honeyd does not find any template matching the destination IP address of a packet and it is preferred when there is a need f or assigning a group of IP addresses under a common template rather than assigning each template to a unique address. Following the creation of a template, the configuration commands define how the virtual honeypot will behave. The set and add commands are used to shape the behavior of the configured honeypot. The first characteristic to be defined by the set command is the operating system or personality from the Nmapfingerprint database which will dictate how the computer system will behave at the IP network stack. The personality indicates the form of the responses honeyd will be sending back along with other details such as the TCP sequence numbers, the TCP timestamps and other. It can be chosen from a great number and variety of famous operating systems like Linux, FreeBSD, Mac OS, Microsoft Windows, Cisco IOS, etc. The set command can also determine the default behavior of the template regarding the supported network protocols (TCP, UDP, ICMP), i.e. how the template reacts to probes at ports which are unassigned. The action taken can include three options: Open: this signifies that all ports for the particular network protocol are open by default. This setting applies only to TCP and UDP connections Block: this indicates that the ports will ignore any incoming connections and packets directed to them will be dropped by default. Reset: this means that all ports for the specified protocol are closed by default. For a TCP port, honeyd will reply with a TCP RST packet to a SYN packet whereas for a UDP port with a UDP-port unreachable message. Finally, honeyd gives the option to spoof the uptime of a host, referring to the duration of time since the system was first booted. The set uptime command does exactly that. If no uptime is defined, honeyd assumes an arbitrary value up to 20 days. Following the set command is the add set of commands. The add commands constitute the center of the template as they are the ones which signify what applications will be running on each port and which are the services that can be remotely accessed by the outside world. The syntax of the add command requires to specify the network protocol, the number of the port and an appropriate action. As we see in the above configuration, the options open, block and reset that are used for the default behavior of the template can also be used on a per-port basis. The important difference here is that apart from just opening or closing ports, predefined scripts can be called and emulate different services on different ports. This possibility of integrating scripts written in programming languages within the honeyd configuration gives virtual honeypots a high degree of realism. A realistic service to which an adversary can talk can grant much more detailed information about an attacker. Apparently, the more scripts running on ports, the higher the possibilities for interacting with attackers. The following example from our configuration file starts a telnet simulator service for TCP connections on port 23: add Linux1 tcp port 23 /usr/share/honeyd/scripts /unix/linux/suse8.0/telnetd.sh When a remote hosts attempts to establish connection with the above Linux1 template-personality on port 23, honeyd will initiate a new process executing the shell script ./telnetd.sh. The script is receiving input data via stdin and it is sending replies back to the sender via its stdout. Apart from TCP connections, scripts can also be used to interact with remote users through UDP connections. Important to mention is that when honeyd receives a new connection on one of its honeypots port, it forks (starts) a new process which will execute the specified script. This can be at times quite risky as it can lead to a performance bottleneck if the virtual honeypots get overwhelmed with network traffic, e.g. if deployed in a busy network [1]. The last command which should be implemented to configure successfully the virtual honeypot is the bind command whose role is to bind the created template with the IP address on which it will be operating virtually. The Ethernet option for the set command can be used to assign explicitly a unique MAC address to each configured template. As mentioned earlier, physical addresses are essential for network communication and via proxy ARP the honeyd host can reply with its own MAC address to the ARP requests regarding the honeypots. A disadvantage of this is that attackers can easily realize the existence of virtual machines as all the IP addresses of the honeypots will relate to one MAC address. Using the set ethernet command, this risk is wiped out and no need for configuring proxy ARP exists as honeyd takes care of all the ARP procedures [1]. Attention should be given to avoid any MAC address collisions when assigning them to the virtual hosts, as physical addresses should be unique for every system. 2.2.5. Honeyd Logging Information Gathering The Honeyd framework comes with a built-in mechanism for gathering information regarding the connection attempts launched from adversaries targeting the virtual honeypots. Honeyd has the ability to populate files with log information for both connection attempts by attackers and established connections for all protocols. The command used to log the network activity concerning the virtual honeypots is the following: [emailprotected]:/etc/honeypot$ honeyd -p /etc/honeyd/nmap.prints -d -f /etc/honeyd/honeyd_thesis.conf -l thesis.log The -l command line option enables the packet-level logging in honeyd. It only takes one parameter and this is the log file that will be used to create the connection logs. In this case, the log filethesis.log. It is important that the directory in which the log file resides, should have the permission to be writable by the user who is running honeyd. The log file contains information about the time a connection was attempted, the source IP address and port of the attacker attempting to connect, the destination IP address and port of the virtual honeypot under attack, the protocol involved and if the attempt is successful and the connection eventually establishes, the starting and ending point of the connection in time along with other information like the total number of bytes transmitted. The packet-level log files can be extremely useful when used in combination with data mining tools. They can offer a great deal of helpful information regarding the connection attempts launched by adversaries. Scripts written in Perl, Python or other programming languages can extract useful information and statistics from the log files such as the number of IP addresses probing our virtual honeypots on a daily basis, a list with the most common ports to be attacked and other data giving an insight on the scanning activity of the virtual hosts from the potential attackers. This kind of log files can get extremely large over time and care should be taken regarding the processing capabilities of the data mining tools used in each case. Apart from packet-level logging, the option for service-level logging is also provisioned by honeyd [1]. Whereas packet-level logging gives a general view of the overall network traffic handled by the virtual honeypots, service-level log files give a more detailed view on the ongoing sessions. When scripts emulating services on different ports are used in honeypots and these scripts have additional logging capabilities, a great deal of interesting information can be attained about the attackers activities and methods they use to take a system under their control. 2.2.6. Significance of Honeyd As an Open Source low-interaction honeypot, honeyd introduces a great range of interesting features as those were mentioned previously. Being an Open Source software tool indicates that its distribution is free and anyone can have access to the source code [3]. This means that individuals and groups belonging to the network security community can customize and contribute to its source code adding more emulated services which will improve the interaction level between the attacker and the virtual honeypots providing us with even more information about the methods they use to break into systems. Over the next years we can expect an exponential rise in our ability to capture malicious behavior via honeyd. On the other hand, being an Open Source solution, honeyd does not offer any support for maintenance or troubleshooting from an official source. As a low-interaction honeypot honeyd is basically deployed as a production honeypot used to detect and capture network attacks. No real complete operating system is offered but adversaries are limited to the network services emulated by the scripts. As such, honeyd introduces a low risk to organizations for their overall security when introduced [3]. A recognized by the attacker honeypot becomes useless, so camouflaging honeyd is an issue that should be addressed. Xinwen Fu et al. have shown that an adversary can fingerprint honeyd through measuring the latency of the links simulated and proposed a camouflaged honeyd capable of behaving like its surrounding network environment []. Another issue to be addressed is the scripts emulating network services in honeyd. These need to be written by hand and as a result not so many scripts exist. CorradoLeita et al. have proposed a method which can alleviate this issue by automatically creating new scripts []. Finally, the fact that no alerting built-in mechanism exists in honeyd as well as that only command-line interface is offered are two shortcomings of its design. Chao-His Yeh et al. in their work have proposed a Graphical User Interface (GUI) for honeyd offering a variety of interesting features []. 2.3. Dionaea Dionaea [] is an open source low interaction honeypot that can be further categorized into the class of malware collector honeypots. The aim of these low interaction honeypots is to create vulnerabilities on specific services, in order to attract malware exploiting the network and if possible, capture and download a copy of the malware. As nowadays the number of malware attacks is increasing, these copies could be very useful for monitoring and analyzing in a safe environment the behavior of a malware and finding defending security solutions. In literature, two ways of malware analysis have been proposed [], static and dynamic analysis. As their names suggest, static analysis is simply the procedure of reading the code and trying to figure out the intention of the malware, while dynamic analysis includes the execution of the code of malware in a secure manner. Usually, these two types of analysis are combined and the output of the static analysis can be very useful for the dynamic one. The collected malware copies are usually stored in the form of a binary file. Malware collectors such as Dionaea can download a great amount of binaries although in most cases these files may represent the same malware. A binary should have different MD5 hash in order to be characterized as unique []. From the perspective of detection, two types have been proposed: detection of existing malware based on patterns or samples and zero-day detection schemes. Zero-day malware is defined as a malicious software which is not detected by anti-virus programs due to lack of existing virus signatures or other malware detection techniques []. Dionaea is usually referred as Nepenthes [] successor. The main improvements on the features of the new malware collector compared to Nepenthes include [18]: the protocol implementation in python scripting language the use of libemu library for shell code detection instead of pattern matching which requires a copy of the shell code, thus making extremely hard the detection of zero-day malware support for ipv6 addresses and TLS encryption development of the VOIP module 2.3.1. Features of Dionaea As mentioned above, Dionaea developers used python to implement the network protocols. This selection allows for an easier implementation compared to C language for instance. However, the main reason for this choice was to deal with the new generation of malware that utilize API to access services. SMB is the basic protocol supported by Dionaea. The SMB (Server Message Block) protocol works on port 445 [] and is used from Windows operating systems for file and printer sharing over TCP. Akamais [] internet report for the second and third quarter of 2012 (figure 3), shows that port 445 was the most targeted port at this period, as it attracted almost one third of the total network attack traffic. Attack-traffic-of-top-ports.jpg Figure . Percentage of global internet attack traffic during the 2nd and 3rd quarter of 2012, by targeted ports [24] The SMB protocol has known vulnerabilities and it is a common target especially for worms. That is the reason for which it has been selected by the developers of Dionaea as the main protocol and, as it will be shown in the following chapter, most of the captured copies of malware originated from that port. Other important protocols that Dionaea supports are the following: HTTP and secure HTTP (HTTPS) are also supported on port 80 FTP, although the possibility of an attack to an ftp service is rather low.Dionaea supports ftp protocol on port 21. It implements an ftp server which can create directories and also upload/download files TFTP, tftp server is provided on port 69 and is implemented to check the udp connection code MSSQL, Dionaea also emulates a Microsoft SQL server on port 1433. Attackers are able to login to the server but as there is no real database provided by Dionaea, there is no further interaction MYSQL, Dionaea also implements Mysql wire stream protocol on port 3306 SIP, as mentioned above a new module for supporting VOIP was added to Dionaea. The VoIP protocol implemented is SIP. The operation of this module consists in waiting for incoming SIP messages, logging all data and replying accordingly to the requests. Only when malicious messages are detected, Dionaea passes the code to the emulation engine. 2.3.2. Operation of Dionaea The main function of Dionaea is to detect and analyze the offered payload of the attacker in order to gain a copy of the malware. To succeed this, Dionaea offers different ways of interaction with the attacker. For example, it can provide a command prompt cmd.exe window to the attacker and react accordingly to the input commands or use the URLDownloadToFileapi to get a file through http. If the previous operation is successful, Dionaea should know the location of the file that the attacker tries to send and attempts to download the file. One very interesting feature of Dionaea is that it can send the downloaded file to a third party for further analysis than simply storing it on disk. Dionaea is also a great monitoring tool. It records all the activities on the ports it listens but also keeps record of connections to other ports. All these recorded data are kept in a log file in text format. Although we can choose the format of the log file, for instance filter the log messages or sort the events from the most recent to the least recent ones, it is still quite difficult to read and gain useful information. Therefore, Dionaea creates ansqlite database with all the recorded activities and makes it easier for the user to make queries and obtain useful information from the honeypot. From the log file we can retrieve useful data to understand the operation of the honeypot. Dionaea records three types of connections: reject, accept and connect. Connection attempts to the ports that Dionaea does not listen are marked as reject. On the other hand, attempts to monitored ports are marked as either connect or accept. In any case, Dionaea records in the log file and additionally in the sqlite database, valuable information about these connections such as the timestamp of the connection, the IP addresses of the local and remote host and the corresponding ports and protocols. Except of the information about the connections, Dionaea also keeps in database other significant tables such as download tables which contain information about the id of the connection, the url from which the malware was downloaded and also the downloaded md5 hash. 2.3.3. Installation and Configuration of Dionaea The installation of Dionaea requires some basic knowledge of Linux operating systems, as it is important to install all the required dependencies first but there are useful and detailed instructions in the official home page too. Dionaea is a flexible software tool and can be easily configured according to our needs by editing the configuration file. More specifically, in the configuration file we can edit the following: We can change the directory of the log file and more importantly we can reduce the amount of the produced data. By default, Dionaea records every event in the log file. We can filter the output data by changing the levels value from all to only warning, error for example. Dionaea writes the last event at the end of the log file. Thus, it is really useful to rotate this behavior in logging section, so that the last event can be read directly at the first line of the log file. Moreover, we can modify the path of the downloaded binaries and bi-streams folders. Bi-directional streams allow us to replay an attack that Dionaea captured on IP-level. As we mentioned above, with Dionaea we can submit directly the downloaded malware to third parties for further analysis. In the submit section of the configuration file, we can edit all these details. One more interesting feature is that we can manually configure the IP range that Dionaea can listen to and also add ipv6 addresses. By default, Dionaea listens to all the IP addresses it can find. Finally, we can configure the modules section which is considered the most significant of the configuration files. The modules section includes a list of services which Dionaea supports and we can enable or disable some of them. For instance, we can enable and edit the pcap module if we want to keep information about rejected connection attempts or additionally, if we are interested in the operating system of the attackers, we can enable the p0f service. 2.4. Kippo Kippo [] is a medium interaction honeypot which emulates an SSH server. It provides an interaction shell to the intruder while monitoring and recording all the activities. Furthermore, it is designed to monitor brute force attacks. Secure shell (SSH) [] is a network protocol which provides encrypted communication between two devices. SSH allows users to gain access to remote devices through a shell or interactive command line in a secure manner. The port used by SSH protocol by default is 22 [23]. In most cases, a client can access an SSH server by entering a valid username and password through an SSH client tool. From that perspective, SSH servers are vulnerable to password attacks. Especially SSH dictionary or brute force attacks are very common and quite easy to be launched even by unqualified attackers. These types of attacks are based on the fact that many users choose their credentials from a small domain []. Thus, brute force attacks try all the possible username and password combinations until the correct one is found, in an automated way. This attribute could be very useful for SSH server honeypot implementations. In order to have as many successful logins as possible in our SSH honeypot, it is preferred to choose credentials that rely on automated dictionary attack tools. Ciscos white paper about SSH login activity [] shows that for a total of approximately 1,56 million login attempts, username root was used almost in 35 percent of all cases. The following figure depicts the 10 most used usernames according to the results of the research conducted by Cisco. cisco.jpg Figure . Top 10 attempted usernames [28] In addition, other surveys [],[ ] give some interesting information about the most commonly used passwords in connection attempts. The top password combinations include variations of the username such as username or username123 and passwords like 123456 or even password. The results about the usernames used are almost the same like the ones in Ciscos research. 2.4.1. Features of Kippo Kippo is implemented in python language. As we mentioned above, Kippo basically emulates an SSH server on port 22 and logs all login attempts to that port. Whenever a login is successful, Kippo monitors all the input commands of the attacker and replies to these commands in order to convince the attacker that she interacts with a real system. A list of the available commands can be found in Kippos directory. More specifically, the features of Kippo include: a fake file system. The attacker can add or remove files with the appropriate command Kippo saves files that have been downloaded by the attacker with the command wget, in a specific secured folder Kippo gives the ability to the attacker to add fake file contents, using for example the cat command provides fake output for some specific commands such as vi, useradd, etc. tries to fool the attacker with some reactions to specific commands, for instance exit command does not work, which means that the attacker thinks that has disconnected but still can be monitored by kippo. all the sessions are recorded and can be easily replayed with the initial timestamps all records are kept in an sql database. 2.4.2. Operation of Kippo Kippo records all the useful information in a log file but also in ansql database. The main tables of the database include: authentication table, containing information about the login attempt, the timestamp of the attempt and also the usernames and passwords that have been used client table, which contains information about the SSH client version that has been used input table, with information about the input commands that have been entered. Also, in that table we have information about the session id, the timestamp and additionally if the command was successful or not sessions table, containing information about the id of the connection, the duration and timestamp of the connection and the IP address of the attacker sensors table providing information about the ssh server and the IP address of the host finally, the ttylog table which, as mentioned above, contains information about how to replay sessions with the corresponding timestamps 2.4.3. Installation and Configuration of Kippo The installation of Kippo is quite easy if someone follows the instructions of the home page and installs the latest version of the software. In the configuration file of Kippo we can customize the honeypot according to our needs. We can edit the IP of the host if we want to change the default which is 0.0.0.0 and also the listening port which is by default 2222. Port 2222 is an alternate port and may be quite useful for testing purposes but as long as most ssh attacks are detected on port 22, this choice would reduce the number of recorded attempts. Thus, it is necessary to change the default port to 22. To succeed this, we need root privileges to the system but this is not recommended due to security reasons. Instead, port redirection can be used as proposed in Kippos home page or by using other existing solutions, such as authbind []. In addition, in the configuration file we can change the name of the user in the interaction shell. By default, it is sales, which is quite attractive to attackers. Furthermore, we can set the desired password for our server. By default, it is 123456 which as we have shown above, it is included in dictionary attacks and could guarantee a large number of successful logins. Besides that, Kippo creates a dedicated password database, where we can add more valid passwords. Also, some other configurations include the directories of important folders such as the downloaded folder, a fake file system folder and password and input data storage folders. Finally, we can edit the credentials in order to connect Kippo log files with the sql database