Free Essay

Termpaper

In:

Submitted By sxu2
Words 2416
Pages 10
Siyao Xu
Dr. Fisk
CSCI 301
Term Paper Revision #1
24 November 2012
Internet Censorship of the People’s Republic of China 2000 years ago, in Qin Dynasty. The ancient Chinese Emperor Qin Shi Huang launched the infamous event "Burning of the Books". He burned all the books from the countries he conquered and thousands of Scholars were killed. Why it happened? The reason is simple, Qin Shi Huang wanted to censor any of the information either threat him or his nation. Today, the speed and the scale of the Internet development in China is incredible. However, development always accompanied with troubles. The globe is connected with the Internet. China is in front of a crossroads, a more open Internet society or another "Burning of the Internet"? The rest of the article will discuss the following points. 1. The background of the Chinese Internet censorship 2. Legal basis and requirements 3. Chinese Internet censorship measures 4. Cases of Internet censorship 5. The impact of Internet censorship 1. The background of the Chinese Internet censorship “The 23rd China Internet Development Statistics Report” released by the China Internet Network Information Center, CNNIC, in January 2009, according to the report, as the end of 2008, the number of Internet users in China had reached 298 million people, the number of mobile Internet had reached 117.6 million people. Internet penetration rate is 22.6%. Chinese netizens more than the United States, are the highest in the world. Internet users in China mainly use the Internet to read news, play online games, communicate through online social network and send emails. Also more and more businessmen chose to use the Internet to run their companies. Commercial activities on the Internet has been increased steadily. The growth rate of Internet users in China is 5-6 percent per month, the number of Internet users in China will soon be up to a quarter of the population, of slightly more than 250 million people around. In recent years, many Internet formulate laws also began to implement in China. The Internet and digital technology-based new media brings opportunities to China’s development, but it also brings problems to the closed-end management of the Chinese Communist Party. Former Chinese President Jiang Zemin, in the interview with Mike Wallace in 2000, said: “I hope that people to learn a lot of useful things from the Internet, but in any case, sometimes there are unhealthy things, especially online pornographic content hurt a lot to our young people. We want as much as possible to limit the development of useless information.” (http://renminbao.com/rmb/articles/2000/9/1/2786.html) As a result, Government decided to implement the Golden Shield Project with the purpose for keep the unhealthy things out. The idea of the Golden Shield Project is build by the former general secretary of the CPC Central Committee, the eldest son of President Jiang Zemin, Chinese Academy of Sciences, China Netcom directors Jiang Mianheng. And the implementation of the most important equipment, the Great Firewall of Internet censorship, is built by the designer Bin Xingfang, Chinese Academy of Engineering, the incumbent president of Beijing University of Posts and Telecommunications, he also called by netizens, the father of “the Great Firewall of China”. (http://www.aboluowang.com/news/2007/0821/52504.html) In May 2005, co-founded by Harvard Law School, the University of Cambridge and the University of Toronto, “Association for the Promotion of open network” (OpenNet Initiative) published a research report on China’s Internet blockade. The report said: “Chinese government controls and manipulates the information environment in which its citizens live, including websites, blogs, emails, and online discussion forums. ONI’s analysis found that government-mandated filtering in China has reached new levels of sophistication and breadth as it apparently tries to keep pace with evolving uses of the Internet for political expression, group organization, and access to sensitive materials ranging from health information to debates about Taiwan and Tibet.” (http://cyber.law.harvard.edu/node/398) 2. Legal basis and requirements The cause and manner of the Chinese government on the review of web content is diverse, multi-level, and inter-departmental. Review of network is the responsibility for all the levels and relevant departments from Internet service providers to the people’s governments. According to the article 10 of the Convention on the Chinese Internet industry self-regulation. Internet access service providers deal with access inside and outside the site inspection and supervision, refused to release harmful information site access, to eliminate the adverse effects of harmful information on our network users. (http://www.isc.org.cn/hyzl/hyzl/listinfo-15599.html) Article V of the international networking of computer information network security management approach based on 33 Decree of the Ministry of Public Security. Article V any unit or individual may not use the Internet to create, copy, access and dissemination of the following information:
(1) To incite resistance, undermine the Constitution and laws, administrative regulations implemented;
(2) Incitement to subvert state power and overthrow the socialist system;
(3) Incitement to split the country and undermine national unity;
(4) Incitement to ethnic hatred, ethnic discrimination, undermining national unity;
(5) Fabrication or distortion of facts, spread rumors, disturbs social order;
(6) Spread feudal superstition, obscenity, pornography, gambling, violence, murder, terrorism and abetting a crime;
(7) An affront others or fabricating facts to slander others;
(8) Damage the credibility of state organs;
(9) Other violation of the Constitution and the laws and administrative regulations. Resulting in access to illegal information on the Internet is also illegal. These are called “legal” documents; the inherent has legitimacy of controversial issues. 3. Chinese Internet censorship measures Since 1995, the Chinese government has promulgated more than 60 laws and regulations to regulate the Internet. The days when the sensitive political situation in the early 2000s, the government asked the NMS strict blockade of Falun Gong and sixty-four event, and other political themes website, the increasing spread of pornographic information is still not showing enough care and attention. This situation began to change in 2004; the authorities began to aggressively combat Internet pornography. Administrative means includes networking monitoring, implementation of the administrative penalty and judicial accountability, Government and Internet commentators guide online public opinion, the real-name system and filing, requirements of domestic and foreign companies to cooperate, condemnation and punishment of overseas companies and network report. Internet police, national security departments, news management departments, communication management departments, cultural departments, Radio, Film and Television, publishing departments and confidential sector staff to monitor the entire mainland China’s Forums, blogs, chat rooms, emails and any other Internet information. They use the technology domain name hijacking, keyword filtering, network sniffers, the Gateway IP blocking and electronic data forensics, etc… to gain or eliminate the information. The staffs will judge the content, and will delete all kinds are considered harmful information. They will ban and block the sites which may use the Internet to spread rumors, to spread harmful information. Meanwhile, the implementation of the network reviewing is put on certain group of people, and the background network communication of sensitive people is built. In addition, since May 2006, the authorities began recruiting network supervisor. They accept the guidance of the relevant departments on a regular basis and monitor the “uncivilized behavior, illegal and unhealthy information” on the network in their spare time by phone, email from time to time to participate in meetings and other ways to monitor views to the relevant units. Some network security branch, will recruit a network security officer. Network security has no enforcement power, mainly through network monitoring service units in a timely manner to remove all kinds of bad information, timely halt illegal alarm to the network supervision departments. In China, the punishment of violation of the laws of the network is relatively more severe. Not only publish bad information will face punishment, but also have access to relevant information may receive penalties from the Ministry of Public Security. Sichuan police used the clues obtained from the Office of the Commissioner of Provincial Public Security Department and the Supervisor detachment of Hangzhou, Zhejiang Province, on 9 Aug 2004, to identify the two men in 2004 March 21 and 2004 July 11 login a pornographic website, access, browse pornographic pictures and leave a message on the site. By users Internet account information and a lot of evidence, they arrested Mr. Han and Mr. Zhong two illegal suspects. (http://news.xinhuanet.com/newmedia/2004-08/25/content_1879691.htm) In addition to the passive censorship, the Chinese Government also vigorously develops the official website, and actively online publicity. City University of Hong Kong, said Professor Li Jinquan, “10% of all Chinese website is created and operated directly by the government, at all levels of Government to create a number of major news websites.” The authorities require network access, Internet cafes, and information publishing site, e-mail or even the game, to provide the real name for the record. Especially since February 2005, the Ministry of Information Industry requirements of all webhosting site provides access, hosting, web hosting services, IDC ISP to registration or login MII website for the record itself. Enterprises, institutions website or personal website, you must provide valid identification number at the time of the filing. The Chinese Government has adopted the technology provided by Cisco, Nortel, Oracle, 3Com and Microsoft and other foreign companies to block the network, and ordered Internet companies to help the government to filter the "sensitive" speech. (http://www.mega.nu/ampp/freespeech.html) The mainland China is scheduled for July 1, 2009, requires comprehensive per-installed Green Dam Youth Escort in the territory of the new production and sales of computer. The Chinese government said the purpose of installing the software is to protect a minor computer users mistakenly broke into the porn sites and other harmful content. The software, however, incur a lot of media and the government’s objection about large-scale implementation of the software pre-installed measures. On the eve of the implementation of the policy in June 2009, China high-profile condemned Google spread of pornography, and for a time blocked Google’s service. According to China Central Television “Focus” in June 2009, in Google, enter the keyword “son”, below it, but will show the option “son mother improper relationship” and so on ten options. The Chinese government requires Internet café provide Internet real-name registration, while cafes must install cafes security management software. Also provinces and cities Internet cafes must install the cultural regulatory system, control and timely block any articles unfavorable to the authorities. Governments and departments at all levels have created a report web site and telephone, used to receive the social harm website, report on politics, sex and violence. For example, the Report of the Ministry of Public Security Public phone is 010-65283344, 010-65207655 Report website is http://www.cyberpolice.cn; China Internet Illegal Information Reporting Centre Association http://net.china.cn/chinese / index.htm. 4. Cases of Internet censorship Most foreign news political class websites are blocked of interference. Wikipedia has been blocked for a long time. All language version of Wikipedia is unavailable in mainland China. Google.com is blocked in the middle of 2006. After reopened, part of the services offered by Google still cannot use normal in China. Some well-known international media: BBC, Voice of America Chinese and Deutsche Welle Chinese network. And so on. Flickr is blocked due to there are some pictures of the Tiananmen Square protests. (http://news.bbc.co.uk/chinese/simp/hi/newsid_6740000/newsid_6746200/6746271.stm) What’s more, websites like niconico, WordPress, Xanga, Opera Community, Blogger, LiveJournal, Dailymotion, YouTube and Plurk are also been blocked. And the famous social networking site Facebook, Twitter, and MySpace. Many sites filter by keywords appear occasionally inaccessible (such as Gmail). Such a filter is bi-directional, meaning that domestic websites containing keywords site inaccessible abroad, the foreign URL site contains keywords inaccessible in the country. 5. The impact of Internet censorship CCP network content review is based on the special nature of the social system, part of the public hold supportive attitude, as well as those who held the opposite view. For the ruling party and some people it seems the implementation of this system is some necessity. But it also produced a certain negative impact. In the eyes of those who pursuit of freedom of expression at home and abroad people, since only few in the world to implement a socialist and one-party dictatorship, censorship is conscious political manipulation. In March 2010, Ars Technica reports that, according to the IETF DNS operations mailing list discussion, a domain name registrar in Chile technicians said, their root name server i.root-servers.net node observed the strange behavior of the response returned when the user queries facebook.com. These sites are blocked in China, the domain name is contaminated, and this means that the Great Firewall DNS domain name pollution and domain name hijacking has affected the Internet. Finally, the root name servers in China because the multiple DNS pollution foreign network, threats to Internet security and freedom is to disconnect the connection with the Internet. (http://arstechnica.com/tech-policy/2010/03/china-censorship-leaks-outside-great-firewall-via-root-server/) Network regulation in China has reached a turning point. If the Chinese government blindly takes stringent regulatory regime, there could be no doubt that China will be further and further away from the world. If they can combine the realistic and change of policy to deal with the Internet today, it is undoubtedly not only for the mainland Chinese and the entire world is a boon.

Works Cited
Beijnum, Iljitsch Van. "ArsTechnica." Ars Technica. N.p., 25 Mar. 2010. Web. 03 Nov. 2012. .
"Berkman Center for Internet & Society." May 2005. Harvard University, 1 May 2005. Web. 03 Nov. 2012. .
Jia, Li. "江绵恒一手打造“金盾工程”希望一举数得." N.p., 21 Aug. 2007. Web. 03 Nov. 2012. .
Kramer, Staci D. "Enslaving Speech and Thought." AMPP: Enslaving Speech. N.p., 5 Jan. 2012. Web. 03 Nov. 2012. .
“Photo-sharing website flickr blocked." BBC News. BBC, 06 Dec. 2007. Web. 03 Nov. 2012. .
"The Interview of the President Jiang Zemin by CBS, 60 minutes" Renminbao, 1 Sept. 2000. Web. 03 Nov. 2012. .
"The Convention on the Chinese Internet industry self-regulation” Internet Society of China, 26 Mar. 2002. Web. 03 Nov. 2012. .
"Two Citizens Arrested Due to Viewing Pornographic Site" China Youth Daily, 25 Aug. 2004. Web. 03 Nov. 2012. .

Similar Documents

Free Essay

Termpaper

...To purchase a paperback copy please visit: http://www.cafepress.com/hanmilounge Thinking of starting your own online business or writing career? Try My Favorites: Internet and Computer Tutorials Newbie Club *** LOW COST - HIGH QUALITY! Websites and Domain names Netfirms *** E-Book Creation Software E-book Gold *** Sell your books and more. CafePress Self Publishing House *** Personalized Merchandise You create it, they sell & ship it! Zazzle *** Many resources for writers The Writers Store *** Search hundreds of Literary Agents in seconds! FirstWriter English Korean Phonetic Dictionary ROMANIZED Travel Companion Edition A beginner’s guide to the Korean language By D.L. Bangerter Emergency Word List ambulance bleeding breathless (not breathing) choking doctor food poisoning headache heart heart failure help hospital injured medicine pain painful painkiller pharmacy poison sick unconscious urgent g(k)oo-guuhp-chah pee-nah-yoh soom-ah-moht-sae-oh soom-mahk-hee-dah uuhee-sah s(sh)eek-joong-d(t)ohk d(t)oo-tohng sheem-jahng sheem-jahng-mah-bee d(t)oh-ah-choo-sae-oh b(p)yuhng-wuhn d(t)ah-chee-dah yahk g(k)oh-tohng ah-puuhn j(ch)een-tohng-jeh yahk-gook d(t)ohk-yahk mah-nee-ah-puuh-yoh moo-uuhee-sheek g(k)een-guuhp-hahn 구급차 피나요 숨 못쉬어요 숨막히다 의사 식중독 두통 심장 심장마비 도와주세요 병원 다치다 약 고통 아품 진통제 약국 독약 많이아프다 무의식 긴급한 Public Places airport bank downtown hotel immigration office market (small store) money changer police station post office...

Words: 27439 - Pages: 110

Free Essay

Termpaper

...Introduction to PC Components Here you will learn computer hardware tutorials introduction, basic pc components, networking devices, ram, vga, monitor and printer etc. Computer hardware is the physical part of the computer including the digital circuits inside the computer as opposed to the software that carry out the computing instructions. The hardware of a computer is unlikely to change frequently unless due to the crash or for upgrading them. The devices that is capable of storing, executing system instructions and controlling other logical outputs.  Hardware comprises all of the physical part of the computer such as Monitor, CPU, motherboard, ram, CD-Rom, printer, scanner, hard disk, flash drive (AKA pen drive), processor, pci buses, floppy disk, power supply, VGA card, sound card, network interface card, peripherals, joystick, mouse, keyboard, foot pedal, computer fan, camera, headset and others. On the other hard software is a logical part of a computer and is used to carry out the instructions, storing, executing and developing other software programs. A typical PC consists of a case or chassis in the desktop or tower case and these components. Motherboard • CPU • Computer Fan • RAM • BIOS • Digital Circuitry • Computer Fan • PCI Slots PC Buses • PCI • USB • Hyper-transport • AGP • ISA • EISA • VLB Media • CD-Rom • DVD-Rom • Combo box • Joystick • BD-Rom drive Internal storage • Hard disk (ATA & SATA) • Data array controller • Floppy disk ...

Words: 1889 - Pages: 8

Premium Essay

Termpaper

...Brainia.com Join Now! Login Search Saved Papers 60 Free Essays on Starbucks Control Mechanisms SEARCH Documents 1 - 30 of 1,000 1 2 3 4 5 6 7 8 9 ... 34 » Control Mechanisms Control Mechanisms Executive Summary February 1, 2006 The control mechanism for Raytheon Missile Systems and TUSD Food Services is bureaucratic while Pima Medical Institute has culture control. A control is any process that directs the activities of individuals toward the achievement of orga Premium 2 Page 344 Words Foucault and Truffaut: Power and Social Control in French Society Foucault and Truffaut: Power and Social Control in French Society Both Michel Foucault and Truffaut's depiction of a disciplinary society are nearly identical. But Truffaut's interpretation sees more room for freedom within the disciplinary society. The difference stems from Foucault's be Premium 3 Page 727 Words Starbucks Srategy 1) Starbucks used mostly a differentiation strategy, however it had also used a cost leadership strategy. Its differentiation strategy was exemplified by their stores providing an experience, offering interesting coffee-related drinks in a theatrical kind of atmosphere, their unique Coffee blending Premium 4 Page 900 Words Problems in Air Traffic Control and Proposed Solutions Problems in Air Traffic Control and Proposed Solutions In northern California this summer, the Federal Aviation Administration (FAA) unintentionally performed it's first operational test of...

Words: 1787 - Pages: 8

Premium Essay

Termpaper

...Term Paper Topics on Human Resource Management Human resources managers can be involved in hiring and training employees in addition to administering a company's benefits program, reports Education Portal. The median annual wages of human resources managers in May 2008 ranged from $86,500 to $96,130, according to the Bureau of Labor Statistics (BLS). A bachelor's degree is the minimum requirement to land a human resources position, with many companies preferring managerial job candidates who have a master's degree. A term paper in a human resources management degree program can cover a wide variety of industry topics. Labor Relations Labor relations is a major focus area for human resources management students. If you are interested in writing a term paper on labor/employee relations, you can concentrate on the area of conflict resolution or explain the value of integrative bargaining--which is more cooperative--versus distributive bargaining, which is more competitive. You additionally could write about current issues and changing trends in employment laws that cover fair labor standards, pension funds and Occupational Health and Safety Administration requirements, according to the University of Rhode Island. In addition, you can evaluate case studies on collective bargaining and explore the functions of the National Labor Relations Board and state labor boards. Diversity A popular human resources management term paper topic is diversity in the workplace, according to DeVry...

Words: 432 - Pages: 2

Free Essay

Termpaper

...SCORE: (PRELIMS) EXERCISES 4 IN TRIGONOMETRY SET A Name: ___________________________________ Course, Year & Section: ____________________ Date: ____________________________________ Instructor: ________________________________ A. Tell whether a triangle with sides of the given lengths is acute, right or obtuse. 1. 11, 11, 15 2. 6, 6, 62 3. 9, 9, 13 4. 8, 83, 16 5. 8, 14, 17 B. Tell whether each group of angles could form a triangle. Write Yes or No. 1. 39°, 35°, 116° 2. 75°, 80°, 25° 3. 30°, 60°, 90° 4. 46°, 79°, 65° 5. 102°, 50°, 48° C. Draw the right triangle whose sides have the following values, and find the six trigonometric functions of the angle A. 1. a = 4, b = 3, c = 5 2. a = 2, b = 3, c = 13 3. a = 2, b = 5, c = 13 4. a = 1, b = 1/3 5. b = 21, c = 29 D. Solve the following problems. 1. The lengths of the sides of a rectangle are 5 cm and 10 cm respectively. What will be the length of the diagonal? 2. If the length of the diagonal of a square is 22 cm, what will be the length of one of the sides? 3. An 8m long ladder is leaning against a 5m high wall. How long is the foot of the ladder from the wall? 4. A lineman who is 3m away from an electrical post is holding a 12m cable wire which is connected to the top of the post. What is the height of the electric post? 5. A man travels 15 km due north, then goes 5 km due east. How far is he...

Words: 271 - Pages: 2

Premium Essay

Termpaper

...Chapter 9 Taxation: Income and Wealth Classification of Taxes on Income and Wealth: 1. the personal and corporate income taxes; 2. the transfer taxes, namely, the estate and inheritance taxes; 3. the real property tax on realty used for personal purposes; 4. the individual residence tax, both basic and additional; 5. the tax on motor vehicle used for personal purposes; 6. the immigration tax; 7. firearms license fee; 8. hunting permits; and 9. social security contributions, both of private and public employees. Arguments for Taxes on Income and Wealth Taxation is a fiscal tool of government for the achievement of economic, sometimes non-economic, goals. GOALS: 1. maximum freedom for choice, consistent with the welfare of others; 2. optimum standards of living, in terms of available resources and techniques; 3. an optimum rate of economic growth; and 4. distribution of income in conformity with the standards of equity currently accepted by society. Characteristics of Tax System Economic effects. – The tax structure must be established in such a way as to avoid interference with the attainment of the optimum allocation and use of resources and where possible, to assist in the attainment of the optimum. Equity. – The distribution of the tax burden must conform to the pattern of income distribution regarded as the optimum by the consensus in contemporary society. Minimum costs of collection and compliance, consistent with effective enforcement....

Words: 3264 - Pages: 14

Premium Essay

Termpaper

...Objective of the study: 1. To develop a general understanding and situation under negotiation; 2. To develop a thorough understanding of the interests of both side and their relation to the negotiations; 3. To undertake adequate preparation to realize these interests and resolve the problematic situation. Introduction: In simplest terms, negotiation is a discussion between two or more disputants who are trying to work out a solution to their problem. This interpersonal or inter-group process can occur at a personal level, as well as at a corporate or international (diplomatic) level. Negotiations typically take place because the parties wish to create something new that neither could do on his or her own, or to resolve a problem or dispute between them. The parties acknowledge that there is some conflict of interest between them and think they can use some form of influence to get a better deal, rather than simply taking what the other side will voluntarily give them. They prefer to search for agreement rather than fight openly, give in, or break off contact. Here I have drawn a negotiation module where I have discussed my performance and contributions and that of my negotiating team to the negotiation process. Negotiating role-plays of the different members of my negotiating team: Here I have described a lot about effective negotiation and problem solving. I am an Operating Officer of a cell phone case manufacturer. So I am intimately familiar with all the inn’s...

Words: 1098 - Pages: 5

Free Essay

Termpaper

...The Plot: Dekada 70 is a story of a family caught in the midst of a tumultuous time in Philippine history – the martial law years. Amanda (Vilma Santos) and Julian (Christopher Deleon) is a picture of a middle class couple with conservative ideologies, who must deal with raising their children, five boys – Jules (Piolo Pascual), Isagani (Carlos Agassi), Emmanuel (Marvin Agustin), Jason (Danilo Barrios) and Bingo (John Sace) in an era marked by passion, fear, unrest and social chaos. As siblings struggle to accept the differences of their ideologies, as a father faces the painful dissent of his children, a mother’s love will prove to be the most resonant in the unfolding of this family’s tale, will awaken to the needs of her own self, as she embarks on a journey of discovery to realize who she is as a wife, amother, a woman and a Filipino. – Star Cinema Dekada ’70 (English: 70s Decade) is a 2002 Filipino drama film released based on a book called Dekada ’70 written by Filipino author, Lualhati Bautista. The film tells the story of the life of a middle-class Filipino family who, over the space of a decade, become aware of the political policies that have ultimately led to repression and a state of Martial law in the Philippines. Filipina actress Vilma Santos stars as Amanda, who realizes the implications of living within a dictatorship after sorting out the contradictory reactions of her husband and five sons. Her husband (Julian), played by Filipino actor, Christopher de Leon...

Words: 349 - Pages: 2

Premium Essay

Termpaper

...Garment Factory Compliance • Home • About • Top of Form [pic][pic] Bottom of Form [pic]Indian Textile Industry and Garment Exports November 28, 2012 Disha Leave a comment The Indian textile industry is one of the largest industries in the world, with a huge raw material and textile manufacturing base. The industry occupies a unique position as a self-reliant industry, from the production of raw materials to the delivery of finished products. This large and ancient industry has carved out a special niche for itself as a facilitator of the county’s economic growth and participative development. Textile industry in India is a highly versatile sector, with smaller firms providing flexibility needed for smaller orders; the larger firms have the capacity to service the world’s biggest buyers. The Government of India has also undertaken several favourable policy initiatives, which have resulted in the growth of the sector. “Indian textile industry contributes about 14 per cent to industrial production, 4 per cent to the country’s gross domestic product (GDP) and 16.63 per cent to export earnings,” as per Ministry of Commerce and Trade, India. Major destination for Indian garment exports The USA is the number one destination for the exports of Indian apparels. During 2011, the garment imports to the USA from world were around US$ 81.51 billion. India exports garments of worth US$ 3.53 billion to the USA, which accounts for 4.33 per cent share in the USA’s total...

Words: 18280 - Pages: 74

Premium Essay

Termpaper

...CONSUMER SATISFACTION OF BEVERAGE: THE CASE OF “COCA-COLA COMPANY” Please note that this is an academic exercise and the findings of this study will remain confined between our course instructor and us. All the information provided by you would be kept secret and these will help our decision making. So please give us your kind suggestions without any hesitation. Name: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ Address and Phone: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 1. Gender: Male Female 2. Age: Bellow 15 years 15-25 years 26-35 years Above 35 years 3. Occupation: Student Service Housewife Business Others 4. Monthly family income: Bellow TK 5000 TK 5000-10000 TK 10000-15000 TK 15000-20000 TK 20000 above 5. Do you drink BEVERAGE? Yes No If “Yes” how frequently? Weekly Fortnightly Monthly Everyday 6. Do you take BEVERAGE? 7:00am- 12.00 pm 12.oo pm – 3pm 3 pm. – 7 pm 7pm- 12am 7. How many liters of BEVERAGE do you purchase at a time? 1-2 liter 2-4 liter 1/2-1 liter 0-1/2 liter 8. Which brands of BEVERAGE do you prefer most? Coca-Cola Pepsi Mojo...

Words: 443 - Pages: 2

Free Essay

Termpaper

...THE SIERRA LEONE CHAPTER OF THEPUBLIC SECTOR MANAGEMENT TRAINING PROGRAMME (CLASS OF 2013) 1. DUGBA NGOMBU 12024487 2. MUSA SAIDU 12024474 3. SAMUEL SESAY 12024513 4. GIBRILLA JUSU 12024494 5. ANTHONY DOMAWA 12024476 6. HENRY TALUVA 12024496 7. DOROTHY ADEOLA 12024486 INTRODUCTION Sierra Leone is a constitutional republic with unicameral parliamentary system (GoSL, 2009). The President is the Head of State, the supreme executive authority of the Republic and the Commander-in-Chief of the Armed Forces of Sierra Leone. He is the Fountain of Honour and Justice and the symbol of national unity and sovereignty. The President is also the guardian of the Constitution and the guarantor of national independence and territorial integrity, and shall ensure respect for treaties and international agreements (GoSL, 1991). Under the constitution (1991), no person shall hold office as President for more than two terms of five years each whether or not the terms are consecutive. The legislature of Sierra Leone, the Parliament consists of the President, the Speaker and Members of Parliament (GoSL, 1991). There are 124 Members of Parliament, 112 of whom are elected by a universal adult suffrage to represent their constituencies. The 12 are Paramount Chief Representatives to Parliament who are voted for by their fellow PCs and the chiefdom councilors, each PC representing a provincial district. The MPs (not as in the case of the president)...

Words: 4908 - Pages: 20

Premium Essay

Termpaper

...The assigned chapter for the week in the Northouse text proved a timely resource in the topic of introducing and maintaining leadership development in the organization. According to Northouse (2010), the psychodynamic approach to leadership emphasizes the importance of the leader, and follower I might add, becoming aware of their personality types and their implications on work and relationships. One cannot improve what one does not work on. This takes intentional effort. Especially as the landscape of the organization and subsequently, leadership has changed in recent times. Macoby (2007) argues for the notion of social character as a way of looking at leadership in terms of the psychology of followers. He defines social character as "macro personality based on the emotional attitudes and values shared by people in a certain context." Maccoby (2007) contends that there has been a shift in the social character of our times which has resulted in movement away from an industrial economy to a knowledge-based one. Here, formal hierarchical organizations are giving way to networks, collaborations and more of a horizontal structure. Persons in organizations today no longer want to be mere followers but collaborators in a joint effort between leaders and "what were once followers" (Northouse). They favor continual improvement and creativity as opposed to stability. Given the mindset change and expectation as regards leadership and the organization, the only logical conclusion is to...

Words: 860 - Pages: 4

Premium Essay

Termpapers

...Kenya’s education system is divided into three stages: primary, secondary and higher education. Primary education starts at the age of six, lasts for eight years and is organised in three stages: lower primary (ages 6-8 or grade 1-3), middle (9-10 or grades 4-5) and upper primary (ages 11-13 or grades 6-8). Secondary education lasts four years (ages 14-17 or form 1-4). Challenges to the education system Kenya’s population is growing fast at 2.7% annually, putting extra pressure onto an already struggling public sector Progression from primary to secondary is an issue with only 50% of children in 2009 enrolled in secondary school A 2011 study reporting on the Kenyan status of education found: learning levels to be relatively low. Nationally, seven out of ten children in Class 3 could not do Class 2 work (Class 2 work represents basic skills.) student and teacher absenteeism to be a challenge. In many districts, more than four out of ten children missed school daily. On any single day, 13 out of 100 teachers were not in school teacher shortages in primary schools to be acute. On average, every Kenyan primary school had a shortage of four teachers (Uwezo, 2011) Poor learning levels seem to be a stubborn problem; between 2000 and 2007, levels of achievement for Grade 6 students in both reading and mathematics did not improve. Studies have attributed this lack of improvement to the high levels of pupil drop out and repetition rates (SACMEQ...

Words: 312 - Pages: 2

Free Essay

Termpaper

...Project on Bangladesh cÖvK…wZK `~‡h©v‡Mi e¨e¯’vcbv, N~wY©S‡oi Dci GKwU mgx¶v| f~‡Mvj I cwi‡ek wefvM RMbœv_ wek¦we`¨vjq, XvKv| Gg.Gm.wm †kl c‡e©i cvV¨m~wPi AvswkK cwic~iK wn‡m‡e cÖvK…wZK `~‡h©v‡Mi e¨e¯’vcbv, N~wY©S‡oi Dci GKwU mgx¶v| Dc¯’vcbvq †gvt Rwmg DwÏb cix¶vi †ivj bs-752824 ‡iwR bs-066124 f~‡Mvj I cwi‡ek wefvM RMbœv_ wek¦we`¨vjq, XvKv| Gg.Gm.wm †kl c‡e©i cvV¨m~wPi AvswkK cwic~iK wn‡m‡e cÖvK…wZK `~‡h©v‡Mi e¨e¯’vcbv, N~wY©S‡oi Dci GKwU mgx¶v| ZË¡veavqK †gvnv¤§` Avãyj Kv‡`i cÖfvlK RMbœv_ wek¦we`¨vjq, XvKv| Dc¯’vcbvq †gvt Rwmg DwÏb ‡kªYx †ivj t 672660 cix¶vi †ivj bs-752827 ‡iwR bs-066124 f~‡Mvj I cwi‡ek wefvM RMbœv_ wek¦we`¨vjq, XvKv| Aby‡gv`b cÎ Avgiv wbgœ ¯^v¶iKvix wefvMxq wk¶K e„›` Avb‡›`i mv‡_ cªZ¨qb KiwQ †h, †gvt Rwmg DwÏb, Gg,Gm,wm dvBbvj 2007Bs mv‡ji GKRb cwi¶v_x© wn‡m‡e RMbœv_ wek¦we`¨vj‡qi cvV¨µg Abymv‡i AšÍ©f~³ evsjv‡`‡ki †h †Kvb wel‡qi Dci cÖKí Kv‡Ri Ask wn‡m‡e cÖvK…wZK `~‡h©v‡Mi e¨e¯’vcbv, N~wY©S‡oi Dci GKwU mgx¶v| Ó wk‡ivbv‡g M‡elYv Kg©wU cwiPvjbv K‡i cÖwZ‡e`b Dc¯’vcb Kivi AbygwZ cÖ`vb Kiv n‡jv| GB cÖwZ‡e`‡bi gva¨‡g M‡elYv cwiPvjbvKvix `xcK mvaK M‡elYv mswk­ó wel‡qi Mfxi Áv‡bi cwiPq enb K‡i| hv Zvi Gg.Gm.wm dvBbvj cix¶v 2007 Gi Rb¨ LyeB ¸i“Z¡c~Y©| |mvwe©K wb‡`©kbvq t | | |cÖwZ¯^v¶i |cÖwZ¯^v¶i | |...

Words: 2170 - Pages: 9

Premium Essay

Termpaper

...Accounting Information System Prepared for Arif Rana School of Business Prepared by Abdul Baten ID- 11315069 Poritos Chandra Day ID- 10315117 Farzana Arju ID- 11315115 Shohel Rana ID- 11315028 Nazrul Islam ID- 11315113 Asif Iqbal ID- 10315025 Farjana Ferdousi ID- 09515009 University of Information Technology and Sciences (UITS) 23rd December 2011 Table of Contents |Part |SL No. | |Page | | | |Introduction Of Company | | |A | | | | | | |Overview of the company | | | | |Products of the company | | | | | | | | | |What is AIS | | | | | ...

Words: 1871 - Pages: 8