Sunday, November 3, 2019

Successful International Assignment Example | Topics and Well Written Essays - 750 words

Successful International - Assignment Example By knowing their culture, their mindset can be according to the traditions and culture of the place they are relocated. This allows the individual to adjust better and refine their adjustments to be more accurate. In this case, Fred Bailey seems to be very excited about his shift, thus showing his interest. Cross-culture training is vital to ensure that the individual knows exactly how to react and behave in the given situation which also improves the adjustment to a job (Eschbach, Parker& Stoeberl). This training includes not only the procedures of the job but also how to interact with the nationals of the host country and the environment in general. But the problem during this pre-departure preparation is the individual's concentration on logistical problems which prevents them from paying attention to any form of training. Fred Bailey Previous experience in the international arena is considered as an asset to help in adjusting to a new atmosphere. However, many individuals lack this knowledge. Thus, there ability to the deep culture is greatly reduced. Without any pre-departure training, many individuals face culture shock and find it difficult to adjust to the new environment. The organization should also ensure that their employees are aware of the degree of difference between the organization in their own country and the one they are changing to. If the foreign institute has a different operational method then it will be harder for the expatriate to fit into the organizational structure. For instance, Bailey does not understand the Japanese inability to hold proper communication with the head of the organization. All of them hold are unable to hold a interactive discussion with Bailey which leads to frustration on his side. Also, it is very hard for an employee with a family to move to a new country, especially if the logistics include a family. By providing support to the individual, the organization can remove problems like finding housing and schooling. In this way non-work problems can be easily solved, allowing the expatriate to adjust easily to the general environment. In this case Fred Bailey is prevented from being too happy about the move because of the wife and children that will accompany him. Not only does this curtail the interest in the new job but the children's shift in schools and environment will be an added burden on the parents' minds. Along with this, Fred's wife finds the move to be difficult and eventually ends up wanting to leave instead of adjust. This is especially important when the native and host culture are greatly different. Adjustment for the employee and their partner's interaction with the environment is difficult because of their inability to behave appropriately. The greater the cultural difference between the environments, the easier it is to make cultural mistakes which can lead to immense frustration about the errors (Lowe, Downes & Kroeck). The co-workers in the host organization play a vital role in allowing the new member to fit into the environment. They provide emotional support to the new employee with their acceptance and also teach them how to follow the ropes. In this case, Bailey hardly gets any feedback from his fellow employees. Instead he feels alienated and different from the

Thursday, October 31, 2019

R2 Essay Example | Topics and Well Written Essays - 750 words

R2 - Essay Example Common causes on the other hand are the common, past and quantifiable variations within a system (Hwang et al. 96). The tool used to help identify both incidences is statistical thinking. Some advantages to using CTQ trees are; transformation of unspecific into specific customer requirements, aid sigma teams to detail wider specifications and it assures the fulfillment of all customer requirements (Graban 63). Advantages of conducting a stakeholder analysis include; one gets to understand the stakeholders better through identifying risks and managing the existing relationships better, one is able to decide and strategize in an effective way, and one is able to accept the actions of stakeholders in an organization in a better way (Hwang et al. 109). The disadvantages are; the analysis yield better results if done continuously, subjective assessment analysis and sometimes some interests of specific stakeholders may not be met (Eckes 110). The payoff matrix represents valuable results like lottery tickets or money for participants (Hwang et al. 43). The matrix is used in experimental games, the participants are given an opportunity to choose to cooperate or un-cooperate, but the final consequences falls on them (Hwang et al. 32). Tools useful in running effective team meetings are OARR objectives, roles and responsibilities as well as agendas. These tools help to have an industrious, valuable, and engaging meeting. These tools will ensure smooth and effective meeting that will cut down costs and save time (Graban 54). Lean standardization advocates that the future needs us to be more efficient in pointing out problems and finding solutions for them (Graban 11). This calls for analysis of processes going into products. Traditional Standard Operating Procedures (SOPs) was never given priority, and it was disjointed and difficult to understand. Challenge; to have a long term vision of future challenges so that

Tuesday, October 29, 2019

Thornton's Strategic Choices Essay Example | Topics and Well Written Essays - 4500 words

Thornton's Strategic Choices - Essay Example 18 References 21 (Words 4997) 1. Introduction The identification of successful strategies is a key challenge for managers worldwide. Usually, the ability of managers to locate strategies that are able to respond to organizational needs is differentiated, according to the personal skills and perceptions. Also, each organization’s external environment is likely to affect, more or less, the progress of strategies of the particular organization. In this context, the establishment of an effective strategic management framework can help an organization to increase its efficiencies and stabilize its market position. Kew and Stredwick (2005) note that three are the key elements of all strategic management frameworks: ‘the strategic analysis, the strategic choice and the strategic implementation’ (Kew and Stredwick 2005, p.205). The first of these elements, i.e. the strategic analysis addresses the following two issues: ‘which is the organization’s current pos ition and where the organization wants to go’ (Kew and Stredwick 2005, p.205). At the next level, the strategic choice refers to the need for the identification of appropriate strategic options, as appropriate, for responding to the organization’s needs, as they have been identified through the strategic analysis process (Kew and Stredwick 2005). ... In 2011, the firm’s employees were estimated to 4,205 (Thornton, company website, investor relations 2012). The firm’s turnover in 2011 was estimated to ?218.26m, slightly increased to the turnover of 2010, which was estimated to ?214.55m (Thornton, company website, investor relations/ financial summary 2012). The firm’s performance during the last five years indicates that the organization has been able to face effectively the market challenges. Indeed, the turnover of the firm from 2007 up to 2011 has been changed, as presented in the table in Figure 1 below. Turnover of Thornton from 2007 to 2011 2007 ?185.99m 2008 ?208.12m 2009 ?214.80m 2010 ?214.55m 2011 ?218.26m Figure 1 - Turnover of Thornton from 2007 to 2011 (Source: company website, investor relations/ financial summary 2012) According to the figures presented in Figure 1 below, the organization has managed to achieve a continuous growth. However, if reviewed more carefully, the organization’s pe rformance has not been improved the last five years. More specifically, the organization’s profits have been significantly decreased in 2011, if compared to 2007, as also revealed through the table in Figure 2 below. Profits of Thornton from 2007 to 2011 2007 ?5.21m 2008 ?6.07m 2009 ?3.60m 2010 ?4.35m 2011 -?0.25m Figure 2 – Profits (after tax) of Thornton from 2007 to 2011 (Source: company website, investor relations/ financial summary 2012) At the same time, the number of the organization’s employees has been decreased in 2011, as compared to 2010; in 2010 the firm’s employees were 4,377 while in 2011 they were reduced to 4,205 (Thornton, company website, investor relations 2012). Also, problems in regard to the alignment

Sunday, October 27, 2019

Strategies for Password Cracking

Strategies for Password Cracking Abdulmalik Nasser The aim of my project is to give ICT students an idea of the mechanism of cracking password using an using John the ripper. I will also explain the process that the application does to crack a password. Moreover,I will talk about password complexity. how does the complexity increase the cracking time? are there intractable passwords? why? encryptions . Finally , I will explain different types of cracking like brute force, dictionary attack etc. Password cracking is one of the oldest hacking arts. Every system must store passwords somewhere in order to authenticate users. However, in order to protect these passwords from being stolen, they are encrypted. Password cracking is the art of decrypting the passwords in order to recover them. Passwords are the most common means of authentication. Passwords are protected by using one-way cryptographic algorithms that produce a hash of set length. Cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try and guess it. However, in the case of passwords guessing is easy. Passwords are insecure by nature because they are used for preventing humans from guessing a small secret created by humans. To understand how to get a good understanding about password, we have to understand how they are stored in a system. To store a password in a text form is strongly unacceptable. The same thing when storing the passwords deep in tree of directories that would result in Security through Obscurity and this is also unacceptable. Unix management file system gives an acceptable solution: one of the main distributions of Multicast (the precursor to Unix) stored the file of password in a clear text, but it can be seen by a super user only. This was a improper solution. Also caused a bug to which switching some temporary file and showed the password in text being printed for all the clients when they login. Unix instead of doing that, saves the passwords that were hashed in the password file and not the actual passwords. After that, as the user puts his password , the system has the ability to simply compare the hash of the user password input and it will be compared with the stored hash value [1]. Â   Â   3.1 What a complex password should include. Figure 1 what password combination should include. A strong password should include what is listed in Fig1 in order to be complex password. so, what complex password means that password that include :Upper lower case letters, symbols and numbers getting that password is an extreme power consumption and time wasting for any password cracker [2]. 3.2 Common passwords Figure 2 : the most common passwords According to a study that was accomplished by David Bisson in 2014 . The result shows the most common passwords that are used on the Internet which any cracker would definitely add to his word list. These are typical example of an obvious passwords and easy to crack unfortunately. Easy passwords like what is shown above is very easy to guess it would not even use processor of the cracker it will be in his word list, because these passwords are the most common passwords at all time. So, any password cracker would definitely start cracking the password with guessing such passwords [3]. Figure 3: TOP 100 password hints by category [4] Fig3 shows the result of a study that was done by Troyhunt shows how people choose their password. Guessing a password from the E-mail address: Figure 4: Passwords derived from the email address [4] Figure 5: Number of Password combinations alphanumeric Password [5] The table above shows number of possibilities based on the password length so, any digit of the password is considered as process loop. Each digit can have 64^ the number of digits. Imagine having 13 characters that 64 raised to the power of 13 its an extremely big number of combination that the cracker has to try. Its extreme based on the source of the cracker processor and its also based on time. 3.3 Password complexity and Time Complex password is extremely important for securing your data and information. Most of the people think their password is being hacked or sniffed but the main reason for their password was not complex so, the depending on the assigned password the time will be proportional for example, three digit numeral or alphabet password ahc, 897, or even abc432 would take less than a second for cracking. However,[emailprotected] would take almost a month to be cracked, because the cracking cycle will go checking numbers,alphabet,and symbols and that is why complex password is strongly required [6]. The quicker your PC can hash passwords, the more you can crack in a given certain of time, and that results in a better chance of having of cracked passwords. We used John The Ripper because it is an open source cracking tool which is available on almost all Linux distros. However, it is not usually the best choice. John runs depending upon the CPU, but password hashing can be launched really efficiently depending upon graphics cards. Hashcat is password cracking tool that can run on graphics cards, and on the right hardware can do much better than John. Password cracking computers most of the time have number high-performance GPUs and depend on these for their rapidity . You might not find Hashcat in your distros repositories, but its downloadable on www.hashcat. net (itsfree as in zero cost, but not free as in free software) [7]. 5.1 Cracking tools and applications 5.1.1 Aircrack-ng its a free network hacking tool which include packet sniffer,detector, and various of encryption types cracker. Moreover, it includes Analysis tool that works with WLAN. In addition, this tool can sniff and monitor packets which travels from one person to another. This tool can run in a verity of platforms eg, FreeBSD, OSX, Wubdows, OpenBSD and Linux. Maemo, Zaurus and Android platforms 5.1.2 Crow bar This tool is exclusive on Linux operating systems. It is a free tool that runs a type of password cracking technique called Brute Force. It doesnt save a list of passwords, but try every possible combination of a password. this tool is supporting remote Desktop Protocol with NLA, VNC key authentication, open VPN and SSH private key authentication. 5.1.3 L0phtCrack This is a recovery password auditing app designed by Mudge. It was written to crack windows encrypted passwords. Moreover, it can crack from Primary domain controllers, and network servers or Active Directory. It also allows the user to sniff a password off the wire. This tool can go further and create many methods for guessing a password. It can work only on Microsoft Windows OS. 5.1.4 Medusa It a tool that is designed to be a strong, fast login using brute force. The purpose of this tool is to work with a lot of services remotely at the same time. That means this tool can not only brut force only one host but multiple hosts and passwords at a time. The targeted information can be registered in different methods. So each entry can be single information or file with many entries.Each mod file is for separate mod file . Meaning , this is needed for brute forcing. It is a free tool and Medusa works on Linux and MAC OS X operating systems. 5.1.5 Ophcrack This is a rainbow table that discovers passwords and crack a complex passwords. Moreover, it can crack simple passwords within minutes.In order to get the great advantage of this tool the user has to buy what is so-called rainbow tables to crack complex passwords.This tool is free runs on Linux,Microsoft Windows and MAC operating system. 5.1.6 RainBow Crack This tool is free and runs on Linux,Microsoft Windows, and MAC OS. It is specialized in hash cracking . It is a common brute force cracking tool that tries every combination of plaintext and that results in time consuming for complex passwords. It does not only crack passwords only but store the result in a library called(Rainbow tables).The brute force process takes extremely long time to be done but when using precompute tables it is one of the fastest cracking tool. 5.1.7 SolarWinds This tool works on Windows only .It is also known as FireWall Security Manager. It is the best solution for any company that needs reports and advanced management on their sensitive devices. It can be configured to allow multiple clients to be deployed at Multiple system administrators at once. It also features network discovery router password decryption , SNMP brute force cracker and TCP connection reset application. 5.1.8 THC hydra This tool is free and works on all the operating systems except MAC. This tool allows the user to remotely break into a system and crack a password using different protocols. It crack using fifty protocols. it can crack a network login. it crack the password using the dictionary or brute force attacks. It also features login brute force attack. 5.1.9 Wfuzz This is a free tool that works on Linux Windows and Mac Os. it features the following :multiple injection points capability, recrusion when doing dictionary brute force, Post headers and authentication data brute force, out put to HTML, Proxy and SOCK support. It is usually used to brute force web applications and to find user name and password [8] [9]. 6.1 Overview John the ripper is the best cracking tool ever. John the ripper comes with two versions the popular version is free and there is a pro version which is commercial version. It runs on many platforms like DOS, Unix, BeOS, Win32 and OpenVMS. It is similar to THChydra but the main difference is that Hydra is Online password cracker whereas John the ripper is offline password cracker. It is usually used by hacktivists for penetrating passwords. John the Ripper is a fast password cracker. Period. In fact, you can consider John The Ripper as the definitive password hacking tool. Johnny is a graphical interface that can replace John the ripper to simplify the cracking process instead of using the command line interface. it comes by default with kali Linux. 6.2 John the ripper features Decrypt most guessing hashes using wordlist dictionaries. Ability to specify guessing with certain letters and symbols assigned by the user without using the dictionary. Ability to decrypt more than hash at once. Automatically detect the type of the hash. Rapidly crack passwords. ability to continue guessing process that has started earlier from another device [10] [11]. 6.3 How does John the ripper work? John the ripper cracks the password in four main Modes: 6.3.1 WordList Mode Its the simplest technique that mainly allows the user to assign what is so-called word lists which is a text file includes a password in each line and some password files. Also features the ability of generating other likely password files. 6.3.2 Single Crack Mode this is the mode a user should start cracking with. It assigns the login names. Moreover, it uses GECOS which contain personal information about the user, user home dictionary, also several of rules applied. It also have got the ability to crack other password hashes if guessing is success, it would try the same password for all the hashes because more likely there will be another user with the same password. Usually the administrator should have an access to the a file which contains the users information and passwords. Finally, single mode is much faster because it cracks single password at a time. The user can also use this mode in two different files at the same time [12]. 6.3.3 External Mode To define an external cracking mode you need to create a configuration file section called [List.External:MODE], where MODE is any name that you assign to the mode. The section should contain some functions programmed in a C-like language. John will compile and use the functions if you enable this cracking mode via the command line 6.3.4 Incremental Mode. This is the most effective and powerful cracking mode. It assigns every possible combination of characters for cracking passwords . but it still have a disadvantage which is the cracking process will keep running and will never stop because the tried combination password characters are too large. there for, crackers usually limit the character combinations to lower case so, it doesnt take as much time as if its not set. It uses what is so-calledtrigraph process for example: (aa, ab,ac,etc,), (ba,bc,bd,be,baa,bba etc,) it would not miss any password combination every combination will be tried. Its main advantage is to crack a password in a limited time [11] [10]. 7.1 Brute force attack This technique of password attack That is not actually decrypt any data, but also continue trying a list of password combination eg, words, letters .A simple brute force could be dictionary of all words commn passwords. doing trying cycle until it gets the access to an account. the complex example of brute force is trying every possible combinations of numbers, letters and symbols. However, this technique is the has to be the last option for any cracker because it can take long and the bigger number of encryption (64-32-265)bit the longer time it will take for cracking. 7.2 Dictionary attack This type of password where the cracker can assume the password consisting of string of words, Years, or special number that is chosen from the dictionary. This tool has to be included with what is so-called dictionary input list. The cracker can download a big database including specific vocabularies for example, Sports, movies, and so on. 7.3 Password sniffing This technique called sniff because the the crackers have the ability to sniff the authentication packets that are travelling from the client to the server among the Internet or the local area network. This technique can provide the cracker with hashes or other authentication data necessary for cracking process. There are verity of sniffers tools such as Wireshark,ScoopLM,KerbCrack. The NTLNv2 authentication traffic cannot be sniffed neither by ScoopLM nor Kerbcrack. 7.4 Password capturing Alot of crackers get passwords easily by launching a keyboard sniffing Trojan horse or buying a physical keyboard logging device.According to many reports 82% of the most widely used viruses steal critical data.Most of them sniff passwords. Less than a $100 anyone can get key logging device which is very small and can simply fit between the keyboard and the computers keyboard port. Its also extremely easy to sniff password even from wireless keyboards [13]. To conclude, First, There are verity of applications and tools that you could crack any password. Second, protecting your password requires using strong password. Moreover, there is nothing called uncrackable password its just a matter of time and resources. Finally, the only thing you can do is using strong password and keep changing your password from time to time. [1]M. Tokutomi and S. Martin, Password Cracking. [2]Chit Ko Ko Win, Password management for you, 08:57:17 UTC. [3]D. Bisson, Cracked Ashley Madison passwords consistent with years of poor security, Graham Cluley, 16-Sep-2015. . [4]The science of password selection, Troy Hunt, 17-Jul-2011. [Online]. Available: https://www.troyhunt.com/science-of-password-selection/. [Accessed: 16-Feb-2017]. [5]jsheehan2014, Choosing a Password: Needle in a Haystack, MACED Tech Resource, 15-May-2015. . [6]How Long Would it Take to Crack Your Password? Find Out! Randomize, Random ize. [Online]. Available: http://random-ize.com/how-long-to-hack-pass/. [Accessed: 15-Feb-2017]. [7]B. Evard, JOHN THE RIPPER, linuxvoice, 2015. [Online]. Available: https://www.linuxvoice.com/issues/008/john.pdf. [Accessed: 13-Feb-2017]. [8]Wfuzz, Concise Courses. . [9]10 Most Popular Password Cracking Tools, InfoSec Resources, 27-Dec-2016. [Online]. Available: http://resources.infosecinstitute.com/10-popular-password-cracking-tools/. [Accessed: 27-Feb-2017]. [10]ports, John the Ripper, 18-Feb-2014. [Online]. Available: http://tools.kali.org/password-attacks/john. [Accessed: 19-Feb-2017]. [11]John the Ripper cracking modes, openwall. [Online]. Available: http://www.openwall.com/john/doc/MODES.shtml. [Accessed: 20-Feb-2017]. [12]passwords What exactly is single mode in John the Ripper doing?, Information Security Stack Exchange, 2014. [Online]. Available: https://security.stackexchange.com/questions/37072/what-exactly-is-single-mode-in-john-the-ripper-doing. [Accessed: 20-Feb-2017]. [13]Types of Password Attacks, windowsitpro, 30-Jan-2006. [Online]. Available: http://windowsitpro.com/security/types-password-attacks. [Accessed: 02-Mar-2017].

Friday, October 25, 2019

the chrysanthemums Essay -- essays research papers

â€Å"The Chrysanthemums† by John Steinbeck   Ã‚  Ã‚  Ã‚  Ã‚  The short story â€Å"The Chrysanthemums† shows how extraordinarily forward thinking the author, John Steinbeck, was in his understanding of the pressures that women dealt with in his time. Through the exploration and illustration of women’s emotions, Steinbeck gives us a view into the struggle of women in the early 20th century to find a place for themselves in society as well as establishing their own sexuality(Charters, 502).   Ã‚  Ã‚  Ã‚  Ã‚  The story starts out with the description of a grey fog over the place where the story is set. The significance of this is to set the mood of the story. It also is a possible representation of how the main character of the story, Elisa Allen, feels about her life. Elisa is first introduced working in the garden planting her flowers, and while doing so looks up to see her husband talking to two men in suits. She later asked him who they were and he said that he sold them some steers and â€Å"got nearly my own price, too†(The Chrysanthemums, 2). This shows the fact that all the business of the family was handled by the man, and that in general women’s inputs were not considered, if they were ever given. However Elisa is by no means a woman who is unable to do things herself, Steinbeck makes a point to mention that â€Å"The chrysanthemum stems seemed too small and easy for her energy†. In the narration and description of Elisa’s garden a nd her chrysanthemums are ...

Thursday, October 24, 2019

Filipinos Then, Filipinos Now Essay

Reaction Paper on the film â€Å"Ganito Kami Noon, Paano Kayo Ngayon?† by Eddie Romero Ganito Kami Noon, Paano Kayo Ngayon is a 1976 film directed by Eddie Romero starring Christopher de Leon and former Miss Universe Gloria Diaz. It’s easy to say â€Å"I am a Filipino†. But when can a person be considered as a true Filipino? In the movie, the word â€Å"Filipino† had different definitions. The word originally referred to a person of pure Spanish decency that was born in the country. However, a travelling Chinese merchant (Lim) born in the country was also considered as a Filipino. Based on these facts, being born in the country is one of the major criteria in order for one to be called a â€Å"Filipino†. Nicholas Ocampo, also called Kulas, was the main protagonist in the film. He was innocently set to find a friar’s son at the peak of the Philippine revolution against the Spanish colonization. He was able to encounter people who influenced hi s way of thinking and his way of living during his journey. He was able to meet different kinds of people; Filipino revolutionaries, Spanish friars, guardia civils, circus folks (where he met Diding, a girl whom he fell in love with), and Filipino elites who identified themselves as the real Filipinos. He was confused on what a Filipino truly is, on who has the right to call himself/herself as a true Filipino. He had no idea of what a Filipino is, or why he was called as one. He asked Don Tibor, a Visayan lawyer, if he has the right to call himself a Filipino, to which the lawyer answered that in order to be a Filipino one must be a worthy and valuable person. Kulas went through a lot of ups and downs during his stay in Manila. He experienced being wealthy, being respected, being bullied, being heartbroken, and being betrayed by the people around him. Kulas, in the end, realized that it is not enough to be born in the country in ordered to be called a Filipino, that being a Filipino doesn’t only mean the physical ties a person has with the land, or with tradition, or even with his or her family. It means recognizing ourselves as the protector of this land, and protector of our fellow men. It is being able to fight a grander cause and being able to fight for what is good for our country. The term Filipino was made because in the past, the people of the Philippines called themselves according to what region or island they came from, for example, the people from Visayas  are called Visayans, people from Manila call themselves Tagalogs, Ilokanos for the people from Ilocos and many more. Since the Philippine archipelago consists of thousands of islands, it created a rift between its people because of their different identities. Because of this, the term Filipino was used to call the people of the Philippines as a whole in order to avoid conflicts among the natives and also to unify the people. According to a study conducted by J. A. Yacat of the University of the Philippines Diliman, there are three factors that are considered in order to have a Filipino identity: a sense of sh ared origins (pinagmulan), growing up in a similar cultural environment (kinalakhan), and a shared consciousness (kamalayan). T he first one, pinagmulan, has something to do with being born in the country, having parents who are Filipinos, residing in the Philippines, or is a Filipino citizen. It basically implies that a person is a Filipino if he or she satisfies the definition of Filipino citizenship as stated in the 1987 constitution. The second factor, kinalakhan (cultural roots) revolves around participation and being immersed in a cultural background acknowledged as Filipino. This includes the speaking of a Philippine language, and other things that differentiates us from foreigners, like the way we see things, the way we look at things, and the way we face every situation that we encounter. The last factor, â€Å"kamalayan† (consciousness), is associated with awareness of the self as a Filipino, acceptance of membership in the category â€Å"Filipino†, and also pride in this membership. The American colonization was helpful in the making of the Filipino identity because of the way they tr eated us in the past, our ancestors thought of a way to distinguish ourselves and put the Filipinos on a classification different than the wicked colonizers. The revolution also helped in shaping the Filipino identity. The revolution unified the people. Without the revolution, we would still be under the hands of the colonizers without having an identity of our own. Though the colonization and Filipino revolution helped in the creation of the Filipino identity, each also brought negative impacts that hindered the Filipinos to create an identity of their own. Because of the booming economy of the United States, there is a noticeably big difference on the physical appearance of the Americans from the Filipinos. This is where the colonial mentality of the Filipinos heightened. Those who had money or were in the upper class of the society  tried hard to dress and act like Americans in order to blend with the colonizers and also to flaunt their newly bought things and their fluency in speaking the American language. Because of this, they believed that they belonged with the Americans, that they are Americans and not Filipinos. In the title, Ganito kami noon , paano kayo ngayon:?, there is a question that needs to be answered. Paano kayo ngayon? What is the state of the Filipinos now? To answer that question, many of the Filipino’s ideas and interests have changed. Technology rises and new trends have been made. Sometimes, the Filipinos now tend to forget what is important and what is significant. Filipinos then were able to think rationally. Filipinos nowadays are simply going with the flow. They go to where they will surely benefit, or to where they can gain much, much more. The sense of Filipino nationalism is in the end forgotten. People patronize more the products that came from other countries rather than the products that were made here in the country. Though Filipinos in the past did the same things, the intensity in this modern era is a lot greater than in the past. Our country is getting more and more liberated. Because of the many colonizers after the Americans, several foreign influences have been adapted as our own. The Filipino culture have been mixed with different cultures from neigh bouring countries like China, Japan, Korea, and others because of intermarriages. The way the government runs the country is becoming worse. The Philippines is now buried in debt. Filipinos nowadays are becoming harder to understand. One runs for election not because he or she wants to serve the country but because he or she wants to make more money. Also, the increasing percentage of crimes involving youth offenders is very alarming. We always ask for reasons why these crimes happened. Maybe because Filipino youth then have good moral attitude than Filipino youth now. The use of â€Å"po† and â€Å"opo† have always been a part of our Filipino culture. We were taught to use these words as a sign of respect to the elders. But now, we rarely hear those words especially from the younger ones. Filipino youth today had become verbally aggressive and delinquent. Another example is, Filipino youth now tend to imitate some characters from different foreign films thinking that it is â€Å"cool† to be violent and aggressive. Unlike Filipino youth then were respectful and God-fearing. Thus, Filipino youth then have good moral attitude than Filipino youth now. We are forgetting our objective, the aim which our  ancestors have passed unto us, which was to protect and fight for what is good for our country. We cannot achieve this goal if we keep on doing these things. It seems that in the present times, the definition of being a Filipino is reduced to just being a citizen of the country. If you are a citizen of the Philippines, then you can already be considered as a true Filipino. I am a Filipino. I became a Filipino because both my parents are Filipinos. I am a Filipino because I speak several Philippine languages. I am a Filipino because I am a citizen of this country. I am a Filipino because I love my country. I am a Filipino and I am proud to be one.

Wednesday, October 23, 2019

Fiedler contingency model Essay

Whenever and wherever human beings are gathered together in large numbers, they need leadership. Even children need their school prefects and schools captains! Men whether of the East or the West, require to be led and each group ‘throws up’ its own leaders in each succeeding generation. Whether in the school-room, or on the battlefield or in governmental deliberations, people who are natural leaders and who are chosen to lead, always have the same qualities of character and of outlook. In order to become the best leader the person should possess several qualities that will be described in this essay. Leadership is an indispensable activity, which every leader has tap perform for directing the people, working under him. It is the ability of the Leader to induce subordinates to work with confidence and zeal. In other words â€Å"Leadership is the process by which an leader imaginatively directs, guides and influence the work of others in choosing and attaining specified goals by mediating between the individuals and the organisation in such as manner, that both will obtain maximum satisfaction. As a matter of a fact many people choose their perspective leader by appearance, however it is their fault. Some people have a misconception that only those people who are physically strong can become good leaders, but this is not the fact. A leader may not be physically strong but he needs to be mentally strong and firm in decisions. For example, Mahatma Gandhi, the Father of the Nation was the greatest leader but he was active and had a firm desire to serve the Nation. He had the power of organizing and uniting people and attracting people towards him by his speeches. This is the best quality of a leader which he had in him. We can also say that, a person who can satisfy the basic psychological needs of his followers can also be an effective leader. Leadership is a quality which cannot be acquired by any person from the other but it can be acquired by self-determination of a person. Leadership can best be called the personality of the very highest ability-whether in ruling, thinking, imagining, innovation, warring, or religious influencing. that only those people who are physically strong can become good leaders, but this is not the fact. A leader may not be physically strong but he needs to be mentally strong and firm in decisions. For example, Mahatma Gandhi, the Father of the Nation was the greatest leader but he was active and had a firm desire to serve the Nation. He had the power of organizing and uniting people and attracting people towards him by his speeches. Being altruistic and farseeing also affect the leadership. A leader has to use his/her brain every time and also has to remain alert with eyes and ears open otherwise he/she could easily be carried by any fraud or enemy. Many a times we see such situations around us, where a person in trouble or problem doesn’t hesitate in blaming and embarrassing even his closest friend to save himself, and also does not bother about his friends at all because the person has to get rid of his problems anyhow. So, he just thinks about himself and his life, the life of other does not matter to him much. Almost all of us are having one or more such close friends, so a leader should always keep in mind that he should not trust even his closest friends more than required as it can create problems for him. At the time of war, an Army Officer who leads his soldiers as to apply his brain every second and has to be attentive while marching ahead. A Police Officer has to be attentive always while he is at work as his duty is to control crime and provide safety to the people. The political leader of a county should be most intelligent as the security of not only few people but of the whole nation depends in him in one way or the other. Therefore, we can say intelligence and alertness are the indispensable qualities of a leader. As for example, one of the greatest leader of his time, Winston Churchill could win the Second World War just by applying his brain and his alertness. A leader should also be an optimist having a positive attitude. he should not think negatively or plan something showing negative attitude. A person who thinks or plans something’s showing his negative attitude never be a Leader. A leader should always be courageous. He should have courage to face the troubles or problems and solving the problems by himself in place of blaming and embarrassing others. Cowards, who at the time of facing problems or troubles in their life try to blame and embarrass others can never succeed in their life. Such person remain at the same place where they stood in the beginning. To gain height and achieve something, one should come out of cowardness, jealousy and should become innovative, courageous, action-oriented and optimist. A good leader has all these qualities in him. To elaborate further the qualities of a good leader there are three theories of leadership and these are (a) trait theory (b) behavioral theory and (c) situation theory. The first approach (trait theory) views leadership as a conglomeration of a set of personality traits. The older tradition in these studies of leadership has been the search for a cluster of traits, attributes or other types of individual difference, which see leaders apart from their followers or which distinguish effective leaders from ineffective ones. A good leader, as it found more often, is a good teacher. Instead of bossing his followers or group members – a good leader always helps them through experience that brings a changed mind and motive. The leaders are rarely born. Favorable circumstances and perseverance – these are the main components of the education of any leader. Therefore, if your goal – to take the lead, develop those qualities that, in your opinion, still do not meet the â€Å"standard. † The aforementioned characteristics can help people to make great strides in being leader regardless of sphere of work, as human should preserve the humanistic thought. Finally, a good leader must be faithful to his group members and activities. This in turn, will result in an atmosphere of assurance among the followers. Having faith in self abilities and the world around him/her the leader gains inspiration and also inspires others in the process.