Free Essay

Foundation of It

In:

Submitted By julydyu
Words 2429
Pages 10
Table of Contents
Abstract……………………………………………………………………………………………3
Introduction………………………………………………………………………….…………….3
Background……………………………………………………………………………….……….4
Recommendation………………………………………………………………………….………5
Counter Measures to Wireless Insecurity……………………………………………………….6-7
Discussion…………………………………………………………………………..……………..7
Conclusion……………………………………………………………………………..………..8-9
Bibliography……………………………………………………………………………………..10

Abstract
End of the twentieth century and the beginning of twenty-first century has marked a great advancing period in technological world, especially Internet. Internet has allowed users around the world to communicate with each other very quick and fast. And with the development of Wi-Fi, these communication methods have been even more available. But Wi-Fi also brings its disadvantages with it since potential hackers can access the network faster than wired networks. In this research paper, our team has put forward a goal to observe and find information about the communications ways through the internet and how to improve the security of a wireless network. During our research our team members carefully researched and practiced all those communication methods. Our goal was to evaluate the best ways of communication. Our team members have also learned the threats that could affect Wi-Fi. Our next goal was to prevent all of those threats, to find security measures and evaluate which security measure would work the best. In order to experiment the Wi-Fi and its security we have taken a hotel in Djizak City, Afrosiyob Hotel, which has been opened in July, 2012 and does not have Wi-Fi system. We will implement a Wi-Fi network and we will suggest security measures for the network and propose our plan to the owner, Mr. Jahon Isakov.
Introduction
Since the invention of Internet, it has had numerous uses, from data analysis to communication, from entertainment to education and so on. This proves the importance of internet in today’s world. As technology is ever developing thing, there was no doubt that we would eventually move on from wired networks to wireless ones. Wi-Fi, short for Wireless Fidelity has emerged into our lives and now Wi-Fi hot spots became the first thing we need to know if they have it in restaurants or not. Wirelessly connecting to internet has given us the opportunity to be connected to the internet all the time everywhere. Internet’s most useful side is that it allows users to communicate. Of course there are various methods of communication over the Internet and each person chooses the best fit one for themselves. Each communication method has its own use and has weaknesses too.

With Wi-Fi becoming available in a lot of places and even homes and businesses, restaurants, to secure the wireless network has posed problems to many network users and owners. With various ways of breaking in into a network being developed by hackers, one would have to take few steps to insure the security of a network. The types of threats vary, thus types of security measures have to be used differently. Our potential client, Mr. JahonIsakov of Afrosiyob Hotel will be notified of our project plan and our suggestion, leading to his decision.
Background
We know that Internet has become an important part of our life. We use internet to communicate with friends abroad, to leave comments on their photos, statuses, we use internet to read news, watch movies, and listen to music. Internet’s number one use is it being a great communication tool that has connected billions of people around the world. In present day, internet has broadened our way of thinking to the next level with communication tools such as e-mail, instant chat, video conferencing and web pages. Internet was first developed as a communication tool for United States Army but soon became available to the whole world(Internet, 2012). Since its being made available to public Internet has given us so much, take for example one of the things we can do on Internet. E-mail, Chat or Video Call. A user can log in and see which of his friends or relatives or acquaintances are online and send them messages, talk with them via online phone call or even video talk with them. Also it allows employees in a workplace to talk and discuss matters online without getting up from their seats and going to each other’s offices.
Wireless LANS has made it easy for us to connect to the Internet and communicate, search information and do business even in remote areas. But as everything has its downsides, Wi-Fi is no exception. If wired LANS were a little bit easier to secure since all the cables are physically present and you can control them, wireless networks have no cables thus harder to secure. Wi-Fi faces many threats and improving the security of a wireless network has become the hot topic of today’s technological world.
There are different types of threats to a wireless network, including passive and active attacks. Just to state some of them; Clear Text Traffic which is the basic method for hackers to find out the information, it happens when the message you are trying to send is not encrypted, thus hacker can sniff out your information through data analysis. Next threat is the hacker attacking from a protocol level. In this case a hacker can send out authenticate message to a wireless network use and can disconnect the user from a network. In this case, a network owner may face denial of service and cannot log into his or her own network. The server might have to be reloaded or the password changed.
Afrosiyob Hotel is located in HalqlarDustligi 27, Djizak City, Djizak Region, Uzbekistan. It has been opened in July 2012 and is the first four star hotel in Djizak. However it does not possess Wi-Fi spot and guests were complaining about it. Thus the owner wanted special team to come up with the plan to set up a Wi-Fi system and to make sure that the network will be secure once the wireless network is on. Thus our team has conducted a research on available wireless network providers and the security measures that Afrosiyob manager needs to take in order to prevent from unauthorized access to the network

Recommendation
As we have given examples of ways of communication, it is time to briefly list out some details about these methods. First and easiest form of internet communication is e-mail. This was the first type of communication used since the internet was invented. Once a user would like to send a message to a recipient, he or she would have to type in the message and send it to the relevant mail address and the message will be delivered electronically in minutes of not seconds. If in the first decades it was not possible for you to view your e-mails from any computer, it has become possible with web based e-mails and companies like Microsoft, Yahoo and G-mail are ahead of this game with their free web based e-mail. These companies offer free mail, because they allow advertisers to promote their products and services. If in the beginning only text could be sent by e-mail, now user can attach files and media files to an e-mail and easily send it.
Next communication tool is chatting. This method allows you to have real time, live conversation with another user on a network or online. Chatting can be between two people or between a group of people. With so many chat services available on the internet, a user can download any of these web browsers and chat with their peers. Nowadays, users can actually chat on the web browser itself. In these chat services one can have private chat with a friend or be included in a chat room that is categorized by the hobbies of users like cars, medicine, technology and any other topics a person could imagine. Chatting is not only used by individuals but also at workplaces where employees can discuss work matters.
Internet’s evolution has also brought us video conferencing. You can actually video chat with a person as long as you and the person you are video chatting with have a web cam and a head set with a microphone. While some providers offer this communication method for free, others have monthly subscription fees. Video chat’s main advantage is that users can see each other while speaking, which telephone service lacks.

Current counter measures to Wireless in security 1. Changing the SSID. A wireless STA uses the SSID to find and connect to the wireless network. Since the ways to hide that from an authorized user, the only possible thing you can do is changing SSID so the potential hacker doesn’t make immediate association to your home or company.(Bahadur) 2. Configuring the AP correctly. After changing the SSID, you have to change the default password and SNMP community sting and at the end make sure that all the management interfaces are closed down properly. 3. Do not depend on WEP. Using substitute for WEP such as IPSec, VPN, SSH user can insure that once WEP is broken the hacker will face other obstacles to break into the network 4. Adopting another authorization mechanism. If a user uses 801.1 xs, VPN or certificates to authorize the wireless network users, then hacking in will become harder .This strengthens the security of a wireless network. 5. Segmenting the wireless network. A firewall or similar tools have to be installed in between the AP and the corporate intranet. This method insures that if the hacker broke into network damage is prevented. 6. Preventing physical access. A network owner can use directional antennas on your APS to restrict the directions of the signal.(Chris Weber, 2006)

Discussion
As we have mentioned all the methods of communication over the Internet, individual or a business may prefer one or the other. E-mail is of course the most preferred way of communication by businesses. Employees can send official letters, memos through the Internet. But instant messaging is more preferred by individuals as it allows users to talk fast in real-time. Video calls can be used as an efficient method for international business. Partners around the world can discuss business matter over video call services like Skype.
Security measures we have discussed are all advised by many IT professionals and they work best if they are administered in a proper way and proper place. The first measure that we have mentioned, which is changing the SSID is the most simple way to secure your network since any typical user can do it. If the SSID is changed the potential hacker will not know the network’s name and the password to it. But this method is the most simple, that’s why the easiest to cheat. Hackers have special programs that they use to find the SSID name and they can connect to the network. Next method, configuring the AP is done properly it will secure the network further, thus making it harder for hackers to break in. next method, installing a firewall between the corporate intranet and the AP is another method to secure the wireless network and when hackers will try to break in they will have trouble with it. All these mentioned methods have their own use. If a network owner uses them all with each other and together, the network will be fully secured.
These methods will be used in Afrisoyob Hotel in Djizak, and all the security measures will be used together. As Djizak is developing city in Central Uzbekistan, there are a lot of computer owners who have skills and knowledge in connecting to networks. Thus if security measures are not taken then unauthorized users will be able to connect to the wireless network of the hotel and download illegal material or eat up too much traffic. To avoid additional charges and to not get into legal trouble these security measures have to be taken. (Isakov, 2012)

Conclusion
During our research our team has fully inspected the possibilities of Internet, we have researched all of the methods of communication over the network, we have established that wireless network has more flaws in its security than wired LANS, and we have listed the threats and the ways to secure the wireless network. Our team has decided that if a business would need a communication tool between its employees than the best method is instant messaging. If management wants to send out official letters and memos to its employees, or individuals would like to send messages to each other then e-mail is the best option. If corporates and companies want to have discussions and meeting with each other without the hassles of flying and travelling then free or charged video calling systems are the best method.
In terms of wireless network security, the methods we have mentioned above have carefully been inspected and used by our team members, and we fully recommend all those methods to be used together. The reason for that is, all those methods have their flaws if used alone.
After our suggestion plan to the hotel owner, Mr. Isakov carefully looked through our plan and has agreed to set up a Wi-Fi system with TPS Internet Provider. He will implement all of the security measures we have suggested.

Bibliography
McAfee Wireless Home Network Security. (2005). Retrieved October 15, 2012, from McAfee Inc,: http://download.mcafee.com/products/manuals/en-us/MWL Datasheet 2006.pdf
Methods to Communicate over the Internet. (2011). Retrieved October 20, 2012, from CIEC: http://ciec.org/trial/complaints/facts3.html
Internet. (2012). Retrieved October 21, 2012, from Wikipedia: en.wikipedia.org/wiki/Internet
Bahadur, G. (n.d.). Windows XP Professional Security . McGraw-Hill.
Chris Weber, B. (2006). Wireless Networking Security .
Isakov, M. J. (2012, October 18). Setting up Wi-Fi in Afrosiyob Hotel. (K. Kholmatova, Interviewer)
PCMAG. (1981-2012). Definition of: 802.11n. Retrieved October 24, 2012, from PC Magazine: http://www.pcmag.com/encyclopedia_term/0,1237,t=80211n&i=37213,00.asp
Pinola, M. (n.d.). What is WEP. Retrieved October 21, 2012, from Mobile Office Technology: http://mobileoffice.about.com/od/glossary/g/wep.htm
Rao, B., & Parikh, M. A. (Fall, 2003). Wireless Broadband Networks: The U.S. Experience. International Journal of Electronic Commerce, 37-53.
Upadhyay, K., Mishra , D., & Shrivastava, R. (2011, May 11). Review of Wap 1.0 And Wap 2.0 Protocol For Wireless Communication. Retrieved October 20, 2012, from Pioneer Journal: http://pioneerjournal.in/conferences/tech-knowledge/12th-national-conference/3632-review-of-wap-1-0-and-wap-2-0-protocol-for-wireless-communication.html

Similar Documents

Free Essay

Foundations

...Foundations Brigham Young University–Idaho 2013-2014 This is an exciting time to be associated with Brigham Young University-Idaho as it continues on a steady, upward course of academic innovation. Dedicated administrators and faculty members are continually working to prepare students to be well educated academically as well as spiritually. One of the university’s academic developments is our general education program called Foundations. Just as the name suggests, Foundations is designed to provide a strong base for the rest of your university experience and throughout your life. Foundations presents a focused approach to general education, allowing students to explore specific aspects of diverse subjects, delving deep into each topic. The courses are interdisciplinary and have been created through countless hours of faculty collaboration to provide you with the most effective learning outcomes. Foundations courses are divided into five groups: Eternal Truths, Academic Fundamentals, Science, Cultural Awareness, and Connections. While some courses are required, others are left to personal preference. You will be blessed as you enter these inspired classes with an open mind and willing heart. I invite you to carefully review the Foundations courses available and determine which classes will benefit you most. I wish you success in this and every other endeavor here at BYU-Idaho. Best regards, Kim B. Clark President, Brigham Young University-Idaho 47 Foundations Brigham...

Words: 7055 - Pages: 29

Premium Essay

Foundation

...This was my first footstep of starting my degree life. First day of attending the Foundation of Business course, the feeling of tension filled me up. The main reason was because I have to adapt the new course and environment. This course is taught by Ms. Khor Siu Gek, an approachable and friendly lecturer. When I first glance over the module guide, this is quite a different course since it contains 100% coursework mark. In the first lecture class, Ms. Khor explained about what we are going to do throughout this course. The 100% coursework mark is divided into four categories which are portfolio, group project, essay on a given assignment and attendance. We need to provide evidence such as draft, notes and pictures as a proof to show the accomplishment of learning process. Some activities will be carried out in every tutorial class to ensure that students are participating in classes. Then, we need to express our feeling and provide relevant theories learnt in the reflective report weekly. This is to improve our learning skills, communication skills, time management skills and critical thinking skills. I can still remember clearly that Ms. Khor had made the introduction part became very interesting. She gave us a roll of toilet paper and asked us to take how many pieces we wanted to take. I felt nervous because I did not know what activities would be carried out. Finally, I took a piece of toilet paper. After that, she asked us to tell our secret according to the number of...

Words: 411 - Pages: 2

Premium Essay

Foundations

...Foundations Paper Holly Regan HSM/260 May 9, 2014 Greg O'Donnell Foundations Paper The Robert Wood Johnson Foundation was established in 1972 with a mission that focused on making basic healthcare available and affordable to everyone. The Robert Wood Johnson Foundation is this nation’s largest health care related charitable organization with clear objectives which are directly focused on only health care issues and ways to transform and improve the overall health of every American. This foundation supports Universities, public agencies and charities which fall under the tax exempt sec. 501(c)(3) of the internal revenue code . The type of projects the foundation supports are related to higher education, hospitals and institutes specific to certain research. The foundation gives support by giving out around 1,000 grants annually that range in total from hundreds of thousands to millions of dollars. The foundation provides a list of all the grants which applicants can apply on an annual basis. The applicants can also apply for multiple grants at one time, but only if they are specific to separate and entirely different projects. The amount of time you must wait before getting any word on a grant being awarded could be as long as four to seven months. Clinical Scholars is one of the most successful of the foundations programs. The program provides young physicians an opportunity to study non-clinical topics such as management or economics. This program gives each...

Words: 828 - Pages: 4

Free Essay

Foundations

...I choose to write my foundations paper on an organization that is based in my area that I live in, and although it is in my area it is not just a local organization but one that actually has the ability to span across the nation with support from local companies, as well as government agencies. The organization with which I am speaking is the Freestore Foodbank. I will go into the details of the non-profit organization in further detail in this paper. The Freestore began in 1971 by a man named Frank Gerson who worked in Cincinnati’s incinerator. He saw that there was too many household items that were being wasted when there were so many in his community that needed help. So this man quit his job, and started the non-profit business out of his apartment. By 1979 it had grown too big for his little apartment to handle, so he decided to get a warehouse to handle the sorting, and distribution of the food items for his community. Also at this time the Freestore became a founding member of Feeding America, which helped the organization evolve into the Freestore Foodbank. Today the Freestore is one of over 200 foodbanks within the Feeding America networks, which helps serve communities across the whole nation, not just in the Cincinnati area. They distribute over 19 million meals through a network of 275 community agencies. www.fsfb.org. This is an astonishing number of meals that are handed out to those that are going hungry, which is the organizations main mission. No one should...

Words: 784 - Pages: 4

Premium Essay

The Foundation...

...Joshua Lecour 15 October 2015 Essay #2 The majority of adults today have a stable home life, which helps to build a stable foundation by the time they reach grade school. That’s all in thanks to having loving and caring parents, grandparents and caretakers to guide kids so that they can preform at the highest levels in life, especially scholastically. In a perfect world having a solid system like this to build on would be the perfect catapult for success in America’s school systems. Unfortunately, most children in the inner cities aren’t blessed to have a stable home because of the absence of consistent parental figures in the house. Sometimes these households have one parent within them because of divorce or other more saddening circumstance like the death of a parent. Death leads to an absence within a child life that will persist into their adult life. Despite the timing or reason behind these situations they greatly affect a child’s confidence, self-esteem and self worth. Instability within the household causes a child to suffer anxiety disorders and self-confidence issues, depending on the situations that occur like physical or substance abuse by the parent, which is taken with them into the classroom. This kind of conditioning at home also shapes the ability to interact with other students in a positive or negative way, which also leads to poor academic and social standing within a school setting. The easiest way to remedy the issues of poor performance in school due...

Words: 1846 - Pages: 8

Premium Essay

Foundations

...Letter to Stockholders To Our Stockholders: The year 2021 proved to be another successful year with significant progress for MESCK, Inc. It was the most profitable year for our company. We not only continued to stay ahead of our competitors by anticipating and accommodating changing customer trends, but also increased our market share of the sensor industry by 6.67% during the past year. Our company has historically held the majority share of the low-tech market, and with the recent release of Acorn and current innovations underway, MESCK, Inc. is well on its way to controlling the high-tech industry. The past year brought a 36.89% increase in net profit, moving our figure from $28,680,000 in 2020 to an impressive $45,923,000 in 2021. MESCK, Inc. also experienced a 29.7% jump in sales from the previous year, putting sales at a total of $199,054,000. Our earnings before interest (EBIT) of $83,493,000 and the company’s overall profit sharing figure of $937,000 exceeded all previous years. In an effort to stay on top of the market, our competitive strategy leads us to reinvest in our company, which has caused retained earnings to reach $149,276,000. Recent financial reports show MESCK, Inc. is in a healthy position for a fairly young company. While liabilities remained constant during 2021, current assets almost doubled, greatly increasing working capital. With the release of our newest product, Acorn, we experienced a high cash inflow from operations of $60,533,000...

Words: 625 - Pages: 3

Free Essay

Apache Foundation

...Foundation • Projects • People • Get Involved • Support Apache • Download • ASF Blog [pic] The Apache Software Foundation Celebrating a Decade of Open Source Leadership. The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users. [pic] Latest News Начало формы [pic][pic][pic] Конец формы If you would like to keep up with news and announcements from the foundation and all its projects, you can subscribe to the Apache Announcements List or you can subscribe to our foundation blog. Latest blog entries: The Apache Software Foundation Announces Apache SpamAssassin Version 3.3.0 Leading Open Source Email Filtering Package Offers First Major Code Release Since 2007 FOREST HILL, MD – 26 January, 2010 – The Apache Software Foundation (ASF) today announced the release of Apache SpamAssassin 3.3.0, the first major code release from the Apache SpamAssassin Project since May 2007. Apache SpamAssassin v3.3.0 marks the Project's 4th major (and 24th overall release) since the SpamAssassin Project joined the ASF in December 2003. Apache SpamAssassin is an award winning...

Words: 2086 - Pages: 9

Premium Essay

Foundation of Psychology

...Foundations of Psychology Dorothy Forrest June 8, 2012 Sarah Bihms Foundations of Psychology The miscellaneous condition of psychology is a scientific investigation of humankind mind, body, and behavior. Psychology includes different departments of psychology to apprehend and supervise observations on the mental technique of a person mind and behavior. Psychology is regularly used to establish the secrecy of the human behavior. Observation was the way to study a person mind to become aware of the mental conscious and unconscious states. As time went by psychology was established, alone with some major schools of thoughts. The paper below will examine the foundation of psychology, identify the major schools of thought in psychology, and examine their major underlying assumptions such as, behaviorism, psychoanalytic/psychodynamic, humanistic, and cognitive. In addition, it will identify the primary biological foundations of psychology linked to behavior such as, brain, central nervous system, peripheral nervous System, and genetics/evolution. Behavioral Theory Behavioral psychology, also known as behaviorism, is a learning theory established on the notion that behaviors are gathered by conditioning. Conditioning develops from influenced of the environment. There are two major types of conditioning classical and operant. Classical conditioning is a procedure used in behavioral training where a naturally stimulus is paired with a response. Operant conditioning...

Words: 1341 - Pages: 6

Premium Essay

Foundations of Psychology

...Foundations of Psychology John Stafford University of Phoenix PSY/300 Abstract There are several major approaches to psychological study with several other disciplines falling under these primary approaches. Ranging from psychodynamic to evolutionary perspectives, and rarely sharing a unified paradigm, psychology has advanced since the late 1800s to be a wide-ranging field of human study. Foundations of Psychology The study of psychology found roots in philosophy. However, Wilhelm Wundt, who founded the first psychological laboratory, led the recognition of psychology as a science in 1879. In the mid-to-late 1940s standards were put into place for the doctoral programs designed to place emphasis on a general knowledge of psychology. This knowledge included the history of psychology, and modern disciplines of physiological, comparative, developmental, and social psychology. Students were also required to gain an understanding of research methods, advanced statistics, and psychological scaling (Zlotlow, Peterson, & Nelson, 2011). Behavioral Foundations of Psychology The major topics covered in behavioral psychology include evolution, heredity, and adaptation and learning, mating habits, parenting behaviors, and primate study. Behavioral psychology primarily focuses on the study of animal behavior to obtain a deeper understanding of human behavior. Studies like Ivan Pavlov’s (1849-1936) research on classical conditioning, also referred to as “Pavlov’s Dogs,” he...

Words: 912 - Pages: 4

Premium Essay

Foundations of Research

...Foundations of Research Kevin Jackson UNIVERSITY OF PHOENIX April 22, 2013 Dr. Linda Crawford University of Phoenix Material Foundations of Research Template * Complete the following University of Phoenix Foundations of Research template. * Base your responses on at least four current scholarly sources, of which two are articles from peer-reviewed journals. * Cite references used according to APA 6th edition. Include an APA-formatted reference list. * Insert your reference list at the end of the document. * Demonstrate your understanding of the nature of the three major research methods by describing and comparing the foundations of quantitative and qualitative research for each of the following elements, using this template. Limit your response of each item to 100 words. * Nature of research: scientific and philosophical underpinnings The scientific and philosophical underpinnings need a foundation for inquiry to conduct research. Quantitative and qualitative research methodologies consist of three philosophical underpinnings, which is identified as: objectivism, subjectivism, and constructivism. The different philosophical foundations and scientific of quantitative and qualitative methodologies have different ontology and epistemology. In quantitative paradigms have an ontology and epistemology of, where the observer and the observed are considered separate and independent. Whereas, qualitative the ontology and...

Words: 867 - Pages: 4

Premium Essay

Foundations of Psychology

...The Foundations of Psychology Psychology is the scientific investigation of mental processes and behavior. Mental processes include how a person thinks, feels, remembers as well as a person’s behavior. When a doctor needs to understand a person they need to know the person’s biology, psychological experience, and cultural context. People’s experiences during their life from birth to adulthood are what shape how they feel and think. Early psychologists established several approaches and schools of thoughts of psychology. These schools of thought are known as the psychodynamic, behaviorist, cognitive and evolutionary perspectives. They came up with these by research and study which will be discussed throughout this paper. In many respects, these perceptions have progressed independently, and at the center of each are singularities the others tend to ignore (Kowalski & Westen, 2011). Despite their differences, each school of thought sought evolution for psychology as well as advancement of human understanding while remaining focused on the unique characteristics of contemporary psychology. Psychodynamic Perspective. The psychodynamic perspective belief is that most of the mental processes and emotions happen at the unconscious or subconscious levels, meaning below conscious awareness. Sigmund Freud was one of the most influential thinkers in the early twentieth century whose work in the psychodynamic...

Words: 1089 - Pages: 5

Free Essay

Charity Foundations

...The Bill & Melinda Gates Foundation Christina Bell University of Phoenix Dr. Kevin Bottomley HSM 260 The Bill & Melinda Gates Foundation Introduction Charities are an integral part of every community, whether it is a small non-profit or a worldwide organization. Charity is the way of helping people in need and even a small amount of donations can make a substantial impact on the community. The act of charity assists to make the community a better place to live by delivering services and goods to the group of individuals who may not otherwise have access to them (Ein-Gar & Levontin, 2013). While the funding of the government also makes a valuable contribution in fostering the charity work, many charities rely on donations from people and organizations as well. Furthermore, knowing that one has sacrificed something such as finances, property or time for the purpose to strengthen the way of living of people in need provides a sense of inner satisfaction and a purpose of life (Anheier, 2014). Many governmental entities are incapable to support certain types of charities. Therefore, these non-profit organizations depend on the funding from the common pubic. Among these charitable organizations, one organization that often comes in mind is the Bill & Melinda Gates Foundation due to its valuable contribution to the society. This paper will provide an overview about the Bill & Melinda Gates Foundation and highlights the projects it currently supports. ...

Words: 1017 - Pages: 5

Premium Essay

Foundations of Psychology

...Foundations of Psychology January 19, 2012 Foundation of Psychology Psychology is the study of the mind and the behavior of the subject in question. Multiple tests are conducted on the subject to discover what makes the individual tick. Like all scientific studies there must be a foundation for researchers to build their own studies from. Psychology is no different with its major schools being: behaviorist, psychodynamic, cognitive, and evolutionary. The behaviorist perspective is based off the information created by John B. Watson, Ivan Pavlov, and B. F. Skinner around the early 1950s. This theory is of the belief that there is a “relation between observable behaviors and environmental events or stimuli” (Kowalski and Westen, 2009). Classic conditioning was a method created due to the research of one Ivan Pavlov. Pavlov conditioned his dogs to begin salivating at the sound of a bell. Classic conditioning generally speaking is where the subject has been trained to give certain responses due to certain stimuli (Heffner, 2011). Exhibit A would be Pavlov’s dogs. Skinner later discovered that an individual’s behavior can also be controlled by stimuli from the environment that could either reinforce the response or deal out a punishment. The primary method to researching this perspective has been experimental. It allows researchers to make educated guesses before creating a situation to test their theory. The theory of psychodynamics was created by Sigmund Freud during the...

Words: 874 - Pages: 4

Premium Essay

Foundations of Psychology

...Foundations of Psychology Foundations of Psychology Nathan Teggerdine PSY/300 GENERAL PSYCHOLOGY Instructor: Ashley Dolecki There seems to be seven major schools of thought in psychology, structuralism, functionalism, gestalt psychology, behaviorism, psychoanalysis, humanistic and cognitive. Each major school of thought has it’s own major underlying assumption’s. First structuralism was one of the first major schools of thought in what was modern psychology. The structuralism approach really focuses on breaking down the mental process into really basic components. Functionalism was first formed based on the theories of the structuralist school of thought and was heavily influenced by the work of William James. (Cherry, 2014) Gestalt psychology is the school opf thought that looks at the human mind and a persons behavior as a whole. (Cherry, What is Gestalt Psychology?, 2014) Behaviorism was one of the main school of thought in psychology in the ninteen twenties until about ninteen fifty. Behaviorism is made up of a number of underlying assumtions reguarding specific methodology and behavioral analysis. (Mcloud, 2007) Psychoanalysis school of thought is mostly based on the idea that most of the time, people are completley unaware of things that determine what emotions they are feeling and when. It is also said that because these factors are for the most part on an unconscious level, during times when someone is struggling, advice and help from family members...

Words: 894 - Pages: 4

Free Essay

Foundations for Buildings

...` NATIONAL BOARD OF DIRECTORS FISCAL YEAR 2014-2015 PAOLO M MENDOZA, uapsa-mit NATIONAL PRESIDENT SHARLEEN MAE M ESTEVES, uapsa-feu NATIONAL EXECUTIVE VICE-PRESIDENT MARK ARTHUR DL CRUZ, uapsa-bulsu VICE-PRESIDENT FOR AREA A ZSENILLE A OPEÑA, uapsa-uphsd-c VICE-PRESIDENT FOR AREA B BERLIN JOHN T TOLENTINO, uapsa-lccb VICE-PRESIDENT FOR AREA C JANNAH CLARRISE B CLARIN, uapsa-upmin VICE-PRESIDENT FOR AREA D GELLI P RICO, uapsa-tup SECRETARY-GENERAL PAUL DANIEL D ARROZAL, uapsa-feu NATIONAL TREASURER AIRON J SAMAC, uapsa-mit NATIONAL AUDITOR HANNA B ARCILLA, uapsa-ust IMMEDIATE PAST NATIONAL PRESIDENT NEL JAMES B AQUINO, uapsa-slc DISTRICT DIRECTOR A-1A BARIQUIELLE T TORRADO, uapsa-uslt DISTRICT DIRECTOR A-1B JET LEVI L JOSON, uapsa-bulsu DISTRICT DIRECTOR A-2A JASLINE A REYES, uapsa-dhvtsu DISTRICT DIRECTOR A-2B ERIN T SUMBILLA, uapsa-tipqc DISTRICT DIRECTOR A-3 MARK ANTHONY M MADO, uapsa-ue DISTRICT DIRECTOR A-4, A-5 JOHN FEDERICK C MEJIA, uapsa-feu DISTRICT DIRECTOR B-1 MARVIN PAUL L SUGUITAN, uapsa-mit DISTRICT DIRECTOR B-2 SHERVIN M PEJI, uapsa-cvsu DISTRICT DIRECTOR B-3 MA. SHAMILE ANNE C CUETO, uapsa-batsu DISTRICT DIRECTOR B-4 JAN DARYL B AYCARDO, uapsa-bu DISTRICT DIRECTOR B-5 RAMON PHILIP M CURIT, uapsa-ub DISTRICT DIRECTOR C-1 MARY ROSE M FERRER, uapsa-norsu DISTRICT DIRECTOR C-2 MIKKA ANGELA T MENDOZA, uapsa-evsu DISTRICT DIRECTOR C-3 MA. SHARMAINE B BARRETTO, uapsa-usa DISTRICT DIRECTOR C-4 NESTOR T QUEZADA JR, uapsa-addu DISTRICT DIRECTOR D-1 JOMARIE P BARBA, uapsa-wmsu...

Words: 3732 - Pages: 15