Saturday, December 28, 2019
St. Valentines Day Massacre
Around 10:30 a.m. on St. Valentines Day, February 14, 1929, seven members of Bugs Morans gang were gunned down in cold blood in a garage in Chicago. The massacre, orchestrated by Al Capone, shocked the nation by its brutality. The St. Valentines Day Massacre remains the most notorious gangster killing of the Prohibition era. The massacre not only made Al Capone a national celebrity, but it also brought Capone, the unwanted attention of the federal government. The Dead Frank Gusenberg, Pete Gusenberg, John May, Albert Weinshank, James Clark, Adam Heyer, and Dr. Reinhart Schwimmer Rival Gangs: Capone vs. Moran During the Prohibition era, gangsters ruled many of the large cities, becoming rich from owning speakeasies, breweries, brothels, and gambling joints. These gangsters would carve up a city between rival gangs, bribe local officials, and become local celebrities. By the late 1920s, Chicago was split between two rival gangs: one led by Al Capone and the other by George Bugs Moran. Capone and Moran vied for power, prestige, and money; plus, both tried for years to kill each other. In early 1929, Al Capone was living in Miami with his family (to escape Chicagos brutal winter) when his associate Jack Machine Gun McGurn visited him. McGurn, who had recently survived an assassination attempt ordered by Moran, wanted to discuss the ongoing problem of Morans gang. In an attempt to eliminate the Moran gang entirely, Capone agreed to fund an assassination attempt, and McGurn was placed in charge of organizing it. The Plan McGurn planned carefully. He located the Moran gangs headquarters, which was in a large garage behind the offices of S.M.C. Cartage Company at 2122 North Clark Street. He selected gunmen from outside the Chicago area, to ensure that if there were any survivors, they would not be able to recognize the killers as part of Capones gang. McGurn hired lookouts and set them up in an apartment near the garage. Also essential to the plan, McGurn acquired a stolen police car and two police uniforms. Setting Up Moran With the plan organized and the killers hired, it was time to set the trap. McGurn instructed a local booze hijacker to contact Moran on February 13. The hijacker was to tell Moran that he had obtained a shipment of Old Log Cabin whiskey (i.e. very good liquor) that he was willing to sell at the very reasonable price of $57 per case. Moran quickly agreed and told the hijacker to meet him at the garage at 10:30 the following morning. The Ruse Worked On the morning of February 14, 1929, the lookouts (Harry and Phil Keywell) were watching carefully as the Moran gang assembled at the garage. Around 10:30 a.m., the lookouts recognized a man heading to the garage as Bugs Moran. The lookouts told the gunmen, who then climbed into the stolen police car. When the stolen police car reached the garage, the four gunmen (Fred Killer Burke, John Scalise, Albert Anselmi, and Joseph Lolordo) jumped out. (Some reports say there were five gunmen.) Two of the gunmen were dressed in police uniforms. When the gunmen rushed into the garage, the seven men inside saw the uniforms and thought it was a routine police raid. Continuing to believe the gunmen to be police officers, all seven men peacefully did as they were told. They lined up, faced the wall, and allowed the gunmen to remove their weapons. Opened Fire With Machine Guns The gunmen then opened fire, using two Tommy guns, a sawed-off shotgun, and a .45. The killing was fast and bloody. Each of the seven victims received at least 15 bullets, mostly in the head and torso. The gunmen then left the garage. As they exited, neighbors who had heard the rat-tat-tat of the submachine gun, looked out their windows and saw two (or three, depending on reports) policemen walking behind two men dressed in civilian clothes with their hands up. The neighbors assumed that the police had staged a raid and were arresting two men. After the massacre had been discovered, many continued to believe for several weeks that the police were responsible. Moran Escaped Harm Six of the victims died in the garage; Frank Gusenberg was taken to a hospital but died three hours later, refusing to name who was responsible. Though the plan had been carefully crafted, one major problem occurred. The man that the lookouts had identified as Moran was Albert Weinshank.Ã Bugs Moran, the main target for the assassination, was arriving a couple of minutes late to the 10:30 a.m. meeting when he noticed a police car outside the garage. Thinking it was a police raid, Moran stayed away from the building, unknowingly saving his life. The Blonde Alibi The massacre that took seven lives that St. Valentines Day in 1929 made newspaper headlines across the country. The country was shocked at the brutality of the killings. Police tried desperately to determine who was responsible. Al Capone had an air-tight alibi because he had been called in for questioning by the Dade County solicitor in Miami during the time of the massacre. Machine Gun McGurn had what became called a blonde alibi -- he had been at a hotel with his blonde girlfriend from 9 p.m. on February 13 through 3 p.m. on February 14.Ã Fred Burke (one of the gunmen) was arrested by police in March 1931 but was charged with the December 1929 murder of a police officer and sentenced to life in prison for that crime. The Aftermath of the St. Valentine's Day Massacre This was one of the first major crimes that the science of ballistics was used; however, no one was ever tried or convicted for the murders of the St. Valentines Day Massacre. Though the police never had enough evidence to convict Al Capone, the public knew he was responsible. In addition to making Capone a national celebrity, the St. Valentines Day Massacre brought Capone to the attention of the federal government. Ultimately, Capone was arrested for tax evasion in 1931 and sent to Alcatraz. With Capone in jail, Machine Gun McGurn was left exposed. On February 15, 1936, nearly seven years to the day of the St. Valentines Day Massacre, McGurn was gunned down at a bowling alley. Bugs Moran was quite shaken from the entire incident. He stayed in Chicago until the end of Prohibition and then was arrested in 1946 for some small-time bank robberies. He died in prison from lung cancer.
Friday, December 20, 2019
Extracurricular Activities And Academic Success - 1230 Words
Surveys show that around eighty percent of students participate in extracurricular activities. Participating in an extracurricular activity involves balance between the activity and academics while gaining positive impacts. Many people do not see or understand the importance of extracurricular activities. Critics might argue that extracurricular activities may harm student academic success, but what they do not realize is the benefits from extracurricular activities. The following argument started when the question was raised of how students were spending their leisure time and what they gained from their involvement. After school hours are the peak time for bad behaviors and crime for students. However, extracurricular activities provide a shelter for students for fun activities. Extracurricular activities contribute positively to student academic success by teaching responsibility, time management, and team building skills. Responsibility is a substantial skill developed from extra curricular activities that impact academic success. Responsibility promotes students to be held accountable for their actions. For example, students learn that they cannot always count on their parents. Students learn there will be times when they have to do things on their own and figure out life by themselves. Parents are not always going to be there by your side. Thankfully, extracurricular activities allow students to use responsible skills in and outside of school. Responsibility givesShow MoreRelatedThe Effect Of Extracurricular Activities On Academic Success1130 Words à |à 5 PagesChristine Lasagne Dr. Joseph Centamore EDL 502 ââ¬â APA March 23, 2017 The Effect of Extracurricular Activities on Academic Success Academic achievement can be influenced by a variety of factors. Studies have shown the link between extracurricular activities and improved attendance, behavior, and academic performance. As the director of student engagement, my role is to manage extracurricular and intramural athletics for the district. I work to develop and implement accessible programs and servicesRead MoreNo Pass No Play Rule1643 Words à |à 7 Pagesstandards for athletic participation. According to the state law, students must have a passing grade in each class during the grading period they are attempting to participate in the extracurricular activity in order to be eligible to participate. Although the state of Texas was the first to initiate the academic standards, most states quickly followed behind passing similar ââ¬Å"no pass / no playâ⬠rules. The passing of this law has created controversy since its inception. Many educators, lawmakersRead MoreBenefits And Costs Of Extracurricular Activi ties Essay826 Words à |à 4 Pagesparticipate in some type of extracurricular activities (Gardner, Roth and Brooks-Gunn, 2006). Extracurricular activities can include sports, journalism, drama or theater, art or music, youth groups, student council, and clubs. Today about one in four students participate in academics clubs (Miller Zittleman, 2012). Since extracurricular activities are so popular among students, it is important to understand the pros and cons of engaging in extracurricular activities. The purpose of this literatureRead MoreHow Extracurricular Activities Affect Children s Education1233 Words à |à 5 PagesGeneral Statement: A common misconception among adults is that extracurricular activities interfere with their childrenââ¬â¢s education and have no overall benefit, but recent research and studies beg to differ. Claim 1: Studentsââ¬â¢ should be engaged in extra-curricular activities because it instills in them valuable life skills and character traits needed for a successful future. Claim 2:Studentsââ¬â¢ should participate in extra-curricular activities as doing so would make it easier for them to get into the post-secondaryRead MoreCorrelation Between Extracurricular Activities And Grade Point Averages1350 Words à |à 6 Pagestrend of the relationship between extracurricular activities and grade point averages, historical perspectives will be explored. This chapter addresses why grade point averages have become so vital to studentsââ¬â¢ future success. Association among peer acceptance, positive behaviours, character building, and G.P.A. are also included. Finally, the proven benefits of curricular activities found in recent studies will be described. 2.0.1. LITERATURE REVIEW. Academics are an important part of each studentââ¬â¢sRead MoreExtracurricular Activity Aiding Positive Development1501 Words à |à 7 PagesBettering Studentsââ¬â¢ Lives: Extracurricular Activity Aiding in Positive Development More than half of American teenagers that attend school participate in some sort of organized activity (Gardner, Roth Brooks-Gunn, 2006). A structured organized activity may include athletic teams, school clubs and organizations like student council or drama club, youth groups, and more. Psychologists are becoming more and more interested in how adolescents are spending their leisure time and how it affects theirRead MoreRelationships Between 5 After School Activities And Academic Achievement Essay776 Words à |à 4 PagesAfter-School Activities and Academic Achievementâ⬠Psych 103 Prof. Cornelia Rea October 22, 2016 Logan Roberts The article ââ¬Å"Relationships Between Five After-School Activities and Academic Achievementâ⬠by Harris Cooper, Jeffery C. Valentine, James Lindsay, and Barbara Nye, was published in the Journal of Educational Psychology in 1999, and it delves into how various after-school activities impact academic performance. Specifically, the study researched how homework, extracurriculars, employmentRead MoreDetermining The Relationship Between Extracurricular Activities And Academic Performance Using Computational Intelligence813 Words à |à 4 PagesDetermining relationship between Extracurricular Activities and Academic Performance using Computational Intelligence Tejaswini Koduri Department of Computer Science, Georgia State University tkoduri11@gsu.student.edu Abstract- Elementary school is the medium for the students to step into the professional field.The knowledge can achieved from curriculum by following it.But the hands on experience on the subject can be gained only through the extracurricular activities. So, students should take someRead MoreCollege Is Not Just About Receiving Good Grades842 Words à |à 4 Pagesstudents to get involved in student support programs and extracurricular activities such as internships, community involvement and leaderships. The reason why it s important for students to get involved is so they can apply what they learn in the classroom into practice, gain social skills, develop leadership skills and learn time management skills. Moreover, what make it more respected is the skills gained from extracurricular activities and student support programs such as networking, mentorshipsRead MoreA Research Study On Curricular Activities1253 Words à |à 6 PagesBackground of the problem. Many parents and students do not understand the importance of extracurricular activities. Parents hesitate to allow their children participate in extra-curricular activities because they feel that these activities distract their offspring from their academic work. This scenario tends to unfold either when a student is struggling academically or when the student wants to focus totally on academics to the exclusion of everything else. They feel that extra-curricular involvement
Thursday, December 12, 2019
Managing Technological Catastrophic Risks - Free Samples to Students
Question: Discuss about the Managing Technological Catastrophic Risks. Answer: Introduction Victorian Protective Data Security Framework (VPDSF) is the security scheme that has been prepared by the Victorian Government. The aim of the framework is the management of security risks and concerns that are identified in the operations and activities associated with the public sector units. There are three elements to security that are present in VPDSF that is security standards protocols, assurance model along with the supporting references and guides. The framework that has been defined for the Victorian Government addresses these security risks. A clear picture of the probable security events is required for the development of the measures to prevent and control the risks. Many information and data security risks may take place in the public sector agencies and organizations that are linked with and are operated by the Victorian Government. Some of these risks may have an extremely damaging impact and two of such risk categories include insider attacks and availability attacks. The members and employees of the public sector units will have added privileges to access the public and personal information of the agencies and organizations. These privileges may be used in a malicious manner to expose the information to the unauthorized entities to gain personal advantage. Also, the malevolent entities may flood the system with unwanted network traffic to disrupt the continuity of the applications and the services (Cpdp, 2016). Information breaches and leakage of the information may occur in association with the data and information sets. There may also be violation of the information integrity by altering the destination address or the contents of the information sets. These attacks will include the network access points as the threat agent. These attacks may occur in association with the information in-motion. Exposure of the Risk - Medium-Low There are some of the extremely severe impacts that may result with the occurrence of a security attack. These impacts may give rise to the other forms of the risks and threats that may be required to be dealt with. Some of the data security risks may result in legal obligations or the risks revolving around non-compliance of the regulatory policies. The likelihood of such events is not very high and these have been therefore been put in this category. Many of the data security risks may come up due to the operational error or a technical fault resulted due to the negligence or mistake of the operator or the employee. These events may lead to the exposure of information in front of the unauthorized entities. There may also be occurrences wherein the damage may not be reversible in nature. The likelihood and the degree of impact associated with these issues are low (Moreau, 2001). The data and information security risks that may occur in the VIC Government and the public sector units governed by the Government are abundant in number. The nature of these risks may differ from one another that will determine the degree of impact that will be caused by the occurrence of the risk. These risks can be categorized in two different categories on the basis of the motive that is involved behind the same. Deliberate Threats Accidental Threats The motive of the attacker that is involved behind the execution of these threats and attacks is completely malicious in order to cause negative impact on the party attacked. The motive of the attacker is not negative or selfish in this case as these are the forms of the threats that are caused without any malicious intent. These are primarily a result of the unintended move that may cause damage. These threats may have a vanishing damage as the primary motive of the attacker in this case is to cause damage. The impact in this case may vary. These can have low, medium, high or critical impact which is usually negative (Kadam, 2007). Attackers plan these threats in advance and there are specific time-intervals that are determined to trigger these attacks These are not planned in advance and can occur at any time or at any moment. Threats on the availability of the information and services are usually deliberate in nature. These may include all form of flooding attacks. Threats carried out with network as the threat agent are included in this category Malware attacks Leakage of the information due to the exposure of authorized information in front of the unauthorized users due to an error or a mistake. Breaching of information or the loss of data There is one form of attack that may be deliberate as well as accidental in nature depending upon the situation. Insider threats are the attacks that are carried out with employees of an organization as the threat agents. These employees may cause a threat due to selfish motives. Insider threats are the attacks that are carried out with employees of an organization as the threat agents. These employees may cause a threat due to an error or a mistake that may not be known in advance. Organizations and business units have developed and implemented the security standards and policies to ensure that the deliberate and accidental threats are targeted. There are also measures that VIC Government may use and apply to put a check on both forms of the attacks. Department of Homeland security made an analysis of the possible deliberate and accidental threat events that may occur. The mitigation strategies and associated decisions were taken to target and deal with both of these threat categories. The nature of impact and the degree of damage was found to be more severe in case of deliberate threats in comparison with the accidental events to security. The first step that the department carried out was risk and threat analysis and the account of the organizational practices. There were many gaps and loopholes that were discovered. There were many automated tools and applications that were implemented to fight against the attacks. The human resources were also provided with the skills and trainings to put a check on the deliberate attacks. VIC Government can also refer to the same approach and take a phased approach to prevent and mitigate the deliberate and accidental threats to security (Sei, 2013). Security/Risk Management Execution Possible Challenges and Issues There are various methodologies and processes that may be adopted by VIC Government to deal with the security risks and attacks. The process of strategy implementation and decision making in terms of design and development of the methods may be done internally or externally. The internal method may involve the in-house development of the security protocols and processes which shall then be implemented across the entire infrastructure. The process will be extremely cost-effective in nature as the resource utilization that will be done will be on an internal basis. There might a few challenges that VIC Government may have to face in association with the internal methods as suggested above. The internal employees may not have an adequate combination of the necessary skills and knowledge to accurately develop the necessary tools. The process of design and development of the mechanisms internally will provide the internal employees with a complete knowledge of the security processes. This may be used in a malevolent manner. There may be technical issues and operational challenges that may be observed in the process of migration. The second method that may be used and applied may be outsourcing of the development activities and processes. This method will be external to the VIC Government and there will the third-parties that will be assigned with the tasks of development and design processes. This method will have its own set of challenges and issues. In terms of cost, this process will score higher than the internal method explained earlier (Taylor, 2015). The end-result may not be in complete adherence with the requirements and specifications. The third-parties may demand access to the production data for the execution of the testing activities. It will put the privacy of the data at risk. There will be many changes that will be introduced in any of the two processes. These changes will be a challenge in itself. The entities associated with the public sector units under the VIC Government will have to manage and understand all of these changes. Adaptability to these changes will be necessary to make sure that the smooth functioning of the operations is maintained. Comparison of Risks and Uncertainties Risk is defined as an occurrence that can be predicted and controlled and is usually associated with the negative impacts and outcomes for the parties that are targeted. In case of the VIC Government, the primary risks that are present are in the form of information security risks. These risks may impact the availability, integrity and confidentiality of the information. The impact that may result out from the risks on the VIC Government may be low, medium, high or critical in nature. Some of these risks may have an extremely damaging impact and two of such risk categories include insider attacks and availability attacks. The members and employees of the public sector units will have added privileges to access the public and personal information of the agencies and organizations. These privileges may be used in a malicious manner to expose the information to the unauthorized entities to gain personal advantage. There may also be violation of the information integrity by altering the destination address or the contents of the information sets. Some of the data security risks may result in legal obligations or the risks revolving around non-compliance of the regulatory policies. These events may lead to the exposure of information in front of the unauthorized entities. There may also be occurrences wherein the damage may not be reversible in nature. Th e likelihood and the degree of impact associated with these issues are low (Kumar, 2013). Uncertainties are defined as the events that cannot be predicted and therefore it is difficult to develop the control measures for these events. The uncertainties that are associated with the VIC Government can include the modification on the regulatory and legal policies that are put in action by the Government. The policies around data privacy, Intellectual property and information security may be updated by the Victorian Government. There are also many of the security models and security standards that have been developed to make sure that the security of the information is maintained in the organizations. However, with such unpredictable scenarios, these models and standards will turn invalid. There will be transformations that will be required to be made so that the new sets of policies and controls may be applied. Risk Control and Mitigation Many different approaches can be put in to action to prevent, detect, control and mitigate the security risks and concerns. The overall structure of security can be put in to action if it is backed by a strong administrative control. There are developments that are required to be made in this area at regular intervals to ensure that the security risks and attacks do not take place. These administrative controls must match with the latest security strategies and the enforcement of the same shall be monitored. In case of the VIC Government, the approach will determine the correctness and validity of the security policies that are applied across the agencies and organizations under the public sector. It shall be ensured that the team of reviewers, auditors and inspectors are provided with the set of latest tools and equipment for easier execution of the processes. There are also technical steps that the VIC Government may take for the improvements in the security status and the management of the overall security infrastructure. There are many technical applications and tools that are available in the market that can be purchases and installed in the organizations across the entire public sector. These tools may also be outsourced for development as per the specific policies of the organizations and agencies. The information categories such as public data and private data will be protected with this approach. Also, the trust and engagement of the customers will also improve. There are many flooding and malware attacks that are on the higher side of the probability which will be reduced with the aid of the technical methods (Rashvand, 2010). The development in the technical framework will also cause the enhancement of the security architecture and the integration of all the units with each other. Physical Security Approach There are various units that are associated with the public sector agencies and organizations that need to be safeguarded. Such units include the data centres, databases, server rooms, workstations etc. The administrative and technical approach towards security can add to the advanced methods to protect and safeguard the overall security of the information. However, the basic step towards security will be provided only with the aid of the physical security measures. The physical security approach will provide the required control and mitigation in association with the risks and attacks. The entry and exit doors of all the units shall be equipped with physical security measures for keeping a track of the people making the access and intruders (Godlove, 2012). The security approach that is recommended to be used for risk mitigation in the VIC Government is the implementation of the technical approach amalgamated with the physical and administrative approach. Conclusion VIC Government is an entity that is composed of numerous components and entities. These components include the agencies and organizations along with their specific data bases, data centres, workstations, server rooms, warehouses etc. Every such unit has a lot of information and data associated with it. Also, the information sets that are associated with a specific agency are also huge in number. There are information and data related security risks that may take place in relation with the public sector units under the VIC Government. It is of utmost importance to make sure that there are countermeasures and mitigation strategies developed and implemented for the avoidance and prevention of the security risks and issues (Leszczyna, 2011). The approach that has been recommended for the purpose is the implementation of the technical approach. However, it shall be combined along with the physical security and administrative controls. There are various elements of technology that may be used and applied to deal with the security risks and attacks. One of such elements is the Big Data tools for security. These tools have the capability to perform the analytics on the risks and security occurrences that have taken place in the past. This will provide the strategies and mechanisms to develop for the avoidance and control of the risks (Early, 2015). Also, these tools will efficiently manage the information and data sets that will be associated with the public sector units under the VIC Government. In such a manner, the overall state of security will be strengthened and there will be lesser occurrences of data security risks and attacks. References Cpdp. (2016). Victorian Protective Data Security Framework. Retrieved 25 August 2017, from https://www.cpdp.vic.gov.au/images/content/pdf/data_security/20160628%20VPDSF%20Framework%20June%202016%20v1.0.pdf Early, G. (2015). Preemptive Security Through Information Analytics. Information Security Journal: A Global Perspective, 24(1-3), 48-56. https://dx.doi.org/10.1080/19393555.2015.1042600 Godlove, T. (2012). Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines. Information Security Journal: A Global Perspective, 21(4), 216-229. https://dx.doi.org/10.1080/19393555.2012.668747 Kadam, A. (2007). Information Security Policy Development and Implementation. Information Systems Security, 16(5), 246-256. https://dx.doi.org/10.1080/10658980701744861 Kumar, M. (2013). An exploration of risk management in global industrial investment. Risk Management, 15(4), 272-300. https://dx.doi.org/10.1057/rm.2013.8 Leszczyna, R. (2011). Approach to security assessment of critical infrastructures information systems. IET Information Security, 5(3), 135. https://dx.doi.org/10.1049/iet-ifs.2010.0261 Moreau, F. (2001). Managing technological catastrophic risks. Risk Decision And Policy, 6(1), 17-32. https://dx.doi.org/10.1017/s1357530901000242 Rashvand, H. (2010). Editorial: Multi-agent distributed information security. IET Information Security, 4(4), 185. https://dx.doi.org/10.1049/iet-ifs.2010.9128 Sei. (2013). Unintentional Insider Threats: A Foundational Study. Retrieved 25 August 2017, from https://www.sei.cmu.edu/reports/13tn022.pdf Taylor, R. (2015). Potential Problems with Information Security Risk Assessments. Information Security Journal: A Global Perspective, 24(4-6), 177-184. https://dx.doi.org/10.1080/19393555.2015.1092620
Wednesday, December 4, 2019
Research Methods
Question: Explain Research Methods. Answer: I am a research scholar pursuing a Ph.D degree. I feel that my course of study while pursuing the Ph.D degree would help me approach a research problem in an efficient manner. Firstly, my Ph.D degree course helps me to choose a suitable topic for doing the research. Sometimes people get confused to select the right research topic of their choice. My degree course provides different strategies for selecting a suitable and exciting topic for the research. There is no fixed algorithm or formula for selecting an appropriate research topic. The selection of the research topic depends on the persons imagination and skills. The skills and imaginations of Paul Samuelson have made him a prominent name as a scientist in the field of Economics (Bryman Bell, 2015). My Ph.D degree course generates excitement in my mind to conduct the research. The degree course gives me a proper idea of framing the research questions in an appropriate manner. My course of learning gives me the idea about the components of a good research paper. My degree course guides me to approach the research questions in the right way. Hence, I can get a clear idea about the way of answering the research questions. My degree course helps me to highlight the significance of the research topic. In my PH.D degree course I have learnt how to challenge or develop the literature on the research topic that I can find in different sources. The above discussion gives us a clear idea about how the Ph.D degree course can help people approach the research problem with deft hands (Collis Hussey, 2013). I firmly believe that the Ph.D degree course that I am pursuing would influence my decisions about the research design and approach. By undertaking the Ph.D degree course, I have a clear idea about the way I would approach my research. I would frame the design of my research in the most appropriate manner. My research design would include the following steps: Selecting the research topic: First, I would select a suitable topic of my study. The topic would be something associated with the society or environment or business. Literature review: Secondly, I would review the literature available on the topic from different sources. The literature review provides a clear idea of the research topic. Data collection and analysis: The next step in my research would be to collect relevant data on the topic. The data may be qualitative or quantitative in nature depending on the chosen topic of the research. Then I would analyse the data that I have collected. I may perform qualitative or quantitative analysis of the data. Reporting and conclusion: Finally, I would present the findings of my research in a proper manner (Denscombe, 2014). My Ph.D degree course guides me through all these steps of framing the design of the research. My course of study helps in building up of a frame of mind that can think critically. My degree course also allows me to analyse the situation with critical thinking approach. The Ph.D course would help me decide in each and every step of the research process. The research works of famous scientist Ken Arrow shows how he invented and discovered new branches of Economics (Fink, 2013). I believe that my Ph.D degree would influence my research methodology and design in a positive way. While taking the course, the first thing that I realised is that the Ph.D degree course is not the continuation of the undergraduate degree course. In the undergraduate degree course, a student has to complete a set of assignments that his professor allots to him. In the Ph.D degree course, the scholar has to develop original and significant research paper. The research work of the Ph.D scholar would reflect the area of the expertise of the researcher. The Ph.D degree course helps me develop a deep and broad base of knowledge that would help me conduct the research process (Gray, 2013). In the Ph.D degree program, no one will judge me on the basis of my grades. In the Ph.D programme, my innovative and creative mind would help me sail through the research process. The Ph.D program is designed to help the students produce unique research papers that would reflect their innovative and analytical skills. Hence, the research degree course would help me in completing every step of the research process. The Ph.D degree would help me in selecting a suitable research topic and frame the most appropriate research questions. The course structure would help me develop an inquisitive mind. This would help me to go through the various literatures available on my topic. I would be able to successfully extract the desired information from those literatures by creating a review on them. Finally, the Ph.D degree would help me analyse the data in a critical way. My course also teaches me to report the findings of my research in a presentable manner. The works of the famous scientist A lain Aspect in the Quantum theory reflects his innovative and inquisitive mind (Heppner, et al., 2015). The final aspect that I want to discuss here is that the Ph.D program would make me a better mixed researcher. Mixed researcher is a person who can handle both qualitative and quantitative analysis of data efficiently. My Ph.D course would help me perform statistical analysis of the quantitative data. My course requires me to acquire proper knowledge of the statistical software like R, SPSS, STATA to analyse the data (Gray, 2013). My course gives a proper understanding and knowledge of the subject. I can handle the quantitative data in a more precise and accurate manner. My degree course requires me to interview many subjects to extract data from them. My course gives me confidence to interview the people with the help of questionnaire. My Ph.D degree course also makes me efficient in adopting different qualitative analysis techniques of data analysis. The course gives me a proper understanding of the different scaling structures on which the qualitative data needs to be analysed. There are other psychological tests that would help to understand the psychology of the respondents. My Ph.D degree would give me a clear idea of all these aspects. Hence, after finishing the course for getting the Ph.D degree, I would consider myself to be an efficient researcher who can handle both qualitative and quantitative analysis of data. Allen Bard is a famous scientist who has contributed in the field of Electrochemistry (Collis Hussey, 2013). His works inspires me to become a mixed researcher in my field of study. References: Bryman, A., Bell, E. (2015).Business research methods. Oxford University Press, USA. Collis, J., Hussey, R. (2013).Business research: A practical guide for undergraduate and postgraduate students. Palgrave macmillan. Denscombe, M. (2014).The good research guide: for small-scale social research projects. McGraw-Hill Education (UK). Fink, A. (2013).Conducting Research Literature Reviews: From the Internet to Paper: From the Internet to Paper. Sage Publications. Gray, D. E. (2013).Doing research in the real world. Sage. Heppner, P., Wampold, B., Owen, J., Thompson, M., Wang, K. (2015).Research design in counseling. Cengage Learning.
Subscribe to:
Posts (Atom)