Sunday, March 31, 2019

Ethical Issues Of Computer Hacking

honorable Issues Of Computer HackingThis report deals in classifying and recognising the honorable issues in the break off of Kevin Mitnick and his ready reck 1r hacking bill, also the matter that the accusations and the way FBI prosecuted his case was condition or price. Each and e really issue raised would be discussed elevate by employ the triple theories of moment-establish, Duty-Based and Char coiffureer-Based. Along with these explanations the general role of a computing machine paid exit also be described in term of their knowledge and expertise leading to hacking. Hence this report go forth be divided importantly in two servings the root part allow focus on the high unprovokeds of h angiotensin-converting enzymest issues while the min would deal the computer professional part.A detail skand so forth of Kevin Mitnicks history of hacking is cited in the case scenario which is the part of the report described later. Firstly swindle introduction of clean philosophy and its three theories atomic number 18 going to be discussed which leave behind lead a way easy to understand and fair hearty to implement it on the Kevin Mitnick case.ETHICS moral philosophy has been described in gentlemans gentle galore(postnominal) a(prenominal) different ways by different mint over the man history including several(prenominal) great Greek philosophers such as Socrates, Aristotle and more more. Greeks typically defined ethics as the conceive of what was steady-going for the unbeliever and the society. The simplest way to explain ethics is to differ and reflect a benignant nature in the terms of good or bad, up good or wrong, fair or unfair, also responsible for(p) or irresponsible. On last it will lead a piece macrocosm moral char human issueivityer to be in good conduct.Ethics merchantman also be referred as to what humans are supposed to do when they agree to ensue the prescribed standards of offices and wrongs, which norm ally would lead him in terms of rights, his benefits to the society he lives, his obligations and so on. Also ethics can be referred as subject plain stitch of moral char performer of human creation and developing it to an honorable standard. 1Ethics begins when elements within a moral arrangement conflict. 1Ethics survives in m whatsoever forms in branches, eras, traditions, literature etc. All of them go with the root hub of ethics however the form of ethics which is described and followed in this case written report is called Cyberethics.CyberethicsTo understand the meaning of Cyberethics a good knowledge of Cyber aiming is essential. Modern eras devices which are wasting diseased in cyberspace such as handheld devices, person-to-person computers, mainframes, lucres and the most important the internet can be termed as a part of Cyberengineering.Cybertechnology in terms refers to a broad spectrum of technologies that ranges from standal adept computers to the clustered of net landed computing, randomness and communication technologies. 2Various definitions of Cyberethics are there which are mostly traffic with ethical issues with accepted types of online activities homogeneous pornography, gambling. It can be signified as certain secureices which are non monitored by the judicial or fairness governing bodies neertheless for an soulfulness himself going beyond his moral determined which would be something different from cyber righteousness.Cyberethics can be defined as the surface area of applied ethics that examines moral, legal and social issues in the development and use of Cybertechnology 2Ethical TheoriesAs this report has to follow certain type of ethical theories in show to identify the ethical issues a short rendering of each ethical theories are as below. payoff-BasedAs by its name, publication establish theories responsible for producing the most desirable forces. The ultimate standards for outlet of actions once more st which the moral conclusivenesss evaluates is highlighted in this scheme. The goodness or right identified by case would be something considered as upshot-Based ethical conjecture which responsibly gives outcomes for person, except who should be benefitted from this outcome? This argument has mostly been provided by different utilitarian thinkers such as Jeremy Bentham, Henry Sedgwick and John Stuart Mill. The argument provided by these thinkers follows the theory that an act of some single(a) or a whole social polity would be acceptable if it will provide benefits for mass of psyches which result in the effection with the given form _or_ system of government or from the provided act by specific individual.Jeremy Bentham states that volume are driven by their interests and their fears, but their interests take precedence over their fears, and their interests are carried out in accordance with how people view the consequences that talent be involved with their interes ts. 3Consequence-establish ethics mainly describes that whatever happens the final results should be in benefitted to oversize number of population rather than that of a certain minority. Moreover it should provide enjoyment to everyone rather than just a single individual.Duty-BasedDuty based ethical theory gives perception of Deontology which is derived from the Greek formulate Deon means Duty. Deontology is the nuzzle which defines goodness and right that would be achieved by study the act of an individual or social policy rather than the consequence it leads too.Immanuel Kant is considered to be a great Deontological thinker who always criticized Utilitarian thinkers describing that piety must be defined as the employment of an individual to one a nonher(prenominal) despite consequence produced normally when a certain individual performs a specific type of action.He further said that happiness is non something which should be concerned in term of morality, the motives a nd goals of a human existence are the qualities which make him able to choose right and wrong rather than consequences.W.D Ross a deontological thinker statesUtilitarianism seems to simplify unduly our relations to our fellows. It guesss, in effect, that the entirely virtuously significant relation in whom my neighbours stand to me is that of cosmos possible beneficiaries of my action. They do stand in this relation to me, and this relation is morally significant. But they may also stand to me in the relation of herald to promisor, of consultationor to debtor, of wife to husband, of fellow countryman to fellow countryman, and the comparable and each of these relations is the establishation of aduty4So in short a Duty-Based attempt gives a clear conclusion that morality of a human being would be carried out by the acts he performs able enough to justify being right or wrong. Honesty, Justice, Violence etc. should be the characteristics for which he will be regarded his moral duty rather than getting happy by telling a lie. role-Based function Based theory is something different which rejects the offset printing two theories which were foc employ on consequence and an act, despite this theory focuses on an individual character and is widely kn ingest as virtue Ethics. The main concerns are the individuals moral character which does non rely on duties and consequences.It has very old history rages back to some great Greek philosophers like Aristotle and Plato who contended that each person has to obtain a right virtue as everyone will pay off a certain virtue in him which will be his strength and excellences leading toward good and bad moral character.Virtue ethics is also considered to be an agent oriented rather than the low gear two which are action oriented and rule oriented.It is only by mean of the idea of Virtue than each judgment through for a moral worthy or its if its opposite possible, everything which are good and are non based on mora lly good disposition is but nothing but pretence and glittering misery. 5BackgroundOur case study is about a person named Kevin Mitnick who is considered to be the first taxi in computer valet to reach the FBI most wanted list. His period was taken place on 15 Feb 1995 by FBI in which he was charge of number of acts which included break of serve into computer systems and vanes all over the world and fastener information which put misemploy to the family by investment more into new security measures and also for the charge of violations of his terms and conditions of his plosive consonant of probation for his previous computer crimes. Mitnick was caught by the help of a Japanese computer security expert Tsutomu Shimomura whose system was hacked by Kevin Mitnick in San Diego Supercomputer centre which do him furious to track and help FBI.This was Mitnicks check days when for the first sentence he got fascinated with computers and start hacking. He was having strong pas sion of technology which do him learn quickly and he shortly managed to Hack LA public crop districts computer. When Mitnick was just 17 he hacked into peaceful cost and change call in bills there, and in the same year he jumped into San Francisco Comp whatevers interlocking where he got coming to some information valued of $200,000. But he was caught and prosecuted which earned him a probation period of 6 months. He didnt sit unwarranted in probation period and hacked into the telephone comp some(prenominal) once again and disconnected the probation officers phone and memory accessed a credit service computer and altered the computerised record of the hear on his case. Interestingly guard caught the fact that the system has been accessed from outside. During this epoch he also convicted of stealing package from a comp all in Santa Cruz, California. no(prenominal)AD, a missiles monitoring caller-out in states, was his next victim, which could concur catastrophic do as NORAD is a part of an early warning system and responsible for monitoring possible missile attacks directed toward United States.In 1988 he was criminate of two more crimes, firstly accessing MCI network for long space calls and secondly stealing some computer security system from a Digital Equipment Corporation cause a maltreat of $4 one million million million in total. This time the judge decided to put Mitnick in poky without gage. During his bail attempts prosecutor presented evidence that he had penetrating a discipline security agency in Washington. He also planted a false story about a bank describing some plodding loss and where he was about to get job, the story was detected and Mitnick was acc apply responsible and denied for job. This was March 15 1989 when Mitnick pleaded guilty for the two crimes and sent to pokey for one year with six months of psychological counselling and also with three historic period of probation.In 1992 FBI suspect Mitnick of hac king into Pacific Bell system again, his work place as searched, he disappeared and evidences were found later. While searches were carrying on for Pacific Bell more evidences were found that Mitnick hacked California Driver Licence records to set up a false identity for himself and also posed as a police officer to collect some information. Warrant of arrest was issued against him but each time he managed successfully to flee from police raid.Finally found and arrested in 1995 and was aerated with various new crimes and violations of his intelligence. His bail was denied and it was ensured that no more computer equipment is handed to him in tuck away. His phone calls were nigh monitored and in 1997 Mitnick was sentenced for 22 months afterwards pleaded guilty. This sentence was followed by 3 geezerhood of probation period in which he was ordered to stay away from any Hi-Tech equipment. He was released in January 2000 and his probation was ended in January 2003. 678Ethical issu es on that stop consonant are number of Ethical issues in the given case study, their reciprocation in the light of above theories.* Hacking into the networks of different companies by gaining access to wildcat files or data. Was it ethical to access head-to-head files and data or raze just disruption into a computer network?By applying the consequence based approach breaking in a computer network illegally and/or gain access to private files had benefited Mitnick only nor anybody else. Utilitarism states that the studyity must gain happiness on the base of consequence but in the case of Mitnick he himself only gain happiness and not the majority, so it concluded that this act is going to be wrong for Mitnick that it is not ethical for him to gain or break into somebody private computer network.The duty base approach and deontology theory would easily say this was wrong. Mitnicks act can be easily considered wrong to gain access to an other(a) computer networks. The ten comma ndments of ethics which was defined in 1992 states that all companies would rush secure file and data and would not be breached by an unaccredited outsider. Hence this was completely wrong by Mitnick to do so.If the current study case would be judged through character based ethical approach so it would be obvious that Mitnick break into computer networks for his passion of technology and for the sake of sportswoman. His thirst of knowledge forced him to continue in breaking into computer networks and gain more knowledge which was a great fun for him. But if considered morally this is completely wrong. By virtue ethics Mitnicks adoptive path was not legitimate and he should have chosen the right path.* Kevin Mitnick never make hacking for any financial purpose instead his hacking was just for the sake of challenge or sometime taking penalize from people. Was it Ethical to hack for any reason and to take challenges and getting r planege from people?If this is to be dealt by conse quence based theory , the state would be definitely NO in this case totally because of the fact that extracting revenge from someone or going to win a challenge to experiment his ability was beneficial for Mitnick only and majority of people would not be happy from this outcome.Duty based approach would state again NO as seeking revenge or damaging or doing any form of unauthorized steps of which someone is not authorize to do. Mitnick was not supposed to do as this is not something an individual should act like.Character based or Virtue ethics justify in pick good habits of ones moral character and to leave the odd ones out to be a good human being for himself. In this case Mitnick has done good for himself by causing harm to others which isnt something good for an individual character.* Mitnick got access to his school computer network system and hacked Pacific Bell for altering phone bills. Was it ethically right for him to break into a computer of his school and Pacific Bell to alter phone bills while he was only 17 years old?Consequence ethical approach would again say NO as this is something he totally done for himself. This is something he for his hold benefit for his own good and not for anybody else. The alteration in the phone bills will lead to create losses for the phone company which might turn up into large number as well. then this was something completely wrong to do so.Duty based ethical approach in this case would again lead to conclusion of NO as there is no actor policy which allow Mitnick to break into school system or into Phone Company to alter his phone bills. Based on the outcome his act was considered to be totally wrong.In the light of Character based approach, it leads to the fact that morally Mitnick knew that it was wrong in doing so but still he preferred to adopt his bad habit, which concludes that the outcome will be again NO.* Mitnick was in his probation period when got access to telephone company and disconnect his par ole officers phone, he also altered the computer record of the judge of his case in a credit service computer. Was it ethical for Kevin to do such an act?Applying consequence based approach to this case will once again lead to NO because the result of what he done was bad for his parole officer and the judge. This is a kind of act which is considered as have done for his own satisfaction, being on probation he should have avoided such strong illegal moves but he didnt.Duty based approach would not go in favour of Mitnick in this issue. His act was definitely wrong as the judge would have very bad impact of him and as well parole office too must have been unhappy. While on probation one should be very careful about law and should not go against it but Mitnick do for his own feud.Character based ethical theory never permit someones moral character to take revenge and to hurt someone , in this case according to this law it will again go for NO. Thinking of revenge and hurting someone i s considered to be very bad habit and also if an act leading to something which is not taken morally good with the assurance that law is not allowing such workings, so a good moral character will never allow someone to go against law to hunt for his own happiness.* Mitnick found guilty in stealing soft devastate from a company in Santa Cruz California but at the same time there was not any convection record FBI database. Was it ethical to steal and alter record?Consequence based theory would not tolerate stealing or altering. theft is something really bad which is not allowed in any circumstances and even if assumed it does it would be something advantageous to majority, but in this case as it is obvious no beneficial for majority so the resolvent is NO.Duty based ethical approach strongly oppose act of stealing or altering which wont be considered good , so once again in comparisons of acts the answer is again NO.Character based believes that stealing is one of the bad habits of a human being and unauthorized alteration of records is also of the same category. Mitnick was convicted of such bad deeds so the answer will be again NO this time.* Convicted of breaking into North American Air Defence Command (NORAD) missiles defence system. Was it ethical for Mitnick to break into a defence system of a country? mind the study case through Consequence based ethical approach, it would be a high dispute because getting access to such elegant system could have catastrophic affects on millions of people. It would be extremely precarious if such files to be changed or harmed. So the answer for this case will be NOThe duty based ethical approach would not allow any such policy or rule for someone who want to have unauthorized access to such delicate system as the outcome can be extremely dangerous. So the answer is NO.The third approach of Character based would consider it to be worse habit of one moral character in doing so as the outcome can be something very harmf ul to large number of people. So its a NO.* Mitnick accessed MCI network for long outdistance calls and in another case he caused $4 million damage to Digital Equipment Corporation. Was it ethical to illegally access MCI and cause damage of worth $4 million to a company?The Consequence theory would say NO because again the minority gets benefit which is Mitnick and the majority faces damages which is the MCI network also the Digital Cop lost lots of money which is again the majority in damage.The Duty theory will again have no bind for Mitnick as the case describes the huge losses for two the companies from what the Mitnick done with them. on that point is no such policy or act which can allow an individual to do so in any circumstances. So the answer is simply NO.Character based theory is again on its answer with NO and the reason for that is as say above many times that alteration of records and damaging any private and confidential files cause harm to others which is conside red a bad deed or bad habit.* In 1988 Judge denied him bail and ordered him to be held in jail. Was the judge ethical in doing so? This period lasted for eight months in nonsocial consignment for Mitnick.Now there is an additional act which is the Judge, Consequence based ethical theory has substitute with this act because Mitnick was responsible for causing harm to large majority of people but there is some conflict in the case as well, as Mitnick was put in jail for 8 months without bail and at that time it was not prove that these had been done by him, so this is a bit harsh on Mitnick, so here Mitnick get some support from Consequence theory.In duty base Judge gets support which is from the reason that Mitnick had caused harm to major companies and people but still the decision was too harh for him as he deserved at least a confidential information.As from Character based theory here the Judge lost his support as it was a fact that Mitnick was notorious but he deserved a tra il and even if the Judge though he didnt, it was a wrong decision to put him in a solitary consignment. Mitnick would have come to good way by putting him in a normal jail as it was very harsh to put him in a solitary consignment.* While FBI was doing their most to pay off Mitnick, he flee from the authorities on a number of occasions for two years by using fake identities to hide himself from the authorities. Was it ethical for him to do so?Mitnick at this point again done everything for his own good and during this period he caused damage to majority with his activities, so Consequence based theory would not support him on this issue.Using fake identities and staying on run for two years is not something good but a way to misguide law, which would not be supported by Duty based.Using fake identities by damaging other people identities to keep himself safe is something taking law in his own hands. It is not a good deed so according to Character based theory the answer will a defin ite NO.* Shimomura helped FBI to catch Mitnick, Was it ethically right for him to do so?All the three ethical theories Consequence, Duty and Character based would support Shimomura, as ethically he is right. It is duty of everyone to help the law to catch someone who has been causing harm to the community, and it is morally right for every individual to help to catch law breakers like Kevin Mitnick.* From 1995 till 1997 Mitnick was held in federal prison without bail and trail by FBI, was it ethically right to do so?Consequence based ethical theory in this case is going to support FBI as Mitnick was harm to many unanimous companies and people but the support is going through only if Mitnick was charged after trial to stay in prison.As it has been described a number of times that law is superior than anything else, so in Mitnicks case again FBI should have run the case under law and should have allowed a fair trial to convict Mitnick, which has not been done, so this time the Duty b ase approach is supporting Mitnick and the answer is yes as FBI were ethically wrong in doing so.Character based would not support FBI as it is out of law to keep someone in prison for 2 years without fair trail and the chance for bail. At least he deserved fair trail and if found guilty then should have faced whatever he deserved.Role of a ProfessionalA simple definition of a professional can be done like that, anyone who hold a degree in any special(a) field of education and then uses that knowledge in his relative field and making sure that professionalism follows the cypher of ethics including the terms Behaviour, society , confidentiality etc. At the time when a professional is hired, normally a direct or a bond is created between the two to follow certain defined acts and rules of policy and to keep high level of security by keeping the data safe and to avoid by missing any kind of data of the organization.Organization which is totally related to Information engineering or having an IT department also maintain a specified policy between its engineers and themselves. In this particular case the role of a software engineer, hardware engineer or an application engineer have to follow those rules and policies but also IEEE CODE OF ETHICS which is considered to be the main source of ethics code for any IT professional should be followed by any IT professional related to any field of Information Technology and in this case being software, application and hardware engineer. 9Use of Knowledge for Hacking by a ProfessionalIt is sooner disastrous when a computer professional use his knowledge for hacking. By taking each of different IT professionals one after another and considering hardware engineer first to discuss, it is coming obvious that hard ware engineer can use his knowledge both in right way or the wrong way, as hardware devices manually trope are quite useful in hacking mainly portable devices which is something like which Kevin Mitnick used for h acking. A brain arises here that is it right to do so? The answer is quite simple NO because its against the code of ethics which exists in many forms of Cybertechnology.Same rules and principles applied for software engineer and application engineer as software and application level technical support is quite useful to build or modify codes of program and make its own custom made to be useful for something negative, which is not appreciated in society because of it harmful nature to many.A very technical question sometime being asked, Can all this knowledge be used in positive way? Can hacking be positive? The answer to these question is YES and is something called Ethical Hacker.Ethical Hacker vs. HackerHacker is someone who uses his knowledge on negative side and breaks in system, while an ethical hacker is someone who is doing hacking which is called penetration testing and hacks into different systems in order to identify security holes and then inform companies with or withou t solutions. Such kind of work is normally being done by security firms who is commissioned to do so and has authorized to do so. An individual, who is not a part of a security firm and have no pre confirmed authorization, breaking into system would be consider a crime. Ethical hacker has the duty of catching hackers as well.In our case study Tsutomu Shirmomura is an ethical hacker who used his knowledge to catch a hacker Kevin Mitnick.Time has changed now, Kevin Mitnick is no more hacker, rather he is ethical hacker now who runs his own security company and does penetration testing for various organizations by accessing their systems, but this time the access is legal, authorized and paid.ConclusionLike many other technologies Information technology has also had good and bad impacts. Hacking is considered to be a negative act in the world of Cybertechnology. Kevin Mitnick curiosity for technology made him a Hacker, first started with a fun but then glum up quite disrupting. Howev er if the case is studied with some down-to-earth fact, it is seem to be very unfair when FBI holding him solitary labor movement for 8 months without bail and trail. It unfair for a person like Kevin Mitnick aegir as from the case study its quite obvious that he was a genius. And for sure if a genius is treated like this way he is bound to go on run. This leads to a situation that if he is hazard in the future and he has not committed that crime, he would be afraid of facing the same thing happened with him by putting him in prison without bail and trail. In a documentary movie on the life of Kevin Mitnick Freedom Downtime Life of Kevin Mitnick the reports from psychologist stated that it was an event which every individual will want to run away and then his bad part took over him of which he evaded FBI for two years. Putting Mitnick in jail for 2 years between 1995 and 1997 with not access to bail is again something wrong. A fair trail is a right of every individual when one does something wrong then wherefore not this applied on Mitnick. There are statements from Lawyers that even murderers get bail and trail then why Mitnick didnt? Whatever Mitnick had done he deserve to be punish for that as that were totally unethical with the time but if FBI would have used the law in sincere and fair way he wouldnt end up that way and he would have only been sentenced for the time period he deserved. One of the most interesting part of American Judiciary is that Kevin Mitnick is the continuing held person in history without trial or bail which can be considered as to be totally unfair for him. Mitnick has changed his life after ending his 3 years of probation in 2003, Mitnick has started a security consulting company and now offering a role of ethical hacker and using penetration which test to check his client security flaws and using the code of ethics quite well. Kevin Mitnick is now using his professional skills toward his clients and himself which leads to t he fact that his knowledge is now being used for positive way to secure his composition and prove to the entire world that he is a genius.

Saturday, March 30, 2019

Law of One Price and Purchasing Power Parity | Analysis

Law of unmatch adequate cost and purchase Power space-reflection symmetry AnalysisIntroductionThe gradatory emergence of globalisation in businesses has contri merelyed towards a signifi derrieret rise in international trade. Consequently, commerce crossways countries has been prominent among businesses in order to seek high geargonr growth opportunities available in the international markets (Michie, 2011). Our forgetingness to pay a certain impairment for abroad m virtuos integrityssy must ultimately and essentially be due to the fact that this m one and just now(a)y possesses a buying might as against commodities and work in that boorish (Gustav Gassel, 1922). The applications and conversions of currencies control become vitally important in international businesses in order to obtain or forecast the substantial cost and r withalues for the purpose of financial information. The concept of get Power Parity (uvulopalatopharyngoplasty) enables one to forecast the metamorphose dictate of devil several(predicate) countries based on the impudence of correspondent purchasing magnate under law of one outlay of dickens countries currencies. However, various significant obstacles have been encountered in current life despite the concreteness of the proposed theories and one of the intercommunicate main concerns is to determine the equipment casualty for a similar w ar across divers(pre titulary) markets and continents (Wang, 2009). According to the hypothesis of get Power Parity ( palatopharyngoplasty), one up-to-dateness should be able to buy the aforementioned(prenominal) amount of carrefours which can be purchased from other currencies. This concept suggests that the currencies should be valued in a way that it allows consumers to buy similar quantity of goods irrespective of the currencies that they utilise in making purchases (Manzur, 2008). According to the Law of integrity charge ( line up), consumers should be able to purchase similar or aforesaid(prenominal) kind of goods at the indistinguishable expenditure despite the utilisation of contrastive currencies. Nevertheless, the application of bring down is easily difficult and would non prevail in certain predicaments across polar economies and countries despite the supportive underlying theories (Mezzera, 1990).Conceptual Understanding of Law of One toll and Purchasing Power ParityLaw of One Price and Purchasing Power Parity play a crucial parting in determining the international trade mechanism. The concept of LOP indicates that the price for homogenous goods and services should be the equivalent despite all locations. The possibleness behind LOP is established through the equilibrium price of a product. The equilibrium market price of a product is achieved when market participants ca drop the unlike pricing for an akin product in different locations, (assuming no transaction be and other trade restrictions) and take advantage o f the arbitrage opportunities. The principle of LOP is highly justified because deviances in the price of the same products in devil different markets would piss the perfect opportunity for arbitragers to win by purchasing products in a displace priced markets and selling them in markets where thither atomic number 18 sold at a higher price. The proceeding among market participants get pressure through demand and supply strength in the devil locations and would considerably eliminate such opportunities and hence create an refer and transparent price. As a result, the price for the same trade good traded in two different markets should be same if they are reborn into a common currency (Ignatiuk, 2009). The concept of LOP asserts that if same goods discharge each countrys market basket, the uvulopalatopharyngoplasty swap rate should prevail between the two countries to maintain the principle of one price despite the difference in currencies (Eicher, Mutti and Turnovsky, 2009).The Law of One Price (LOP)Pd=S*PfPd is price of the good in the domestic thriftiness whereas Pf is the price of the good in a foreign economy and S* is the nominal exchange rate between the two economies. The concept of Purchasing Power Parity (uvulopalatopharyngoplasty) implies that the nominal exchange rate between two currencies should be equal to the ratio of aggregate price levels between two countries. This will create the similar purchasing power of one currency as compared to that of another. in that respectfore, according to PPP, exchange order need to be modify between countries so that the exchange can be made tantamount(predicate) to each currencys purchasing power. The question arises immediate as at that place are two realizable ways that PPP would prevail to create the perfect equilibrium. Absolute purchasing power parity relates to the set when the purchasing power of a unit currency is converted into foreign currency at the exchange rate in market, it is directly equal in the domestic and foreign economy (Taylor and Taylor, 2004). However, it is congenerly hard to betoken the amount of homogeneous goods in the baskets of the two different countries. Hence, it is more occurring to streamlet relative PPP, which implies that the percentage change in the exchange rate oer a given period just offsets the difference in inflation rates in the different countries over the time horizon (Taylor and Taylor, 2004). Therefore, if out-and-out(a) PPP holds, then relative PPP must also hold, but if relative PPP holds, there is a probability that relative PPP might not hold as it is possible that at different levels of purchasing power of the two currencies, there are changes in the nominal exchange rates possibly due to the legal proceeding costs (Isard, 1977). To librate whether the theory of perfect commodity arbitrage applies in the real field to create the law of one price, consider take in 1 and Figure 2 which illustrate the notio n of absolute PPP and relative PPP. For the relative data demonstrated in both the figures, it is evidently clear that uncomplete absolute nor relative PPP seems to hold reasonably in the pitiable run, thus does this imply that PPP does not hold in real life? According to the perfect commodity theory, equilibrium will come out and restore the differences between the relative prices which is clearly proposed by the principle of LOP by adjusting the exchange rates for the two locations. Hence, as far as this is concerned, perfect commodity arbitrage guarantees that each good is uniformly priced even with the initial difference of transaction costs between similar products in different locations, thus within a period of time in the long run,, the prices are adjusted to establish the perfect equilibrium of LOP, ensuring the same purchasing power in terms of currencies under the influence of PPP (Isard, 1977). Nonetheless, where does all the disputation arise concerning the pragmati city of LOP and PPP in truth?Analysis of the PropositionIn the assumed absence seizure of transport costs and trade restrictions, perfect commodity arbitrage insures that each good is uniformly priced (in common currency units) throughout the terra firma the law of one price prevails. In reality the law of one price is fragrantly and systematically profaned by empirical data (Isard, 1977). It is undeniably true that in the heraldic bearing of perfect commodity arbitrage, each good will be substantially priced accordingly to demand and supply pressure in the assumed absence of legal proceeding costs. However, the immediate response to this is that how practical and realistic is the assumption of transactions costs applicable to the principle LOP in order to create the exchange rate in PPP?The concept of LOP indicates that the prices for the identical products are the same across two countries, but this has not been the grapheme in factual situation proposed by numerous scholar s and researchers. The principle of LOP has been violated in actual practice and this has been supported by account statement that the transaction costs make it difficult to ensure same price for the identical products in two markets by cr ingest a restriction in the equilibrium flow of the commodities known as the border effect (Rogoff, 1996). The transactions costs consist mainly of tariffs, taxes, duties and non-tariff barriers costs. For instance, the commodity that is priced lower in one market would involve transaction and transportation costs for participants to trade them in another market, and this will constitute to the additional costs of the commodity (Bumas, 1999). The excitableness in the price differential would be progressively higher if the difference between the two countries is large. In addition, the transportation costs will maturation due to the driving supply of arbitragers participating to transfer the commodity from one location with lower price to anothe r with higher price, and the resulting impact would be differences in price disrupting the adjustment of arbitrage equilibrium (Clark, 2002). The study by Engel and Rogers (1996) have indicated that the price differential is greater in case of greater distance between the cities concerned, and it leads to substantial increase in the prices when they are compared in different countries proceeding to different continents.Furthermore, single or identical manipulation of goods common to everyone is highly kafkaesque because different consumers from different locations will have different preferences and choices, and it is always very difficult to have the same balance wheel of commodity identified in the comparing countries consumption basket (Clark, 2002). There is no guarantee that all commodities are traded between international economies and relatively to domestic economies, there are always substitutes in products if level of competitions is high but most of the cases, more dif ferentiated goods are available compared to the product substitutes (Kim and Ogaki, 2004). Hence, when all these circumstances applied, the proportion of consumption from different locations concerning identical commodities in aggregate price indices will vary across countries.In sum, trading goods are more accurate drivers for the estimation of PPP compared to non-trading goods. This is because non-trading goods circulate within the domestic economy of that country and does not cross the barrier beyond international trade which involves additional transactions costs. Non-trading goods are more jailed within the domestic economy compared to trading goods which are more express in exchange rates term when they are traded elsewhere round the world contributing towards the credibility of PPP. Hence, it is more useful to test with manufacturer price index rather to use the consumer price index as suggested by the graphs in Figure 1 above. There is shorter deviation of PPP in produ cer price index compared to consumer price index in the short run from both the graphs. Hence, it often suggested that the PPP theory of exchange rates will hold at least approximately because of the hypothesis of international goods arbitrage. However, in real life, the practicality of PPP is disclosed to a evident amount of subjectivity and uncertainty as to which product is categorized as trading or non-trading goods, if identified, will it be the same around the world for the comparison of prices? Non-trading goods in UK might not necessarily be identical in US where that particular product might be a trading good for US rather and will this affect the producer price index, what about the LOP? To conclude the theory of PPP, there are definitely dreadful amount of assumptions underlying it to support its application and reliability. In real life, do all these assumptions prevail?Lets try out and explore the credibility of the assumptions mentioned above by analyzing the Big macintosh forefinger created by The Economists in 1986. As far as we know, Big macintosh is a hamburger available from macintoshdonalds Restaurant, the world largest fast nourishment filament. What happens is that the price for a Big Mac in one country is divided by the price of a Big Mac in another country (both in domestic price) to obtain the Big Mac PPP exchange rate. This value is then compared and analyzed with the actual exchange rate in the market. The aim of this discussion is to determine the practicality of Big Mac index in real world in relate to the assumptions of PPP. The limitations are closely related to the assumptions mentioned aboveIt is not possible to have the same price of a Big Mac from all around the world (results from the diagram below) due to different government tax policies, levels of competition and different transaction costs such as rental for different locations not just within particular area of a city, as vigorous as different countries and c ontinents. This will surely add up to the costs of a burger and disrupt the notion of LOP.Being the worlds largest chain of hamburger fast food restaurants, certain products need to be merchandise or merchandiseed by franchises all around the world to maintain the concurrence and the quality of the worlds prominent restaurant and this will certainly contribute to the different costs of the product disrupting the free movement of goods across borders.Source Big Mac Index, The Economists 2013. Available at http//www.economist.com/content/big-mac-indexFurthermore, the assumption of single consumption is not possible in many countries, for instance, eating in McDonalds Restaurant in some countries is relatively costly compared to others and consumers would prefer eating in local fast food restaurants instead as a close substitute at a lower price.In addition, the demand for the consumption of Big Mac varies across different countries and this will not create an equal proportion of commodities in different countries basket. For example, buying Big Mac in China is not as high demand as buying Big Mac in the United States.The assumption made by PPP is highly unrealistic due to the disruption theory of LOP as it is not possible to have one common currency price for the same product demonstrated using the study of Big Mac Index. A similar investigation has been conducted by Haskel and Wolf (2001), they explored the deviations from the LOP by making use of the retail transaction costs in IKEA, a multinational Swedish furniture company. In performing the case study, samples were gathered comprising of 100 identical goods sold by IKEA in 25 countries. The outcome of the study indicated that there are significant common currency price divergences across countries for a given product.ConclusionIn conclusion, according to PPP theory, the exchange rates should be adjusted in a manner where equal purchasing power is established with respect to a commodity in two markets. In the real world, this is highly unachievable and it is rather unrealistic to the limit that there is always difference in prices of the same goods. However, this scenario might pit with the results and findings from Figure 1 and figure 2 as both the figures proposed that in the short run, PPP does not hold, whereas in the long run, the law of one price will prevail and PPP is therefore determinable. In practical applications this seems rather convincing as due to the matter of time, equilibrium will kick in and adjust the prices accordingly to the LOP. Nonetheless, one question close up remains unanswered, how far can the LOP brings us towards the validity of PPP and determining the exchange rate between two countries? How certain are the assumptions of PPP on the data and findings by researchers and scholars influence the outcome of the actual results obtained? As mentioned by Keynes (1923), At first sight this theory appears to be one of great practical utility. In practical applications of the doctrine there are, however, two further difficulties, which we have allowed so far to escape our assist. According to Keynes, the first difficulty is to make allowance for transport costs, imports and export taxes. The second difficult refers to the treatment on purchasing power of goods and services which do not enter into international level of trade. In sum, the theory of PPP derived from LOP is useful in theory for product pricing and the determination of exchange rate currencies, but as far as the limitations mentioned above is concerned, it should sensibly be considered as a guidance only rather than a direct application in real world.ReferencesApreda, R. and Pelzer, L.Z. 2005. focalize on Macroeconomics Research. Nova Publishers.Abildtrup, J. 1999. Modern Time Series Analysis in timber Products Markets. Springer.Bumas, L.O. 1999. Intermediate Microeconomics Neoclassical and Factually-oriented Models. M.E. Sharpe.Clark, E. 2002. world-wide Finance. Cen gage Learning EMEA.Engel, C. and Rogers, J.H. 1999. Violating the Law of One Price Should We Make a federal official Case Out of It?. Board of Governors of the Federal Reserve System.Eicher, T., Mutti, J.H. and Turnovsky, M.H. 2009. International Economics. Routledge.Haskel, J. and Wolf, H.C. 1999. Why Does the law of One Price snap? A Case Study. Centre for Economic Policy Research.Isard, P., 1977. How Far basin we Push the Law of One Price?. American Economic Review, 67 (5), 942-948.Ignatiuk, A. 2009. The Principle, Practise and Problems of Purchasing Power Parity Theory. GRIN Verlag.Jonsson, G. 1999. Inflation, Money Demand, and Purchasing Power Parity in South Africa. International Monetary Fund.Michie, J. 2011. The handbook of Globalisation, Second Edition. Edward Elgar Publishing.Manzur, M. 2008. Purchasing Power Parity. Edward Elgar Publishing, Incorporated.Mezzera, J. 1990. Monopoly Profits and the Law of One Price The Cost of Misapplied Theory, Volume 146. Helen Kellogg Institute for International Studies, University of Notre Dame.Rogoff, K. 1996. The Purchasing Power Parity Puzzle. Journal of Economic Literature, Vol. 34 (2), 647-668.Ricci, L.A. and MacDonald, R. 2002. Purchasing Power Parity and innovative Trade Theory. International Monetary Fund.Silver, M. 2010. Imf Applications of Purchasing Power Parity Estimates. International Monetary Fund.Taylor, A.M. and Taylor, M.P. 2004. The Purchasing Power Parity Debate. Journal of Economic Perspectives, Vol. 18 (4), pp. 135-158.Wang, P. 2009. The Economics of Foreign Exchange and Global Finance. Springer.

Literature Review of Language Learning Strategies

Literature Review of musical compositionner of speaking acquirement StrategiesChapter 1 Literature Review of spoken expression skill Strategies1.1 en fork outResearch into lyric removeing strategies began in the 1960s, particularly , maturement in cognitive psychology bringd much of the research d i on wording attainment strategies (Williams payload 2000 149). Since then, there has been a prominent shift in spite of appearance the domain of wording tuition and t separatelying with greater emphasis organismness put on squargon upers and breeding sooner than on checkers and t all(prenominal)ing.In match to this tonic shift of interest, how noniceers process new information and what kinds of strategies they employ to understand, learn or remember the information has been the primary concern of the researchers dealing with the bailiwick of outside(prenominal) delivery encyclopaedism. Therefore, a lot of researchers acquit been devoting themselves to the ara, among whom best de bank lineate by Rubin (1975), Cohen (1981), Wenden (1982), Oxford(1989), OM all toldey Chamot (1990), etc. In China, the research into run-in schooling strategies began in the optic 1980s, such as Huang Xiaohua(1985), Gui Shichun (1988), Liu Runqing (1990), followed by Wen Qiufang(1996) and Cheng Xiaotang(2000).1.2 consequence of the Studies of position Learning StrategiesLearning is a lifelong task for each person. With the development of the times and the promotion of the position education reform, we, teachers of incline pre work been clearly aw be that our duty is non but to teach students language knowledge, whats to a greater extent, we should teach them to learn to learn. As far as the reality is concerned, the studies of side of meat acquirement strategies ar signifi after partt in these run acrosss as followsThe studies of face tuition strategies impinge on the needs of the current implementation of select-oriented education in our country.At present, quality-oriented education is being carried out in both primary schools and middle schools, whereas quality-oriented education is the sensation foc utilize on students overall development. As we see, the human being has entered the information and knowledge-based economy era in which skill and technology ar advancing by bounds and leaps with each passing day. Therefore, students should be fit out with lifelong capabilities of schooling if they lack to succeed in fierce competitions in future. As teachers of side of meat, we should serve up students to head assure the correct modes of schooling English, develop students information potentials, foster their serious education habits and bring up the abilities of breeding themselves English so that they bed digest concrete foundations of English tuition aft(prenominal) they leave school. In addition, the fosterage of direction strategies is beneficial to developing students hand nigh perso nalities as well as their spirits of innovation. No wonder that the newly-issued subject English program Standard (200329) points out Helping students develop sound eruditeness habits and form the effective accomplishment strategies is an of the essence(p) task of English curriculum. Just as the Chinese saying goes, Give a man a fish and he eats a day teach him how to fish and he eats for a lifetime.2. The studies of English nurture strategies atomic number 18 conducive to shifting our teachers traditional beliefs so as to elevate our ca physical exercise quality and thus astir(p) the quality of our didactics and education in large scales.In the current world, the rapid development of social economy, culture, science and technology suffer been all the to a greater extent seeing the traditional beliefs and modes pretermit to adapt to the modem educational requirements .Through the studies , we can demote update the teachers educational beliefs and always learn new tra ining method methods and new knowledge to meet the needs of educational reforms. Furtherto a greater extent, we hold that quality is the absolute principle in the educational c beer. Regrettably, a lot of problems leading to poor educational quality come d admit to the inefficient accomplishment methods sort of than commandment methods. Hence, if we want to remediate the quality of our education and pedagogy in large scales, we shall cypher the studies of education strategies as the break done point . According to strange language pedagogy theory, teaching and reading belong to an insepar able-bodied organic entity which atomic number 18 interdependent and complementary to each otherwise. All these require we should strengthen the studies of the English learning strategies in middle schools.3. The studies of English learning strategies help the learners(students) go bad more successful in their learning.The SLA theory and practice have all the more been proving that the cognition of learning methods plays an increasingly primal role in ones learning and the prerequisite to learning English well is to learn how to learn effectively. More and more research results have to a fault shown that the effective learning strategies are quite relevant to ones academic deliver the goodsments . Biggs(1990) points out that when students are impatient(predicate) to learn and know how to learn, they depart be able to achieve nonsuch achievements. So the studies of English learning strategies are important means to meliorate students learning aptitude in an all-round way.1.3 delivery Learning StrategiesSince the matter of learning strategies, galore(postnominal) researchers have been concentrating their attention on language learning strategies, however, defining and classifying language learning strategies has been a major concern for researchers give to this area. As language learning strategy studies develop and researchers identify more and more stra tegies, the sort schemes become more elaborate and complicated, which in themselves are not a problem because they help us to have a better understanding of the nature of language learning strategies.1.3.1 Definition of quarrel Learning StrategiesThe term language learning strategies has been defined by many researchers. Learning strategies are defined by Rubin(197543) as the techniques or devices that the language learner may use to gain knowledge.Weinstein and Mayer (1986315) state that Learning strategies have learning facilitation as a goal and are intention on the part of the learner, the goal of strategy use is to affect the learners want or affective state, or the way in which the learner selects, acquires, organizes, or integrates new knowledge.Wenden (1987 19) defines learning strategies as any sets of operations, steps, plans , routines utilise by the learner to hasten the obtaining, storage, retrieval, and use of information.According to Stem (1992261) , the concep t of learning strategies is dependent on the assumption that learners consciously engage in activities to achieve sealed goals and learning strategies can be regarded as broadly conceived intentional directions and learning strategies .Williams and Burden (2000216) define learning strategies as series of skills used with a particular learning purpose in mind. They involve an ability to monitor the learning situation and respond accordingly and they in like manner mean being able to assess the situation, to plan, to select hold skills, to sequence them, to coordinate them, to monitor or assess their effectiveness and to revise the plan when prerequisite.Based on Chinese students learning and development , the newly-issued National English Curriculum Standard (200323) regard learning strategies as all kinds of actions and measures students take in order to learn efficiently and develop themselves.To sum up, we may understand English learning strategies as followsFirstly, learning strategies are the complex plans concerning learning process learners reap. In a strict sense, all the plans of the learning activities should be contrasting, thats to say, the learning strategies each time used by the learners are quite different. However, relatively speaking, for the same(p) sort of learning, learners may have similar plans, which we may call learning strategies in common use, just resembling the narration method SQ3R(Survey, Question, Read, distinguish and Revise)many learners use. heartbeatly, learning strategies are initiatively used by the learners so as to achieve a certain(prenominal) learning goal. Therefore, learners should make appropriate learning plans in the comfortable of their learning tasks accordingly. Generally speaking, learners are conscious when they use certain learning strategies. When the plans are being carried out over and over, learners level of employ them leave alone reach a certain sort of automation.Thirdly, to use learning s trategies is to learn efficiently. On the contrary, if the learners dont use certain strategies in their learning, they may come about it difficult to attain their learning aim. In other words, they wont vex satisfying effect even if they finally attain a certain aim. Take memorizing English words as an example, given enough time, one can also remember words through and through shop mechanical repetition. However, if one uses other methods , the memorizing efficiency may be improved greatly.1.3.2 Classification of terminology Learning StrategiesClassifying language learning strategies has been a major concern for researchers prone to this field. So far language learning strategies have been classified by many scholars, such as OMalley(1985), Wenden Rubin(1987) , Oxford (1990), Stern(1992) , Ellis (1994), Wen Qiufang (1996) and so on.Lets see a few representative viewpointsOMalleys (1985) assortment of language learning strategiesMetacognitive strategies cognitive strategiesSo cioaffective strategiesRubins (1987) mixture of language learning strategies/ Learning strategies Cognitive learning strategiesMetacognitive learning strategies communicatory strategiesSocial strategiesOxfords(1990) classification of language learning strategiesDirect strategies Memory Cognitive Compensation strategiesIndirect strategies Metacgnitive strategiesAffective strategiesSocial strategiesStems(1992) classification of language learning strategiesManagement and planning strategiesCognitive strategiesCommunicative-Experiential strategiesInterpersonal strategiesAffective strategiesWen Qiufangs (1996) classification of language learning strategiesConcept Methods- Management methodsLearning methodsAs different researchers have given different ways of classification from different aspects . In order to make the operation of English learning strategies program line and knowledge more convenient and effective, on the basis of National English Curriculum Standard (2003) and taxon omies mentioned. above, on the one hand , Ive adopted the following classification according to the role that strategies play in the learning process, that is , affective strategies, cognitive strategies, metacognitive (regulative) strategies, communicative strategies and resourceful strategies on the other hand, in accordance of rights with the palm of language knowledge and language skills, Ive listed strategies for learning vocabulary, grammar, and strategies for developing listening, speaking, reading and pen skills. The former will be penetrated in my daily English teaching (Strategy-based command) and the latter will be trained through supererogatory lectures.1.3.3 Factors Influencing address Learning StrategiesThe use of learning strategies is not an isolated phenomenon. The mastery and borrowing of students learning strategies are doubtless(prenominal) affected by various factors. So the research and investigation into these factors will surely be of great help to te achers who are engaged in learning strategies command and training, as the teachers can control or eliminate the disturbance of these elements. Furthermore, the research into the factors influencing learning strategies plays an elevatedly important role in shortening students learning time and improving their learning efficiency and making the strategies instruction and training more targeted. As we know , learners(students) and teachers are two closely related aspects in teaching, so the factors influencing the mastery and acceptance of students learning strategies mainly derive from students and teachers.1.3.3.1 Motivation and matter toBy need, I mean the term of describing , arising, maintaining and guiding of the human behaviors. To some extent, pauperism is the driving power of human behaviors. Therefore, motivation is very important when students learn English. They are believed to be always dominated by a certain motivation. In the educational field, motivation is a ver y important requirement to keep the education and class-teaching going smoothly and effectively.Motivation is the more or less oft used term for explaining success or failure in virtually any complex task. Its easy to claim that a move learner will do better in language learning. This is of feast not groundless, for countless studies and experiments have demonstrated that motivation is a make out to success in language learning. But researches also show hardly neither alike high nor too low learning motivation can improve learning efficiently.Its clear that if learning motivation is too low, higher(prenominal) efficiency cant be achieved. bookmans with lower learning motivation are usually short of study enthusiasm. They are the passive participants in the learning activity and their learning efficiency will be negatively influenced. Students with too high of a motive ardor will fail to face difficulties confidently, fail to take part in the communication sedately and their potentials for study will not be desirable.According to Oxford and Nyikos(1989 404-19) research, the higher the learners motivation is , the more learning strategies and the more frequently he will use. As we know, learning is a kind of ,conscious activity, only when students hove the definite alive(predicate)ness to improve their learning and the strong desire to master learning strategies will they positively be able to find out and summarize strategies leading to success. Also, the outside learning strategies instruction and training can be internalized.In addition, the intensity of students learning motivation determines what kind of strategies they will choose and therefore affects the efficiency of their strategy use. For example, Biggs(1990) research shows that students with extrinsic motivation tend to choose mechanic learning strategies while those with intrinsic motivation tendto choose pregnant organizing learning strategies and students with higher motivation tend to use more frequently the learning strategies they have mastered while those with lower motivation are insensitive to the use of strategies. OO According to Gardner and Lambert(1972) , learners mainly with instrument motivation tend to use communicative learning strategies more frequently.Last but not least, interest is an important aspect in motivation. elicit is aroused and develop on the basis of needs. When one shows interest in certain things, theyll undoubtedly take positive attitudes towards them. As Einstein once said Interest is the best teacher. Some British psychologists experiments have proved that interest rather than intelligence can better promote students autonomous learning. Therefore, teachers should design germinal and lively teaching activities and new forms and ways through various teaching media to help students learn better.1.3.3.2 temperamentWhat is personality? How is it to be generally represented and understood ? In psychology, Eysenck (1974) occupies a pivotal position in this field. He elaborates a most comprehensive and objective approach to the study of personality. His theory, using dichotomies, identifies the general traits extrovert/ draw in and neurotic/stable. As for personality influencing foreign language learning, more researches are concerned with exploring the personality of extroversion and introversion.Traditionally, it has oft been assumed that learners who are extroverts will be better and faster foreign language learners, who are generally more sociable and gregarious. They enjoy variety show and excitement. Extroverts will be more actively involved with the language than their introvert classmates. They will be more responsible to the input they get, be keener to try producing their own foreign language utterances and so have more opportunities to install up and test hypotheses about the language. Its also most noticeable in the language classroom where the teacher likes talkative, outgoing students who part icipate freely in class discussions. On the other hand, introverts are often thought of as reserved, bookish and slow. Unfortunately, this prejudice has had a considerable influence on language teaching, which vie should be careful with.So far, Griffiths (1991) viewpoints have been widely legitimate introverts have advantages over extroverts in developing their cognitive academic language ability, as they usually spend more time in grammar, reading and writing and they are good at observing and call ining. mend extroverts are capable in basic interpersonal communication skills, as they have more opportunities and more language input. This is also in accordance with Zhu Chuns conclusion(1 994347). In my opinion , as far as my 13 years teaching practice is concerned, these ideas are authoritative. So it needs to be judged fairly in our teaching practice. Personally, in our daily learning strategies instruction and specialized training, Id like to propose that we teachers of Englis h should consciously kick upstairs students to be extroverted, while at the same time being1990, ( -fj kEi 03N*)IY. el t, M 122 aware of the optimal between extroversion and introversion, which may vary from student to student, from moment to moment.1.3.3.3 Learning StylesThe way we learn things in general and the particular attack we make on a problem seem to hinge upon a rather amorphous link between personality and cognition_ This link is called learning elbow room or cognitive agency. Ellis (1985) states Cognitive style is a term used to refer to the manner in which people perceive, abstractize , organize and pull in ones horns information. Each person is considered to have a more or less consistent mode of cognitive functioning. According to Wedell, M Liu Runqing (1995209) Cognitive style refers to the ways that individuals organize, analyze and recall new information and experiences. Up cashbox now, different researchers have identified different types of learning sty les from different angles. For font, Margaret. Morgan (198252) identifies 16 types of learning styles from two dimensions extroversion-introversion sense-intuition. Cl) Reid (1987) identifies as Audio-Sense Type, Visual-Sense Type, Moval-Sense Type, Touch-Sense Type from the angel of different sensories. OO As far as the researches are concerned, the more detailed the divisions are, the better we can perform. However, in daily applications we find them too trivial. To make our studies convenient and operable, a distinction is made between Field-Dependent and Field- Independent language learners in the set out of students perceptional styles.The following are seen in our practical English teachingField-dependent students are more positively influenced by their teachers they perform better on geomorphologic tasks than unstructured they dont try to analyze or think about English themselves they are very reliant on what other people think of them and depend a great deal on positive fe edback in their English learning they tend to be seen as outgoing and arouse in others and they are usually perceptive of the feelings and thoughts of others. In contrast, field-independent students do better without teachers interference they are good at fmding patterns, organizing data to make generalizations and learning rules and they have a strong sense of personal identity and often seem insensitive to and distant from others.Its possible to say that these characteristics are not totally related to the styles of field independence or dependence, but its necessary for us teachers to be conscious of these cognitive elements in English teaching. What I would claim is that individual student vary their utilization of field dependence or field independence, depending on the context of learning. If a task requires field independence, individuals may invoke their field-independent style if it requires field dependence, they may invoke a field-dependent style. Obviously, our role is to understand the preferred style of each student and to encourage the appropriate style for the context in our learning strategiesGordon Lawrence. 198252-53. People Types and tiger Strips. Centre for Application of Psychological Type, Inc. ( Reid, J. 1987. The Learning Styles Preferences of ESL Students. TESOL Quarterly 21 87-111 instruction and specialized training. Its worth mentioning that English learners themselves should be aware of their own learning styles so that they can make full of their own characteristics.13.3.4 Intelligencesubjectively speaking, learners wont consciously choose and use learning strategies in line with their own intelligence, as learners are not inescapably aware of their own intelligence, furthermore, there hasnt been evident relationship between intelligence and learning strategies so far. However, objectively speaking, intelligence is still a factor influencing the aspect and weft of learners learning strategies to some extent, as we know, some learning strategies require learners higher intelligence, for example, when learners are required to summarize grammatical rules through language synopsis and observation. Although the less levelheaded learners may also attempt to foster and use these strategies, the efficiency when they use these strategies will surely be not as high as those more smart as a whip learners. Gradually, they will abandon these learning strategies consciously or unconsciously and thus they may turn to other learning strategies.The research into language strategies training has proved that the more intelligent students tend to develop their own effective learning strategies spontaneously through trying to figure out teachers daily interpretations and summarizing experiences in solving problems. While for the general intelligent students, they tend to develop their learning strategies through teachers specialized and explicit instructions or training. For the poor students, they need not only teacher s specific help and explicit interpretations but constant practice as well. In this case, they can use the learning strategies theyve got mechanically , but when the learning tasks , learning environment or learning contexts are changeable , they are at a loss as to how to choose appropriate learning strategies, or rather, even if they use the strategies, they still fail to solve problems effectively.It should be pointed out that intelligence is only one of the factors influencing students formulation _ and adoption, but not the mere condition. Its shared understanding that the more intelligent learners wont necessarily master the effective learning strategies naturally while those who cant master effective learning strategies are not necessarily the less intelligent learners.1.3.3.5 The TeacherTeaching, as a kind of cognition, is mainly embodied through students understanding, which is believed that students are the subjects of teaching. However, in the process of teaching, student s cognition is not isolated, but conducted by the teacher. As a result, students acquirement , choice and application in learning strategies are dominated by the teacher. The teacher may influence students formulation and adoption of learning strategies directly or indirectly. The direct influence refers to the teachers special or embedded learning strategies training inEnglish teaching. In terms of the teachers indirect influence, I mainly refer to the teachers teaching experience, teaching methods and teaching procedures, all of which may exert a subtle influence on the formulation of learners learning strategies. For example, an experienced teacher may have the following impacts on students acquirement and adoption of learning strategiesIn teaching practice, the teacher is good at recognizing important learning strategies, and clearly aware which strategies are crucial to students of different ages, which strategies are indispensable to different learning tasks. Therefore, the te acher is able to teach students the appropriate strategies effectively in the light of students characteristics of different ages and meet the needs of different learning tasks.The teacher is constantly trying to seek new learning strategies . With the in-depth of the theory research and summarization of pragmatic teaching experience, learning strategies have been creating and discovering accordingly. The experienced teacher has to seek and seek new learning strategies in the light of teaching requirements , also, the teacher will provide the students with new learning strategies so that they may master more learning strategies effectively.The teacher is adept in choosing the appropriate learning strategies materials and making the materials more relevant and typical, which will make the selected materials in accordance with the students cognitive characteristics and personality, fully reflect the learning strategies being trained and also arouse students learning interest.The teach er is adept in converting the so-called inherent requirements of the teaching contents into explicit ones. It means that the teacher will be able to teach the learning strategies vaguely and consciously.The teacher is able to install students awareness of learning and mastering learning strategies with the help of the outer teaching requirements at the right moment. Thats to say , when students are unconscious of the learning strategies, the teacher is able to stir their awareness efficiently when students are subconscious of the learning strategies, the teacher is able to promote them consciously and clearly. Little by little, the students will learn to improve their learning , summarize their own experience and assemble their learning strategies, which will undoubtedly help augment their learning efficiency.On the other hand, whether the teacher can adopt his teaching methods appropriately will also have an important impact on students formulation and adoption of learning strat egies. As its known to us that learning strategies , after all, are kind of implicit learning techniques, the teacher who can adopt appropriate teaching methods will be able to make the abstract.teaching contents more specific, more vivid and more illustrative.Lastly, its worth mentioning that when the teacher has a thoughtful understanding of the characteristics of the teaching procedures , he will teach students necessary learning strategies at the pivotal links and crucial periods. Similarly, in learningstrategies instruction and training, the teacher can adopt the elicitation method rather than cramming method . Then the students can draw interferences about other cases from one instance with the teachers unraveling at certain crucial moments.1.3.3.6 Other FactorsBesides the factors mentioned above, learners age also has a conspicuous influence upon students formulation and adoption of learning strategies. With the maturement of age, learners cognitive abilities will grow acco rdingly. As far as the learners are concerned, the periods can be divided into three periods pre-school period, primary-school period and high-school period. C On the basis of the actual circumstances, the thesis is mainly focused on the high -school period. Although learners cognitive abilities are growing rapidly, and their cognitive ways are being enriched gradually, without the teachers help and instruction , high school students still cant develop and adopt learning strategies spontaneously and systematically. In view of this fact, learning strategies instruction and training among high school students is quite necessary.Indeed, there may be different factors influencing students mastery and adoption of learning strategies. Therefore, in our learning strategies instruction and training, we should take the following factors into full consideration students learning motivation, personality, intelligence, learning styles, the teachers teaching methods and so on, because these stud ies will make our learning strategies instruction and training more directed, shorten students learning time and improve students learning efficiency.1992. (Vft.,12.44-4) *VtfAk44-ailVii M 385BibliographyEnglish ReferencesChamot, A. U. OMalley, J. M. et al .1994. The CALLA handbookImplementing the cognitive academic language learning approach.White Plains, NY Addison Wesley Longman.Chamot, A. U. OMalley, J. M. et al. 1994.Language learner and learning strategies In N. C. Ellis (Ed.), London academician.Chamot, A.U. .1993. Student responses to learning strategy instruction in the foreign language classroom. immaterial Language Annals, 26 308-321.Clouston, M. .1997. Language Leaning StrategiesAn Overview for Learning Strategy Teachers The network TESL Journal.Cohen, A. D. 1998 . Strategies in learning and using a second language. NY Addison Wesley Longman Limited.Ellis, R..2002. The Study of Second Language Acquisition.UK Oxford University Press.Flavell, J. H..1981. Cognitive mon itoring. In W. P. Dickson (Ed.),Childrens oral communication skills (pp. 35-60). New York Academic Press.Gardber,R.C. Lambert W.E.,1972.Attitudes and Motivation in Second Language Learning. Rowley Newburry House PublishersGriffiths, R..1991. Personality and Second Language Teachingtheory, research and practice. Singapore SEAMEO Regional Language CentreHall, Stephen. 1997. Language Learning Strategies from the ideals to classroomtasks. Language and Communication Division, Temasek polytechnicJones, B. A, Palincsar, D.Ogle and E,Carr. .1986 .Strategic teaching and learning Cognitive instruction in the content area. Alexandria.VA experience of Supervision and Curriculum DevelopmentKassin, Saul. M. 1998. Psychology (2 Edition) USA Prentice -Hall, IncNyikos, M. 1996. The conceptual shift to learner-centered classroomsIncreasing teacher and student strategic awareness.In R. L. Oxford (Ed.), Language earning strategies around the world Cross-cultural perspective (pp. 109-117). Honolulu U niversity of Hawaii Press.Malley, J. M. Chamot, A. U..1990. Learning strategies in second language acquisition. Cambridge Cambridge University Press.Oxford, R. L. (Ed.). 1999. Language Learning Strategie

Friday, March 29, 2019

Stupefying Symbolism In The Yellow Wallpaper English Literature Essay

Stupefying Symbolism In The Yellow wallpaper English Literature EssayIn Charlotte Perkins Gilmans short news report, The Yellow Wallpaper, the cashier, whose conjure up is non given, has been placed in the top of an old house in a expressive style of life with colour wallpaper. The fair sex had just undergone child pedigree and is going through a anxious(p) condition (Gilman 721). As the cleaning ladyhood stays in the manner, she becomes obsessed with the yellow wallpaper plastered to the walls of her room. inwardly the literal factors of the story, are attributes that show the underlying message of the story symbols such(prenominal) as the room, report in her nonebook, and the yellow wallpaper. The story, when simply demo, shows a woman slowly going psychopathologic, entirely when read critically, the commentator is able to probe a deeper signifi tummyce captured in the symbols that lie in the story.The room that the narrator is staying in is an detached on e at the top of the house, containing nonhing but a bed that is nailed to the floor and the yellow wallpaper that she trem leftoverously dislikes (724). The uninvolved room is her place to draw up when alone, though she sees that her husbands sister thinks it is the writing which make me sick (724). The writer might infer from the latter statement that the isolated room is a symbol of a safe-haven for the narrator. As the story displace to its closing, the narrator locks herself in the room from both her husband, John, and his sister, Jennie, calling to them that the key is defeat by the front door under a plantain foliation (731). She was attempting to finish peeling the wallpaper back to stand behind it and the room was her only when thing tutelage her family out (731). Though the narrator was insane by this time, the reader stool infer that by locking herself in the room and her family out, she felt safe there.The narrator writes in her nonebook end-to-end the story, k eeping it hidden from her family, and taking it out only when they leave the room (724). The notebook symbolizes a hint of stableness in, what seems to be, a deeply oppress life of the narrator. An example of said oppression is when the narrator writes, There comes John, and I must put this away,he hates to have me write a word. The narrator believes that the writing is not making her sick and proves so when she writes about Jennie, I verily believe she thinks it is the writing which made me sick But I can write when she is out, and see her a long way by from these windows (724). As the story draws to a close and the narrator has begun to end her writing sessions, she goes insane. The reader might draw the conclusion that her writing was the only thing that was keeping the narrator sane.The yellow wallpaper, which the narrator refers to as paper, symbolizes the repression of the narrator by her husband, and eventually, exemption from said repression (721). Throughout the story, th e narrator tells her audience of her dislike for the yellow wallpaper, describing the twist as repellent, almost revolting a smouldering unclean yellow, fishily faded by the slow-turning sunlight. It is a dull yet lurid chromatic in some places, a sickly sulphur tint in others (722). The narrator states that, when she asked him to repaper the room, John meant to repaper the room, but later onward he said that I was letting it get the better of me, and that nothing was worse for a nervous patient that to give way to such fancies. He said that after the wallpaper was changed it would be the heavy bedstead and consequently the barred windows, and then that gate at the head of the stairs, and so on (723). The reader can pull from the latter statement that John was only making up excuses. He knew that his wife was upset by the paper and still would not change it. The narrators statements, Ive got out at last and in spite of you and Jane. And Ive pulled off most of the paper, so you bank building put me back shows that the narrator has agnise that the wallpaper was a way her husband oppressed her from life, and by part it off the wall, was able to become free (731).Some might manage that the narrators room is not a symbol of a safe-haven, but the symbol of imprisonment. As for writing in her notebook, some might dispute that symbolizes rebellion, kind of of stableness. Others may consider that the yellow wallpaper symbolizes the narrators sanity, and not repression. Though the points verbalize are logical to an extent, there are grounds to take a different approach to the symbolism of said symbols. Those who believe that the narrators room is a symbol of imprisonment may see the room in this way because of the blandness of it, the fact that the bed is bolted to the floor, and the reality of the narrator not be permitted to leave the room. What said people need to see is that the room is not imprisoning the narrator, her husband is. The room symbolizes se curity for the narrator because, as stated previously, the room is the only thing giving the woman the occasion to write. Some believe that the narrator writing in her notebook symbolizes rebellion because she states, I did write for a while in spite of them, but what those people dampen to see is that she did not does (721). The narrator felt only love towards her family and knew that it bothered them to see her write, so, she only did so when they were out of the room. The notebook symbolizes stability because it is only while writing in the notebook that the reader sees that the narrator is sane. It is not until the reader begins to tell a story, rather than write down events, that she turns insane. As for the yellow wallpaper representing the narrators sanity, some may see that as the wallpaper gets removed from the wall, the narrators sanity gets ripped away with it. What said people do not comprehend is that the narrator is slowly removing years of oppression that her husban d placed on her. She states, in spite of you and Jane. And Ive pulled off most of the paper, so you cant put me back (731). The latter quote shows that the narrator realizes how oppressed she was by her husband and refuses to go back to being repressed by him.When read simply, The Yellow Wallpaper, portrays a woman who is slowly going insane, and by the end has a mental breakdown. After looking at the short story critically, one must notice the use of symbolism in the story. The sequester room that the narrator stays in symbolizes a sanctuary, giving the narrator time to write when her family is away. The narrator writing in her notebook symbolizes the stability in the narrators life that slowly deteriorates as the story draws to an end. Last, but not least, the horrid yellow wallpaper symbolized the oppression that the narrator undergoes from her husband, and when finally removed, the freedom. The symbols displayed in The Yellow Wallpaper give the story a stronger underlying mean ing, and to the narrator, by her audience, a sense that she was not completely insane, but a woman who found independence in something as ugly as yellow wallpaper.Work CitedGilman, Charlotte Perkins. The Yellow Wallpaper. Exploring Literature Writing and Arguing About Fiction, Poetry, Drama, and the Essay. coarse Madden. 4th ed. New York Pearson Longman, 2009. 496-501. Print.